summaryrefslogtreecommitdiff
path: root/test/aux-fixed/exim-ca/example.com
AgeCommit message (Collapse)Author
2016-11-02Testsuite: regen certs, now with additional LetsEncrypt-style OCSP proofsJeremy Harris
2015-12-17DANE: do not override a cert verify failure, in callback. Also fix some ↵Jeremy Harris
test mistakes
2014-10-16Handle certificate dir under GnuTLS, if recent enoughJeremy Harris
Add testcases for certificate directories The GnuTLS implementation has been tested on Fedora 21 (alpha), using GnuTLS 3.3.9. The testsuite case is here but with the script commented-out. When enabled, the log/mail/stdout/stderr files will be created fresh.
2014-08-10Add (2 0 1) testJeremy Harris
2014-04-24Support OCSP Stapling under GnuTLS. Bug 1459Jeremy Harris
Requires GnuTLS version 3.1.3 or later. Under EXPERIMENTAL_OCSP
2013-12-15Increase test CA key sizes from 512 to 1024 to handle TLS1.2 digest sizes.Jeremy Harris
2013-03-25OCSP-stapling enhancement and testing.Jeremy Harris
Server: Honor environment variable as well as running_in_test_harness in permitting bogus staplings Update server tests Add "-ocsp" option to client-ssl. Server side: add verification of stapled status. First cut server-mode ocsp testing. Fix some uninitialized ocsp-related data. Client (new): Verify stapling using only the chain that verified the server cert, not any acceptable chain. Add check for multiple responses in a stapling, which is not handled Refuse verification on expired and revoking staplings. Handle OCSP client refusal on lack of stapling from server. More fixing in client OCSP: use the server cert signing chain to verify the OCSP info. Add transport hosts_require_ocsp option. Log stapling responses. Start on tests for client-side. Testing support: Add CRL generation code and documentation update Initial CA & certificate set for testing. BUGFIX: Once a single OCSP response has been extracted the validation routine return code is no longer about the structure, but the actual returned OCSP status.