@@ -135,14 +135,14 @@ def test_load_pkcs7_empty_certificates(self):
135
135
136
136
def _load_cert_key ():
137
137
key = load_vectors_from_file (
138
- os .path .join ("pkcs7 " , "ca_key.pem" ),
138
+ os .path .join ("x509" , "custom" , "ca " , "ca_key.pem" ),
139
139
lambda pemfile : serialization .load_pem_private_key (
140
140
pemfile .read (), None , unsafe_skip_rsa_key_validation = True
141
141
),
142
142
mode = "rb" ,
143
143
)
144
144
cert = load_vectors_from_file (
145
- os .path .join ("pkcs7 " , "ca.pem" ),
145
+ os .path .join ("x509" , "custom" , "ca " , "ca.pem" ),
146
146
loader = lambda pemfile : x509 .load_pem_x509_certificate (pemfile .read ()),
147
147
mode = "rb" ,
148
148
)
@@ -266,7 +266,7 @@ def verify_invalid_pkcs7_certificate(certificate: x509.Certificate):
266
266
verifier .verify (certificate , [])
267
267
268
268
@pytest .mark .parametrize (
269
- "filename" , ["ca_non_ascii_san .pem" , "ca_ascii_san .pem" ]
269
+ "filename" , ["non-ascii-san .pem" , "ascii-san .pem" ]
270
270
)
271
271
def test_verify_pkcs7_certificate_wrong_san (self , filename ):
272
272
# Read a certificate with an invalid SAN
0 commit comments