hostapd/tests/hwsim/auth_serv
Jouni Malinen cc8330b88b tests: Write MSK dump files from authentication server
This makes it easier to post-process frame capture files if frames need
to be decrypted in test cases that do not configure wlantest with the
PMK directly (i.e., mainly the cases when a RADIUS server is used).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2017-09-05 19:29:01 +03:00
..
iCA-server tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
iCA-user tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
rootCA tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
as.conf tests: Write MSK dump files from authentication server 2017-09-05 19:29:01 +03:00
as2.conf tests: Write MSK dump files from authentication server 2017-09-05 19:29:01 +03:00
ca-and-crl.pem tests: EAP-TLS and server checking CRL 2015-06-29 23:23:56 +03:00
ca-incorrect.pem tests: Add negative TLS test case to verify trust root validation 2013-10-20 21:38:02 +03:00
ca-key.pem tests: Additional OCSP coverage 2015-10-10 17:32:53 +03:00
ca.der tests: CA certificate in DER format 2014-01-08 17:06:36 +02:00
ca.pem tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
dh.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
dh2.conf tests: DH params with 2048-bit key 2015-05-24 11:03:42 +03:00
dsaparam.pem tests: DH parameter file DSA conversion and error cases 2015-06-29 23:23:56 +03:00
eap_user.conf tests: Use a domain name in the identity for get_emsk OOM tests 2017-05-22 13:51:07 +03:00
eap_user_vlan.conf tests: Tagged-VLAN only change on reauthentication 2016-02-27 21:49:27 +02:00
ec-ca-openssl.cnf tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
ec-ca.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-generate.sh tests: Complete Suite B 128-bit coverage 2015-01-27 01:43:55 +02:00
ec-server.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-server.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-user.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-user.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-ca.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-generate.sh tests: Suite B 192-bit profile 2015-01-27 01:43:55 +02:00
ec2-server.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-server.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-user.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-user.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
hlr_auc_gw.gsm tests: EAP-SIM server using GSM triplets 2014-03-30 16:28:48 +03:00
hlr_auc_gw.milenage_db tests: EAP-SIM with external GSM auth and replacing SIM 2016-01-08 18:03:11 +02:00
ica-generate.sh tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
index-revoked.txt tests: Fix OCSP response for ap_wpa2_eap_ttls_ocsp_revoked 2015-10-02 19:16:04 +03:00
index-unknown.txt tests: Valid OCSP response with revoked and unknown cert status 2015-01-12 00:19:21 +02:00
index.txt tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
ocsp-multi-server-cache.der tests: Minimal testing of OCSP stapling with ocsp_multi 2015-12-23 00:32:52 +02:00
ocsp-req.der tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
ocsp-responder.key tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-responder.pem tests: Renew the expired OCSP responder certificate 2016-01-13 00:38:29 +02:00
ocsp-server-cache.der tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
ocsp-server-cache.der-invalid tests: EAP-TLS with OCSP 2014-01-08 17:45:56 +02:00
radius_clients.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
radius_clients_ipv6.conf tests: Verify RADIUS functionality over IPv6 2014-03-02 10:35:33 +02:00
radius_clients_none.conf tests: hostapd authentication server test cases 2017-03-05 16:51:04 +02:00
server-eku-client-server.key tests: Server certificate with both client and server EKU 2014-03-02 10:35:33 +02:00
server-eku-client-server.pem tests: Renew expired server certificates 2017-02-18 21:39:01 +02:00
server-eku-client.key tests: EAP-TTLS and server certificate with client EKU 2014-02-15 10:33:55 +02:00
server-eku-client.pem tests: Renew expired server certificates 2017-02-18 21:39:01 +02:00
server-expired.key tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-expired.pem tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-extra.pkcs12 tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
server-long-duration.key tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31 2015-05-24 11:24:35 +03:00
server-long-duration.pem tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31 2015-05-24 11:24:35 +03:00
server-no-dnsname.key tests: Domain name suffix match against CN 2014-02-15 10:19:16 +02:00
server-no-dnsname.pem tests: Renew expired server certificates 2017-02-18 21:39:01 +02:00
server.key tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
server.pem tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
server.pkcs12 tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
sha384-server.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-server.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-user.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-user.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-ca.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-ca.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-generate.sh tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-server.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-server.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-user.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-user.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
user.key tests: Add an EAP-TLS test case 2013-11-03 19:51:06 +02:00
user.key.pkcs8 tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format 2015-12-05 20:27:27 +02:00
user.key.pkcs8.pkcs5v15 tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format 2015-12-05 20:27:27 +02:00
user.pem tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
user.pkcs12 tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
user.rsa-key tests: Use RSA key format in ap_wpa2_eap_tls_blob 2015-01-12 00:19:21 +02:00
user2.pkcs12 tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00
user3.pkcs12 tests: Update server and user certificates (2015) 2016-09-30 22:45:03 +03:00