We may want to support a convenient way to perform revocation checking of the client certificate in SSL/TLS handshaking.
Section 3.2, NIST Sp 800-52 R1 [1]:
----------------------------------------------------
The server shall perform revocation checking of the client certificate, when client authentication is used. Revocation information shall be obtained by the server from one or more of the following locations:
1. Certificate Revocation List (CRL) or OCSP [RFC6960] response in the server���s local store;
2. OCSP response from a locally configured OCSP Responder;
3. OCSP response from the OCSP Responder location identified in the OCSP field in the Authority Information Access extension in the client certificate; or
4. CRL from the CRL Distribution Point extension in the client certificate.
When the local store does not have the current or a cogent11 CRL or OCSP response, and the OCSP Responder and the CRL Distribution Point are unavailable or inaccessible at the time of TLS session establishment, the server will either deny the connection or accept a potentially revoked or compromised certificate. The decision to accept or reject a certificate in this situation should be made according to agency policy.
[1]: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf