| Index: net/cert/x509_certificate_ios.cc
|
| diff --git a/net/cert/x509_certificate_ios.cc b/net/cert/x509_certificate_ios.cc
|
| index 18ce828df728c2f8447ebbbb91c5e22222da5a68..737970768fbbeb59c9ec546c500ad3c7766b031c 100644
|
| --- a/net/cert/x509_certificate_ios.cc
|
| +++ b/net/cert/x509_certificate_ios.cc
|
| @@ -358,29 +358,6 @@ void X509Certificate::GetPublicKeyInfo(OSCertHandle os_cert,
|
| *size_bits = EVP_PKEY_bits(key);
|
| }
|
|
|
| -// static
|
| -X509Certificate::SignatureHashAlgorithm
|
| -X509Certificate::GetSignatureHashAlgorithm(OSCertHandle cert_handle) {
|
| - bssl::UniquePtr<X509> cert = OSCertHandleToOpenSSL(cert_handle);
|
| - if (!cert)
|
| - return kSignatureHashAlgorithmOther;
|
| -
|
| - // TODO(eroman): This duplicates code with x509_certificate_openssl.cc
|
| - int sig_alg = OBJ_obj2nid(cert->sig_alg->algorithm);
|
| - if (sig_alg == NID_md2WithRSAEncryption)
|
| - return kSignatureHashAlgorithmMd2;
|
| - if (sig_alg == NID_md4WithRSAEncryption)
|
| - return kSignatureHashAlgorithmMd4;
|
| - if (sig_alg == NID_md5WithRSAEncryption || sig_alg == NID_md5WithRSA)
|
| - return kSignatureHashAlgorithmMd5;
|
| - if (sig_alg == NID_sha1WithRSAEncryption || sig_alg == NID_dsaWithSHA ||
|
| - sig_alg == NID_dsaWithSHA1 || sig_alg == NID_dsaWithSHA1_2 ||
|
| - sig_alg == NID_sha1WithRSA || sig_alg == NID_ecdsa_with_SHA1) {
|
| - return kSignatureHashAlgorithmSha1;
|
| - }
|
| - return kSignatureHashAlgorithmOther;
|
| -}
|
| -
|
| bool X509Certificate::SupportsSSLClientAuth() const {
|
| return false;
|
| }
|
|
|