Lines Matching refs:sal_uInt8
87 bool decrypt( const sal_uInt8* pInBuffer, sal_uInt32 nLen, sal_uInt8* pOutBuffer, in decrypt()
215 pEData->decrypt( (sal_uInt8*)aFiltered.getStr(), aFiltered.getLength(), in emit()
216 (sal_uInt8*)aFiltered.getStr(), in emit()
727 pEData->decrypt( reinterpret_cast<const sal_uInt8*>(*ppStream), in getDeflatedStream()
729 reinterpret_cast<sal_uInt8*>(*ppStream), in getDeflatedStream()
741 sal_uInt8** pOutBuf, sal_uInt32* pOutLen ) in unzipToBuffer()
753 *pOutBuf = (sal_uInt8*)rtl_reallocateMemory( *pOutBuf, buf_increment_size ); in unzipToBuffer()
766 *pOutBuf = (sal_uInt8*)rtl_reallocateMemory( *pOutBuf, nNewAlloc ); in unzipToBuffer()
796 sal_uInt8* pOutBytes = NULL; in writeStream()
836 sal_uInt8* pOutBytes = NULL; in emit()
843 pOutBytes = (sal_uInt8*)pStream; in emit()
898 if( pOutBytes != (sal_uInt8*)pStream ) in emit()
904 if( pOutBytes != (sal_uInt8*)pStream ) in emit()
1036 sal_uInt8 m_aOEntry[32];
1037 sal_uInt8 m_aUEntry[32];
1043 sal_uInt8 m_aDecryptionKey[ENCRYPTION_KEY_LEN+5]; // maximum handled key length
1081 bool PDFFile::decrypt( const sal_uInt8* pInBuffer, sal_uInt32 nLen, sal_uInt8* pOutBuffer, in decrypt()
1092 m_pData->m_aDecryptionKey[i++] = sal_uInt8(nObject&0xff); in decrypt()
1093 m_pData->m_aDecryptionKey[i++] = sal_uInt8((nObject>>8)&0xff); in decrypt()
1094 m_pData->m_aDecryptionKey[i++] = sal_uInt8((nObject>>16)&0xff); in decrypt()
1095 m_pData->m_aDecryptionKey[i++] = sal_uInt8(nGeneration&0xff); in decrypt()
1096 m_pData->m_aDecryptionKey[i++] = sal_uInt8((nGeneration>>8)&0xff); in decrypt()
1098 sal_uInt8 aSum[ENCRYPTION_KEY_LEN]; in decrypt()
1116 static const sal_uInt8 nPadString[32] =
1135 static sal_uInt32 password_to_key( const OString& rPwd, sal_uInt8* pOutKey, PDFFileImplData* pData,… in password_to_key()
1145 sal_uInt8 aPEntry[4]; in password_to_key()
1146 aPEntry[0] = static_cast<sal_uInt8>(pData->m_nPEntry & 0xff); in password_to_key()
1147 aPEntry[1] = static_cast<sal_uInt8>((pData->m_nPEntry >> 8 ) & 0xff); in password_to_key()
1148 aPEntry[2] = static_cast<sal_uInt8>((pData->m_nPEntry >> 16) & 0xff); in password_to_key()
1149 aPEntry[3] = static_cast<sal_uInt8>((pData->m_nPEntry >> 24) & 0xff); in password_to_key()
1153 sal_uInt8 nSum[RTL_DIGEST_LENGTH_MD5]; in password_to_key()
1174 sal_uInt8 aKey[ENCRYPTION_KEY_LEN]; in check_user_password()
1175 sal_uInt8 nEncryptedEntry[ENCRYPTION_BUF_LEN]; in check_user_password()
1204 sal_uInt8 aTempKey[ENCRYPTION_KEY_LEN]; in check_user_password()
1206 aTempKey[j] = static_cast<sal_uInt8>( aKey[j] ^ i ); in check_user_password()
1244 sal_uInt8 aKey[ENCRYPTION_KEY_LEN]; in setupDecryptionData()
1245 sal_uInt8 nPwd[ENCRYPTION_BUF_LEN]; in setupDecryptionData()
1261 sal_uInt8 nTempKey[ENCRYPTION_KEY_LEN]; in setupDecryptionData()
1263 nTempKey[j] = sal_uInt8(aKey[j] ^ i); in setupDecryptionData()
1319 … fprintf( stderr, "%.2x", (unsigned int)sal_uInt8(m_pData->m_aDocID.getStr()[i]) ); in impl_getData()
1383 … fprintf( stderr, " %.2X", (unsigned int)sal_uInt8(aEnt.getStr()[i]) ); in impl_getData()
1402 … fprintf( stderr, " %.2X", (unsigned int)sal_uInt8(aEnt.getStr()[i]) ); in impl_getData()