OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:nextByteToReturn
(Results
1 - 2
of
2
) sorted by null
/development/samples/BrokenKeyDerivation/src/com/example/android/brokenkeyderivation/
InsecureSHA1PRNGKeyDerivator.java
283
int
nextByteToReturn
; // index of ready bytes in "bytes" array
345
nextByteToReturn
= 0;
348
n = (HASHBYTES_TO_USE - nextBIndex) < (bytes.length -
nextByteToReturn
) ? HASHBYTES_TO_USE
350
: bytes.length -
nextByteToReturn
;
352
System.arraycopy(nextBytes, nextBIndex, bytes,
nextByteToReturn
, n);
354
nextByteToReturn
+= n;
357
if (
nextByteToReturn
>= bytes.length) {
404
j = HASHBYTES_TO_USE < (bytes.length -
nextByteToReturn
) ? HASHBYTES_TO_USE
405
: bytes.length -
nextByteToReturn
;
408
System.arraycopy(nextBytes, 0, bytes,
nextByteToReturn
, j)
[
all
...]
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1PRNG_SecureRandomImpl.java
286
int
nextByteToReturn
; // index of ready bytes in "bytes" array
350
nextByteToReturn
= 0;
353
n = (HASHBYTES_TO_USE - nextBIndex) < (bytes.length -
nextByteToReturn
) ? HASHBYTES_TO_USE
355
: bytes.length -
nextByteToReturn
;
357
System.arraycopy(nextBytes, nextBIndex, bytes,
nextByteToReturn
, n);
359
nextByteToReturn
+= n;
362
if (
nextByteToReturn
>= bytes.length) {
409
j = HASHBYTES_TO_USE < (bytes.length -
nextByteToReturn
) ? HASHBYTES_TO_USE
410
: bytes.length -
nextByteToReturn
;
413
System.arraycopy(nextBytes, 0, bytes,
nextByteToReturn
, j)
[
all
...]
Completed in 385 milliseconds