hmac Sha512
open fun hmacSha512(password: Array<Byte>, salt: Array<Byte>, iterations: Int, dkLen: Int): Array<Byte>
Derives a key from a password and a salt using PBKDF2 + Sha512.
Return
the derived key data.
Parameters
password
is the master password from which a derived key is generated
salt
is a sequence of bits, known as a cryptographic salt
iterations
is the number of iterations desired
dk Len
is the desired bit-length of the derived key