Index: net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py b/net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
deleted file mode 100755 |
index b04faef3c1b32ca9808891add3849e0193b20f55..0000000000000000000000000000000000000000 |
--- a/net/data/verify_certificate_chain_unittest/generate-intermediate-lacks-signing-key-usage.py |
+++ /dev/null |
@@ -1,34 +0,0 @@ |
-#!/usr/bin/python |
-# Copyright (c) 2015 The Chromium Authors. All rights reserved. |
-# Use of this source code is governed by a BSD-style license that can be |
-# found in the LICENSE file. |
- |
-"""Certificate chain with 1 intermediate and a trusted root. The intermediate |
-contains a keyUsage extension, HOWEVER it does not contain the keyCertSign bit. |
-Hence validation is expected to fail.""" |
- |
-import common |
- |
-# Self-signed root certificate (used as trust anchor). |
-root = common.create_self_signed_root_certificate('Root') |
- |
-# Intermediate that is missing keyCertSign. |
-intermediate = common.create_intermediate_certificate('Intermediate', root) |
-intermediate.get_extensions().set_property('keyUsage', |
- 'critical,digitalSignature,keyEncipherment') |
- |
-# Target certificate. |
-target = common.create_end_entity_certificate('Target', intermediate) |
- |
-chain = [target, intermediate] |
-trusted = common.TrustAnchor(root, constrained=False) |
-time = common.DEFAULT_TIME |
-key_purpose = common.DEFAULT_KEY_PURPOSE |
-verify_result = False |
-errors = """----- Certificate i=1 (CN=Intermediate) ----- |
-ERROR: keyCertSign bit is not set |
- |
-""" |
- |
-common.write_test_file(__doc__, chain, trusted, time, key_purpose, |
- verify_result, errors) |