OpenSSL: full-chain OCSP stapling. Bug 1466
[exim.git] / test / scripts / 5655-OCSP-GnuTLS-1.3 / 5655
... / ...
CommitLineData
1# OCSP stapling, server, multiple chain-element OCSP
2#
3#
4#
5mkdir -p DIR/tmp/ocsp
6sudo chown -R EXIMUSER:EXIMGROUP tmp
7sudo chmod -R a+rwx DIR/tmp/ocsp
8perl
9chdir 'aux-fixed/exim-ca/example.com';
10system 'cat server1.example.com/server1.example.com.ocsp.signernocert.good.resp.pem CA/Signer.ocsp.signernocert.revoked.resp.pem > DIR/tmp/ocsp/double_r.ocsp.pem';
11****
12#
13#
14exim -z '1: TLS1.2 Server sends good leaf-staple on request, to client requiring RSA auth'
15****
16#
17sudo exim -bd -oX PORT_D -DSERVER=server -DLIMIT=TLS1.2
18****
19#
20exim -odf -DOPT=rsa -DLIMIT=TLS1.2 rsa.auth@test.ex
21Subject: test
22
23.
24****
25killdaemon
26#
27#
28exim -z '2: TLS1.3 Server sends good 3-element staple on request, to client requiring RSA auth'
29****
30#
31# Prefix with sudo to get SSLKEYLOGFILE to work. Only works on the server.
32exim -bd -oX PORT_D -DSERVER=server -DLIMIT=TLS1.3
33****
34exim -odf -DOPT=rsa rsa.auth@test.ex
35Subject: test
36
37.
38****
39killdaemon
40#
41#
42#
43exim -z '3: TLS1.3 Server sends bad nonleaf staple, client detects it'
44****
45#
46EXIM_TESTHARNESS_DISABLE_OCSPVALIDITYCHECK=y exim -bd -oX PORT_D -DSERVER=server -DLIMIT=TLS1.3 -DCONTROL=bad
47****
48exim -odf -DOPT=rsa rsa.auth@test.ex
49Subject: test
50
51.
52****
53killdaemon
54#
55#
56#
57#
58sudo rm -fr tmp/
59no_msglog_check