IKEv2 NSS X509 test with various bits and flags toggled.

Note: dist_certs.py cannot generate some bogus certs because the underlying
openssl is refusing to generate those bogus certs. We need another tool for those.

certificate names (files) ending with "-bad" are supposed to fail validation. All
others are supposed to succeed using the NSS IPsec profile.

East always presents a proper certificate and uses %any for west so that instantiation
and followed Notify/Delete causes the instances to clean up without conflicting.
(using the regular IP for west, any second conn will fail. This is being copied to
another test case to resolve)

The certificate CN encdoes what non-standard operation was done on it:

-ku-	non-standard Key Usage specified (otherwise it contains only digitalSignature
-eku-	non-standard Key Usage specified (otherwise it contains serverAuth,clientAuth
-kuBOGUS- set a bogus KU OID [refused to be generatd by openssl, not tested]
-ekuBOGUS- set a bogus EKU OID
-kuOmit- don't include a Key Usage section
-ekuOmit- don't include an Extended Key Usage section
-kueMpty- include empty Key Usage section  [refused to be generatd by openssl, not tested]
-ekuEmpty- include empty Extended Key Usage section [refused to be generatd by openssl, not tested]
-kuCritical  make KU section Critical
-ekuCritical  make EKU section Critical

Current status:

Of those that we could generate with openssl:
   All validate according to the NSS IPsec profile, except:
       west-ekuCritical fails NSS IPsec profile but passes via fallback of TLS Client profile
       west-ekuCritical-eku-emailProtection fails NSS IPsec profile, TLS Client profile and TLS Server profile


