hostap/tests/hwsim/auth_serv
Jouni Malinen 31dd315382 tests: PKCS#12 with extra certs on the server
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
2016-02-06 01:14:43 +02:00
..
iCA-server tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
iCA-user tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
rootCA tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
as.conf tests: Minimal testing of OCSP stapling with ocsp_multi 2015-12-23 00:32:52 +02:00
as2.conf
ca-and-crl.pem
ca-incorrect.pem
ca-key.pem tests: Additional OCSP coverage 2015-10-10 17:32:53 +03:00
ca.der
ca.pem
dh.conf
dh2.conf
dsaparam.pem
eap_user.conf tests: WPS and EAP-WSC in network profile 2016-01-13 22:08:04 +02:00
eap_user_vlan.conf tests: RADIUS server changing VLAN ID assignment 2015-01-30 01:11:56 +02:00
ec-ca-openssl.cnf tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
ec-ca.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-generate.sh
ec-server.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-server.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-user.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec-user.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-ca.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-generate.sh
ec2-server.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-server.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-user.key tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
ec2-user.pem tests: Generate new certificates for Suite B test cases 2016-02-02 00:09:20 +02:00
hlr_auc_gw.gsm
hlr_auc_gw.milenage_db tests: EAP-SIM with external GSM auth and replacing SIM 2016-01-08 18:03:11 +02:00
ica-generate.sh tests: EAP-TLS with intermediate CAs and OCSP multi 2015-12-24 00:54:30 +02:00
index-revoked.txt tests: Fix OCSP response for ap_wpa2_eap_ttls_ocsp_revoked 2015-10-02 19:16:04 +03:00
index-unknown.txt
index.txt
ocsp-multi-server-cache.der tests: Minimal testing of OCSP stapling with ocsp_multi 2015-12-23 00:32:52 +02:00
ocsp-req.der
ocsp-responder.key
ocsp-responder.pem tests: Renew the expired OCSP responder certificate 2016-01-13 00:38:29 +02:00
ocsp-server-cache.der
ocsp-server-cache.der-invalid
radius_clients.conf
radius_clients_ipv6.conf
server-eku-client-server.key
server-eku-client-server.pem
server-eku-client.key
server-eku-client.pem
server-expired.key
server-expired.pem
server-extra.pkcs12 tests: PKCS#12 with extra certs on the server 2016-02-06 01:14:43 +02:00
server-long-duration.key
server-long-duration.pem
server-no-dnsname.key
server-no-dnsname.pem
server.key
server.pem
server.pkcs12
sha384-server.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-server.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-user.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha384-user.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-ca.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-ca.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-generate.sh tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-server.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-server.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-user.key tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
sha512-user.pem tests: EAP-TLS with SHA512/SHA384 signature 2015-11-30 00:39:38 +02:00
user.key
user.key.pkcs8 tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format 2015-12-05 20:27:27 +02:00
user.key.pkcs8.pkcs5v15 tests: PKCS #8 private key with PKCS #5 v1.5 and v2.0 format 2015-12-05 20:27:27 +02:00
user.pem
user.pkcs12
user.rsa-key
user2.pkcs12
user3.pkcs12