Home
last modified time | relevance | path

Searched refs:RTL_DIGEST_LENGTH_SHA1 (Results 1 – 13 of 13) sorted by relevance

/trunk/main/oox/source/core/
H A Dencryption.cxx151 sal_uInt8 pnX1[ RTL_DIGEST_LENGTH_SHA1 ]; in deriveKey()
152 aError = rtl_digest_get( aDigest, pnX1, RTL_DIGEST_LENGTH_SHA1 ); in deriveKey()
161 sal_uInt8 pnX2[ RTL_DIGEST_LENGTH_SHA1 ]; in deriveKey()
162 aError = rtl_digest_get( aDigest, pnX2, RTL_DIGEST_LENGTH_SHA1 ); in deriveKey()
165 if( nRequiredKeyLen > RTL_DIGEST_LENGTH_SHA1 ) in deriveKey()
167 … memcpy( pnKeyDerived + RTL_DIGEST_LENGTH_SHA1, pnX2, nRequiredKeyLen - RTL_DIGEST_LENGTH_SHA1 ); in deriveKey()
168 nRequiredKeyLen = RTL_DIGEST_LENGTH_SHA1; in deriveKey()
188 size_t nHashSize = RTL_DIGEST_LENGTH_SHA1 + 4; in verifyPassword()
202 memmove( pnHash, pnHash + 4, RTL_DIGEST_LENGTH_SHA1 ); in verifyPassword()
203 memset( pnHash + RTL_DIGEST_LENGTH_SHA1, 0, 4 ); in verifyPassword()
[all …]
/trunk/main/connectivity/source/cpool/
H A DZConnectionPool.hxx76 sal_uInt8 m_pBuffer[RTL_DIGEST_LENGTH_SHA1];
91 for(i=0;i < RTL_DIGEST_LENGTH_SHA1 && (x.m_pBuffer[i] >= y.m_pBuffer[i]); ++i) in operator ()()
93 return i < RTL_DIGEST_LENGTH_SHA1; in operator ()()
/trunk/main/sal/qa/rtl/digest/
H A Drtl_digest.cxx420 ASSERT_TRUE(RTL_DIGEST_LENGTH_SHA1 == nAlgoLength) << "query length"; in TEST_F()
873 sal_uInt8 *pBuffer = new sal_uInt8[ RTL_DIGEST_LENGTH_SHA1 ]; in TEST_F()
875 memset(pBuffer, 0, RTL_DIGEST_LENGTH_SHA1); in TEST_F()
880 rtlDigestError aError = rtl_digest_SHA1(pMsg1, nLen, pBuffer, RTL_DIGEST_LENGTH_SHA1); in TEST_F()
884 rtl::OString aStr = createHex(pBuffer, RTL_DIGEST_LENGTH_SHA1); in TEST_F()
/trunk/main/svl/source/misc/
H A DPasswordHelper.cxx35 rPassHash.realloc(RTL_DIGEST_LENGTH_SHA1); in GetHashPassword()
87 uno::Sequence<sal_Int8> aNewPass(RTL_DIGEST_LENGTH_SHA1); in CompareHashPassword()
/trunk/main/comphelper/source/misc/
H A Dstoragehelper.cxx467 sal_uInt8 pBuffer[RTL_DIGEST_LENGTH_SHA1]; in CreatePackageEncryptionData()
471 RTL_DIGEST_LENGTH_SHA1 ); in CreatePackageEncryptionData()
479 …a[nSha1Ind+nInd].Value <<= uno::Sequence< sal_Int8 >( (sal_Int8*)pBuffer, RTL_DIGEST_LENGTH_SHA1 ); in CreatePackageEncryptionData()
/trunk/main/sal/workben/
H A Dt_digest.c264 p=pt (md, RTL_DIGEST_LENGTH_SHA1); in main()
288 p=pt (md, RTL_DIGEST_LENGTH_SHA1); in main()
/trunk/main/sal/inc/rtl/
H A Ddigest.h372 #define RTL_DIGEST_LENGTH_SHA1 20 macro
517 #define RTL_DIGEST_LENGTH_HMAC_SHA1 RTL_DIGEST_LENGTH_SHA1
/trunk/main/sot/source/sdstor/
H A Dstorage.cxx1458 sal_uInt8 aBuffer[RTL_DIGEST_LENGTH_SHA1]; in SetKey()
1459 …rror nError = rtl_digest_SHA1( m_aKey.GetBuffer(), m_aKey.Len(), aBuffer, RTL_DIGEST_LENGTH_SHA1 ); in SetKey()
1463 … ::com::sun::star::uno::Sequence < sal_Int8 > aSequ( (sal_Int8*) pBuffer, RTL_DIGEST_LENGTH_SHA1 ); in SetKey()
H A Ducbstorage.cxx715 sal_uInt8 aBuffer[RTL_DIGEST_LENGTH_SHA1]; in UCBStorageStream_Impl()
716 …estError nErr = rtl_digest_SHA1( pKey->GetBuffer(), pKey->Len(), aBuffer, RTL_DIGEST_LENGTH_SHA1 ); in UCBStorageStream_Impl()
720 … ::com::sun::star::uno::Sequence < sal_Int8 > aSequ( (sal_Int8*) pBuffer, RTL_DIGEST_LENGTH_SHA1 ); in UCBStorageStream_Impl()
/trunk/main/dbaccess/source/core/dataaccess/
H A Ddatasource.cxx299 sal_uInt8 m_pBuffer[RTL_DIGEST_LENGTH_SHA1];
323 for(i=0;i < RTL_DIGEST_LENGTH_SHA1 && (x.m_pBuffer[i] >= y.m_pBuffer[i]); ++i) in operator ()()
325 return i < RTL_DIGEST_LENGTH_SHA1; in operator ()()
/trunk/main/package/source/package/zipapi/
H A Dsha1context.cxx78 uno::Sequence< sal_Int8 > aResult( RTL_DIGEST_LENGTH_SHA1 ); in finalizeDigestAndDispose()
/trunk/main/connectivity/source/commontools/
H A DConnectionWrapper.cxx260 aError = rtl_digest_get(aDigest,_pBuffer,RTL_DIGEST_LENGTH_SHA1); in createUniqueId()
/trunk/main/sal/rtl/source/
H A Ddigest.c1376 RTL_DIGEST_LENGTH_SHA1,
1811 RTL_DIGEST_LENGTH_SHA1,
1927 &(ctx->m_hash), ctx->m_opad, RTL_DIGEST_LENGTH_SHA1); in rtl_digest_initHMAC_SHA1()

Completed in 94 milliseconds