Index: net/data/verify_certificate_chain_unittest/target-has-keycertsign-but-not-ca/generate-chains.py |
diff --git a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py b/net/data/verify_certificate_chain_unittest/target-has-keycertsign-but-not-ca/generate-chains.py |
similarity index 68% |
rename from net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
rename to net/data/verify_certificate_chain_unittest/target-has-keycertsign-but-not-ca/generate-chains.py |
index 7d361dffa3a95ffed201bd7ad5489b8b13e12556..01f4509d2466d9177135e5bc27112d81c2c7c45b 100755 |
--- a/net/data/verify_certificate_chain_unittest/generate-target-has-keycertsign-but-not-ca.py |
+++ b/net/data/verify_certificate_chain_unittest/target-has-keycertsign-but-not-ca/generate-chains.py |
@@ -8,6 +8,9 @@ certificate that is not a CA, and yet has the keyCertSign bit set. Verification |
is expected to fail, since keyCertSign should only be asserted when CA is |
true.""" |
+import sys |
+sys.path += ['..'] |
+ |
import common |
# Self-signed root certificate (used as trust anchor). |
@@ -21,16 +24,5 @@ target = common.create_end_entity_certificate('Target', intermediate) |
target.get_extensions().set_property('keyUsage', |
'critical,digitalSignature,keyEncipherment,keyCertSign') |
- |
-chain = [target, intermediate] |
-trusted = common.TrustAnchor(root, constrained=False) |
-time = common.DEFAULT_TIME |
-key_purpose = common.DEFAULT_KEY_PURPOSE |
-verify_result = False |
-errors = """----- Certificate i=0 (CN=Target) ----- |
-ERROR: Target certificate looks like a CA but does not set all CA properties |
- |
-""" |
- |
-common.write_test_file(__doc__, chain, trusted, time, key_purpose, |
- verify_result, errors) |
+chain = [target, intermediate, root] |
+common.write_chain(__doc__, chain, 'chain.pem') |