Tobias Brunner
8cb5918b0c
testing: Add ikev2/net2net-route-narrow scenario
2025-05-28 16:01:00 +02:00
Tobias Brunner
4249d721ec
testing: Add rw-eap-id-switch scenario
2025-04-14 12:18:24 +02:00
Tobias Brunner
d7eb3ed92e
testing: Make ocsp.cgi in ikev2-multi-ca/ocsp-signers scenario executable
2025-04-07 14:54:48 +02:00
Andreas Steffen
5a74d796a8
testing: Adapted ha/active-passive tests
2025-03-10 19:18:40 +01:00
Jean-François Hren
fd6ac87fc3
testing: Add ha/active-passive-multi-ke scenario
2025-02-28 16:02:41 +01:00
Andreas Steffen
24a9c32a43
testing: Include ML-KEM crypto tests rw-cert scenario
2024-12-06 14:39:20 +01:00
Tobias Brunner
17bc5166d4
Fixed some typos, courtesy of codespell
2024-11-25 12:06:54 +01:00
Tobias Brunner
7e310e3425
testing: Make timing for TKM rekey scenarios a bit more stable
...
In particular for the first one randomization could trigger an additional
rekeying, which let the "Adding ESA ..." check fail. But even without
randomization (could be seen in the second scenario that already uses
`rand_time=0`) 4 seconds can apparently be too low some time.
2024-11-25 11:44:04 +01:00
Andreas Steffen
2c18e87b25
testing: Added ML-KEM test cases
2024-11-23 16:53:02 +01:00
Andreas Steffen
def312d200
testing: Fixed typos
2024-11-23 15:06:37 +01:00
Andreas Steffen
558529afe2
testing: Migrated wolfssl scenarios
2024-11-22 14:14:53 +01:00
Andreas Steffen
2e4c062512
testing: Migrated tnc scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
11bb0a73b8
testing: Migrated tkm scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
89acb24bd7
testing: Migrated sql scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
b891da52b4
testing: Migrated route-based scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
8fc6340c05
testing: Migrated pfkey scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
93b6162d74
testing: Migrated p2pnat scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
bd93dfb09b
testing: Migrated libipsec scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
0cf08b45dd
testing: Migrated ha scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
dc69cf2f65
testing: Migrated gcrypt-ikev2 scenarios
2024-11-22 14:14:53 +01:00
Andreas Steffen
b9e5764b75
testing: Migrated botan scenarios
2024-11-22 14:14:53 +01:00
Andreas Steffen
17e0f20f57
testing: Migrated af-alg scenarios
2024-11-22 14:14:53 +01:00
Andreas Steffen
fdc9e69523
testing: Migrated ike scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
6ae40ac581
testing: Migrated ikev1-stroke to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
950d4fe7a0
testing: Migrated ikev2-stroke scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
2dbcb15338
testing: Migrated ipv6-stroke scenarios to new default plugins
2024-11-22 14:14:53 +01:00
Andreas Steffen
38bacea63b
testing: Migrated ipv6 scenarios to new default plugins
2024-11-22 14:14:52 +01:00
Andreas Steffen
e7166c342b
testing: Distributed openssl-ikev1 scenarios
2024-11-22 14:14:52 +01:00
Andreas Steffen
c9883d612b
testing: Migrated ikev1-algs scenarios to new default plugins
2024-11-22 14:14:52 +01:00
Andreas Steffen
8060541f53
testing: Migrated ikev1 scenarios to new default plugins
2024-11-22 14:14:52 +01:00
Andreas Steffen
4df94b56c0
testing: Distributed openssl-ikev2 scenarios
2024-11-22 14:14:52 +01:00
Andreas Steffen
f766a7ed49
testing: Migrated ikev2-algs scenarios to new default plugins
2024-11-22 14:14:52 +01:00
Andreas Steffen
2099a52618
testing: Migrated ikev2 scenarios to new default plugins
2024-11-22 14:14:52 +01:00
Andreas Steffen
1265d78cac
ntru: Remove legacy NTRU key exchange method
2024-11-22 14:05:36 +01:00
Andreas Steffen
8e3a373e18
newhope: Remove legacy Newhope key exchange method
2024-11-22 14:05:36 +01:00
Andreas Steffen
4833f29b15
bliss: Remove legacy BLISS signatures
2024-11-22 14:05:36 +01:00
Tobias Brunner
d14bb3881b
botan: Add support for ML-KEM
2024-11-22 14:03:17 +01:00
Tobias Brunner
1bb6f1dd73
wolfssl: Add support for ML-KEM
2024-11-22 14:03:17 +01:00
Tobias Brunner
2b1885b892
testing: Add TKM scenarios with multiple key exchanges
2024-09-19 14:39:13 +02:00
Stefan Berghofer
7975a0cfa4
charon-tkm: Adapt to interface changes to support multiple key exchanges
...
Also includes ESA flags.
Co-authored-by: Tobias Brunner <tobias@strongswan.org>
2024-09-19 14:39:13 +02:00
Tobias Brunner
f3c7e5227c
testing: Add ikev2/rw-cert-multi-ke scenario
2024-08-07 16:20:19 +02:00
Tobias Brunner
56b6eeb385
testing: Add ikev2/start-action-start scenario
...
This tests the behavior for configs with start_action=start during
reloads of the config (updates/removal).
2024-07-26 16:56:32 +02:00
Tobias Brunner
c4bce2b79b
testing: Enable mgf1 plugin for scenarios where FreeRADIUS uses PSS signatures
...
Looks like a cipher suite without DHE was selected previously.
Could be a side-effect of dc1085734f34 ("testing: Remove unnecessary
FreeRADIUS dh_file option as recommended in the log").
2024-06-26 14:56:22 +02:00
Tobias Brunner
a9ced3ccb4
testing: Fix IP pool scenarios after changing base address
...
Fixes: 2b11764b705d ("mem-pool: Adjust the base address if it's the network ID")
2024-06-26 14:56:22 +02:00
Tobias Brunner
1cbcf198ab
testing: Make RADIUS server enforce client identity in certificate's CN
2024-06-17 14:47:11 +02:00
Tobias Brunner
dc1085734f
testing: Remove unnecessary FreeRADIUS dh_file option as recommended in the log
2024-06-17 14:47:11 +02:00
Andreas Steffen
6f8275abab
testing: Added RFC4806 tests
2024-03-13 15:11:00 +01:00
Tobias Brunner
7550463d51
Replace some other mentions of "Linux strongSwan"
2023-12-14 11:27:19 +01:00
Tobias Brunner
801c6c32e5
testing: Use a single OCSP responder for ikev2-multi-ca/ocsp-signers scenario
...
This demonstrates the multi-CA capabilities of the pki --ocsp command.
2023-11-13 12:50:47 +01:00
Tobias Brunner
c10a13589e
testing: Use pki --ocsp as OCSP responder
...
The only exception is the ikev2/ocsp-no-signer-cert scenario as the
pki command won't sign an OCSP response with a certificate that isn't
the CA certificate or marked as an OCSP signer.
2023-11-13 12:50:47 +01:00