| .. | 
		
		
			
			
			
			
				| iCA-server | tests: EAP-TLS with intermediate CAs and OCSP multi | 2015-12-24 00:54:30 +02:00 | 
		
			
			
			
			
				| iCA-user | tests: GnuTLS configuration of intermediate CA certificate | 2017-12-29 12:01:22 +02:00 | 
		
			
			
			
			
				| rootCA | tests: EAP-TLS with intermediate CAs and OCSP multi | 2015-12-24 00:54:30 +02:00 | 
		
			
			
			
			
				| test-ca | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| as.conf | tests: Move hs20_t_c_server_url parameter from AP to AS | 2018-06-21 20:52:54 +03:00 | 
		
			
			
			
			
				| as2.conf | tests: Write MSK dump files from authentication server | 2017-09-05 19:29:01 +03:00 | 
		
			
			
			
			
				| ca-and-crl.pem | tests: EAP-TLS and server checking CRL | 2015-06-29 23:23:56 +03:00 | 
		
			
			
			
			
				| ca-incorrect.pem |  |  | 
		
			
			
			
			
				| ca-key.pem | tests: Additional OCSP coverage | 2015-10-10 17:32:53 +03:00 | 
		
			
			
			
			
				| ca.der | tests: CA certificate in DER format | 2014-01-08 17:06:36 +02:00 | 
		
			
			
			
			
				| ca.pem |  |  | 
		
			
			
			
			
				| dh.conf |  |  | 
		
			
			
			
			
				| dh2.conf | tests: DH params with 2048-bit key | 2015-05-24 11:03:42 +03:00 | 
		
			
			
			
			
				| dh_param_3072.pem | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| dsaparam.pem | tests: DH parameter file DSA conversion and error cases | 2015-06-29 23:23:56 +03:00 | 
		
			
			
			
			
				| eap_user.conf | tests: EAP-pwd with salted passwords | 2018-05-28 22:15:20 +03:00 | 
		
			
			
			
			
				| eap_user_vlan.conf | tests: Tagged-VLAN only change on reauthentication | 2016-02-27 21:49:27 +02:00 | 
		
			
			
			
			
				| ec-ca-openssl.cnf | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| ec-ca.key | tests: Add the EC root CA private keys to repository | 2018-01-12 22:42:23 +02:00 | 
		
			
			
			
			
				| ec-ca.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec-generate.sh | tests: Complete Suite B 128-bit coverage | 2015-01-27 01:43:55 +02:00 | 
		
			
			
			
			
				| ec-server.key | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec-server.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec-user.key | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec-user.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec2-ca.key | tests: Add the EC root CA private keys to repository | 2018-01-12 22:42:23 +02:00 | 
		
			
			
			
			
				| ec2-ca.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec2-generate.sh | tests: Suite B 192-bit validation with p256 client cert | 2018-01-12 20:30:07 +02:00 | 
		
			
			
			
			
				| ec2-server.key | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec2-server.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec2-user-p256.key | tests: Suite B 192-bit validation with p256 client cert | 2018-01-12 20:30:07 +02:00 | 
		
			
			
			
			
				| ec2-user-p256.pem | tests: Suite B 192-bit validation with p256 client cert | 2018-01-12 20:30:07 +02:00 | 
		
			
			
			
			
				| ec2-user.key | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| ec2-user.pem | tests: Generate new certificates for Suite B test cases | 2016-02-02 00:09:20 +02:00 | 
		
			
			
			
			
				| hlr_auc_gw.gsm | tests: EAP-SIM server using GSM triplets | 2014-03-30 16:28:48 +03:00 | 
		
			
			
			
			
				| hlr_auc_gw.milenage_db | tests: EAP-SIM with external GSM auth and replacing SIM | 2016-01-08 18:03:11 +02:00 | 
		
			
			
			
			
				| ica-generate.sh | tests: GnuTLS configuration of intermediate CA certificate | 2017-12-29 12:01:22 +02:00 | 
		
			
			
			
			
				| index-revoked.txt | tests: Fix OCSP response for ap_wpa2_eap_ttls_ocsp_revoked | 2015-10-02 19:16:04 +03:00 | 
		
			
			
			
			
				| index-unknown.txt | tests: Valid OCSP response with revoked and unknown cert status | 2015-01-12 00:19:21 +02:00 | 
		
			
			
			
			
				| index.txt | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| ocsp-multi-server-cache.der | tests: Minimal testing of OCSP stapling with ocsp_multi | 2015-12-23 00:32:52 +02:00 | 
		
			
			
