security/nss/tests/iopr/server_scr/iopr_server.cfg
author Vivien Nicolas <21@vingtetun.org>
Wed, 14 Dec 2011 11:34:33 +0100
changeset 83341 7c621c7bfea34f5a9ec5eb09b23c5ae7be1c8294
parent 37961 b234c7370793095b38292d533132b8065446844b
child 112392 699db88b5ea01fd321fe8abfe5bb071e991b120d
permissions -rw-r--r--
Bug 709010 - Add a empty components directory to b2g/. r=cjones

# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is the Network Security Services (NSS)
#
# The Initial Developer of the Original Code is Sun Microsystems, Inc.
# Portions created by the Initial Developer are Copyright (C) 2007-2009
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****

certDir=/iopr
caCertName=TestCA
caCrlName=TestCA

#old values
userCertNames="TestUser510-rsa TestUser512-rsa"
userRevokedCertNames="TestUser510-rsa"
reverseRunCGIScript="/cgi-bin/client.cgi"
#reverseTestParam=NOREVALL
supportedTests="SslSingleHs SslSecondHs"
#supportedTests="SslSecondHs"


downloadFiles="TestUser510-rsa.p12 TestUser512-rsa.p12 ocspTrustedResponder-rsa.crt ocspTRTestUser514-rsa.crt ocspTRTestUser516-rsa.crt ocspRCATestUser518-rsa.crt ocspRCATestUser520-rsa.crt ocspDRTestUser522-rsa.crt ocspDRTestUser524-rsa.crt ocspTRUnknownIssuerCert-rsa.crt ocspRCAUnknownIssuerCert-rsa.crt ocspDRUnknownIssuerCert-rsa.crt"
# Keep a space at the end of
SslClntValidCertName="TestUser512-rsa"
SslClntRevokedCertName="TestUser510-rsa"
reverseRunCGIScript="/cgi-bin/client.cgi"
#reverseTestParam=NOREVALL

supportedTests_new="SslSingleHs SslSecondHs OcspTrustedResponder OcspResponderCA OcspDesinatedResponder"

#
# SslSingleHs: ssl single handshake with out client cert auth
SslSingleHsDescr="ssl with single handshake without client cert auth"
SslSingleHsPort=443
SslSingleHsUrl=/iopr_test/test_pg.html
SslSingleHsParam=NOAUTH

#
# SslSecondHs: ssl with secondary hs when accessing direcory 
# that requires cert verification
SslSecondHsDescr="ssl with secondary hs when accessing direcory that requires cert verification"
SslSecondHsPort=443
SslSecondHsUrl=/iopr_test_2hs/test_pg.html
SslSecondHsParam=NOCOV

#
# OcspTrustedResponder - trusted responder key is used to sign OCSP response
#
OcspTrustedResponderDescr="trusted responder key is used to sign OCSP response"
OcspTrustedResponderProto=http
OcspTrustedResponderPort=2560
OcspTrustedResponderResponderCert=ocspTrustedResponder-rsa
OcspTrustedResponderValidCertNames="ocspTRTestUser516-rsa"
OcspTrustedResponderRevokedCertNames="ocspTRTestUser514-rsa"
OcspTrustedResponderStatUnknownCertNames="ocspTRUnknownIssuerCert-rsa"

#
# OcspResponderCA - CA key is used to sign OCSP response
#
OcspResponderCADescr="CA key is used to sign OCSP response"
OcspResponderCAValidCertNames="ocspRCATestUser518-rsa"
OcspResponderCARevokedCertNames="ocspRCATestUser520-rsa"
OcspResponderCAStatUnknownCertNames="ocspRCAUnknownIssuerCert-rsa"

#
# OcspDesinatedResponder - CA Designated Responder key is used to sign OCSP response
#
OcspDesinatedResponderDescr="CA Designated Responder key is used to sign OCSP response"
OcspDesinatedResponderValidCertNames="ocspDRTestUser522-rsa"
OcspDesinatedResponderRevokedCertNames="ocspDRTestUser524-rsa"
OcspDesinatedResponderStatUnknownCertNames="ocspDRUnknownIssuerCert-rsa"