Searched refs:salt (Results 1 – 3 of 3) sorted by relevance
/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | EphemeralKeyTest.java | 157 byte[] salt = new byte[1]; in TestReader() 160 salt[0] = 0x01; in TestReader() 161 byte[] derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info, 32); in TestReader() 164 salt[0] = 0x00; in TestReader() 165 derivedKey = Util.computeHkdf("HmacSha256", sharedSecret, salt, info,32); in TestReader()
|
D | HkdfTest.java | 87 byte[] salt = randBytes(20); in testNullSaltOrInfo() 88 byte[] hkdfWithNullInfo = Util.computeHkdf("HmacSha256", ikm, salt, null, size); in testNullSaltOrInfo() 89 byte[] hkdfWithEmptyInfo = Util.computeHkdf("HmacSha256", ikm, salt, new byte[0], size); in testNullSaltOrInfo()
|
D | Util.java | 1008 byte[] salt = new byte[1]; in calcEMacKeyForReader() 1011 salt[0] = 0x00; in calcEMacKeyForReader() 1013 sharedSecretWithSessionTranscriptBytes, salt, info, 32); in calcEMacKeyForReader() 1043 String macAlgorithm, final byte[] ikm, final byte[] salt, final byte[] info, int size) { in computeHkdf() argument 1054 if (salt == null || salt.length == 0) { in computeHkdf() 1060 mac.init(new SecretKeySpec(salt, macAlgorithm)); in computeHkdf()
|