.. |
as2.conf
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
as.conf
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ca-and-crl.pem
|
tests: EAP-TLS and server checking CRL
|
2015-06-29 23:23:56 +03:00 |
ca-incorrect.pem
|
tests: Add negative TLS test case to verify trust root validation
|
2013-10-20 21:38:02 +03:00 |
ca.der
|
tests: CA certificate in DER format
|
2014-01-08 17:06:36 +02:00 |
ca.pem
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
dh2.conf
|
tests: DH params with 2048-bit key
|
2015-05-24 11:03:42 +03:00 |
dh.conf
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
dsaparam.pem
|
tests: DH parameter file DSA conversion and error cases
|
2015-06-29 23:23:56 +03:00 |
eap_user_vlan.conf
|
tests: RADIUS server changing VLAN ID assignment
|
2015-01-30 01:11:56 +02:00 |
eap_user.conf
|
tests: EAP-PEAP/MSCHAPv2 with domain name
|
2015-03-29 22:06:06 +03:00 |
ec2-ca.pem
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec2-generate.sh
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec2-server.key
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec2-server.pem
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec2-user.key
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec2-user.pem
|
tests: Suite B 192-bit profile
|
2015-01-27 01:43:55 +02:00 |
ec-ca-openssl.cnf
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-ca.pem
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-generate.sh
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-server.key
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-server.pem
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-user.key
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-user.pem
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
hlr_auc_gw.gsm
|
tests: EAP-SIM server using GSM triplets
|
2014-03-30 16:28:48 +03:00 |
hlr_auc_gw.milenage_db
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
index-revoked.txt
|
tests: Valid OCSP response with revoked and unknown cert status
|
2015-01-12 00:19:21 +02:00 |
index-unknown.txt
|
tests: Valid OCSP response with revoked and unknown cert status
|
2015-01-12 00:19:21 +02:00 |
index.txt
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ocsp-req.der
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ocsp-responder.key
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ocsp-responder.pem
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ocsp-server-cache.der
|
tests: Update server and user certificates
|
2014-09-30 00:40:23 +03:00 |
ocsp-server-cache.der-invalid
|
tests: EAP-TLS with OCSP
|
2014-01-08 17:45:56 +02:00 |
radius_clients_ipv6.conf
|
tests: Verify RADIUS functionality over IPv6
|
2014-03-02 10:35:33 +02:00 |
radius_clients.conf
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
server-eku-client-server.key
|
tests: Server certificate with both client and server EKU
|
2014-03-02 10:35:33 +02:00 |
server-eku-client-server.pem
|
tests: Re-sign expired test certificates
|
2015-02-19 14:18:57 +02:00 |
server-eku-client.key
|
tests: EAP-TTLS and server certificate with client EKU
|
2014-02-15 10:33:55 +02:00 |
server-eku-client.pem
|
tests: Re-sign expired test certificates
|
2015-02-19 14:18:57 +02:00 |
server-expired.key
|
tests: Expired server certificate
|
2014-02-15 10:28:22 +02:00 |
server-expired.pem
|
tests: Expired server certificate
|
2014-02-15 10:28:22 +02:00 |
server-long-duration.key
|
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
2015-05-24 11:24:35 +03:00 |
server-long-duration.pem
|
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
2015-05-24 11:24:35 +03:00 |
server-no-dnsname.key
|
tests: Domain name suffix match against CN
|
2014-02-15 10:19:16 +02:00 |
server-no-dnsname.pem
|
tests: Re-sign expired test certificates
|
2015-02-19 14:18:57 +02:00 |
server.key
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
server.pem
|
tests: Update server and user certificates
|
2014-09-30 00:40:23 +03:00 |
server.pkcs12
|
tests: Update server and user certificates
|
2014-09-30 00:40:23 +03:00 |
user2.pkcs12
|
tests: EAP-TLS with PKCS12 that includes additional certificates
|
2015-06-29 23:23:56 +03:00 |
user.key
|
tests: Add an EAP-TLS test case
|
2013-11-03 19:51:06 +02:00 |
user.pem
|
tests: Update server and user certificates
|
2014-09-30 00:40:23 +03:00 |
user.pkcs12
|
tests: Update server and user certificates
|
2014-09-30 00:40:23 +03:00 |
user.rsa-key
|
tests: Use RSA key format in ap_wpa2_eap_tls_blob
|
2015-01-12 00:19:21 +02:00 |