.. |
iCA-server
|
tests: EAP-TLS with intermediate CAs and OCSP multi
|
2015-12-24 00:54:30 +02:00 |
iCA-user
|
tests: GnuTLS configuration of intermediate CA certificate
|
2017-12-29 12:01:22 +02:00 |
rootCA
|
tests: EAP-TLS with intermediate CAs and OCSP multi
|
2015-12-24 00:54:30 +02:00 |
test-ca
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
as.conf
|
tests: Remove unnecessary copying of ocsp-multi-server-cache.der
|
2019-12-27 20:14:02 +02:00 |
as2.conf
|
tests: Remove unnecessary copying of ocsp-multi-server-cache.der
|
2019-12-27 20:14:02 +02:00 |
ca-and-crl-expired.pem
|
tests: Server checking CRL with check_crl_strict=0
|
2019-08-11 16:37:48 +03:00 |
ca-and-crl.pem
|
tests: EAP-TLS and server checking CRL
|
2015-06-29 23:23:56 +03:00 |
ca-incorrect.pem
|
|
|
ca-key.pem
|
tests: Additional OCSP coverage
|
2015-10-10 17:32:53 +03:00 |
ca.der
|
|
|
ca.pem
|
|
|
dh.conf
|
|
|
dh2.conf
|
tests: DH params with 2048-bit key
|
2015-05-24 11:03:42 +03:00 |
dh_param_3072.pem
|
tests: Suite B with RSA keys
|
2017-09-18 12:12:48 +03:00 |
dsaparam.pem
|
tests: DH parameter file DSA conversion and error cases
|
2015-06-29 23:23:56 +03:00 |
eap_user.conf
|
tests: EAP-TEAP with machine username/password credential
|
2019-08-20 13:24:14 +03:00 |
eap_user_vlan.conf
|
tests: Tagged-VLAN only change on reauthentication
|
2016-02-27 21:49:27 +02:00 |
ec-ca-openssl.cnf
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
ec-ca.key
|
tests: Add the EC root CA private keys to repository
|
2018-01-12 22:42:23 +02:00 |
ec-ca.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec-generate.sh
|
tests: Complete Suite B 128-bit coverage
|
2015-01-27 01:43:55 +02:00 |
ec-server.key
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec-server.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec-user.key
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec-user.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec2-ca.key
|
tests: Add the EC root CA private keys to repository
|
2018-01-12 22:42:23 +02:00 |
ec2-ca.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec2-generate.sh
|
tests: Suite B 192-bit validation with p256 client cert
|
2018-01-12 20:30:07 +02:00 |
ec2-server.key
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec2-server.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec2-user-p256.key
|
tests: Suite B 192-bit validation with p256 client cert
|
2018-01-12 20:30:07 +02:00 |
ec2-user-p256.pem
|
tests: Suite B 192-bit validation with p256 client cert
|
2018-01-12 20:30:07 +02:00 |
ec2-user.key
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
ec2-user.pem
|
tests: Generate new certificates for Suite B test cases
|
2016-02-02 00:09:20 +02:00 |
hlr_auc_gw.gsm
|
tests: EAP-SIM server using GSM triplets
|
2014-03-30 16:28:48 +03:00 |
hlr_auc_gw.milenage_db
|
tests: EAP-SIM with external GSM auth and replacing SIM
|
2016-01-08 18:03:11 +02:00 |
ica-generate.sh
|
tests: GnuTLS configuration of intermediate CA certificate
|
2017-12-29 12:01:22 +02:00 |
index-revoked.txt
|
tests: Fix multi-ocsp response conents
|
2019-02-05 03:01:38 +02:00 |
index-unknown.txt
|
tests: Valid OCSP response with revoked and unknown cert status
|
2015-01-12 00:19:21 +02:00 |
index.txt
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
ocsp-multi-server-cache.der
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
ocsp-req.der
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
ocsp-responder.key
|
tests: Generate a fresh OCSP response for each test run
|
2015-01-12 00:19:21 +02:00 |
ocsp-responder.pem
|
tests: Renew the expired OCSP responder certificate
|
2016-01-13 00:38:29 +02:00 |
ocsp-server-cache.der
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
ocsp-server-cache.der-invalid
|
|
|
openssl2.cnf
|
tests: Add a server certificate with TOD policy
|
2019-06-12 22:29:09 +03:00 |
radius_clients.conf
|
|
|
radius_clients_ipv6.conf
|
tests: Verify RADIUS functionality over IPv6
|
2014-03-02 10:35:33 +02:00 |
radius_clients_none.conf
|
tests: hostapd authentication server test cases
|
2017-03-05 16:51:04 +02:00 |
rsa3072-ca.key
|
tests: Suite B with RSA keys
|
2017-09-18 12:12:48 +03:00 |
rsa3072-ca.pem
|
tests: Suite B with RSA keys
|
2017-09-18 12:12:48 +03:00 |
