Searched refs:salt (Results 1 – 5 of 5) sorted by relevance
/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | EphemeralKeyTest.java | 157 byte[] salt = new byte[1]; in TestReader() 160 salt[0] = 0x01; in TestReader() 161 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in TestReader() 164 salt[0] = 0x00; in TestReader() 165 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info,32); in TestReader()
|
D | HkdfTest.java | 87 byte[] salt = randBytes(20); in testNullSaltOrInfo() 88 byte[] hkdfWithNullInfo = Util.computeHkdf("HmacSha256", ikm, salt, null, size); in testNullSaltOrInfo() 89 byte[] hkdfWithEmptyInfo = Util.computeHkdf("HmacSha256", ikm, salt, new byte[0], size); in testNullSaltOrInfo()
|
D | Util.java | 1046 byte[] salt = MessageDigest.getInstance("SHA-256").digest(sessionTranscriptBytes); in calcEMacKeyForReader() 1048 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in calcEMacKeyForReader() 1078 String macAlgorithm, final byte[] ikm, final byte[] salt, final byte[] info, int size) { in computeHkdf() argument 1089 if (salt == null || salt.length == 0) { in computeHkdf() 1095 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | EnrollmentSpecificIdTest.java | 144 @NonNull String macAlgorithm, @NonNull final byte[] ikm, @NonNull final byte[] salt, in computeHkdf() argument 156 if (salt == null || salt.length == 0) { in computeHkdf() 162 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/ |
D | poc.cpp | 54 salt_t salt __attribute__((unused))) const {} in ComputePasswordSignature()
|