Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1339)

Unified Diff: net/data/verify_certificate_chain_unittest/generate-expired-root.py

Issue 2245643004: Support trust anchor constraints, by specifying them as a certificate. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: update gypi Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/data/verify_certificate_chain_unittest/generate-expired-root.py
diff --git a/net/data/verify_certificate_chain_unittest/generate-expired-root.py b/net/data/verify_certificate_chain_unittest/generate-expired-root.py
deleted file mode 100755
index 12115a1828e7420b400f81f463ba473a23f67fe0..0000000000000000000000000000000000000000
--- a/net/data/verify_certificate_chain_unittest/generate-expired-root.py
+++ /dev/null
@@ -1,34 +0,0 @@
-#!/usr/bin/python
-# Copyright (c) 2016 The Chromium Authors. All rights reserved.
-# Use of this source code is governed by a BSD-style license that can be
-# found in the LICENSE file.
-
-"""Certificate chain with 1 intermediate, where the root certificate is expired
-(violates validity.notAfter). Verification is expected to succeed as
-constraints on trust anchors are not enforced.."""
-
-import common
-
-# Self-signed root certificate (used as trust anchor).
-root = common.create_self_signed_root_certificate('Root')
-root.set_validity_range(common.JANUARY_1_2015_UTC, common.MARCH_1_2015_UTC)
-
-# Intermediate certificate.
-intermediate = common.create_intermediate_certificate('Intermediate', root)
-intermediate.set_validity_range(common.JANUARY_1_2015_UTC,
- common.JANUARY_1_2016_UTC)
-
-# Target certificate.
-target = common.create_end_entity_certificate('Target', intermediate)
-target.set_validity_range(common.JANUARY_1_2015_UTC, common.JANUARY_1_2016_UTC)
-
-chain = [target, intermediate]
-trusted = common.TrustAnchor(root, constrained=False)
-
-# Both the target and intermediate are valid at this time, however the
-# root is not. This doesn't matter since the root certificate is
-# just a delivery mechanism for the name + SPKI.
-time = common.MARCH_2_2015_UTC
-verify_result = True
-
-common.write_test_file(__doc__, chain, trusted, time, verify_result)

Powered by Google App Engine
This is Rietveld 408576698