Index: net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-intermediary-lacks-signing-key-usage.py b/net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
similarity index 70% |
rename from net/data/verify_certificate_chain_unittest/generate-intermediary-lacks-signing-key-usage.py |
rename to net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
index 4c3d8e8898e84e857cffb20882c2aac87473c454..5a3c5e13f38647e7210ce21350a22cae45c11a8c 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-intermediary-lacks-signing-key-usage.py |
+++ b/net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
@@ -3,7 +3,7 @@ |
# Use of this source code is governed by a BSD-style license that can be |
# found in the LICENSE file. |
-"""Certificate chain with 1 intermediary and a trusted root. The intermediary |
+"""Certificate chain with 1 intermediate and a trusted root. The intermediate |
contains a keyUsage extension, HOWEVER it does not contain the keyCertSign bit. |
Hence validation is expected to fail.""" |
@@ -12,15 +12,15 @@ import common |
# Self-signed root certificate (part of trust store). |
root = common.create_self_signed_root_certificate('Root') |
-# Intermediary that is missing keyCertSign. |
-intermediary = common.create_intermediary_certificate('Intermediary', root) |
-intermediary.get_extensions().set_property('keyUsage', |
+# Intermediate that is missing keyCertSign. |
+intermediate = common.create_intermediate_certificate('Intermediate', root) |
+intermediate.get_extensions().set_property('keyUsage', |
'critical,digitalSignature,keyEncipherment') |
# Target certificate. |
-target = common.create_end_entity_certificate('Target', intermediary) |
+target = common.create_end_entity_certificate('Target', intermediate) |
-chain = [target, intermediary] |
+chain = [target, intermediate] |
trusted = [root] |
time = common.DEFAULT_TIME |
verify_result = False |