			
			
				| ocsp-req.der | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| ocsp-responder.key | tests: Generate a fresh OCSP response for each test run | 2015-01-12 00:19:21 +02:00 | 
		
			
			
			
			
				| ocsp-responder.pem | tests: Renew the expired OCSP responder certificate | 2016-01-13 00:38:29 +02:00 | 
		
			
			
			
			
				| ocsp-server-cache.der | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| ocsp-server-cache.der-invalid | tests: EAP-TLS with OCSP | 2014-01-08 17:45:56 +02:00 | 
		
			
			
			
			
				| openssl2.cnf | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| radius_clients.conf |  |  | 
		
			
			
			
			
				| radius_clients_ipv6.conf | tests: Verify RADIUS functionality over IPv6 | 2014-03-02 10:35:33 +02:00 | 
		
			
			
			
			
				| radius_clients_none.conf | tests: hostapd authentication server test cases | 2017-03-05 16:51:04 +02:00 | 
		
			
			
			
			
				| rsa3072-ca.key | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| rsa3072-ca.pem | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| rsa3072-generate.sh | tests: Suite B 192-bit RSA validation with 2048-bit client cert | 2018-01-12 22:40:55 +02:00 | 
		
			
			
			
			
				| rsa3072-server.key | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| rsa3072-server.pem | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| rsa3072-user-rsa2048.key | tests: Suite B 192-bit RSA validation with 2048-bit client cert | 2018-01-12 22:40:55 +02:00 | 
		
			
			
			
			
				| rsa3072-user-rsa2048.pem | tests: Suite B 192-bit RSA validation with 2048-bit client cert | 2018-01-12 22:40:55 +02:00 | 
		
			
			
			
			
				| rsa3072-user.key | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| rsa3072-user.pem | tests: Suite B with RSA keys | 2017-09-18 12:12:48 +03:00 | 
		
			
			
			
			
				| server-eku-client-server.csr | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| server-eku-client-server.key | tests: Server certificate with both client and server EKU | 2014-03-02 10:35:33 +02:00 | 
		
			
			
			
			
				| server-eku-client-server.pem | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| server-eku-client.csr | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| server-eku-client.key | tests: EAP-TTLS and server certificate with client EKU | 2014-02-15 10:33:55 +02:00 | 
		
			
			
			
			
				| server-eku-client.pem | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| server-expired.key | tests: Expired server certificate | 2014-02-15 10:28:22 +02:00 | 
		
			
			
			
			
				| server-expired.pem | tests: Expired server certificate | 2014-02-15 10:28:22 +02:00 | 
		
			
			
			
			
				| server-extra.pkcs12 | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| server-long-duration.key | tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31 | 2015-05-24 11:24:35 +03:00 | 
		
			
			
			
			
				| server-long-duration.pem | tests: EAP-TTLS with server certificate valid beyond UNIX time 2^31 | 2015-05-24 11:24:35 +03:00 | 
		
			
			
			
			
				| server-no-dnsname.csr | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| server-no-dnsname.key | tests: Domain name suffix match against CN | 2014-02-15 10:19:16 +02:00 | 
		
			
			
			
			
				| server-no-dnsname.pem | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| server.csr | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| server.key |  |  | 
		
			
			
			
			
				| server.pem | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| server.pkcs12 | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| sha384-server.key | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha384-server.pem | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha384-user.key | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha384-user.pem | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-ca.key | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-ca.pem | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-generate.sh | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-server.key | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-server.pem | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-user.key | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| sha512-user.pem | tests: EAP-TLS with SHA512/SHA384 signature | 2015-11-30 00:39:38 +02:00 | 
		
			
			
			
			
				| update.sh | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| user.csr | tests: Update server and user certificates (2017) | 2017-10-01 18:47:02 +03:00 | 
		
			
			
			
			
				| user.key | tests: Add an EAP-TLS test case | 2013-11-03 19:51:06 +02:00 | 
		
			
			
			
			
				| user.key.pkcs8 | tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format | 2015-12-05 20:27:27 +02:00 | 
		
			
			
			
			
				| user.key.pkcs8.pkcs5v15 | tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format | 2015-12-05 20:27:27 +02:00 | 
		
			
			
			
			
				| user.pem | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| user.pkcs12 | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| user.rsa-key | tests: Use RSA key format in ap_wpa2_eap_tls_blob | 2015-01-12 00:19:21 +02:00 | 
		
			
			
			
			
				| user2.pkcs12 | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 | 
		
			
			
			
			
				| user3.pkcs12 | tests: Update server and user certificates (2018) | 2018-10-04 01:16:55 +03:00 |