| /trunk/main/comphelper/source/misc/ |
| H A D | docpasswordhelper.cxx | 310 sal_uInt8 pKeyData[64]; in GenerateStd97Key() local 311 rtl_zeroMemory( pKeyData, sizeof(pKeyData) ); in GenerateStd97Key() 318 pKeyData[2*nInd] = sal::static_int_cast< sal_uInt8 >( (pPassData[nInd] >> 0) & 0xff ); in GenerateStd97Key() 319 … pKeyData[2*nInd + 1] = sal::static_int_cast< sal_uInt8 >( (pPassData[nInd] >> 8) & 0xff ); in GenerateStd97Key() 322 pKeyData[2*nInd] = 0x80; in GenerateStd97Key() 323 pKeyData[56] = sal::static_int_cast< sal_uInt8 >( nInd << 4 ); in GenerateStd97Key() 328 hDigest, pKeyData, sizeof(pKeyData)); in GenerateStd97Key() 330 hDigest, pKeyData, RTL_DIGEST_LENGTH_MD5); in GenerateStd97Key() 335 rtl_digest_updateMD5( hDigest, pKeyData, 5 ); in GenerateStd97Key() 340 pKeyData[16] = 0x80; in GenerateStd97Key() [all …]
|
| /trunk/main/filter/source/msfilter/ |
| H A D | mscodec.cxx | 278 static void lcl_PrintKeyData(const sal_uInt8* pKeyData, const char* msg) 284 printf("%2.2x ", pKeyData[j*16+i]); 407 sal_uInt8 pKeyData[64]; // 512-bit message block in InitCipher() local 410 (void)memset (pKeyData, 0, sizeof(pKeyData)); in InitCipher() 413 (void)memcpy (pKeyData, m_pDigestValue, 5); in InitCipher() 416 pKeyData[ 5] = sal_uInt8((nCounter >> 0) & 0xff); in InitCipher() 417 pKeyData[ 6] = sal_uInt8((nCounter >> 8) & 0xff); in InitCipher() 418 pKeyData[ 7] = sal_uInt8((nCounter >> 16) & 0xff); in InitCipher() 419 pKeyData[ 8] = sal_uInt8((nCounter >> 24) & 0xff); in InitCipher() 421 pKeyData[ 9] = 0x80; in InitCipher() [all …]
|
| /trunk/main/sal/rtl/source/ |
| H A D | cipher.c | 84 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 143 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_init() argument 153 Cipher, Direction, pKeyData, nKeyLen, pArgData, nArgLen); in rtl_cipher_init() 235 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 659 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in __rtl_cipherBF_init() argument 677 D = ((D << 8) | pKeyData[k]); in __rtl_cipherBF_init() 1044 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_initBF() argument 1049 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_cipher_initBF() 1062 pKeyData, nKeyLen, pArgData, nArgLen); in rtl_cipher_initBF() 1163 const sal_uInt8 *pKeyData, sal_Size nKeyLen) in rtl_cipherARCFOUR_init_Impl() argument [all …]
|
| H A D | digest.c | 1638 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_MD5() argument 1647 result = rtl_digest_initHMAC_MD5 (&digest, pKeyData, nKeyLen); in rtl_digest_HMAC_MD5() 1678 rtlDigest Digest, const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen) in rtl_digest_initHMAC_MD5() argument 1683 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_digest_initHMAC_MD5() 1696 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5() 1703 rtl_copyMemory (ctx->m_opad, pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5() 1867 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_SHA1() argument 1876 result = rtl_digest_initHMAC_SHA1 (&digest, pKeyData, nKeyLen); in rtl_digest_HMAC_SHA1() 1907 rtlDigest Digest, const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen) in rtl_digest_initHMAC_SHA1() argument 1912 if ((pImpl == NULL) || (pKeyData == NULL)) in rtl_digest_initHMAC_SHA1() [all …]
|
| /trunk/main/sal/inc/rtl/ |
| H A D | digest.h | 467 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 507 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 551 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 591 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 618 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen,
|
| H A D | cipher.h | 141 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 213 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 271 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
|
| /trunk/main/oox/inc/oox/core/ |
| H A D | binarycodec.hxx | 303 const sal_uInt8 pKeyData[64],
|
| /trunk/main/filter/inc/filter/msfilter/ |
| H A D | mscodec.hxx | 354 const sal_uInt8 pKeyData[64],
|