Home
last modified time | relevance | path

Searched refs:nKeyLen (Results 1 – 12 of 12) sorted by relevance

/aoo42x/main/sal/qa/rtl/cipher/
H A Drtl_cipher.cxx167 sal_uInt32 nKeyLen = 16; in test_encode() local
233 sal_uInt32 nKeyLen = 16; in test_encode_and_decode() local
391 sal_uInt32 nKeyLen = 16; in test_encode() local
393 memset(pKeyBuffer, 0, nKeyLen); in test_encode()
482 sal_uInt32 nKeyLen = 16; in TEST_F() local
484 memset(pKeyBuffer, 0, nKeyLen); in TEST_F()
510 sal_uInt32 nKeyLen = 16; in TEST_F() local
512 memset(pKeyBuffer, 0, nKeyLen); in TEST_F()
538 sal_uInt32 nKeyLen = 16; in TEST_F() local
540 memset(pKeyBuffer, 0, nKeyLen); in TEST_F()
[all …]
/aoo42x/main/sal/qa/rtl/digest/
H A Drtl_digest.cxx528 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
529 rtl::OString aSum = createHex(pKeyBuffer, nKeyLen); in TEST_F()
556 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
557 rtl::OString aSum = createHex(pKeyBuffer, nKeyLen); in TEST_F()
584 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
611 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
634 memset(pKeyBuffer, 0, nKeyLen); in TEST_F()
642 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
665 memset(pKeyBuffer, 0, nKeyLen); in TEST_F()
673 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in TEST_F()
[all …]
/aoo42x/main/sal/rtl/source/
H A Dcipher.c84 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
143 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_init() argument
235 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
659 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in __rtl_cipherBF_init() argument
679 if (k >= nKeyLen) in __rtl_cipherBF_init()
1044 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_initBF() argument
1062 pKeyData, nKeyLen, pArgData, nArgLen); in rtl_cipher_initBF()
1163 const sal_uInt8 *pKeyData, sal_Size nKeyLen) in rtl_cipherARCFOUR_init_Impl() argument
1177 for (L = K, n = CIPHER_CBLOCK_ARCFOUR; n > nKeyLen; n -= nKeyLen) in rtl_cipherARCFOUR_init_Impl()
1180 L += nKeyLen; in rtl_cipherARCFOUR_init_Impl()
[all …]
H A Ddigest.c1638 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_MD5() argument
1692 if (nKeyLen > DIGEST_CBLOCK_HMAC_MD5) in rtl_digest_initHMAC_MD5()
1696 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5()
1867 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_SHA1() argument
1921 if (nKeyLen > DIGEST_CBLOCK_HMAC_SHA1) in rtl_digest_initHMAC_SHA1()
1925 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_SHA1()
2062 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen, in rtl_digest_PBKDF2() argument
2077 while (nKeyLen >= DIGEST_CBLOCK_PBKDF2) in rtl_digest_PBKDF2()
2087 nKeyLen -= DIGEST_CBLOCK_PBKDF2; in rtl_digest_PBKDF2()
2090 if (nKeyLen > 0) in rtl_digest_PBKDF2()
[all …]
/aoo42x/main/tools/source/generic/
H A Dconfig.cxx283 xub_StrLen nKeyLen; in ImplMakeConfigList() local
405 nKeyLen = nNameLen; in ImplMakeConfigList()
413 nKeyLen++; in ImplMakeConfigList()
414 if ( nKeyLen < nLineLen ) in ImplMakeConfigList()
416 pLine += nKeyLen; in ImplMakeConfigList()
417 nLineLen -= nKeyLen; in ImplMakeConfigList()
457 sal_uInt16 nKeyLen; in ImplGetConfigBuffer() local
564 nKeyLen = pKey->maKey.Len(); in ImplGetConfigBuffer()
565 memcpy( pBuf, pKey->maKey.GetBuffer(), nKeyLen ); in ImplGetConfigBuffer()
566 pBuf += nKeyLen; in ImplGetConfigBuffer()
/aoo42x/main/sal/inc/rtl/
H A Ddigest.h467 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen
507 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen,
551 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen
591 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen,
618 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen,
H A Dcipher.h141 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
213 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
271 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
/aoo42x/main/xmlhelp/source/cxxhelp/provider/
H A Ddb.cxx59 sal_Int32 nKeyLen = strtol( pStartPtr, &pEndPtr, 16 ); in implReadLenAndData() local
65 rValue.copyToBuffer( pKeySrc, nKeyLen ); in implReadLenAndData()
66 riPos += nKeyLen + 1; in implReadLenAndData()
/aoo42x/main/desktop/source/deployment/
H A Ddp_persmap.cxx248 const sal_Int32 nKeyLen = aKeyString.getLength(); in flush() local
249 m_MapFile.write( aKeyString.getStr(), nKeyLen, nBytesWritten); in flush()
250 OSL_ASSERT( nKeyLen == (sal_Int32)nBytesWritten); in flush()
/aoo42x/main/sdext/source/pdfimport/pdfparse/
H A Dpdfentries.cxx1177 sal_uInt32 nKeyLen = password_to_key( rPwd, aKey, pData, false ); in check_user_password() local
1179 rtl_copyMemory( pData->m_aDecryptionKey, aKey, nKeyLen ); in check_user_password()
1185 aKey, nKeyLen, in check_user_password()
1247 sal_uInt32 nKeyLen = password_to_key( rPwd, aKey, m_pData, true ); in setupDecryptionData() local
1251 aKey, nKeyLen, NULL, 0 ); in setupDecryptionData()
1265 nTempKey, nKeyLen, NULL, 0 ); in setupDecryptionData()
/aoo42x/main/l10ntools/source/help/
H A DHelpLinker.cxx180 unsigned int nKeyLen = aKeyStr.length(); in writeKeyValue_DBHelp() local
182 fprintf( pFile, "%x ", nKeyLen ); in writeKeyValue_DBHelp()
183 if( nKeyLen > 0 ) in writeKeyValue_DBHelp()
185 if (fwrite( aKeyStr.c_str(), 1, nKeyLen, pFile ) != nKeyLen) in writeKeyValue_DBHelp()
/aoo42x/main/vcl/win/source/window/
H A Dsalframe.cxx2533 int nKeyLen = 0; in ImplGetKeyNameText() local
2538 nKeyLen = GetKeyNameTextW( lParam, aKeyBuf, nMaxKeyLen ); in ImplGetKeyNameText()
2540 if( nKeyLen > nMaxKeyLen ) in ImplGetKeyNameText()
2541 nKeyLen = 0; in ImplGetKeyNameText()
2542 else if( nKeyLen > 0 ) in ImplGetKeyNameText()
2545 CharLowerBuffW( aKeyBuf, nKeyLen ); in ImplGetKeyNameText()
2558 if ( (nKeyLen > 0) || pReplace ) in ImplGetKeyNameText()
2566 if( nKeyLen > 0 ) in ImplGetKeyNameText()
2568 if( nKeyLen + rCount > nMaxSize ) in ImplGetKeyNameText()
2569 nKeyLen = nMaxSize - rCount; in ImplGetKeyNameText()
[all …]

Completed in 140 milliseconds