Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(59)

Unified Diff: net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py

Issue 2951403002: Update comments for net/data/verify_certificate_chain_unittest/ (Closed)
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py
diff --git a/net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py b/net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py
index e58cd0adf85794cf64afe9beb6abd185d4958bcb..e7490fb931b66e9e57034f7592e8300e7a3afcb0 100755
--- a/net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py
+++ b/net/data/verify_certificate_chain_unittest/root-eku-clientauth/generate-chains.py
@@ -3,18 +3,15 @@
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
-"""Certificate chain with 1 intermediate and a trust anchor. The trust anchor
-has an EKU that restricts it to clientAuth. Verification is expected to fail as
-the end-entity is verified for serverAuth, and the trust anchor enforces
-constraints."""
+"""Certificate chain where the root certificate restricts the extended key
+usage to clientAuth."""
import sys
sys.path += ['..']
import common
-# Self-signed root certificate (used as trust anchor) with non-CA basic
-# constraints.
+# Self-signed root certificate with extended key usage of clientAuth.
root = common.create_self_signed_root_certificate('Root')
root.get_extensions().set_property('extendedKeyUsage', 'clientAuth')

Powered by Google App Engine
This is Rietveld 408576698