.. |
iCA-server
|
52811b8c90
tests: EAP-TLS with intermediate CAs and OCSP multi
|
9 years ago |
iCA-user
|
b4635f0a61
tests: GnuTLS configuration of intermediate CA certificate
|
7 years ago |
rootCA
|
52811b8c90
tests: EAP-TLS with intermediate CAs and OCSP multi
|
9 years ago |
test-ca
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
as.conf
|
cc8330b88b
tests: Write MSK dump files from authentication server
|
7 years ago |
as2.conf
|
cc8330b88b
tests: Write MSK dump files from authentication server
|
7 years ago |
ca-and-crl.pem
|
b197a8194b
tests: EAP-TLS and server checking CRL
|
9 years ago |
ca-incorrect.pem
|
c7afc0789c
tests: Add negative TLS test case to verify trust root validation
|
11 years ago |
ca-key.pem
|
d79ce4a6ce
tests: Additional OCSP coverage
|
9 years ago |
ca.der
|
9f8994c623
tests: CA certificate in DER format
|
11 years ago |
ca.pem
|
479cbb3892
tests: Start RADIUS authentication server
|
11 years ago |
dh.conf
|
479cbb3892
tests: Start RADIUS authentication server
|
11 years ago |
dh2.conf
|
768ea0bc32
tests: DH params with 2048-bit key
|
9 years ago |
dh_param_3072.pem
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
dsaparam.pem
|
b3ff3decf6
tests: DH parameter file DSA conversion and error cases
|
9 years ago |
eap_user.conf
|
0a0c4dc1d7
tests: Use a domain name in the identity for get_emsk OOM tests
|
7 years ago |
eap_user_vlan.conf
|
3fdb5005f5
tests: Tagged-VLAN only change on reauthentication
|
8 years ago |
ec-ca-openssl.cnf
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
ec-ca.key
|
b70a3fc169
tests: Add the EC root CA private keys to repository
|
7 years ago |
ec-ca.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec-generate.sh
|
4113a96bba
tests: Complete Suite B 128-bit coverage
|
10 years ago |
ec-server.key
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec-server.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec-user.key
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec-user.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec2-ca.key
|
b70a3fc169
tests: Add the EC root CA private keys to repository
|
7 years ago |
ec2-ca.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec2-generate.sh
|
9ec824b9c1
tests: Suite B 192-bit validation with p256 client cert
|
7 years ago |
ec2-server.key
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec2-server.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec2-user-p256.key
|
9ec824b9c1
tests: Suite B 192-bit validation with p256 client cert
|
7 years ago |
ec2-user-p256.pem
|
9ec824b9c1
tests: Suite B 192-bit validation with p256 client cert
|
7 years ago |
ec2-user.key
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
ec2-user.pem
|
504108dbdf
tests: Generate new certificates for Suite B test cases
|
9 years ago |
hlr_auc_gw.gsm
|
a0f350fd79
tests: EAP-SIM server using GSM triplets
|
10 years ago |
hlr_auc_gw.milenage_db
|
40c654cc1d
tests: EAP-SIM with external GSM auth and replacing SIM
|
9 years ago |
ica-generate.sh
|
b4635f0a61
tests: GnuTLS configuration of intermediate CA certificate
|
7 years ago |
index-revoked.txt
|
aeba66b28e
tests: Fix OCSP response for ap_wpa2_eap_ttls_ocsp_revoked
|
9 years ago |
index-unknown.txt
|
37b4a66ce6
tests: Valid OCSP response with revoked and unknown cert status
|
10 years ago |
index.txt
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
ocsp-multi-server-cache.der
|
98d125cafa
tests: Minimal testing of OCSP stapling with ocsp_multi
|
9 years ago |
ocsp-req.der
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
ocsp-responder.key
|
279a0afffb
tests: Generate a fresh OCSP response for each test run
|
10 years ago |
ocsp-responder.pem
|
4e34f56f3c
tests: Renew the expired OCSP responder certificate
|
9 years ago |
ocsp-server-cache.der
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
ocsp-server-cache.der-invalid
|
d4c7a2b9e6
tests: EAP-TLS with OCSP
|
11 years ago |
openssl2.cnf
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
radius_clients.conf
|
479cbb3892
tests: Start RADIUS authentication server
|
11 years ago |
radius_clients_ipv6.conf
|
9d756af73e
tests: Verify RADIUS functionality over IPv6
|
10 years ago |
radius_clients_none.conf
|
c90c62e5d3
tests: hostapd authentication server test cases
|
7 years ago |
rsa3072-ca.key
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
rsa3072-ca.pem
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
rsa3072-generate.sh
|
7fd583d62c
tests: Suite B 192-bit RSA validation with 2048-bit client cert
|
7 years ago |
rsa3072-server.key
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
rsa3072-server.pem
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
rsa3072-user-rsa2048.key
|
7fd583d62c
tests: Suite B 192-bit RSA validation with 2048-bit client cert
|
7 years ago |
rsa3072-user-rsa2048.pem
|
7fd583d62c
tests: Suite B 192-bit RSA validation with 2048-bit client cert
|
7 years ago |
rsa3072-user.key
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
rsa3072-user.pem
|
78b6be046d
tests: Suite B with RSA keys
|
7 years ago |
server-eku-client-server.csr
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-eku-client-server.key
|
14bef66d66
tests: Server certificate with both client and server EKU
|
10 years ago |
server-eku-client-server.pem
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-eku-client.csr
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-eku-client.key
|
6ab4a7aa5a
tests: EAP-TTLS and server certificate with client EKU
|
11 years ago |
server-eku-client.pem
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-expired.key
|
6a4d0dbe1c
tests: Expired server certificate
|
11 years ago |
server-expired.pem
|
6a4d0dbe1c
tests: Expired server certificate
|
11 years ago |
server-extra.pkcs12
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-long-duration.key
|
5748d1e5f8
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
9 years ago |
server-long-duration.pem
|
5748d1e5f8
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
9 years ago |
server-no-dnsname.csr
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server-no-dnsname.key
|
64e05f9644
tests: Domain name suffix match against CN
|
11 years ago |
server-no-dnsname.pem
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server.csr
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server.key
|
479cbb3892
tests: Start RADIUS authentication server
|
11 years ago |
server.pem
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
server.pkcs12
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
sha384-server.key
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha384-server.pem
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha384-user.key
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha384-user.pem
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-ca.key
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-ca.pem
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-generate.sh
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-server.key
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-server.pem
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-user.key
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
sha512-user.pem
|
d6ba709aa3
tests: EAP-TLS with SHA512/SHA384 signature
|
9 years ago |
update.sh
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
user.csr
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
user.key
|
e114c49cfc
tests: Add an EAP-TLS test case
|
11 years ago |
user.key.pkcs8
|
96bf8fe104
tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format
|
9 years ago |
user.key.pkcs8.pkcs5v15
|
96bf8fe104
tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format
|
9 years ago |
user.pem
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
user.pkcs12
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
user.rsa-key
|
62750c3e80
tests: Use RSA key format in ap_wpa2_eap_tls_blob
|
10 years ago |
user2.pkcs12
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |
user3.pkcs12
|
0ba13e8613
tests: Update server and user certificates (2017)
|
7 years ago |