hostap/tests/hwsim/auth_serv
Jouni Malinen 279a0afffb tests: Generate a fresh OCSP response for each test run
GnuTLS has a hardcoded three day limit on OCSP response age regardless
of the next update value in the response. To make this work in the test
scripts, try to generate a new response when starting the authentication
server. The old mechanism of a response without next update value is
used as a backup option if openssl is not available or fails to generate
the response for some reason.

Signed-off-by: Jouni Malinen <j@w1.fi>
2015-01-12 00:19:21 +02:00
..
as.conf tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
as2.conf tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ca-incorrect.pem tests: Add negative TLS test case to verify trust root validation 2013-10-20 21:38:02 +03:00
ca.der tests: CA certificate in DER format 2014-01-08 17:06:36 +02:00
ca.pem tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
dh.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
eap_user.conf tests: Verify that wpa_supplicant clears keys from memory 2014-12-30 10:37:02 +02:00
hlr_auc_gw.gsm tests: EAP-SIM server using GSM triplets 2014-03-30 16:28:48 +03:00
hlr_auc_gw.milenage_db tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
index.txt tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-req.der tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-responder.key tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-responder.pem tests: Generate a fresh OCSP response for each test run 2015-01-12 00:19:21 +02:00
ocsp-server-cache.der tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
ocsp-server-cache.der-invalid tests: EAP-TLS with OCSP 2014-01-08 17:45:56 +02:00
radius_clients.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
radius_clients_ipv6.conf tests: Verify RADIUS functionality over IPv6 2014-03-02 10:35:33 +02:00
server-eku-client-server.key tests: Server certificate with both client and server EKU 2014-03-02 10:35:33 +02:00
server-eku-client-server.pem tests: Server certificate with both client and server EKU 2014-03-02 10:35:33 +02:00
server-eku-client.key tests: EAP-TTLS and server certificate with client EKU 2014-02-15 10:33:55 +02:00
server-eku-client.pem tests: EAP-TTLS and server certificate with client EKU 2014-02-15 10:33:55 +02:00
server-expired.key tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-expired.pem tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-no-dnsname.key tests: Domain name suffix match against CN 2014-02-15 10:19:16 +02:00
server-no-dnsname.pem tests: Domain name suffix match against CN 2014-02-15 10:19:16 +02:00
server.key tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
server.pem tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
server.pkcs12 tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.key tests: Add an EAP-TLS test case 2013-11-03 19:51:06 +02:00
user.pem tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.pkcs12 tests: Update server and user certificates 2014-09-30 00:40:23 +03:00
user.rsa-key tests: Use RSA key format in ap_wpa2_eap_tls_blob 2015-01-12 00:19:21 +02:00