/trunk/main/comphelper/source/misc/ |
H A D | docpasswordhelper.cxx | 310 sal_uInt8 pKeyData[64]; in GenerateStd97Key() local 311 rtl_zeroMemory( pKeyData, sizeof(pKeyData) ); in GenerateStd97Key() 322 pKeyData[2*nInd] = 0x80; in GenerateStd97Key() 328 hDigest, pKeyData, sizeof(pKeyData)); in GenerateStd97Key() 330 hDigest, pKeyData, RTL_DIGEST_LENGTH_MD5); in GenerateStd97Key() 340 pKeyData[16] = 0x80; in GenerateStd97Key() 341 rtl_zeroMemory( pKeyData + 17, sizeof(pKeyData) - 17 ); in GenerateStd97Key() 342 pKeyData[56] = 0x80; in GenerateStd97Key() 343 pKeyData[57] = 0x0a; in GenerateStd97Key() 345 rtl_digest_updateMD5( hDigest, &(pKeyData[16]), sizeof(pKeyData) - 16 ); in GenerateStd97Key() [all …]
|
/trunk/main/filter/source/msfilter/ |
H A D | mscodec.cxx | 284 printf("%2.2x ", pKeyData[j*16+i]); 410 (void)memset (pKeyData, 0, sizeof(pKeyData)); in InitCipher() 413 (void)memcpy (pKeyData, m_pDigestValue, 5); in InitCipher() 416 pKeyData[ 5] = sal_uInt8((nCounter >> 0) & 0xff); in InitCipher() 417 pKeyData[ 6] = sal_uInt8((nCounter >> 8) & 0xff); in InitCipher() 421 pKeyData[ 9] = 0x80; in InitCipher() 422 pKeyData[56] = 0x48; in InitCipher() 426 m_hDigest, pKeyData, sizeof(pKeyData)); in InitCipher() 428 m_hDigest, pKeyData, RTL_DIGEST_LENGTH_MD5); in InitCipher() 433 pKeyData, RTL_DIGEST_LENGTH_MD5, 0, 0); in InitCipher() [all …]
|
/trunk/main/sal/rtl/source/ |
H A D | cipher.c | 84 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 143 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_init() argument 235 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 659 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in __rtl_cipherBF_init() argument 677 D = ((D << 8) | pKeyData[k]); in __rtl_cipherBF_init() 1044 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_initBF() argument 1049 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_cipher_initBF() 1062 pKeyData, nKeyLen, pArgData, nArgLen); in rtl_cipher_initBF() 1182 for (k = 0; k < n; k++) L[k] = pKeyData[k]; in rtl_cipherARCFOUR_init_Impl() 1279 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_initARCFOUR() argument [all …]
|
H A D | digest.c | 1638 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_MD5() argument 1683 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_digest_initHMAC_MD5() 1696 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5() 1703 rtl_copyMemory (ctx->m_opad, pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5() 1867 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_SHA1() argument 1912 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_digest_initHMAC_SHA1() 1925 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_SHA1() 2062 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen, in rtl_digest_PBKDF2() argument 2081 &digest, pKeyData, in rtl_digest_PBKDF2() 2086 pKeyData += DIGEST_CBLOCK_PBKDF2; in rtl_digest_PBKDF2() [all …]
|
/trunk/main/sal/inc/rtl/ |
H A D | digest.h | 467 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 507 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 551 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 591 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 618 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen,
|
H A D | cipher.h | 141 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 213 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 271 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
|
/trunk/main/oox/inc/oox/core/ |
H A D | binarycodec.hxx | 303 const sal_uInt8 pKeyData[64],
|
/trunk/main/filter/inc/filter/msfilter/ |
H A D | mscodec.hxx | 354 const sal_uInt8 pKeyData[64],
|