| Index: net/data/verify_certificate_chain_unittest/expired-unconstrained-root/generate-chains.py
|
| diff --git a/net/data/verify_certificate_chain_unittest/generate-expired-unconstrained-root.py b/net/data/verify_certificate_chain_unittest/expired-unconstrained-root/generate-chains.py
|
| similarity index 79%
|
| rename from net/data/verify_certificate_chain_unittest/generate-expired-unconstrained-root.py
|
| rename to net/data/verify_certificate_chain_unittest/expired-unconstrained-root/generate-chains.py
|
| index e415072b3172a07b5470afc35bab5fab6acd001a..c9228b1110251ecc8c210ff4fc2a42aef2002fc2 100755
|
| --- a/net/data/verify_certificate_chain_unittest/generate-expired-unconstrained-root.py
|
| +++ b/net/data/verify_certificate_chain_unittest/expired-unconstrained-root/generate-chains.py
|
| @@ -8,6 +8,9 @@
|
| the trust anchor has no constraints (so expiration of the certificate is not
|
| enforced)."""
|
|
|
| +import sys
|
| +sys.path += ['..']
|
| +
|
| import common
|
|
|
| # Self-signed root certificate (used as trust anchor).
|
| @@ -23,16 +26,10 @@ intermediate.set_validity_range(common.JANUARY_1_2015_UTC,
|
| target = common.create_end_entity_certificate('Target', intermediate)
|
| target.set_validity_range(common.JANUARY_1_2015_UTC, common.JANUARY_1_2016_UTC)
|
|
|
| -chain = [target, intermediate]
|
| -trusted = common.TrustAnchor(root, constrained=False)
|
|
|
| # Both the target and intermediate are valid at this time, however the
|
| # root is not. This doesn't matter since the root certificate is
|
| # just a delivery mechanism for the name + SPKI.
|
| -time = common.MARCH_2_2015_UTC
|
| -key_purpose = common.DEFAULT_KEY_PURPOSE
|
| -verify_result = True
|
| -errors = None
|
|
|
| -common.write_test_file(__doc__, chain, trusted, time, key_purpose,
|
| - verify_result, errors)
|
| +chain = [target, intermediate, root]
|
| +common.write_chain(__doc__, chain, 'chain.pem')
|
|
|