Lines Matching refs:rData

200 void ZipFile::StaticFillHeader( const ::rtl::Reference< EncryptionData >& rData,   in StaticFillHeader()  argument
206 sal_Int16 nIVLength = static_cast < sal_Int16 > ( rData->m_aInitVector.getLength() ); in StaticFillHeader()
207 sal_Int16 nSaltLength = static_cast < sal_Int16 > ( rData->m_aSalt.getLength() ); in StaticFillHeader()
208 sal_Int16 nDigestLength = static_cast < sal_Int16 > ( rData->m_aDigest.getLength() ); in StaticFillHeader()
222 sal_Int32 nIterationCount = rData->m_nIterationCount; in StaticFillHeader()
235 sal_Int32 nEncAlgID = rData->m_nEncAlg; in StaticFillHeader()
242 sal_Int32 nChecksumAlgID = rData->m_nCheckAlg; in StaticFillHeader()
249 sal_Int32 nDerivedKeySize = rData->m_nDerivedKeySize; in StaticFillHeader()
256 sal_Int32 nKeyAlgID = rData->m_nStartKeyGenID; in StaticFillHeader()
279 rtl_copyMemory ( pHeader, rData->m_aSalt.getConstArray(), nSaltLength ); in StaticFillHeader()
283 rtl_copyMemory ( pHeader, rData->m_aInitVector.getConstArray(), nIVLength ); in StaticFillHeader()
287 rtl_copyMemory ( pHeader, rData->m_aDigest.getConstArray(), nDigestLength ); in StaticFillHeader()
295 sal_Bool ZipFile::StaticFillData ( ::rtl::Reference< BaseEncryptionData > & rData, in StaticFillData() argument
319 rData->m_nIterationCount = nCount; in StaticFillData()
358 rData->m_aSalt.realloc ( nSaltLength ); in StaticFillData()
359 rtl_copyMemory ( rData->m_aSalt.getArray(), aBuffer.getConstArray(), nSaltLength ); in StaticFillData()
362 rData->m_aInitVector.realloc ( nIVLength ); in StaticFillData()
363 rtl_copyMemory ( rData->m_aInitVector.getArray(), aBuffer.getConstArray(), nIVLength ); in StaticFillData()
366 rData->m_aDigest.realloc ( nDigestLength ); in StaticFillData()
367 rtl_copyMemory ( rData->m_aDigest.getArray(), aBuffer.getConstArray(), nDigestLength ); in StaticFillData()
385 const ::rtl::Reference< EncryptionData > &rData ) in StaticGetDataFromRawStream()
388 if ( !rData.is() ) in StaticGetDataFromRawStream()
392 if ( !rData->m_aKey.getLength() ) in StaticGetDataFromRawStream()
403 OSL_ENSURE( rData->m_aDigest.getLength(), "Can't detect password correctness without digest!\n" ); in StaticGetDataFromRawStream()
404 if ( rData->m_aDigest.getLength() ) in StaticGetDataFromRawStream()
411 xSeek->seek( n_ConstHeaderSize + rData->m_aInitVector.getLength() + in StaticGetDataFromRawStream()
412 rData->m_aSalt.getLength() + rData->m_aDigest.getLength() ); in StaticGetDataFromRawStream()
419 if ( !StaticHasValidPassword( xFactory, aReadBuffer, rData ) ) in StaticGetDataFromRawStream()
423 return new XUnbufferedStream( xFactory, xStream, rData ); in StaticGetDataFromRawStream()
441 …Factory, const Sequence< sal_Int8 > &aReadBuffer, const ::rtl::Reference< EncryptionData > &rData ) in StaticHasValidPassword() argument
443 if ( !rData.is() || !rData->m_aKey.getLength() ) in StaticHasValidPassword()
448 …uno::Reference< xml::crypto::XCipherContext > xCipher( StaticGetCipher( xFactory, rData, false ), … in StaticHasValidPassword()
474 …estContext > xDigestContext( StaticGetDigestContextForChecksum( xFactory, rData ), uno::UNO_SET_TH… in StaticHasValidPassword()
480 if ( rData->m_aDigest.getLength() != 0 && in StaticHasValidPassword()
481 ( aDigestSeq.getLength() != rData->m_aDigest.getLength() || in StaticHasValidPassword()
483 rData->m_aDigest.getConstArray(), in StaticHasValidPassword()
494 …ol ZipFile::hasValidPassword ( ZipEntry & rEntry, const ::rtl::Reference< EncryptionData >& rData ) in hasValidPassword() argument
499 if ( rData.is() && rData->m_aKey.getLength() ) in hasValidPassword()
512 bRet = StaticHasValidPassword( m_xFactory, aReadBuffer, rData ); in hasValidPassword()
521 const ::rtl::Reference< EncryptionData > &rData, in createUnbufferedStream()
528 …return new XUnbufferedStream ( m_xFactory, aMutexHolder, rEntry, xStream, rData, nStreamMode, bIsE… in createUnbufferedStream()
538 const ::rtl::Reference< EncryptionData > &rData, in getInputStream()
555 if ( bIsEncrypted && rData.is() && rData->m_aDigest.getLength() ) in getInputStream()
556 bNeedRawStream = !hasValidPassword ( rEntry, rData ); in getInputStream()
560 rData, in getInputStream()
566 const ::rtl::Reference< EncryptionData > &rData, in getDataStream()
586 if ( !rData.is() ) in getDataStream()
592 OSL_ENSURE( rData->m_aDigest.getLength(), "Can't detect password correctness without digest!\n" ); in getDataStream()
593 if ( rData->m_aDigest.getLength() && !hasValidPassword ( rEntry, rData ) ) in getDataStream()
601 rData, in getDataStream()
607 const ::rtl::Reference< EncryptionData >& rData, in getRawData()
617 return createUnbufferedStream ( aMutexHolder, rEntry, rData, UNBUFF_STREAM_RAW, bIsEncrypted ); in getRawData()
622 const ::rtl::Reference< EncryptionData >& rData, in getWrappedRawStream()
632 if ( !rData.is() ) in getWrappedRawStream()
638 …return createUnbufferedStream ( aMutexHolder, rEntry, rData, UNBUFF_STREAM_WRAPPEDRAW, sal_True, a… in getWrappedRawStream()