Index: net/data/verify_certificate_chain_unittest/intermediate-restricts-eku-fail/generate-chains.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-intermediate-restricts-eku-fail.py b/net/data/verify_certificate_chain_unittest/intermediate-restricts-eku-fail/generate-chains.py |
similarity index 70% |
rename from net/data/verify_certificate_chain_unittest/generate-intermediate-restricts-eku-fail.py |
rename to net/data/verify_certificate_chain_unittest/intermediate-restricts-eku-fail/generate-chains.py |
index 14659795c0c7e15cccb31ab4ee25312f26e26b1b..8f8eae75bfc5997acbd73cbf9525f67fe3e9ef77 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-intermediate-restricts-eku-fail.py |
+++ b/net/data/verify_certificate_chain_unittest/intermediate-restricts-eku-fail/generate-chains.py |
@@ -7,6 +7,9 @@ |
restricts the EKU to clientAuth, and the target has serverAuth + |
clientAuth. Verification is expected to fail when requesting serverAuth.""" |
+import sys |
+sys.path += ['..'] |
+ |
import common |
# Self-signed root certificate (used as trust anchor). |
@@ -22,15 +25,5 @@ target = common.create_end_entity_certificate('Target', intermediate) |
target.get_extensions().set_property('extendedKeyUsage', |
'serverAuth,clientAuth') |
-chain = [target, intermediate] |
-trusted = common.TrustAnchor(root, constrained=False) |
-time = common.DEFAULT_TIME |
-key_purpose = common.KEY_PURPOSE_SERVER_AUTH |
-verify_result = False |
-errors = """----- Certificate i=1 (CN=Intermediate) ----- |
-ERROR: The extended key usage does not include server auth |
- |
-""" |
- |
-common.write_test_file(__doc__, chain, trusted, time, key_purpose, |
- verify_result, errors) |
+chain = [target, intermediate, root] |
+common.write_chain(__doc__, chain, 'chain.pem') |