Searched refs:salt (Results 1 – 3 of 3) sorted by relevance
/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | EphemeralKeyTest.java | 158 byte[] salt = new byte[1]; in TestReader() 161 salt[0] = 0x01; in TestReader() 162 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in TestReader() 165 salt[0] = 0x00; in TestReader() 166 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info,32); in TestReader()
|
/cts/tests/devicepolicy/src/android/devicepolicy/cts/ |
D | EnrollmentSpecificIdTest.java | 196 @NonNull String macAlgorithm, @NonNull final byte[] ikm, @NonNull final byte[] salt, in computeHkdf() argument 208 if (salt == null || salt.length == 0) { in computeHkdf() 214 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/ |
D | poc.cpp | 54 salt_t salt __attribute__((unused))) const {} in ComputePasswordSignature()
|