Index: net/cert/cert_verify_proc_ios.cc |
diff --git a/net/cert/cert_verify_proc_ios.cc b/net/cert/cert_verify_proc_ios.cc |
index 2ab30ed07e48ed0a612365481316cf7cac15e017..622f0dd00f0b9c8dc384552b1ef74d2aa8a432ef 100644 |
--- a/net/cert/cert_verify_proc_ios.cc |
+++ b/net/cert/cert_verify_proc_ios.cc |
@@ -124,8 +124,6 @@ void GetCertChainInfo(CFArrayRef cert_chain, CertVerifyResult* verify_result) { |
std::string der_bytes; |
if (!X509Certificate::GetDEREncoded(chain_cert, &der_bytes)) |
return; |
- const uint8_t* bytes = reinterpret_cast<const uint8_t*>(der_bytes.data()); |
- bssl::UniquePtr<X509> x509_cert(d2i_X509(NULL, &bytes, der_bytes.size())); |
base::StringPiece spki_bytes; |
if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki_bytes)) |
@@ -144,23 +142,7 @@ void GetCertChainInfo(CFArrayRef cert_chain, CertVerifyResult* verify_result) { |
i == count - 1) { |
continue; |
} |
- |
- int sig_alg = OBJ_obj2nid(x509_cert->sig_alg->algorithm); |
- if (sig_alg == NID_md2WithRSAEncryption) { |
- verify_result->has_md2 = true; |
- } else if (sig_alg == NID_md4WithRSAEncryption) { |
- verify_result->has_md4 = true; |
- } else if (sig_alg == NID_md5WithRSAEncryption || |
- sig_alg == NID_md5WithRSA) { |
- verify_result->has_md5 = true; |
- } else if (sig_alg == NID_sha1WithRSAEncryption || |
- sig_alg == NID_dsaWithSHA || sig_alg == NID_dsaWithSHA1 || |
- sig_alg == NID_dsaWithSHA1_2 || sig_alg == NID_sha1WithRSA || |
- sig_alg == NID_ecdsa_with_SHA1) { |
- verify_result->has_sha1 = true; |
- if (i == 0) |
- verify_result->has_sha1_leaf = true; |
- } |
+ FillCertVerifyResultWeakSignature(chain_cert, i == 0, verify_result); |
} |
if (!verified_cert) { |
NOTREACHED(); |