Index: net/data/verify_certificate_chain_unittest/generate-target-signed-by-512bit-rsa.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-target-signed-by-512bit-rsa.py b/net/data/verify_certificate_chain_unittest/generate-target-signed-by-512bit-rsa.py |
index cd580d2d8b654090d305c925f92ca74ed6b040fc..6de5c0bc3d8ddb55aee93acab1b8284e4b53fe5a 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-target-signed-by-512bit-rsa.py |
+++ b/net/data/verify_certificate_chain_unittest/generate-target-signed-by-512bit-rsa.py |
@@ -23,5 +23,7 @@ chain = [target, intermediate] |
trusted = common.TrustAnchor(root, constrained=False) |
time = common.DEFAULT_TIME |
verify_result = False |
+errors = ['Signature verification failed'] |
mattm
2016/08/29 22:15:11
I assume we would update signature verification to
eroman
2016/08/29 22:55:18
Yes correct.
Follow-ups will probably involve:
|
-common.write_test_file(__doc__, chain, trusted, time, verify_result) |
+common.write_test_file(__doc__, chain, trusted, time, verify_result, |
+ errors) |