rsa3072-generate.sh
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-server.key
|
tests: Suite B with RSA keys
|
2017-09-18 12:12:48 +03:00 |
rsa3072-server.pem
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-server.req
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-user-rsa2048.key
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-user-rsa2048.pem
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-user-rsa2048.req
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-user.key
|
tests: Suite B with RSA keys
|
2017-09-18 12:12:48 +03:00 |
rsa3072-user.pem
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
rsa3072-user.req
|
tests: Update RSA 3k certificates before the previous ones expire
|
2019-08-16 16:40:36 +03:00 |
server-certpol.csr
|
tests: Add a server certificate with TOD policy
|
2019-06-12 22:29:09 +03:00 |
server-certpol.key
|
tests: Add a server certificate with TOD policy
|
2019-06-12 22:29:09 +03:00 |
server-certpol.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server-certpol2.csr
|
tests: Add a server certificate with TOD-TOFU policy
|
2019-08-16 16:40:36 +03:00 |
server-certpol2.key
|
tests: Add a server certificate with TOD-TOFU policy
|
2019-08-16 16:40:36 +03:00 |
server-certpol2.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server-eku-client-server.csr
|
tests: Update server and user certificates (2017)
|
2017-10-01 18:47:02 +03:00 |
server-eku-client-server.key
|
tests: Server certificate with both client and server EKU
|
2014-03-02 10:35:33 +02:00 |
server-eku-client-server.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server-eku-client.csr
|
tests: Update server and user certificates (2017)
|
2017-10-01 18:47:02 +03:00 |
server-eku-client.key
|
tests: EAP-TTLS and server certificate with client EKU
|
2014-02-15 10:33:55 +02:00 |
server-eku-client.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server-expired.key
|
|
|
server-expired.pem
|
|
|
server-extra.pkcs12
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server-long-duration.key
|
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
2015-05-24 11:24:35 +03:00 |
server-long-duration.pem
|
tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31
|
2015-05-24 11:24:35 +03:00 |
server-no-dnsname.csr
|
tests: Update server and user certificates (2017)
|
2017-10-01 18:47:02 +03:00 |
server-no-dnsname.key
|
|
|
server-no-dnsname.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server.csr
|
tests: Update server and user certificates (2017)
|
2017-10-01 18:47:02 +03:00 |
server.key
|
|
|
server.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
server.pkcs12
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
sha384-server.key
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha384-server.pem
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha384-user.key
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha384-user.pem
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-ca.key
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-ca.pem
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-generate.sh
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-server.key
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-server.pem
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-user.key
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
sha512-user.pem
|
tests: EAP-TLS with SHA512/SHA384 signature
|
2015-11-30 00:39:38 +02:00 |
update.sh
|
tests: Add a server certificate with TOD-TOFU policy
|
2019-08-16 16:40:36 +03:00 |
user.csr
|
tests: Update server and user certificates (2017)
|
2017-10-01 18:47:02 +03:00 |
user.key
|
|
|
user.key.pkcs8
|
tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format
|
2015-12-05 20:27:27 +02:00 |
user.key.pkcs8.pkcs5v15
|
tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format
|
2015-12-05 20:27:27 +02:00 |
user.pem
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
user.pkcs12
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
user.rsa-key
|
tests: Use RSA key format in ap_wpa2_eap_tls_blob
|
2015-01-12 00:19:21 +02:00 |
user2.pkcs12
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |
user3.pkcs12
|
tests: Update server and user certificates (2019)
|
2019-10-04 16:03:04 +03:00 |