hmacSha512

open fun hmacSha512(password: Array<Byte>, salt: Array<Byte>, iterations: Int, dkLen: Int): Array<Byte>

Derives a key from a password and a salt using PBKDF2 + Sha512.

Return

the derived key data.

Parameters

password

is the master password from which a derived key is generated

salt

is a sequence of bits, known as a cryptographic salt

iterations

is the number of iterations desired

dkLen

is the desired bit-length of the derived key