Searched refs:key_size_in_bits (Results 1 - 8 of 8) sorted by relevance
/external/chromium/net/base/ |
H A D | keygen_handler.cc | 13 KeygenHandler::KeygenHandler(int key_size_in_bits, argument 16 : key_size_in_bits_(key_size_in_bits),
|
H A D | keygen_handler.h | 31 KeygenHandler(int key_size_in_bits,
|
/external/chromium/crypto/ |
H A D | symmetric_key_mac.cc | 17 size_t key_size_in_bits) { 19 CHECK(key_size_in_bits == 128 || 20 key_size_in_bits == 192 || 21 key_size_in_bits == 256) 22 << "Invalid key size " << key_size_in_bits << " bits"; 29 CHECK(key_size_in_bits >= 80 && (key_size_in_bits % 8) == 0) 30 << "Invalid key size " << key_size_in_bits << " bits"; 72 size_t key_size_in_bits) { 73 CheckKeyParams(algorithm, key_size_in_bits); 16 CheckKeyParams(crypto::SymmetricKey::Algorithm algorithm, size_t key_size_in_bits) argument 71 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 83 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument 142 SymmetricKey(const void *key_data, size_t key_size_in_bits) argument [all...] |
H A D | symmetric_key_openssl.cc | 25 size_t key_size_in_bits) { 27 int key_size_in_bytes = key_size_in_bits / 8; 28 DCHECK_EQ(static_cast<int>(key_size_in_bits), key_size_in_bytes * 8); 30 if (key_size_in_bits == 0) 47 size_t key_size_in_bits) { 49 int key_size_in_bytes = key_size_in_bits / 8; 50 DCHECK_EQ(static_cast<int>(key_size_in_bits), key_size_in_bytes * 8); 24 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_nss.cc | 19 size_t key_size_in_bits) { 23 if (key_size_in_bits == 0) 31 key_size_in_bits / 8, NULL); 43 size_t key_size_in_bits) { 45 if (salt.empty() || iterations == 0 || key_size_in_bits == 0) 65 key_size_in_bits / 8, 18 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 39 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key.h | 37 // |key_size_in_bits| bits. 40 size_t key_size_in_bits); 50 size_t key_size_in_bits); 81 SymmetricKey(const void* key_data, size_t key_size_in_bits);
|
H A D | symmetric_key_win.cc | 29 ALG_ID GetAESAlgIDForKeySize(size_t key_size_in_bits) { argument 31 switch (key_size_in_bits) { 96 // Attempts to generate a random AES key of |key_size_in_bits|. Returns true 99 bool GenerateAESKey(size_t key_size_in_bits, argument 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument 158 return (key_size_in_bits >= (hash_size / 2 * 8) && 159 (key_size_in_bits % 8) == 0); 162 // Attempts to generate a random, |key_size_in_bits|-long HMAC key, for use 164 // |key_size_in_bits| mus 167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_array<BYTE>* raw_key) argument 315 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 355 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument [all...] |
H A D | symmetric_key_unittest.cc | 73 unsigned int key_size_in_bits; member in struct:PBKDF2TestVector 96 test_data.rounds, test_data.key_size_in_bits)); 101 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size());
|
Completed in 95 milliseconds