/aoo41x/main/sal/qa/rtl/cipher/ |
H A D | rtl_cipher.cxx | 193 sal_uInt32 nKeyLen = 16; in test_encode() local 195 memset(pKeyBuffer, 0, nKeyLen); in test_encode() 259 sal_uInt32 nKeyLen = 16; in test_encode_and_decode() local 261 memset(pKeyBuffer, 0, nKeyLen); in test_encode_and_decode() 442 sal_uInt32 nKeyLen = 16; in test_encode() local 444 memset(pKeyBuffer, 0, nKeyLen); in test_encode() 547 sal_uInt32 nKeyLen = 16; in init_001() local 549 memset(pKeyBuffer, 0, nKeyLen); in init_001() 575 sal_uInt32 nKeyLen = 16; in init_002() local 603 sal_uInt32 nKeyLen = 16; in init_003() local [all …]
|
/aoo41x/main/sal/qa/rtl/digest/ |
H A D | rtl_digest.cxx | 588 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_MD2() 589 rtl::OString aSum = createHex(pKeyBuffer, nKeyLen); in init_MD2() 616 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_MD5() 617 rtl::OString aSum = createHex(pKeyBuffer, nKeyLen); in init_MD5() 644 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_SHA() 671 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_SHA1() 694 memset(pKeyBuffer, 0, nKeyLen); in init_HMAC_MD5() 702 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_HMAC_MD5() 725 memset(pKeyBuffer, 0, nKeyLen); in init_HMAC_SHA1() 733 rtl_digest_get( handle, pKeyBuffer, nKeyLen ); in init_HMAC_SHA1() [all …]
|
/aoo41x/main/sal/rtl/source/ |
H A D | cipher.c | 84 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 143 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_init() argument 235 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 659 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in __rtl_cipherBF_init() argument 679 if (k >= nKeyLen) in __rtl_cipherBF_init() 1044 const sal_uInt8 *pKeyData, sal_Size nKeyLen, in rtl_cipher_initBF() argument 1062 pKeyData, nKeyLen, pArgData, nArgLen); in rtl_cipher_initBF() 1163 const sal_uInt8 *pKeyData, sal_Size nKeyLen) in rtl_cipherARCFOUR_init_Impl() argument 1177 for (L = K, n = CIPHER_CBLOCK_ARCFOUR; n > nKeyLen; n -= nKeyLen) in rtl_cipherARCFOUR_init_Impl() 1180 L += nKeyLen; in rtl_cipherARCFOUR_init_Impl() [all …]
|
H A D | digest.c | 1638 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_MD5() argument 1692 if (nKeyLen > DIGEST_CBLOCK_HMAC_MD5) in rtl_digest_initHMAC_MD5() 1696 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_MD5() 1867 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, in rtl_digest_HMAC_SHA1() argument 1921 if (nKeyLen > DIGEST_CBLOCK_HMAC_SHA1) in rtl_digest_initHMAC_SHA1() 1925 &(ctx->m_hash), pKeyData, nKeyLen); in rtl_digest_initHMAC_SHA1() 2062 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen, in rtl_digest_PBKDF2() argument 2077 while (nKeyLen >= DIGEST_CBLOCK_PBKDF2) in rtl_digest_PBKDF2() 2087 nKeyLen -= DIGEST_CBLOCK_PBKDF2; in rtl_digest_PBKDF2() 2090 if (nKeyLen > 0) in rtl_digest_PBKDF2() [all …]
|
/aoo41x/main/tools/source/generic/ |
