Searched defs:key_size_in_bits (Results 1 - 9 of 9) sorted by relevance

/external/chromium_org/net/base/
H A Dkeygen_handler.cc17 KeygenHandler::KeygenHandler(int key_size_in_bits, argument
20 : key_size_in_bits_(key_size_in_bits),
/external/chromium_org/crypto/
H A Dsymmetric_key_openssl.cc25 size_t key_size_in_bits) {
31 if (key_size_in_bits != 128 && key_size_in_bits != 256)
34 size_t key_size_in_bytes = key_size_in_bits / 8;
35 DCHECK_EQ(key_size_in_bits, key_size_in_bytes * 8);
54 size_t key_size_in_bits) {
61 if (key_size_in_bits != 128 && key_size_in_bits != 256)
65 size_t key_size_in_bytes = key_size_in_bits / 8;
66 DCHECK_EQ(key_size_in_bits, key_size_in_byte
24 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument
50 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
[all...]
H A Dsymmetric_key_unittest.cc73 unsigned int key_size_in_bits; member in struct:PBKDF2TestVector
96 test_data.rounds, test_data.key_size_in_bits));
101 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size());
H A Dsymmetric_key_nss.cc19 size_t key_size_in_bits) {
27 if (key_size_in_bits != 128 && key_size_in_bits != 256)
35 key_size_in_bits / 8, NULL);
47 size_t key_size_in_bits) {
49 if (salt.empty() || iterations == 0 || key_size_in_bits == 0)
56 if (key_size_in_bits != 128 && key_size_in_bits != 256)
77 key_size_in_bits / 8,
18 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument
43 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
H A Dsymmetric_key_win.cc28 ALG_ID GetAESAlgIDForKeySize(size_t key_size_in_bits) { argument
30 switch (key_size_in_bits) {
96 // Attempts to generate a random AES key of |key_size_in_bits|. Returns true
99 bool GenerateAESKey(size_t key_size_in_bits, argument
105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits);
137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument
158 return (key_size_in_bits >= (hash_size / 2 * 8) &&
159 (key_size_in_bits % 8) == 0);
162 // Attempts to generate a random, |key_size_in_bits|-long HMAC key, for use
164 // |key_size_in_bits| mus
167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_ptr<BYTE[]>* raw_key) argument
315 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument
355 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
[all...]
/external/chromium_org/net/third_party/mozilla_security_manager/
H A DnsKeygenHandler.cpp95 std::string GenKeyAndSignChallenge(int key_size_in_bits, argument
123 rsaKeyGenParams.keySizeInBits = key_size_in_bits;
/external/chromium_org/content/browser/
H A Dresource_context_impl.cc73 uint32 key_size_in_bits,
78 new net::KeygenHandler(key_size_in_bits, challenge_string, url)));
72 CreateKeygenHandler( uint32 key_size_in_bits, const std::string& challenge_string, const GURL& url, const base::Callback<void(scoped_ptr<net::KeygenHandler>)>& callback) argument
/external/chromium_org/chrome/browser/profiles/
H A Dprofile_io_data.cc932 uint32 key_size_in_bits,
939 new net::KeygenHandler(key_size_in_bits, challenge_string, url));
958 new net::KeygenHandler(key_size_in_bits, challenge_string, url)));
931 CreateKeygenHandler( uint32 key_size_in_bits, const std::string& challenge_string, const GURL& url, const base::Callback<void(scoped_ptr<net::KeygenHandler>)>& callback) argument
/external/chromium_org/content/browser/renderer_host/
H A Drender_message_filter.cc1032 int key_size_in_bits; local
1035 key_size_in_bits = 2048;
1038 key_size_in_bits = 1024;
1048 key_size_in_bits,

Completed in 352 milliseconds