aboutsummaryrefslogtreecommitdiffstats
path: root/testing
Commit message (Collapse)AuthorAgeFilesLines
* testing: Added pfkey/compress test caseTobias Brunner2014-04-249-0/+100
|
* Handle tag separatorsAndreas Steffen2014-04-151-1/+1
|
* Renewed expired user certificateAndreas Steffen2014-04-157-49/+75
|
* Updated SWID scenariosAndreas Steffen2014-04-156-4/+18
|
* Implemented segmented SWID tag attributes on IMV sideAndreas Steffen2014-04-1554-36/+101
|
* Use python-based swidGenerator to generated SWID tagsAndreas Steffen2014-04-1516-21/+46
|
* Make Attestation IMV independent of OS IMVAndreas Steffen2014-04-1521-11/+310
|
* Fixed pretest script in tnc/tnccs-20-pt-tls scenarioAndreas Steffen2014-04-041-1/+1
|
* testing: Run 'conntrack -F' before all test scenariosTobias Brunner2014-04-0228-41/+14
| | | | This prevents failures due to remaining conntrack entries.
* Test TLS AEAD cipher suitesAndreas Steffen2014-04-0110-10/+17
|
* Slightly edited evaltest of ikev2/ocsp-untrusted-cert scenarioAndreas Steffen2014-03-311-1/+1
|
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-312-3/+2
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* testing: Add an acert test that forces a fallback connection based on groupsMartin Willi2014-03-3113-0/+199
|
* testing: Add an acert test case sending attribute certificates inlineMartin Willi2014-03-3118-0/+291
|
* testing: Add an acert test using locally cached attribute certificatesMartin Willi2014-03-3116-0/+239
|
* testing: build strongSwan with acert pluginMartin Willi2014-03-311-0/+1
|
* Added libipsec/net2net-3des scenarioAndreas Steffen2014-03-2811-0/+1521
|
* Renewed self-signed OCSP signer certificateAndreas Steffen2014-03-274-43/+45
|
* Check that valid OCSP responses are received in the ikev2/ocsp-multi-level ↵Andreas Steffen2014-03-241-0/+4
| | | | scenario
* Updated expired certificates issued by the Research and Sales Intermediate CAsAndreas Steffen2014-03-2421-185/+295
|
* Renewed revoked Research CA certificate5.1.3dr1Andreas Steffen2014-03-226-11/+37
|
* Added openssl-ikev2/net2net-pgp-v3 scenarioAndreas Steffen2014-03-2217-0/+208
|
* Completed integration of ntru_crypto library into ntru pluginAndreas Steffen2014-03-229-0/+128
|
* Merged libstrongswan options into charon sectionAndreas Steffen2014-03-1598-240/+41
|
* strongswan.conf is not needed on RADIUS server aliceAndreas Steffen2014-03-152-0/+2
|
* Disable mandatory ECP support for attestionAndreas Steffen2014-03-0718-0/+312
|
* Added ikev2/lookip scenarioAndreas Steffen2014-02-1712-1/+151
|
* testing: Use installed PTS SQL schema and data instead of local copyTobias Brunner2014-02-126-1456/+8
|
* testing: Use installed SQL schema instead of local copyTobias Brunner2014-02-1225-334/+64
|
* Fixed description of ikev1/rw-ntru-psk scenarioAndreas Steffen2014-02-121-1/+1
|
* Updated test kvm tests to Linux 3.13 kernelAndreas Steffen2014-02-122-3/+2050
|
* Added ikev1/net2net-ntru-cert and ikev1/rw-ntru-psk scenariosAndreas Steffen2014-02-1223-0/+302
|
* testing: Add ssh script to distributionTobias Brunner2014-02-121-1/+1
|
* Added missing semicolon in SQL statementsAndreas Steffen2014-02-051-6/+6
|
* Added Android 4.3.1 to products database tableAndreas Steffen2014-02-041-2/+14
|
* Added new Android versions to PTS databaseAndreas Steffen2014-02-041-0/+60
|
* testing: Fetch the FreeRADIUS tarball from the "old" directoryMartin Willi2014-01-311-1/+1
| | | | Fixes #483.
* testing: Add ikev2/host2host-transport-nat scenarioTobias Brunner2014-01-239-0/+146
|
* testing: Add ipv6/rw-compress-ikev2 scenarioTobias Brunner2014-01-239-0/+125
|
* testing: Add ikev2/compress-nat scenarioTobias Brunner2014-01-2312-0/+187
|
* testing: Enable firewall for ikev2/compress scenarioTobias Brunner2014-01-238-7/+14
| | | | | Additionally, send a regular (small) ping as the kernel does not compress small packets and handles those differently inbound.
* Added TPMRA workitem support in PTS databaseAndreas Steffen2014-01-161-0/+60
|
* Starting with 3.1.7 kernel.org replaced bz2 with xz formatAndreas Steffen2014-01-152-5/+5
|
* testing: Fix status output in build-baseimage scriptReto Buerki2013-12-041-1/+1
|
* charon-tkm: Update integration testsReto Buerki2013-12-047-1/+49
|
* Any of the four NTRU parameter sets can be selectedAndreas Steffen2013-11-271-0/+8
|
* Added ikev2/net2net-ntru-cert and ikev2/rw-ntru-psk scenariosAndreas Steffen2013-11-2723-0/+284
|
* Prototype implementation of IKE key exchange via NTRU encryptionAndreas Steffen2013-11-271-1/+2
|
* testing: Config for Linux kernel 3.12Tobias Brunner2013-11-191-0/+2022
| | | | | | | | The most significant change is that CONFIG_ACPI_PROC_EVENT is now finally removed (after being deprecated for a long time). So to successfully shutdown the guests via ACPI the CONFIG_INPUT_EVDEV option is now enabled.
* Version bump to 5.1.1Andreas Steffen2013-10-312-4/+2009
|