1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/security/nss/tests/iopr/server_scr/iopr_server.cfg Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,67 @@ 1.4 +# This Source Code Form is subject to the terms of the Mozilla Public 1.5 +# License, v. 2.0. If a copy of the MPL was not distributed with this 1.6 +# file, You can obtain one at http://mozilla.org/MPL/2.0/. 1.7 + 1.8 +certDir=/iopr 1.9 +caCertName=TestCA 1.10 +caCrlName=TestCA 1.11 + 1.12 +#old values 1.13 +userCertNames="TestUser510-rsa TestUser512-rsa" 1.14 +userRevokedCertNames="TestUser510-rsa" 1.15 +reverseRunCGIScript="/cgi-bin/client.cgi" 1.16 +#reverseTestParam=NOREVALL 1.17 +supportedTests="SslSingleHs SslSecondHs" 1.18 +#supportedTests="SslSecondHs" 1.19 + 1.20 + 1.21 +downloadFiles="TestUser510-rsa.p12 TestUser512-rsa.p12 ocspTrustedResponder-rsa.crt ocspTRTestUser514-rsa.crt ocspTRTestUser516-rsa.crt ocspRCATestUser518-rsa.crt ocspRCATestUser520-rsa.crt ocspDRTestUser522-rsa.crt ocspDRTestUser524-rsa.crt ocspTRUnknownIssuerCert-rsa.crt ocspRCAUnknownIssuerCert-rsa.crt ocspDRUnknownIssuerCert-rsa.crt" 1.22 +# Keep a space at the end of 1.23 +SslClntValidCertName="TestUser512-rsa" 1.24 +SslClntRevokedCertName="TestUser510-rsa" 1.25 +reverseRunCGIScript="/cgi-bin/client.cgi" 1.26 +#reverseTestParam=NOREVALL 1.27 + 1.28 +supportedTests_new="SslSingleHs SslSecondHs OcspTrustedResponder OcspResponderCA OcspDesinatedResponder" 1.29 + 1.30 +# 1.31 +# SslSingleHs: ssl single handshake with out client cert auth 1.32 +SslSingleHsDescr="ssl with single handshake without client cert auth" 1.33 +SslSingleHsPort=443 1.34 +SslSingleHsUrl=/iopr_test/test_pg.html 1.35 +SslSingleHsParam=NOAUTH 1.36 + 1.37 +# 1.38 +# SslSecondHs: ssl with secondary hs when accessing direcory 1.39 +# that requires cert verification 1.40 +SslSecondHsDescr="ssl with secondary hs when accessing direcory that requires cert verification" 1.41 +SslSecondHsPort=443 1.42 +SslSecondHsUrl=/iopr_test_2hs/test_pg.html 1.43 +SslSecondHsParam=NOCOV 1.44 + 1.45 +# 1.46 +# OcspTrustedResponder - trusted responder key is used to sign OCSP response 1.47 +# 1.48 +OcspTrustedResponderDescr="trusted responder key is used to sign OCSP response" 1.49 +OcspTrustedResponderProto=http 1.50 +OcspTrustedResponderPort=2560 1.51 +OcspTrustedResponderResponderCert=ocspTrustedResponder-rsa 1.52 +OcspTrustedResponderValidCertNames="ocspTRTestUser516-rsa" 1.53 +OcspTrustedResponderRevokedCertNames="ocspTRTestUser514-rsa" 1.54 +OcspTrustedResponderStatUnknownCertNames="ocspTRUnknownIssuerCert-rsa" 1.55 + 1.56 +# 1.57 +# OcspResponderCA - CA key is used to sign OCSP response 1.58 +# 1.59 +OcspResponderCADescr="CA key is used to sign OCSP response" 1.60 +OcspResponderCAValidCertNames="ocspRCATestUser518-rsa" 1.61 +OcspResponderCARevokedCertNames="ocspRCATestUser520-rsa" 1.62 +OcspResponderCAStatUnknownCertNames="ocspRCAUnknownIssuerCert-rsa" 1.63 + 1.64 +# 1.65 +# OcspDesinatedResponder - CA Designated Responder key is used to sign OCSP response 1.66 +# 1.67 +OcspDesinatedResponderDescr="CA Designated Responder key is used to sign OCSP response" 1.68 +OcspDesinatedResponderValidCertNames="ocspDRTestUser522-rsa" 1.69 +OcspDesinatedResponderRevokedCertNames="ocspDRTestUser524-rsa" 1.70 +OcspDesinatedResponderStatUnknownCertNames="ocspDRUnknownIssuerCert-rsa"