| Index: net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py
|
| diff --git a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py b/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py
|
| index fa3cafb4022cb6647b30e53c9024e0dd2eb54db3..bd19047f74c6db3fb9cea7b4e962dd9a4ca76174 100755
|
| --- a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py
|
| +++ b/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py
|
| @@ -3,7 +3,7 @@
|
| # Use of this source code is governed by a BSD-style license that can be
|
| # found in the LICENSE file.
|
|
|
| -"""Certificate chain with 1 intermediary, a trusted root, and a target
|
| +"""Certificate chain with 1 intermediate, a trusted root, and a target
|
| certificate that is not a CA, and yet has the keyCertSign bit set. Verification
|
| is expected to fail, since keyCertSign should only be asserted when CA is
|
| true."""
|
| @@ -13,16 +13,16 @@ import common
|
| # Self-signed root certificate (part of trust store).
|
| root = common.create_self_signed_root_certificate('Root')
|
|
|
| -# Intermediary certificate.
|
| -intermediary = common.create_intermediary_certificate('Intermediary', root)
|
| +# Intermediate certificate.
|
| +intermediate = common.create_intermediate_certificate('Intermediate', root)
|
|
|
| # Target certificate (end entity but has keyCertSign bit set).
|
| -target = common.create_end_entity_certificate('Target', intermediary)
|
| +target = common.create_end_entity_certificate('Target', intermediate)
|
| target.get_extensions().set_property('keyUsage',
|
| 'critical,digitalSignature,keyEncipherment,keyCertSign')
|
|
|
|
|
| -chain = [target, intermediary]
|
| +chain = [target, intermediate]
|
| trusted = [root]
|
| time = common.DEFAULT_TIME
|
| verify_result = False
|
|
|