tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

iopr_server.cfg (2764B)


      1 # This Source Code Form is subject to the terms of the Mozilla Public
      2 # License, v. 2.0. If a copy of the MPL was not distributed with this
      3 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
      4 
      5 certDir=/iopr
      6 caCertName=TestCA
      7 caCrlName=TestCA
      8 
      9 #old values
     10 userCertNames="TestUser510-rsa TestUser512-rsa"
     11 userRevokedCertNames="TestUser510-rsa"
     12 reverseRunCGIScript="/cgi-bin/client.cgi"
     13 #reverseTestParam=NOREVALL
     14 supportedTests="SslSingleHs SslSecondHs"
     15 #supportedTests="SslSecondHs"
     16 
     17 
     18 downloadFiles="TestUser510-rsa.p12 TestUser512-rsa.p12 ocspTrustedResponder-rsa.crt ocspTRTestUser514-rsa.crt ocspTRTestUser516-rsa.crt ocspRCATestUser518-rsa.crt ocspRCATestUser520-rsa.crt ocspDRTestUser522-rsa.crt ocspDRTestUser524-rsa.crt ocspTRUnknownIssuerCert-rsa.crt ocspRCAUnknownIssuerCert-rsa.crt ocspDRUnknownIssuerCert-rsa.crt"
     19 # Keep a space at the end of
     20 SslClntValidCertName="TestUser512-rsa"
     21 SslClntRevokedCertName="TestUser510-rsa"
     22 reverseRunCGIScript="/cgi-bin/client.cgi"
     23 #reverseTestParam=NOREVALL
     24 
     25 supportedTests_new="SslSingleHs SslSecondHs OcspTrustedResponder OcspResponderCA OcspDesinatedResponder"
     26 
     27 #
     28 # SslSingleHs: ssl single handshake with out client cert auth
     29 SslSingleHsDescr="ssl with single handshake without client cert auth"
     30 SslSingleHsPort=443
     31 SslSingleHsUrl=/iopr_test/test_pg.html
     32 SslSingleHsParam=NOAUTH
     33 
     34 #
     35 # SslSecondHs: ssl with secondary hs when accessing direcory 
     36 # that requires cert verification
     37 SslSecondHsDescr="ssl with secondary hs when accessing direcory that requires cert verification"
     38 SslSecondHsPort=443
     39 SslSecondHsUrl=/iopr_test_2hs/test_pg.html
     40 SslSecondHsParam=NOCOV
     41 
     42 #
     43 # OcspTrustedResponder - trusted responder key is used to sign OCSP response
     44 #
     45 OcspTrustedResponderDescr="trusted responder key is used to sign OCSP response"
     46 OcspTrustedResponderProto=http
     47 OcspTrustedResponderPort=2560
     48 OcspTrustedResponderResponderCert=ocspTrustedResponder-rsa
     49 OcspTrustedResponderValidCertNames="ocspTRTestUser516-rsa"
     50 OcspTrustedResponderRevokedCertNames="ocspTRTestUser514-rsa"
     51 OcspTrustedResponderStatUnknownCertNames="ocspTRUnknownIssuerCert-rsa"
     52 
     53 #
     54 # OcspResponderCA - CA key is used to sign OCSP response
     55 #
     56 OcspResponderCADescr="CA key is used to sign OCSP response"
     57 OcspResponderCAValidCertNames="ocspRCATestUser518-rsa"
     58 OcspResponderCARevokedCertNames="ocspRCATestUser520-rsa"
     59 OcspResponderCAStatUnknownCertNames="ocspRCAUnknownIssuerCert-rsa"
     60 
     61 #
     62 # OcspDesinatedResponder - CA Designated Responder key is used to sign OCSP response
     63 #
     64 OcspDesinatedResponderDescr="CA Designated Responder key is used to sign OCSP response"
     65 OcspDesinatedResponderValidCertNames="ocspDRTestUser522-rsa"
     66 OcspDesinatedResponderRevokedCertNames="ocspDRTestUser524-rsa"
     67 OcspDesinatedResponderStatUnknownCertNames="ocspDRUnknownIssuerCert-rsa"