Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | testing: Update certs and keys in tkm tests | Reto Buerki | 2014-09-17 | 6 | -0/+0 | |
| | | | | References #705. | |||||
* | testing: Update x509-ada version to 0.1.1 | Reto Buerki | 2014-09-17 | 1 | -1/+1 | |
| | | | | Fixes #705. | |||||
* | Generated new test certificates | Andreas Steffen | 2014-08-28 | 76 | -351/+542 | |
| | ||||||
* | testing: Make sure the kernel exists when starting | Tobias Brunner | 2014-08-25 | 1 | -0/+1 | |
| | ||||||
* | Updated URL to swidGenerator in recipe5.2.0 | Andreas Steffen | 2014-07-09 | 1 | -1/+1 | |
| | ||||||
* | Update KVM test framework to 3.15 guest kernel5.2.0rc1 | Andreas Steffen | 2014-06-27 | 2 | -3/+2086 | |
| | ||||||
* | testing: Add sql/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 18 | -0/+740 | |
| | ||||||
* | testing: Add pfkey/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-26 | 13 | -0/+175 | |
| | ||||||
* | testing: Remove obsolete shunt-policies scenarios | Tobias Brunner | 2014-06-26 | 24 | -688/+0 | |
| | ||||||
* | Updated description of TNC scenarios concerning RFC 7171 PT-EAP support | Andreas Steffen | 2014-06-26 | 6 | -24/+30 | |
| | ||||||
* | Removed django.db from swid scenarios | Andreas Steffen | 2014-06-26 | 2 | -0/+0 | |
| | ||||||
* | testing: Add ikev2/shunt-policies-nat-rw scenario | Tobias Brunner | 2014-06-19 | 12 | -0/+171 | |
| | ||||||
* | testing: Remove ikev2/shunt-policies scenario | Tobias Brunner | 2014-06-19 | 10 | -166/+0 | |
| | | | | | This scenario doesn't really apply anymore (especially its use of drop policies). | |||||
* | Added swanctl/net2net-route scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+145 | |
| | ||||||
* | Added swanctl/net2net-start scenario | Andreas Steffen | 2014-06-18 | 9 | -0/+140 | |
| | ||||||
* | Minor changes in swanctl scenarios | Andreas Steffen | 2014-06-18 | 7 | -5/+8 | |
| | ||||||
* | Added swanctl --list-pols and swanctl --stats do scenario log | Andreas Steffen | 2014-06-18 | 1 | -3/+12 | |
| | ||||||
* | testing: Delete accidentally committed test cases | Tobias Brunner | 2014-06-18 | 57 | -920/+0 | |
| | ||||||
* | Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenarios | Andreas Steffen | 2014-06-14 | 22 | -0/+441 | |
| | ||||||
* | Single-line --raw mode simplifies evaltest of swanctl scenarios | Andreas Steffen | 2014-06-14 | 5 | -92/+16 | |
| | ||||||
* | Added swanctl/ip-pool-db scenario | Andreas Steffen | 2014-06-11 | 11 | -0/+246 | |
| | ||||||
* | Updated strongTNC configuration | Andreas Steffen | 2014-06-11 | 8 | -12/+15 | |
| | ||||||
* | Added swanctl/ip-pool scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+231 | |
| | ||||||
* | Added swanctl/rw-cert scenario | Andreas Steffen | 2014-06-10 | 11 | -0/+216 | |
| | ||||||
* | Define default swanctl credentials in hosts directory | Andreas Steffen | 2014-06-10 | 30 | -4/+383 | |
| | ||||||
* | testing: Cache packages downloaded with pip for strongTNC | Tobias Brunner | 2014-06-02 | 1 | -2/+7 | |
| | | | | This way no network connections is required to rebuild the root/guest images. | |||||
* | First swanctl scenario5.2.0dr5 | Andreas Steffen | 2014-06-01 | 17 | -14/+515 | |
| | ||||||
* | Test SWID REST API ins tnc/tnccs-20-pdp scenarios | Andreas Steffen | 2014-05-31 | 83 | -73/+1113 | |
| | ||||||
* | Migration from Debian 7.4 to 7.5 | Andreas Steffen | 2014-05-31 | 11 | -18/+18 | |
| | ||||||
* | Minor changes in the test environment5.2.0dr4 | Andreas Steffen | 2014-05-15 | 3 | -1/+11 | |
| | ||||||
* | Implemented PT-EAP protocol (RFC 7171) | Andreas Steffen | 2014-05-12 | 46 | -156/+163 | |
| | ||||||
* | testing: Added pfkey/compress test case | Tobias Brunner | 2014-04-24 | 9 | -0/+100 | |
| | ||||||
* | Handle tag separators | Andreas Steffen | 2014-04-15 | 1 | -1/+1 | |
| | ||||||
* | Renewed expired user certificate | Andreas Steffen | 2014-04-15 | 7 | -49/+75 | |
| | ||||||
* | Updated SWID scenarios | Andreas Steffen | 2014-04-15 | 6 | -4/+18 | |
| | ||||||
* | Implemented segmented SWID tag attributes on IMV side | Andreas Steffen | 2014-04-15 | 54 | -36/+101 | |
| | ||||||
* | Use python-based swidGenerator to generated SWID tags | Andreas Steffen | 2014-04-15 | 16 | -21/+46 | |
| | ||||||
* | Make Attestation IMV independent of OS IMV | Andreas Steffen | 2014-04-15 | 21 | -11/+310 | |
| | ||||||
* | Fixed pretest script in tnc/tnccs-20-pt-tls scenario | Andreas Steffen | 2014-04-04 | 1 | -1/+1 | |
| | ||||||
* | testing: Run 'conntrack -F' before all test scenarios | Tobias Brunner | 2014-04-02 | 28 | -41/+14 | |
| | | | | This prevents failures due to remaining conntrack entries. | |||||
* | Test TLS AEAD cipher suites | Andreas Steffen | 2014-04-01 | 10 | -10/+17 | |
| | ||||||
* | Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenario | Andreas Steffen | 2014-03-31 | 1 | -1/+1 | |
| | ||||||
* | revocation: Restrict OCSP signing to specific certificates | Martin Willi | 2014-03-31 | 2 | -3/+2 | |
| | | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally. | |||||
* | testing: Add an acert test that forces a fallback connection based on groups | Martin Willi | 2014-03-31 | 13 | -0/+199 | |
| | ||||||
* | testing: Add an acert test case sending attribute certificates inline | Martin Willi | 2014-03-31 | 18 | -0/+291 | |
| | ||||||
* | testing: Add an acert test using locally cached attribute certificates | Martin Willi | 2014-03-31 | 16 | -0/+239 | |
| | ||||||
* | testing: build strongSwan with acert plugin | Martin Willi | 2014-03-31 | 1 | -0/+1 | |
| | ||||||
* | Added libipsec/net2net-3des scenario | Andreas Steffen | 2014-03-28 | 11 | -0/+1521 | |
| | ||||||
* | Renewed self-signed OCSP signer certificate | Andreas Steffen | 2014-03-27 | 4 | -43/+45 | |
| | ||||||
* | Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵ | Andreas Steffen | 2014-03-24 | 1 | -0/+4 | |
| | | | | scenario |