fragattacks/tests/hwsim/auth_serv
Jouni Malinen 37b4a66ce6 tests: Valid OCSP response with revoked and unknown cert status
This increases testing coverage for OCSP processing by confirming that
valid OCSP response showing revoked certificate status prevents
successful handshake completion. In addition, unknown certificate status
is verified to prevent connection if OCSP is required and allow
connection if OCSP is optional.

Signed-off-by: Jouni Malinen <j@w1.fi>
2015-01-12 00:19:21 +02:00
..
as2.conf tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
as.conf tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ca-incorrect.pem tests: Add negative TLS test case to verify trust root validation 2013-10-20 21:38:02 +03:00
ca.der tests: CA certificate in DER format 2014-01-08 17:06:36 +02:00
ca.pem tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
dh.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
eap_user.conf tests: Verify that wpa_supplicant clears keys from memory 2014-12-30 10:37:02 +02:00
hlr_auc_gw.gsm tests: EAP-SIM server using GSM triplets 2014-03-30 16:28:48 +03:00
hlr_auc_gw.milenage_db tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
index-revoked.txt tests: Valid OCSP response with revoked and unknown cert status 2015-01-12 00:19:21 +02:00
index-unknown.txt tests: Valid OCSP response with revoked and unknown cert status 2015-01-12 00:19:21 +02:00
index.txt tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-req.der tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-responder.key tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-responder.pem tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-server-cache.der tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
ocsp-server-cache.der-invalid tests: EAP-TLS with OCSP 2014-01-08 17:45:56 +02:00
radius_clients_ipv6.conf tests: Verify RADIUS functionality over IPv6 2014-03-02 10:35:33 +02:00
radius_clients.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
server-eku-client-server.key tests: Server certificate with both client and server EKU 2014-03-02 10:35:33 +02:00
server-eku-client-server.pem tests: Server certificate with both client and server EKU 2014-03-02 10:35:33 +02:00
server-eku-client.key tests: EAP-TTLS and server certificate with client EKU 2014-02-15 10:33:55 +02:00
server-eku-client.pem tests: EAP-TTLS and server certificate with client EKU 2014-02-15 10:33:55 +02:00
server-expired.key tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-expired.pem tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-no-dnsname.key tests: Domain name suffix match against CN 2014-02-15 10:19:16 +02:00
server-no-dnsname.pem tests: Domain name suffix match against CN 2014-02-15 10:19:16 +02:00
server.key tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
server.pem tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
server.pkcs12 tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.key tests: Add an EAP-TLS test case 2013-11-03 19:51:06 +02:00
user.pem tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.pkcs12 tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.rsa-key tests: Use RSA key format in ap_wpa2_eap_tls_blob 2015-01-12 00:19:21 +02:00