The CRL, like a certificate, is signed by the owning CA to ensure the authenticity of the CRL contents and has a start and end (expiration) date and time. The start date and time is known as thisUpdate and the end date and time is known as the nextUpdate.
Supported CRLs can be obtained from a dedicated LDAP server or through a certificate's CRL Distribution Point (CDP) extension. HTTP Uniform Resource Identifier (URIs) values within the CDP may be used.
For information about configuring your SSL application to perform CRL revocation checking for SSL secure connections, see SSL/TLS partner certificate revocation checking.
For information about utilizing CRL revocation information from a CMS application, see gsk_validate_certificate_mode().
The OCSP response, like a CRL, is signed by the owning CA (or designated CA) to ensure the authenticity of the OCSP response contents and has a start and end (expiration) date and time. The start date and time is known as thisUpdate and the end date and time is known as the nextUpdate.
Supported OCSP responses can be obtained from a dedicated OCSP responder or through OCSP responders identified through a certificate's Authority Information Access (AIA) extension. AIA extensions may be used when the extension contains an entry with an OCSP access method and a URI access location. The AIA extension can contain multiple entries.
For information about configuring your SSL application to perform OCSP revocation checking for SSL secure connection, see SSL/TLS partner certificate revocation checking.
For information about utilizing OCSP revocation information from a CMS application, see gsk_validate_certificate_mode().