pkix-3----Page:4
1  2  3  4  5  6  7  8  9  10 

Request – Transition Concerns
What hash function / signature algorithm is the OCSP Responder permitted to use?
If Request is signed, could expect the same on to be used by the OCSP Responder
If Request is not signed, could expect the same hash function to be used, but there is no hint about the signature function
Better if the Request listed the acceptable hash functions and signature algorithms
PPT Version