.. |
as.conf
|
tests: Verify RADIUS server MIB values
|
2014-02-15 21:39:31 +02:00 |
ca-incorrect.pem
|
tests: Add negative TLS test case to verify trust root validation
|
2013-10-20 21:38:02 +03:00 |
ca.der
|
tests: CA certificate in DER format
|
2014-01-08 17:06:36 +02:00 |
ca.pem
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
dh.conf
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
eap_user.conf
|
tests: Verify HS 2.0 OSEN connection
|
2014-02-26 18:10:08 +02:00 |
hlr_auc_gw.milenage_db
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
ocsp-server-cache.der
|
tests: EAP-TLS with OCSP
|
2014-01-08 17:45:56 +02:00 |
ocsp-server-cache.der-invalid
|
tests: EAP-TLS with OCSP
|
2014-01-08 17:45:56 +02:00 |
radius_clients.conf
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
server-eku-client.key
|
tests: EAP-TTLS and server certificate with client EKU
|
2014-02-15 10:33:55 +02:00 |
server-eku-client.pem
|
tests: EAP-TTLS and server certificate with client EKU
|
2014-02-15 10:33:55 +02:00 |
server-expired.key
|
tests: Expired server certificate
|
2014-02-15 10:28:22 +02:00 |
server-expired.pem
|
tests: Expired server certificate
|
2014-02-15 10:28:22 +02:00 |
server-no-dnsname.key
|
tests: Domain name suffix match against CN
|
2014-02-15 10:19:16 +02:00 |
server-no-dnsname.pem
|
tests: Domain name suffix match against CN
|
2014-02-15 10:19:16 +02:00 |
server.key
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
server.pem
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
user.key
|
tests: Add an EAP-TLS test case
|
2013-11-03 19:51:06 +02:00 |
user.pem
|
tests: Start RADIUS authentication server
|
2013-09-29 19:14:16 +03:00 |
user.pkcs12
|
tests: PKCS#12 use for EAP-TLS
|
2014-01-08 17:18:22 +02:00 |