HomeSort by relevance Sort by last modified time
    Searched refs:nextByteToReturn (Results 1 - 2 of 2) sorted by null

  /development/samples/BrokenKeyDerivation/src/com/example/android/brokenkeyderivation/
InsecureSHA1PRNGKeyDerivator.java 283 int nextByteToReturn; // index of ready bytes in "bytes" array
345 nextByteToReturn = 0;
348 n = (HASHBYTES_TO_USE - nextBIndex) < (bytes.length - nextByteToReturn) ? HASHBYTES_TO_USE
350 : bytes.length - nextByteToReturn;
352 System.arraycopy(nextBytes, nextBIndex, bytes, nextByteToReturn, n);
354 nextByteToReturn += n;
357 if (nextByteToReturn >= bytes.length) {
404 j = HASHBYTES_TO_USE < (bytes.length - nextByteToReturn) ? HASHBYTES_TO_USE
405 : bytes.length - nextByteToReturn;
408 System.arraycopy(nextBytes, 0, bytes, nextByteToReturn, j)
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1PRNG_SecureRandomImpl.java 286 int nextByteToReturn; // index of ready bytes in "bytes" array
350 nextByteToReturn = 0;
353 n = (HASHBYTES_TO_USE - nextBIndex) < (bytes.length - nextByteToReturn) ? HASHBYTES_TO_USE
355 : bytes.length - nextByteToReturn;
357 System.arraycopy(nextBytes, nextBIndex, bytes, nextByteToReturn, n);
359 nextByteToReturn += n;
362 if (nextByteToReturn >= bytes.length) {
409 j = HASHBYTES_TO_USE < (bytes.length - nextByteToReturn) ? HASHBYTES_TO_USE
410 : bytes.length - nextByteToReturn;
413 System.arraycopy(nextBytes, 0, bytes, nextByteToReturn, j)
    [all...]

Completed in 385 milliseconds