| Index: net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py
|
| diff --git a/net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py b/net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py
|
| similarity index 72%
|
| rename from net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py
|
| rename to net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py
|
| index b51c0da52aa77d20a7ee62a107c206fb73c21fd4..703b779244507d579e638d7567169957887045f8 100755
|
| --- a/net/data/verify_certificate_chain_unittest/generate-constrained-non-self-signed-root.py
|
| +++ b/net/data/verify_certificate_chain_unittest/unconstrained-non-self-signed-root/generate-chains.py
|
| @@ -7,6 +7,9 @@
|
| Verification should succeed, it doesn't matter that the root was not
|
| self-signed if it is designated as the trust anchor."""
|
|
|
| +import sys
|
| +sys.path += ['..']
|
| +
|
| import common
|
|
|
| uber_root = common.create_self_signed_root_certificate('UberRoot')
|
| @@ -20,13 +23,5 @@ intermediate = common.create_intermediate_certificate('Intermediate', root)
|
| # Target certificate.
|
| target = common.create_end_entity_certificate('Target', intermediate)
|
|
|
| -chain = [target, intermediate]
|
| -trusted = common.TrustAnchor(root, constrained=True)
|
| -time = common.DEFAULT_TIME
|
| -key_purpose = common.DEFAULT_KEY_PURPOSE
|
| -verify_result = True
|
| -errors = None
|
| -
|
| -common.write_test_file(__doc__, chain, trusted, time, key_purpose,
|
| - verify_result, errors)
|
| -
|
| +chain = [target, intermediate, root]
|
| +common.write_chain(__doc__, chain, 'chain.pem')
|
|
|