Index: net/data/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/generate-chains.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-intermediate-basic-constraints-not-critical.py b/net/data/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/generate-chains.py |
similarity index 74% |
rename from net/data/verify_certificate_chain_unittest/generate-intermediate-basic-constraints-not-critical.py |
rename to net/data/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/generate-chains.py |
index ee4ab5e929324d7c7968926258badea7d1cb704b..a0f50e7804df9eaded4c1bda0ab5896ba403697c 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-intermediate-basic-constraints-not-critical.py |
+++ b/net/data/verify_certificate_chain_unittest/intermediate-basic-constraints-not-critical/generate-chains.py |
@@ -8,6 +8,9 @@ has a basic constraints extension but does not mark it as critical. |
Verification is expected to succeed, since although not critical, the |
basicConstraints indicates CA=true as expected.""" |
+import sys |
+sys.path += ['..'] |
+ |
import common |
# Self-signed root certificate (used as trust anchor). |
@@ -20,12 +23,5 @@ intermediate.get_extensions().set_property('basicConstraints', 'CA:true') |
# Target certificate. |
target = common.create_end_entity_certificate('Target', intermediate) |
-chain = [target, intermediate] |
-trusted = common.TrustAnchor(root, constrained=False) |
-time = common.DEFAULT_TIME |
-key_purpose = common.DEFAULT_KEY_PURPOSE |
-verify_result = True |
-errors = None |
- |
-common.write_test_file(__doc__, chain, trusted, time, key_purpose, |
- verify_result, errors) |
+chain = [target, intermediate, root] |
+common.write_chain(__doc__, chain, 'chain.pem') |