summaryrefslogtreecommitdiff
path: root/tests/suite
Commit message (Collapse)AuthorAgeFilesLines
...
* testpkcs11: do not ignore the failure to write a trusted CANikos Mavrogiannopoulos2015-01-121-1/+1
|
* testpkcs11: modified to support both softhsmv1 and v2Nikos Mavrogiannopoulos2015-01-111-9/+23
|
* testpkcs11: detect softhsm2Nikos Mavrogiannopoulos2015-01-051-1/+1
|
* tests: added check for gnutls_x509_trust_list_get_issuer_by_dn()Nikos Mavrogiannopoulos2014-12-311-0/+19
|
* PKCS #11 tests: ported to softhsmv2Nikos Mavrogiannopoulos2014-12-247-110/+105
| | | | | | The C programs still rely on softhsmv1 since there are issues with softhsmv2 and CKA_TRUSTED. https://bugzilla.redhat.com/show_bug.cgi?id=1177086
* tests: pkcs11-is-known checks whether the import of PKCS #11 objects as ↵Nikos Mavrogiannopoulos2014-12-211-2/+31
| | | | trusted certs works
* Added softhsm.h to share code in softhsm detectionNikos Mavrogiannopoulos2014-12-217-93/+104
|
* tests: disable SSL 3.0 checks with polarsslNikos Mavrogiannopoulos2014-12-121-0/+3
| | | | It seems that SSL 3.0 is disabled in Debian's polarssl.
* testdane: removed www.vulcano.cl from good hostsNikos Mavrogiannopoulos2014-12-121-1/+2
|
* testcompat: corrected usage of null cipherNikos Mavrogiannopoulos2014-12-111-1/+1
|
* ciphersuite test: enhanced check for correct ciphersuitesNikos Mavrogiannopoulos2014-12-052-3/+13
|
* ciphersuites tests: add missing includesNikos Mavrogiannopoulos2014-12-051-1/+1
|
* ciphersuite tests: define HAVE_CONFIG_HNikos Mavrogiannopoulos2014-12-051-1/+1
|
* tests: updated for AES-128-CCM ciphersuitesNikos Mavrogiannopoulos2014-12-031-0/+10
|
* Added memxor_different_alignment into suppressionsNikos Mavrogiannopoulos2014-11-231-0/+7
|
* tests: added check for the abbreviated URLs which don't contain object ↵Nikos Mavrogiannopoulos2014-11-201-3/+6
| | | | information
* testcompat-openssl: disable SSL 3.0 as it is not supported on debianNikos Mavrogiannopoulos2014-11-061-0/+9
|
* fixed polarssl compatibility checks on debianNikos Mavrogiannopoulos2014-11-061-8/+12
|
* tests: separated the two testcompat tests (openssl/polarssl)Nikos Mavrogiannopoulos2014-11-065-342/+372
|
* tests: added interoperability tests with openssl's PSKNikos Mavrogiannopoulos2014-11-051-0/+46
|
* testcompat: increased the number of test cases checkedNikos Mavrogiannopoulos2014-11-042-88/+114
|
* testcompat-polarssl: try to run the test only if polarssl binaries are availableNikos Mavrogiannopoulos2014-11-041-0/+5
|
* testcompat: check the PSK ciphersuite interoperability against polarsslNikos Mavrogiannopoulos2014-11-042-0/+92
|
* testcompat: added interop tests with polarsslNikos Mavrogiannopoulos2014-11-045-36/+315
|
* tests: Added check for gnutls_certificate_set_x509_key_file2() and PKCS #11 ↵Nikos Mavrogiannopoulos2014-11-012-2/+293
| | | | + PIN
* tests: check the issuer value validity of gnutls_x509_trust_list_get_issuerNikos Mavrogiannopoulos2014-10-231-0/+10
|
* testsrn: do not assume that SSL 3.0 is enabled by defaultNikos Mavrogiannopoulos2014-10-171-1/+1
|
* tests: pkcs11-combo: use unique db fileNikos Mavrogiannopoulos2014-10-101-3/+4
|
* tests: updated time in pkcs11-is-knownNikos Mavrogiannopoulos2014-10-091-1/+1
|
* tests: allow running specific chainverify tests on fixed datesNikos Mavrogiannopoulos2014-10-091-2/+8
|
* tests: Added check to ensure that trust list combination with extra ↵Nikos Mavrogiannopoulos2014-10-092-2/+504
| | | | certificates works
* Add a test for PKCS11 CA iterationArmin Burgmeier2014-10-071-0/+31
| | | | Signed-off-by: Armin Burgmeier <armin@arbur.net>
* tests: corrected check with gnutls_x509_trust_list_get_issuerNikos Mavrogiannopoulos2014-10-071-108/+112
|
* tests: check gnutls_pkcs11_crt_is_known() when multiple same DNs are presentNikos Mavrogiannopoulos2014-10-062-2/+463
|
* tests: added check for GNUTLS_TL_GET_COPYNikos Mavrogiannopoulos2014-10-011-0/+8
|
* tests: Added checks for key purpose verificationNikos Mavrogiannopoulos2014-09-222-2/+11
|
* tests: enhanced test suite to pass more of the PKCS #11 API under valgrindNikos Mavrogiannopoulos2014-09-191-6/+51
|
* create-chain.sh: generate CRLNikos Mavrogiannopoulos2014-09-131-0/+6
|
* pkcs11-get-issuer: do not hardcode the chain number, use its nameNikos Mavrogiannopoulos2014-09-121-7/+22
|
* tests: simply valgrind suppressions for libidnNikos Mavrogiannopoulos2014-09-071-27/+2
|
* use random ports in tests, unless a port is providedNikos Mavrogiannopoulos2014-09-053-3/+6
|
* tests: added more idna valgrind suppressionsNikos Mavrogiannopoulos2014-08-261-0/+15
|
* tests: suppress more libidn warningsNikos Mavrogiannopoulos2014-08-231-0/+9
|
* tests: copied valgrind suppressions to suiteNikos Mavrogiannopoulos2014-08-201-0/+9
|
* testdane: re-enabled DANE checks and added checks on SMTPNikos Mavrogiannopoulos2014-08-091-6/+18
|
* danetool: if the certificate to verify against is not provide it try to ↵Nikos Mavrogiannopoulos2014-08-081-16/+2
| | | | obtain it
* testpkcs11: rearranged checks to avoid wrong deletionsNikos Mavrogiannopoulos2014-08-071-10/+10
|
* tests: ensure that no environment variables confuse softhsmNikos Mavrogiannopoulos2014-08-072-3/+8
|
* testpkcs11: test the trusted and ca flags being setNikos Mavrogiannopoulos2014-08-071-2/+42
|
* testpkcs11: exit if export_pubkey_of_privkey failsNikos Mavrogiannopoulos2014-08-071-4/+2
|