aboutsummaryrefslogtreecommitdiffstats
path: root/testing
Commit message (Collapse)AuthorAgeFilesLines
...
* tests: Introduced SWANCTL flag in test.confAndreas Steffen2015-07-219-23/+57
|
* tests: fixed evaltest of swanctl/rw-cert scenarioAndreas Steffen2015-07-211-2/+2
|
* tests: fixed description of swanctl ip-pool scenariosAndreas Steffen2015-07-212-9/+8
|
* testing: Do not attempt to start the test environment if hosts are still runningTobias Brunner2015-07-151-0/+1
|
* testing: Enable AESNI/PCLMULQD in moon/sun guests, if supportedMartin Willi2015-07-122-0/+10
|
* testing: Do not overwrite kernel configuration if it already existsMartin Willi2015-07-121-1/+4
| | | | | This allows us to do changes to the kernel configuration using menuconfig and friends, and update the kernel with make-testing.
* testing: Extract and patch each kernel version only onceMartin Willi2015-07-121-8/+11
| | | | | | This allows us to do modifications to the kernel tree and rebuild that kernel using make-testing. We can even have a git kernel tree in a directory to do kernel development.
* testing: Build with --enable-chapolyMartin Willi2015-07-121-0/+1
|
* testing: use a decent PSKAndreas Steffen2015-05-302-2/+2
|
* testing: Added ha/active-passive scenarioAndreas Steffen2015-05-3021-0/+441
|
* testing: Include iperf and htop in base imageTobias Brunner2015-05-221-2/+2
|
* testing: Don't check parent dir (and subdirs) when downloading OpenSSL packagesTobias Brunner2015-05-211-1/+1
|
* testing: Fix kernel download URL for kernel versions != 4.xTobias Brunner2015-05-191-1/+1
|
* testing: Fix URL to TNC@FHH project in scenario descriptionsTobias Brunner2015-05-056-8/+8
|
* testing: Update TKM assert stringsReto Buerki2015-05-057-10/+10
|
* testing: Update alog to version 0.3.1Reto Buerki2015-05-051-1/+1
|
* testing: Update tkm to version 0.1.2Reto Buerki2015-05-051-1/+1
|
* testing: Update tkm-rpc to version 0.2Reto Buerki2015-05-051-1/+1
|
* testing: Updated carol's certificate from research CA and dave's certificate ↵5.3.1dr1Andreas Steffen2015-04-2652-846/+898
| | | | from sales CA
* testing: Wait for DH crypto tests to completeAndreas Steffen2015-04-268-8/+8
|
* imv_policy_manager: Added capability to execute an allow or block shell ↵Andreas Steffen2015-04-267-2/+24
| | | | command string
* testing: Migration of KVM framework to Linux 4.x kernelAndreas Steffen2015-04-253-5/+2207
|
* Added tnc/tnccs-20-fail-init and tnc/tnccs-20-fail-resp scenariosAndreas Steffen2015-03-2730-0/+404
|
* Added configurations for 3.18 and 3.19 KMV guest kernelsAndreas Steffen2015-03-272-0/+4346
|
* Added tnc/tnccs-20-pt-tls scenarioAndreas Steffen2015-03-2724-5/+114
|
* testing: added tnc/tnccs-20-mutual scenarioAndreas Steffen2015-03-2311-0/+151
|
* testing: Remove obsolete leftnexthop option from configsTobias Brunner2015-03-126-6/+0
|
* testing: Don't check for exact IKEv1 fragment sizeMartin Willi2015-03-101-2/+2
| | | | | Similar to 7a9c0d51, the exact packet size depends on many factors we don't want to consider in this test case.
* testing: Fix active/passive role description in ha/both-active test caseMartin Willi2015-03-101-2/+2
|
* testing: Update modified updown scripts to the latest templateTobias Brunner2015-03-0614-2589/+993
| | | | | This avoids confusion and makes identifying the changes needed for each scenario easier.
* use SHA512 for moon's BLISS signatureAndreas Steffen2015-03-042-2/+3
|
* testing: Test classic public key authentication in ikev2/net2net-cert scenarioTobias Brunner2015-03-042-0/+2
|
* testing: Disable signature authentication on dave in ↵Tobias Brunner2015-03-042-2/+3
| | | | openssl-ikev2/ecdsa-certs scenario
* testing: Don't check for exact IKEv2 fragment sizeTobias Brunner2015-03-041-2/+2
| | | | | Because SHA-256 is now used for signatures the size of the two IKE_AUTH messages changed.
* testing: Update test conditions because signature schemes are now loggedTobias Brunner2015-03-0433-58/+58
| | | | | RFC 7427 signature authentication is now used between strongSwan hosts by default, which causes the actual signature schemes to get logged.
* testing: Add ikev2/rw-sig-auth scenarioTobias Brunner2015-03-0412-0/+180
|
* testing: Add ikev2/net2net-cert-sha2 scenarioTobias Brunner2015-03-049-0/+104
|
* Implemented improved BLISS-B signature algorithmAndreas Steffen2015-02-254-0/+0
|
* testing: Add a forecast test caseMartin Willi2015-02-2011-0/+152
|
* testing: Build forecast pluginMartin Willi2015-02-201-0/+1
|
* testing: Add a connmark plugin testMartin Willi2015-02-209-0/+109
| | | | | | | | | | In this test two hosts establish a transport mode connection from behind moon. sun uses the connmark plugin to distinguish the flows. This is an example that shows how one can terminate L2TP/IPsec connections from two hosts behind the same NAT. For simplification of the test, we use an SSH connection instead, but this works for any connection initiated flow that conntrack can track.
* testing: Build strongSwan with the connmark pluginMartin Willi2015-02-201-0/+1
|
* testing: Install iptables-dev to guest imagesMartin Willi2015-02-201-1/+1
|
* testing: Update description and test evaluation of host2host-transport-natMartin Willi2015-02-203-9/+8
| | | | | | | | As we now reuse the reqid for identical SAs, the behavior changes for transport connections to multiple peers behind the same NAT. Instead of rejecting the SA, we now have two valid SAs active. For the reverse path, however, sun sends traffic always over the newer SA, resembling the behavior before we introduced explicit SA conflicts for different reqids.
* testing: Be a little more flexible in testing for established CHILD_SA modesMartin Willi2015-02-208-21/+21
| | | | | As we now print the reqid parameter in the CHILD_SA details, adapt the grep to still match the CHILD_SA mode and protocol.
* testing: Add a test scenario for make-before-break reauth using a virtual IPMartin Willi2015-02-209-0/+100
|
* testing: Add a test scenario for make-before-break reauth without a virtual IPMartin Willi2015-02-209-0/+97
|
* testing: Add tkm xfrmproxy-expire testReto Buerki2015-02-2011-0/+121
| | | | | | This test asserts that the handling of XFRM expire messages from the kernel are handled correctly by the xfrm-proxy and the Esa Event Service (EES) in charon-tkm.
* testing: Assert ees acquire messages in xfrmproxy testsReto Buerki2015-02-202-0/+2
|
* testing: Assert proper ESA deletionReto Buerki2015-02-201-0/+4
| | | | | Extend the tkm/host2host-initiator testcase by asserting proper ESA deletion after connection shutdown.