Lines Matching refs:salt
27 Bytes salt;
29 ASSERT_OK(salt.Randomize(GUID_LEN));
33 EXPECT_ZX(hkdf.Init(digest::kUninitialized, ikm, salt), ZX_ERR_INVALID_ARGS);
37 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt), ZX_ERR_INVALID_ARGS);
41 ASSERT_OK(salt.Resize(0));
42 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
43 ASSERT_OK(salt.Randomize(GUID_LEN));
46 EXPECT_ZX(hkdf.Init(digest::kSHA256, ikm, salt, 0x8000), ZX_ERR_INVALID_ARGS);
49 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
60 Bytes salt;
62 ASSERT_OK(salt.Randomize(GUID_LEN));
66 ASSERT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
90 Bytes salt;
94 ASSERT_OK(salt.Resize(13));
95 for (uint8_t i = 0; i < salt.len(); ++i) {
96 salt[i] = i;
104 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt, HKDF::ALLOW_WEAK_KEY));
115 Bytes salt;
121 ASSERT_OK(salt.Resize(80));
122 for (uint8_t i = 0; i < salt.len(); ++i) {
123 salt[i] = static_cast<uint8_t>(0x60 + i);
138 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt));
144 // Based on RFC 5869, Appendix A.3: Test with SHA-256 and zero-length salt/info
149 Bytes salt;
159 EXPECT_OK(hkdf.Init(digest::kSHA256, ikm, salt, HKDF::ALLOW_WEAK_KEY));