summaryrefslogtreecommitdiff
path: root/test/aux-fixed/exim-ca/example.com/revoked1.example.com/revoked1.example.com.chain.pem
Commit message (Collapse)AuthorAgeFilesLines
* Lose duplicated cert in ocsp responseJeremy Harris2022-11-221-30/+30
|
* Testsuite: regenerate OCSP proofs with proof-signer certsJeremy Harris2022-11-221-30/+30
|
* Testsuite: regenerate certificates treeJeremy Harris2022-11-031-33/+31
| | | | The OCSP proofs had become out-of-date
* Testsuite: regen certificates suite with fixed Authority IdentifierJeremy Harris2021-06-041-32/+34
|
* Testsuite: regenerate CA trees with 2048-bit keysJeremy Harris2018-11-271-26/+37
| | | | This is to support RHEL 8.0 where OpenSSL dislikes 1024
* Testsuite: move CRL testcases away from using SHA1-signed certsJeremy Harris2017-12-181-17/+17
|
* Testsuite: regenerate certs treeJeremy Harris2017-12-161-17/+17
|
* Testsuite: testcase for Bug 2198Jeremy Harris2017-12-161-20/+20
|
* Testsuite: regen certs trees, now with OCSP response for one EC certJeremy Harris2017-12-031-17/+17
|
* TLS: support multiple certificate files in server. Bug 2092Jeremy Harris2017-11-071-28/+28
|
* Testsuite: use certs expring before end of 2037, to avoid GnuTLS top-limit ↵Jeremy Harris2017-01-311-19/+19
| | | | clamp on small-size_t platforms
* Testsuite: regen certs, now with additional LetsEncrypt-style OCSP proofsJeremy Harris2016-11-021-20/+20
|
* DANE: do not override a cert verify failure, in callback. Also fix some ↵Jeremy Harris2015-12-171-22/+22
| | | | test mistakes
* Support OCSP Stapling under GnuTLS. Bug 1459Jeremy Harris2014-04-241-19/+19
| | | | | Requires GnuTLS version 3.1.3 or later. Under EXPERIMENTAL_OCSP
* Increase test CA key sizes from 512 to 1024 to handle TLS1.2 digest sizes.Jeremy Harris2013-12-151-18/+24
|
* OCSP-stapling enhancement and testing.Jeremy Harris2013-03-251-0/+29
Server: Honor environment variable as well as running_in_test_harness in permitting bogus staplings Update server tests Add "-ocsp" option to client-ssl. Server side: add verification of stapled status. First cut server-mode ocsp testing. Fix some uninitialized ocsp-related data. Client (new): Verify stapling using only the chain that verified the server cert, not any acceptable chain. Add check for multiple responses in a stapling, which is not handled Refuse verification on expired and revoking staplings. Handle OCSP client refusal on lack of stapling from server. More fixing in client OCSP: use the server cert signing chain to verify the OCSP info. Add transport hosts_require_ocsp option. Log stapling responses. Start on tests for client-side. Testing support: Add CRL generation code and documentation update Initial CA & certificate set for testing. BUGFIX: Once a single OCSP response has been extracted the validation routine return code is no longer about the structure, but the actual returned OCSP status.