| Index: net/cert/x509_certificate_ios.cc
|
| diff --git a/net/cert/x509_certificate_ios.cc b/net/cert/x509_certificate_ios.cc
|
| index 737970768fbbeb59c9ec546c500ad3c7766b031c..18ce828df728c2f8447ebbbb91c5e22222da5a68 100644
|
| --- a/net/cert/x509_certificate_ios.cc
|
| +++ b/net/cert/x509_certificate_ios.cc
|
| @@ -358,6 +358,29 @@ void X509Certificate::GetPublicKeyInfo(OSCertHandle os_cert,
|
| *size_bits = EVP_PKEY_bits(key);
|
| }
|
|
|
| +// static
|
| +X509Certificate::SignatureHashAlgorithm
|
| +X509Certificate::GetSignatureHashAlgorithm(OSCertHandle cert_handle) {
|
| + bssl::UniquePtr<X509> cert = OSCertHandleToOpenSSL(cert_handle);
|
| + if (!cert)
|
| + return kSignatureHashAlgorithmOther;
|
| +
|
| + // TODO(eroman): This duplicates code with x509_certificate_openssl.cc
|
| + int sig_alg = OBJ_obj2nid(cert->sig_alg->algorithm);
|
| + if (sig_alg == NID_md2WithRSAEncryption)
|
| + return kSignatureHashAlgorithmMd2;
|
| + if (sig_alg == NID_md4WithRSAEncryption)
|
| + return kSignatureHashAlgorithmMd4;
|
| + if (sig_alg == NID_md5WithRSAEncryption || sig_alg == NID_md5WithRSA)
|
| + return kSignatureHashAlgorithmMd5;
|
| + if (sig_alg == NID_sha1WithRSAEncryption || sig_alg == NID_dsaWithSHA ||
|
| + sig_alg == NID_dsaWithSHA1 || sig_alg == NID_dsaWithSHA1_2 ||
|
| + sig_alg == NID_sha1WithRSA || sig_alg == NID_ecdsa_with_SHA1) {
|
| + return kSignatureHashAlgorithmSha1;
|
| + }
|
| + return kSignatureHashAlgorithmOther;
|
| +}
|
| +
|
| bool X509Certificate::SupportsSSLClientAuth() const {
|
| return false;
|
| }
|
|
|