Hi, I have 2 questions about this implementation.

1) Can the OCSP client put multiple certificates to check in the request ?
   like this.
----------------------------------------------------------------
$ openssl ocsp -reqin ocsp_req.der -req_text
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 3429CF3BC59A76F61C3296E597B1F9D5F4A52B3A
          Issuer Key Hash: 68DBFBB578936A6704433C981F7ECE61819838C7
          Serial Number: 03
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 3429CF3BC59A76F61C3296E597B1F9D5F4A52B3A
          Issuer Key Hash: 68DBFBB578936A6704433C981F7ECE61819838C7
          Serial Number: D0F00ED53778C7C5
    Request Extensions:
        OCSP Nonce:
            04104C65A6FA1D4839916C3B8C18A4EF2E5D
----------------------------------------------------------------

2) Is it available signing to OCSP request by client ?
   I indicate this https://tools.ietf.org/html/rfc6960#section-4.1.2
   "The requestor MAY choose to sign the OCSP request."

These 2 functionality might NOT need when we're doing OCSP stapling.
(server cert to verify by OCSP stapling will be always single ...)

Best regards,

Kinichiro Inoguchi

Reply via email to