Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(72)

Side by Side Diff: net/data/verify_certificate_chain_unittest/generate-expired-constrained-root.py

Issue 2245643004: Support trust anchor constraints, by specifying them as a certificate. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: update gypi Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 #!/usr/bin/python 1 #!/usr/bin/python
2 # Copyright (c) 2016 The Chromium Authors. All rights reserved. 2 # Copyright (c) 2016 The Chromium Authors. All rights reserved.
3 # Use of this source code is governed by a BSD-style license that can be 3 # Use of this source code is governed by a BSD-style license that can be
4 # found in the LICENSE file. 4 # found in the LICENSE file.
5 5
6 """Certificate chain with 1 intermediate, where the root certificate is expired 6 """Certificate chain with 1 intermediate, where the root certificate is expired
7 (violates validity.notAfter). Verification is expected to succeed as 7 (violates validity.notAfter). Verification is expected to succeed even though
8 constraints on trust anchors are not enforced..""" 8 the trust anchor is initialized with anchor constraints, since validity is
9 not enforced."""
9 10
10 import common 11 import common
11 12
12 # Self-signed root certificate (used as trust anchor). 13 # Self-signed root certificate (used as trust anchor).
13 root = common.create_self_signed_root_certificate('Root') 14 root = common.create_self_signed_root_certificate('Root')
14 root.set_validity_range(common.JANUARY_1_2015_UTC, common.MARCH_1_2015_UTC) 15 root.set_validity_range(common.JANUARY_1_2015_UTC, common.MARCH_1_2015_UTC)
15 16
16 # Intermediate certificate. 17 # Intermediate certificate.
17 intermediate = common.create_intermediate_certificate('Intermediate', root) 18 intermediate = common.create_intermediate_certificate('Intermediate', root)
18 intermediate.set_validity_range(common.JANUARY_1_2015_UTC, 19 intermediate.set_validity_range(common.JANUARY_1_2015_UTC,
19 common.JANUARY_1_2016_UTC) 20 common.JANUARY_1_2016_UTC)
20 21
21 # Target certificate. 22 # Target certificate.
22 target = common.create_end_entity_certificate('Target', intermediate) 23 target = common.create_end_entity_certificate('Target', intermediate)
23 target.set_validity_range(common.JANUARY_1_2015_UTC, common.JANUARY_1_2016_UTC) 24 target.set_validity_range(common.JANUARY_1_2015_UTC, common.JANUARY_1_2016_UTC)
24 25
25 chain = [target, intermediate] 26 chain = [target, intermediate]
26 trusted = common.TrustAnchor(root, constrained=False) 27 trusted = common.TrustAnchor(root, constrained=True)
27 28
28 # Both the target and intermediate are valid at this time, however the 29 # Both the target and intermediate are valid at this time, however the
29 # root is not. This doesn't matter since the root certificate is 30 # root is not.
30 # just a delivery mechanism for the name + SPKI.
31 time = common.MARCH_2_2015_UTC 31 time = common.MARCH_2_2015_UTC
32 verify_result = True 32 verify_result = True
33 33
34 common.write_test_file(__doc__, chain, trusted, time, verify_result) 34 common.write_test_file(__doc__, chain, trusted, time, verify_result)
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698