aboutsummaryrefslogtreecommitdiffstats
path: root/testing/tests/ikev2/ocsp-no-signer-cert/evaltest.dat
Commit message (Collapse)AuthorAgeFilesLines
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-311-1/+1
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* upgraded ikev2 scenarios to 5.0.0Andreas Steffen2012-05-111-6/+6
|
* due to a bug fix reverted to the previous RULE_CRL_VALIDATION checkAndreas Steffen2011-09-091-1/+1
|
* adapted evaltest.dat to new RULE_OCSP_VALIDATIONAndreas Steffen2010-09-011-1/+1
|
* merged multi-auth branch back into trunkMartin Willi2009-04-141-1/+2
|
* adapted ikev2 uml scenarios for the 4.2 versionAndreas Steffen2008-04-011-3/+4
|
* ocsp-no-signer-cert addedAndreas Steffen2007-04-201-0/+5