Index: net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py b/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
index fa3cafb4022cb6647b30e53c9024e0dd2eb54db3..bd19047f74c6db3fb9cea7b4e962dd9a4ca76174 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
+++ b/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
@@ -3,7 +3,7 @@ |
# Use of this source code is governed by a BSD-style license that can be |
# found in the LICENSE file. |
-"""Certificate chain with 1 intermediary, a trusted root, and a target |
+"""Certificate chain with 1 intermediate, a trusted root, and a target |
certificate that is not a CA, and yet has the keyCertSign bit set. Verification |
is expected to fail, since keyCertSign should only be asserted when CA is |
true.""" |
@@ -13,16 +13,16 @@ import common |
# Self-signed root certificate (part of trust store). |
root = common.create_self_signed_root_certificate('Root') |
-# Intermediary certificate. |
-intermediary = common.create_intermediary_certificate('Intermediary', root) |
+# Intermediate certificate. |
+intermediate = common.create_intermediate_certificate('Intermediate', root) |
# Target certificate (end entity but has keyCertSign bit set). |
-target = common.create_end_entity_certificate('Target', intermediary) |
+target = common.create_end_entity_certificate('Target', intermediate) |
target.get_extensions().set_property('keyUsage', |
'critical,digitalSignature,keyEncipherment,keyCertSign') |
-chain = [target, intermediary] |
+chain = [target, intermediate] |
trusted = [root] |
time = common.DEFAULT_TIME |
verify_result = False |