| Index: net/cert/x509_certificate_mac.cc
|
| diff --git a/net/cert/x509_certificate_mac.cc b/net/cert/x509_certificate_mac.cc
|
| index 83f8993dabd7b588a2126c9537d291caaced5e8c..8e6ecf9fb42a026f72c2a1813fa71ed851930f52 100644
|
| --- a/net/cert/x509_certificate_mac.cc
|
| +++ b/net/cert/x509_certificate_mac.cc
|
| @@ -16,7 +16,6 @@
|
| #include "base/mac/scoped_cftyperef.h"
|
| #include "base/memory/singleton.h"
|
| #include "base/pickle.h"
|
| -#include "base/sha1.h"
|
| #include "base/strings/string_piece.h"
|
| #include "base/strings/sys_string_conversions.h"
|
| #include "base/synchronization/lock.h"
|
| @@ -216,9 +215,6 @@ void X509Certificate::Initialize() {
|
| &valid_expiry_);
|
| serial_number_ = GetCertSerialNumber(cached_cert);
|
| }
|
| -
|
| - fingerprint_ = CalculateFingerprint(cert_handle_);
|
| - ca_fingerprint_ = CalculateCAFingerprint(intermediate_ca_certs_);
|
| }
|
|
|
| bool X509Certificate::IsIssuedByEncoded(
|
| @@ -363,25 +359,6 @@ void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) {
|
| }
|
|
|
| // static
|
| -SHA1HashValue X509Certificate::CalculateFingerprint(
|
| - OSCertHandle cert) {
|
| - SHA1HashValue sha1;
|
| - memset(sha1.data, 0, sizeof(sha1.data));
|
| -
|
| - CSSM_DATA cert_data;
|
| - OSStatus status = SecCertificateGetData(cert, &cert_data);
|
| - if (status)
|
| - return sha1;
|
| -
|
| - DCHECK(cert_data.Data);
|
| - DCHECK_NE(cert_data.Length, 0U);
|
| -
|
| - CC_SHA1(cert_data.Data, cert_data.Length, sha1.data);
|
| -
|
| - return sha1;
|
| -}
|
| -
|
| -// static
|
| SHA256HashValue X509Certificate::CalculateFingerprint256(OSCertHandle cert) {
|
| SHA256HashValue sha256;
|
| memset(sha256.data, 0, sizeof(sha256.data));
|
| @@ -400,25 +377,25 @@ SHA256HashValue X509Certificate::CalculateFingerprint256(OSCertHandle cert) {
|
| }
|
|
|
| // static
|
| -SHA1HashValue X509Certificate::CalculateCAFingerprint(
|
| +SHA256HashValue X509Certificate::CalculateCAFingerprint256(
|
| const OSCertHandles& intermediates) {
|
| - SHA1HashValue sha1;
|
| - memset(sha1.data, 0, sizeof(sha1.data));
|
| + SHA256HashValue sha256;
|
| + memset(sha256.data, 0, sizeof(sha256.data));
|
|
|
| - // The CC_SHA(3cc) man page says all CC_SHA1_xxx routines return 1, so
|
| + // The CC_SHA(3cc) man page says all CC_SHA256_xxx routines return 1, so
|
| // we don't check their return values.
|
| - CC_SHA1_CTX sha1_ctx;
|
| - CC_SHA1_Init(&sha1_ctx);
|
| + CC_SHA256_CTX sha256_ctx;
|
| + CC_SHA256_Init(&sha256_ctx);
|
| CSSM_DATA cert_data;
|
| for (size_t i = 0; i < intermediates.size(); ++i) {
|
| OSStatus status = SecCertificateGetData(intermediates[i], &cert_data);
|
| if (status)
|
| - return sha1;
|
| - CC_SHA1_Update(&sha1_ctx, cert_data.Data, cert_data.Length);
|
| + return sha256;
|
| + CC_SHA256_Update(&sha256_ctx, cert_data.Data, cert_data.Length);
|
| }
|
| - CC_SHA1_Final(sha1.data, &sha1_ctx);
|
| + CC_SHA256_Final(sha256.data, &sha256_ctx);
|
|
|
| - return sha1;
|
| + return sha256;
|
| }
|
|
|
| bool X509Certificate::SupportsSSLClientAuth() const {
|
|
|