Bug 1407014 - Fix typo in CyprtoAPI_VerifySignature function name. r?rstrong draft
authorMatt Brubeck <mbrubeck@mozilla.com>
Mon, 09 Oct 2017 11:57:43 -0700
changeset 676812 21a731a28464accb233dadc0a92784b73b4b909e
parent 669480 3828e44f5b0a56e7933b817d430cf32d41b03fe6
child 735074 f396f1b56942d20d983b4ec3e99e09a6fbc4a116
push id83645
push userbmo:mbrubeck@mozilla.com
push dateMon, 09 Oct 2017 18:58:50 +0000
reviewersrstrong
bugs1407014
milestone58.0a1
Bug 1407014 - Fix typo in CyprtoAPI_VerifySignature function name. r?rstrong MozReview-Commit-ID: 9K61LOVzTrJ
modules/libmar/verify/cryptox.c
modules/libmar/verify/cryptox.h
--- a/modules/libmar/verify/cryptox.c
+++ b/modules/libmar/verify/cryptox.c
@@ -106,17 +106,17 @@ NSS_VerifySignature(VFYContext * const *
  *
  * @param hash      The hash context that the signature should match.
  * @param pubKey    The public key to use on the signature.
  * @param signature The signature to check.
  * @param signatureLen The length of the signature.
  * @return CryptoX_Success on success, CryptoX_Error on error.
 */
 CryptoX_Result
-CyprtoAPI_VerifySignature(HCRYPTHASH *hash, 
+CryptoAPI_VerifySignature(HCRYPTHASH *hash,
                           HCRYPTKEY *pubKey,
                           const BYTE *signature, 
                           DWORD signatureLen)
 {
   DWORD i;
   BOOL result;
 /* Windows APIs expect the bytes in the signature to be in little-endian 
  * order, but we write the signature in big-endian order.  Other APIs like 
--- a/modules/libmar/verify/cryptox.h
+++ b/modules/libmar/verify/cryptox.h
@@ -112,17 +112,17 @@ void CryptoMac_FreePublicKey(CryptoX_Pub
 CryptoX_Result CryptoAPI_InitCryptoContext(HCRYPTPROV *provider);
 CryptoX_Result CryptoAPI_LoadPublicKey(HCRYPTPROV hProv, 
                                        BYTE *certData,
                                        DWORD sizeOfCertData,
                                        HCRYPTKEY *publicKey);
 CryptoX_Result CryptoAPI_VerifyBegin(HCRYPTPROV provider, HCRYPTHASH* hash);
 CryptoX_Result CryptoAPI_VerifyUpdate(HCRYPTHASH* hash, 
                                       BYTE *buf, DWORD len);
-CryptoX_Result CyprtoAPI_VerifySignature(HCRYPTHASH *hash, 
+CryptoX_Result CryptoAPI_VerifySignature(HCRYPTHASH *hash,
                                          HCRYPTKEY *pubKey,
                                          const BYTE *signature, 
                                          DWORD signatureLen);
 
 #define CryptoX_InvalidHandleValue ((ULONG_PTR)NULL)
 #define CryptoX_ProviderHandle HCRYPTPROV
 #define CryptoX_SignatureHandle HCRYPTHASH
 #define CryptoX_PublicKey HCRYPTKEY
@@ -132,17 +132,17 @@ CryptoX_Result CyprtoAPI_VerifySignature
 #define CryptoX_VerifyBegin(CryptoHandle, SignatureHandle, PublicKey) \
   CryptoAPI_VerifyBegin(CryptoHandle, SignatureHandle)
 #define CryptoX_FreeSignatureHandle(SignatureHandle)
 #define CryptoX_VerifyUpdate(SignatureHandle, buf, len) \
   CryptoAPI_VerifyUpdate(SignatureHandle, (BYTE *)(buf), len)
 #define CryptoX_LoadPublicKey(CryptoHandle, certData, dataSize, publicKey) \
   CryptoAPI_LoadPublicKey(CryptoHandle, (BYTE*)(certData), dataSize, publicKey)
 #define CryptoX_VerifySignature(hash, publicKey, signedData, len) \
-  CyprtoAPI_VerifySignature(hash, publicKey, signedData, len)
+  CryptoAPI_VerifySignature(hash, publicKey, signedData, len)
 #define CryptoX_FreePublicKey(key) \
   CryptDestroyKey(*(key))
 #define CryptoX_FreeCertificate(cert) \
   CertCloseStore(*(cert), CERT_CLOSE_STORE_FORCE_FLAG);
 
 #else
 
 /* This default implementation is necessary because we don't want to