Index: net/data/verify_certificate_chain_unittest/target-sets-eku-any/generate-chains.py |
diff --git a/net/data/verify_certificate_chain_unittest/target-sets-eku-any/generate-chains.py b/net/data/verify_certificate_chain_unittest/target-sets-eku-any/generate-chains.py |
deleted file mode 100755 |
index c7b5e6896ef864c59c97545ffb1921685943a004..0000000000000000000000000000000000000000 |
--- a/net/data/verify_certificate_chain_unittest/target-sets-eku-any/generate-chains.py |
+++ /dev/null |
@@ -1,27 +0,0 @@ |
-#!/usr/bin/python |
-# Copyright (c) 2017 The Chromium Authors. All rights reserved. |
-# Use of this source code is governed by a BSD-style license that can be |
-# found in the LICENSE file. |
- |
-"""Certificate chain with 1 intermediate and a trusted root. The target |
-restricts EKU to clientAuth+any and requests serverAuth during verification. |
-This should succeed.""" |
- |
-import sys |
-sys.path += ['..'] |
- |
-import common |
- |
-# Self-signed root certificate (used as trust anchor). |
-root = common.create_self_signed_root_certificate('Root') |
- |
-# Intermediate certificate. |
-intermediate = common.create_intermediate_certificate('Intermediate', root) |
- |
-# Target certificate. |
-target = common.create_end_entity_certificate('Target', intermediate) |
-target.get_extensions().set_property('extendedKeyUsage', |
- 'clientAuth,anyExtendedKeyUsage') |
- |
-chain = [target, intermediate, root] |
-common.write_chain(__doc__, chain, 'chain.pem') |