Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 5 of 5) sorted by relevance

/cts/tests/tests/identity/src/android/security/identity/cts/
DEphemeralKeyTest.java157 byte[] salt = new byte[1]; in TestReader()
160 salt[0] = 0x01; in TestReader()
161 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in TestReader()
164 salt[0] = 0x00; in TestReader()
165 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info,32); in TestReader()
DHkdfTest.java87 byte[] salt = randBytes(20); in testNullSaltOrInfo()
88 byte[] hkdfWithNullInfo = Util.computeHkdf("HmacSha256", ikm, salt, null, size); in testNullSaltOrInfo()
89 byte[] hkdfWithEmptyInfo = Util.computeHkdf("HmacSha256", ikm, salt, new byte[0], size); in testNullSaltOrInfo()
DUtil.java1046 byte[] salt = MessageDigest.getInstance("SHA-256").digest(sessionTranscriptBytes); in calcEMacKeyForReader()
1048 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in calcEMacKeyForReader()
1078 String macAlgorithm, final byte[] ikm, final byte[] salt, final byte[] info, int size) { in computeHkdf() argument
1089 if (salt == null || salt.length == 0) { in computeHkdf()
1095 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
DEnrollmentSpecificIdTest.java144 @NonNull String macAlgorithm, @NonNull final byte[] ikm, @NonNull final byte[] salt, in computeHkdf() argument
156 if (salt == null || salt.length == 0) { in computeHkdf()
162 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/
Dpoc.cpp54 salt_t salt __attribute__((unused))) const {} in ComputePasswordSignature()