Lines Matching refs:key

418     // same PBKDF2 cycle with the persisted salt; if the resulting derived key string matches
1049 Slog.e(TAG, "Invalid key spec for PBKDF2!");
1057 SecretKey key = buildPasswordKey(pw, salt, rounds);
1058 if (key != null) {
1059 return byteArrayToHex(key.getEncoded());
2502 // line 6: master key checksum salt [hex]
2504 // line 8: IV of the user key [hex]
2505 // line 9: master key blob [hex]
2506 // IV of the master key, master key itself, master key checksum hash
2508 // The master key checksum is the master key plus its checksum salt, run through
2510 // correct password for decrypting the archive: the master key decrypted from
2591 // User key will be used to encrypt the master key.
2596 // the master key is random for each backup
2601 // primary encryption of the datastream with the random key
2613 // line 6: master key checksum salt [hex]
2620 // line 8: IV of the user key [hex]
2628 // line 9: master IV + key blob, encrypted by the user key [hex]. Blob format:
2631 // [byte] master key length = Nmk
2632 // [array of Nmk bytes] master key itself
2634 // [array of Nck bytes] master key checksum hash
2636 // The checksum is the (master key + checksum salt), run through the
3102 // decrypt the master key blob
3114 // first, the master key IV
3119 // then the master key itself
3124 // and finally the master key checksum hash
3129 // now validate the decrypted master key against the checksum
3144 // the master key. Use the identical "incorrect password" log text as is
3149 Slog.w(TAG, "Invalid block size in master key");
3991 // eol points to the space between the count and the key
3993 int key = eol + 1; // start of key=value
3996 for (value = key+1; data[value] != '=' && value <= eol; value++);
4001 // pax requires that key/value strings be in UTF-8
4002 String keyStr = new String(data, key, value-key, "UTF-8");
4011 if (DEBUG) Slog.i(TAG, "Unhandled pax key: " + key);