| Index: chrome/browser/policy/test/policy_testserver.py
|
| diff --git a/chrome/browser/policy/test/policy_testserver.py b/chrome/browser/policy/test/policy_testserver.py
|
| index 68c3936056249619bb56689c94032165e9f219ed..1bb4bbbfdb7b174670f1dc27976199470384bb81 100644
|
| --- a/chrome/browser/policy/test/policy_testserver.py
|
| +++ b/chrome/browser/policy/test/policy_testserver.py
|
| @@ -847,7 +847,7 @@ class PolicyTestServer(testserver_base.BrokenPipeHandlerMixIn,
|
| try:
|
| key = tlslite.api.parsePEMKey(key_str, private=True)
|
| except SyntaxError:
|
| - key = tlslite.utils.Python_RSAKey.Python_RSAKey._parsePKCS8(
|
| + key = tlslite.utils.python_rsakey.Python_RSAKey._parsePKCS8(
|
| tlslite.utils.cryptomath.stringToBytes(key_str))
|
|
|
| assert key is not None
|
| @@ -865,7 +865,7 @@ class PolicyTestServer(testserver_base.BrokenPipeHandlerMixIn,
|
| # Use the canned private keys if none were passed from the command line.
|
| for signing_key in SIGNING_KEYS:
|
| decoded_key = base64.b64decode(signing_key['key']);
|
| - key = tlslite.utils.Python_RSAKey.Python_RSAKey._parsePKCS8(
|
| + key = tlslite.utils.python_rsakey.Python_RSAKey._parsePKCS8(
|
| tlslite.utils.cryptomath.stringToBytes(decoded_key))
|
| assert key is not None
|
| # Grab the signature dictionary for this key and decode all of the
|
|
|