H A D | config.cxx | 283 xub_StrLen nKeyLen; in ImplMakeConfigList() local 405 nKeyLen = nNameLen; in ImplMakeConfigList() 413 nKeyLen++; in ImplMakeConfigList() 414 if ( nKeyLen < nLineLen ) in ImplMakeConfigList() 416 pLine += nKeyLen; in ImplMakeConfigList() 417 nLineLen -= nKeyLen; in ImplMakeConfigList() 457 sal_uInt16 nKeyLen; in ImplGetConfigBuffer() local 564 nKeyLen = pKey->maKey.Len(); in ImplGetConfigBuffer() 565 memcpy( pBuf, pKey->maKey.GetBuffer(), nKeyLen ); in ImplGetConfigBuffer() 566 pBuf += nKeyLen; in ImplGetConfigBuffer()
|
/aoo41x/main/sal/inc/rtl/ |
H A D | digest.h | 467 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 507 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 551 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen 591 const sal_uInt8 *pKeyData, sal_uInt32 nKeyLen, 618 sal_uInt8 *pKeyData , sal_uInt32 nKeyLen,
|
H A D | cipher.h | 141 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 213 const sal_uInt8 *pKeyData, sal_Size nKeyLen, 271 const sal_uInt8 *pKeyData, sal_Size nKeyLen,
|
/aoo41x/main/xmlhelp/source/cxxhelp/provider/ |
H A D | db.cxx | 59 sal_Int32 nKeyLen = strtol( pStartPtr, &pEndPtr, 16 ); in implReadLenAndData() local 65 rValue.copyToBuffer( pKeySrc, nKeyLen ); in implReadLenAndData() 66 riPos += nKeyLen + 1; in implReadLenAndData()
|
/aoo41x/main/desktop/source/deployment/ |
H A D | dp_persmap.cxx | 248 const sal_Int32 nKeyLen = aKeyString.getLength(); in flush() local 249 m_MapFile.write( aKeyString.getStr(), nKeyLen, nBytesWritten); in flush() 250 OSL_ASSERT( nKeyLen == (sal_Int32)nBytesWritten); in flush()
|
/aoo41x/main/sdext/source/pdfimport/pdfparse/ |
H A D | pdfentries.cxx | 1177 sal_uInt32 nKeyLen = password_to_key( rPwd, aKey, pData, false ); in check_user_password() local 1179 rtl_copyMemory( pData->m_aDecryptionKey, aKey, nKeyLen ); in check_user_password() 1185 aKey, nKeyLen, in check_user_password() 1247 sal_uInt32 nKeyLen = password_to_key( rPwd, aKey, m_pData, true ); in setupDecryptionData() local 1251 aKey, nKeyLen, NULL, 0 ); in setupDecryptionData() 1265 nTempKey, nKeyLen, NULL, 0 ); in setupDecryptionData()
|
/aoo41x/main/l10ntools/source/help/ |
H A D | HelpLinker.cxx | 180 unsigned int nKeyLen = aKeyStr.length(); in writeKeyValue_DBHelp() local 182 fprintf( pFile, "%x ", nKeyLen ); in writeKeyValue_DBHelp() 183 if( nKeyLen > 0 ) in writeKeyValue_DBHelp() 185 if (fwrite( aKeyStr.c_str(), 1, nKeyLen, pFile ) != nKeyLen) in writeKeyValue_DBHelp()
|
/aoo41x/main/vcl/win/source/window/ |
H A D | salframe.cxx | 2533 int nKeyLen = 0; in ImplGetKeyNameText() local 2538 nKeyLen = GetKeyNameTextW( lParam, aKeyBuf, nMaxKeyLen ); in ImplGetKeyNameText() 2540 if( nKeyLen > nMaxKeyLen ) in ImplGetKeyNameText() 2541 nKeyLen = 0; in ImplGetKeyNameText() 2542 else if( nKeyLen > 0 ) in ImplGetKeyNameText() 2545 CharLowerBuffW( aKeyBuf, nKeyLen ); in ImplGetKeyNameText() 2558 if ( (nKeyLen > 0) || pReplace ) in ImplGetKeyNameText() 2566 if( nKeyLen > 0 ) in ImplGetKeyNameText() 2568 if( nKeyLen + rCount > nMaxSize ) in ImplGetKeyNameText() 2569 nKeyLen = nMaxSize - rCount; in ImplGetKeyNameText() [all …]
|