Lines Matching refs:cx

115      cx->pkcs1RSADigestInfo = NULL;
120 - rv = recoverPKCS1DigestInfo(hashAlg, &cx->hashAlg,
121 - &cx->pkcs1RSADigestInfo,
122 - &cx->pkcs1RSADigestInfoLen,
123 - cx->key,
133 + rv = recoverPKCS1DigestInfo(hashAlg, &cx->hashAlg,
134 + &cx->pkcs1RSADigestInfo,
135 + &cx->pkcs1RSADigestInfoLen,
136 + cx->key,
146 + if (sigLen > sizeof(cx->u)) {
158 + PORT_Memcpy(cx->u.buffer, sig->data, sigLen);
168 + rv = decodeECorDSASignature(encAlg, sig, cx->u.buffer, sigLen);
171 - PORT_Memcpy(cx->u.buffer, sig->data, sigLen);
183 - rv = decodeECorDSASignature(encAlg, sig, cx->u.buffer, sigLen);
201 if (HASH_GetHashTypeByOidTag(cx->hashAlg) == HASH_AlgNULL) {
204 switch (cx->key->keyType) {
207 - dsasig.data = cx->u.buffer;
208 - dsasig.len = SECKEY_SignatureLen(cx->key);
209 + dsasig.len = checkedSignatureLen(cx->key);
213 + if (dsasig.len > sizeof(cx->u)) {
217 + dsasig.data = cx->u.buffer;
220 rv = decodeECorDSASignature(cx->encAlg, sig, dsasig.data,
225 rsasig.data = cx->u.buffer;
226 - rsasig.len = SECKEY_SignatureLen(cx->key);
227 + rsasig.len = checkedSignatureLen(cx->key);
232 + if (rsasig.len > sizeof(cx->u)) {
239 VFYContext *cx;
244 cx = vfy_CreateContext(key, sig, encAlg, hashAlg, NULL, wincx);
248 rv = verifyPKCS1DigestInfo(cx, digest);
254 dsasig.data = cx->u.buffer;
255 - dsasig.len = SECKEY_SignatureLen(cx->key);
256 + dsasig.len = checkedSignatureLen(cx->key);
262 - if (PK11_Verify(cx->key, &dsasig, (SECItem *)digest, cx->wincx) !=
264 + if (dsasig.len > sizeof(cx->u)) {
269 + rv = PK11_Verify(cx->key, &dsasig, (SECItem *)digest, cx->wincx);