// With SecTrust Unification, the OCSP response is cached by the previous evaluation.
// FIXME The semantics of the input to SecPolicyCreateRevocation are technically not honored,
// since if neither the OCSP or CRL bits are set, we should not be using either. Unfortunately,
// the iOS implementation treats this as a no-op, which for EV certs means an OCSP check by default.
ok(ev && CFEqual(kCFBooleanTrue, ev), "Expect success even if unable to use network, due to caching");
// With SecTrust Unification, the OCSP response is cached by the previous evaluation.
// FIXME The semantics of the input to SecPolicyCreateRevocation are technically not honored,
// since if neither the OCSP or CRL bits are set, we should not be using either. Unfortunately,
// the iOS implementation treats this as a no-op, which for EV certs means an OCSP check by default.
ok(ev && CFEqual(kCFBooleanTrue, ev), "Expect success even if unable to use network, due to caching");