]> git.ipfire.org Git - thirdparty/strongswan.git/commit
testing: Add tkm xfrmproxy-expire test
authorReto Buerki <reet@codelabs.ch>
Thu, 18 Dec 2014 10:49:05 +0000 (11:49 +0100)
committerMartin Willi <martin@revosec.ch>
Fri, 20 Feb 2015 12:34:54 +0000 (13:34 +0100)
commit65566c37caec653bd91f488083f95387e9fbc1f3
tree5093dc57e2621cad0078594ae2919b7f77827e04
parent03409ac7a0b5033d555282b8101f2f91b0731239
testing: Add tkm xfrmproxy-expire test

This test asserts that the handling of XFRM expire messages from the
kernel are handled correctly by the xfrm-proxy and the Esa Event Service
(EES) in charon-tkm.
testing/tests/tkm/xfrmproxy-expire/description.txt [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/evaltest.dat [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/moon/etc/strongswan.conf [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/moon/etc/tkm/moonKey.der [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/moon/etc/tkm/strongswanCert.der [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/moon/etc/tkm/tkm.conf [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/sun/etc/ipsec.conf [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/hosts/sun/etc/strongswan.conf [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/posttest.dat [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/pretest.dat [new file with mode: 0644]
testing/tests/tkm/xfrmproxy-expire/test.conf [new file with mode: 0644]