hostap/tests/hwsim/auth_serv
Jouni Malinen 0ba13e8613 tests: Update server and user certificates (2017)
The previous versions expired, so need to re-sign these to fix number of
the EAP test cases. In addition, add a shell script (update.sh) and the
needed CA files to automate this full update process.

Signed-off-by: Jouni Malinen <j@w1.fi>
2017-10-01 18:47:02 +03:00
..
iCA-server
iCA-user tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
rootCA
test-ca
as.conf tests: Write MSK dump files from authentication server 2017-09-05 19:29:01 +03:00
as2.conf
ca-and-crl.pem
ca-incorrect.pem
ca-key.pem tests: Additional OCSP coverage 2015-10-10 17:32:53 +03:00
ca.der
ca.pem
dh.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
dh2.conf tests: DH params with 2048-bit key 2015-05-24 11:03:42 +03:00
dh_param_3072.pem tests: Suite B with RSA keys 2017-09-18 12:12:48 +03:00
dsaparam.pem
eap_user.conf
eap_user_vlan.conf tests: Tagged-VLAN only change on reauthentication 2016-02-27 21:49:27 +02:00
ec-ca-openssl.cnf tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
ec-ca.pem
ec-generate.sh
ec-server.key
ec-server.pem
ec-user.key
ec-user.pem
ec2-ca.pem
ec2-generate.sh tests: Suite B 192-bit profile 2015-01-27 01:43:55 +02:00
ec2-server.key
ec2-server.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-user.key
ec2-user.pem
hlr_auc_gw.gsm
hlr_auc_gw.milenage_db
ica-generate.sh
index-revoked.txt
index-unknown.txt tests: Valid OCSP response with revoked and unknown cert status 2015-01-12 00:19:21 +02:00
index.txt
ocsp-multi-server-cache.der
ocsp-req.der
ocsp-responder.key
ocsp-responder.pem tests: Renew the expired OCSP responder certificate 2016-01-13 00:38:29 +02:00
ocsp-server-cache.der
ocsp-server-cache.der-invalid
openssl2.cnf
radius_clients.conf tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
radius_clients_ipv6.conf tests: Verify RADIUS functionality over IPv6 2014-03-02 10:35:33 +02:00
radius_clients_none.conf
rsa3072-ca.key tests: Suite B with RSA keys 2017-09-18 12:12:48 +03:00
rsa3072-ca.pem
rsa3072-generate.sh
rsa3072-server.key
rsa3072-server.pem
rsa3072-user.key
rsa3072-user.pem
server-eku-client-server.csr
server-eku-client-server.key
server-eku-client-server.pem
server-eku-client.csr
server-eku-client.key
server-eku-client.pem tests: Update server and user certificates (2017) 2017-10-01 18:47:02 +03:00
server-expired.key tests: Expired server certificate 2014-02-15 10:28:22 +02:00
server-expired.pem
server-extra.pkcs12
server-long-duration.key
server-long-duration.pem
server-no-dnsname.csr
server-no-dnsname.key
server-no-dnsname.pem
server.csr
server.key tests: Start RADIUS authentication server 2013-09-29 19:14:16 +03:00
server.pem
server.pkcs12
sha384-server.key
sha384-server.pem
sha384-user.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-user.pem
sha512-ca.key
sha512-ca.pem
sha512-generate.sh
sha512-server.key
sha512-server.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-user.key
sha512-user.pem
update.sh
user.csr
user.key
user.key.pkcs8
user.key.pkcs8.pkcs5v15 tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format 2015-12-05 20:27:27 +02:00
user.pem
user.pkcs12
user.rsa-key
user2.pkcs12
user3.pkcs12