X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/866f8763175ff60e4fa455b92b5eb660a12fe6c7..7e6b461318c8a779d91381531435a68ee4e8b6ed:/OSX/libsecurity_ssl/lib/sslCrypto.c diff --git a/OSX/libsecurity_ssl/lib/sslCrypto.c b/OSX/libsecurity_ssl/lib/sslCrypto.c index 166a105b..e26fff2f 100644 --- a/OSX/libsecurity_ssl/lib/sslCrypto.c +++ b/OSX/libsecurity_ssl/lib/sslCrypto.c @@ -48,30 +48,6 @@ #include -/* - * Get algorithm id for a SSLPubKey object. - */ -CFIndex sslPubKeyGetAlgorithmID(SecKeyRef pubKey) -{ -#if TARGET_OS_IPHONE - return SecKeyGetAlgorithmID(pubKey); -#else - return SecKeyGetAlgorithmId(pubKey); -#endif -} - -/* - * Get algorithm id for a SSLPrivKey object. - */ -CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey) -{ -#if TARGET_OS_IPHONE - return SecKeyGetAlgorithmID(privKey); -#else - return SecKeyGetAlgorithmId(privKey); -#endif -} - OSStatus sslCreateSecTrust( @@ -221,37 +197,6 @@ errOut: return status; } -/* Convert cert in DER format into an CFArray of SecCertificateRef */ -CFArrayRef -tls_get_peer_certs(const SSLCertificate *certs) -{ - const SSLCertificate *cert; - - CFMutableArrayRef certArray = NULL; - CFDataRef certData = NULL; - SecCertificateRef cfCert = NULL; - - certArray = CFArrayCreateMutable(kCFAllocatorDefault, 0, &kCFTypeArrayCallBacks); - require(certArray, out); - cert = certs; - while(cert) { - require((certData = CFDataCreate(kCFAllocatorDefault, cert->derCert.data, cert->derCert.length)), out); - require((cfCert = SecCertificateCreateWithData(kCFAllocatorDefault, certData)), out); - CFArrayAppendValue(certArray, cfCert); - CFReleaseNull(cfCert); - CFReleaseNull(certData); - cert=cert->next; - } - - return certArray; - -out: - CFReleaseNull(cfCert); - CFReleaseNull(certData); - CFReleaseNull(certArray); - return NULL; -} - int tls_verify_peer_cert(SSLContext *ctx) { @@ -390,7 +335,7 @@ OSStatus sslVerifySelectedCipher(SSLContext *ctx) } /* Check the alg of our signing key. */ - CFIndex keyAlg = sslPrivKeyGetAlgorithmID(ctx->signingPrivKeyRef); + CFIndex keyAlg = SecKeyGetAlgorithmId(ctx->signingPrivKeyRef); if (requireAlg != keyAlg) { sslErrorLog("sslVerifySelectedCipher: signing key alg mismatch\n"); return errSSLBadConfiguration;