Index: net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py b/net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py |
similarity index 72% |
rename from net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py |
rename to net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py |
index b51c0da52aa77d20a7ee62a107c206fb73c21fd4..703b779244507d579e638d7567169957887045f8 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py |
+++ b/net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py |
@@ -7,6 +7,9 @@ |
Verification should succeed, it doesn't matter that the root was not |
self-signed if it is designated as the trust anchor.""" |
+import sys |
+sys.path += ['..'] |
+ |
import common |
uber_root = common.create_self_signed_root_certificate('UberRoot') |
@@ -20,13 +23,5 @@ intermediate = common.create_intermediate_certificate('Intermediate', root) |
# Target certificate. |
target = common.create_end_entity_certificate('Target', intermediate) |
-chain = [target, intermediate] |
-trusted = common.TrustAnchor(root, constrained=True) |
-time = common.DEFAULT_TIME |
-key_purpose = common.DEFAULT_KEY_PURPOSE |
-verify_result = True |
-errors = None |
- |
-common.write_test_file(__doc__, chain, trusted, time, key_purpose, |
- verify_result, errors) |
- |
+chain = [target, intermediate, root] |
+common.write_chain(__doc__, chain, 'chain.pem') |