Searched refs:key_size_in_bits (Results 1 - 5 of 5) sorted by relevance
/external/libchrome/crypto/ |
H A D | symmetric_key_openssl.cc | 27 size_t key_size_in_bits) { 33 if (key_size_in_bits != 128 && key_size_in_bits != 256) 36 size_t key_size_in_bytes = key_size_in_bits / 8; 37 DCHECK_EQ(key_size_in_bits, key_size_in_bytes * 8); 56 size_t key_size_in_bits) { 63 if (key_size_in_bits != 128 && key_size_in_bits != 256) 67 size_t key_size_in_bytes = key_size_in_bits / 8; 68 DCHECK_EQ(key_size_in_bits, key_size_in_byte 26 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 52 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument [all...] |
H A D | symmetric_key_nss.cc | 21 size_t key_size_in_bits) { 29 if (key_size_in_bits != 128 && key_size_in_bits != 256) 37 key_size_in_bits / 8, NULL); 49 size_t key_size_in_bits) { 51 if (salt.empty() || iterations == 0 || key_size_in_bits == 0) 58 if (key_size_in_bits != 128 && key_size_in_bits != 256) 79 key_size_in_bits / 8, 20 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 45 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument
|
H A D | symmetric_key_win.cc | 31 ALG_ID GetAESAlgIDForKeySize(size_t key_size_in_bits) { argument 33 switch (key_size_in_bits) { 99 // Attempts to generate a random AES key of |key_size_in_bits|. Returns true 102 bool GenerateAESKey(size_t key_size_in_bits, argument 108 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); 140 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument 161 return (key_size_in_bits >= (hash_size / 2 * 8) && 162 (key_size_in_bits % 8) == 0); 165 // Attempts to generate a random, |key_size_in_bits|-long HMAC key, for use 167 // |key_size_in_bits| mus 170 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_ptr<BYTE[]>* raw_key) argument 318 GenerateRandomKey(Algorithm algorithm, size_t key_size_in_bits) argument 358 DeriveKeyFromPassword(Algorithm algorithm, const std::string& password, const std::string& salt, size_t iterations, size_t key_size_in_bits) argument [all...] |
H A D | symmetric_key.h | 41 // |key_size_in_bits| bits. |key_size_in_bits| must be a multiple of 8. 44 size_t key_size_in_bits); 48 // used to derive the key from the password. |key_size_in_bits| must be a 55 size_t key_size_in_bits);
|
H A D | symmetric_key_unittest.cc | 73 unsigned int key_size_in_bits; member in struct:PBKDF2TestVector 96 test_data.rounds, test_data.key_size_in_bits)); 101 EXPECT_EQ(test_data.key_size_in_bits / 8, raw_key.size());
|
Completed in 83 milliseconds