@@ -66,24 +66,6 @@ public static System.Security.Cryptography.SHA512 CreateSHA512()
6666 return System . Security . Cryptography . SHA512 . Create ( ) ;
6767 }
6868
69- #if FEATURE_HASH_RIPEMD160_CREATE || FEATURE_HASH_RIPEMD160_MANAGED
70- public static System . Security . Cryptography . RIPEMD160 CreateRIPEMD160 ( )
71- {
72- #if FEATURE_HASH_RIPEMD160_CREATE
73- #pragma warning disable CA5350 // Do not use weak cryptographic algorithms
74- return System . Security . Cryptography . RIPEMD160 . Create ( ) ;
75- #pragma warning restore CA5350 // Do not use weak cryptographic algorithms
76- #else
77- return new System . Security . Cryptography . RIPEMD160Managed ( ) ;
78- #endif
79- }
80- #else
81- public static global ::SshNet . Security . Cryptography . RIPEMD160 CreateRIPEMD160 ( )
82- {
83- return new global ::SshNet . Security . Cryptography . RIPEMD160 ( ) ;
84- }
85- #endif // FEATURE_HASH_RIPEMD160
86-
8769 public static System . Security . Cryptography . HMACMD5 CreateHMACMD5 ( byte [ ] key )
8870 {
8971#pragma warning disable CA5351 // Do not use broken cryptographic algorithms
@@ -141,19 +123,5 @@ public static HMACSHA512 CreateHMACSHA512(byte[] key, int hashSize)
141123 {
142124 return new HMACSHA512 ( key , hashSize ) ;
143125 }
144-
145- #if FEATURE_HMAC_RIPEMD160
146- public static System . Security . Cryptography . HMACRIPEMD160 CreateHMACRIPEMD160 ( byte [ ] key )
147- {
148- #pragma warning disable CA5350 // Do not use weak cryptographic algorithms
149- return new System . Security . Cryptography . HMACRIPEMD160 ( key ) ;
150- #pragma warning restore CA5350 // Do not use weak cryptographic algorithms
151- }
152- #else
153- public static global ::SshNet . Security . Cryptography . HMACRIPEMD160 CreateHMACRIPEMD160 ( byte [ ] key )
154- {
155- return new global ::SshNet . Security . Cryptography . HMACRIPEMD160 ( key ) ;
156- }
157- #endif // FEATURE_HMAC_RIPEMD160
158126 }
159127}
0 commit comments