Searched refs:inStream (Results 1 – 8 of 8) sorted by relevance
/cts/tests/tests/gesture/src/android/gesture/cts/ |
D | GestureStoreTest.java | 141 ByteArrayInputStream inStream = null; in testSaveLoadOutputStream() local 149 inStream = new ByteArrayInputStream(outStream.toByteArray()); in testSaveLoadOutputStream() 151 loadStore.load(inStream); in testSaveLoadOutputStream() 159 if (inStream != null) { in testSaveLoadOutputStream() 160 inStream.close(); in testSaveLoadOutputStream()
|
/cts/tests/tests/security/src/android/security/cts/ |
D | BitmapFactoryDecodeStreamTest.java | 42 …InputStream inStream = new BufferedInputStream(getInstrumentation().getContext().getResources().op… in testNinePatchHeapOverflow() local 44 BitmapFactory.decodeStream(inStream); in testNinePatchHeapOverflow()
|
/cts/tools/release-parser/src/com/android/cts/releaseparser/ |
D | TestSuiteTradefedParser.java | 156 InputStream inStream = zip.getInputStream(entry); in parseFile() local 157 InputStreamReader isReader = new InputStreamReader(inStream, "UTF-8"); in parseFile() 180 inStream.close(); in parseFile()
|
D | ClassUtils.java | 134 InputStream inStream = openResourceAsStream(clazz, fileName); in getResrouceContentString() local 139 new BufferedReader(new InputStreamReader(inStream, Charset.forName("UTF-8")))) { in getResrouceContentString()
|
/cts/hostsidetests/securitybulletin/test-apps/CVE-2020-0015/src/android/security/cts/CVE_2020_0015/ |
D | DeviceTest.java | 70 InputStream inStream = context.getResources().openRawResource(R.raw.cacert); in startVulnerableActivity() local 71 assumeTrue(context.getString(R.string.rawResOpenError, "cacert"), inStream != null); in startVulnerableActivity() 75 int nRead = inStream.read(data, 0, data.length); in startVulnerableActivity()
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/audio/peripheralprofile/ |
D | ProfileManager.java | 148 public boolean loadProfiles(InputStream inStream) { in loadProfiles() argument 155 xr.parse(new InputSource(inStream)); in loadProfiles()
|
/cts/hostsidetests/securitybulletin/test-apps/CVE-2021-0963/src/android/security/cts/CVE_2021_0963/ |
D | DeviceTest.java | 68 try (InputStream inStream = mResources.openRawResource(resId); in getByteArrayFromRawRes() argument 70 assumeTrue(mContext.getString(R.string.rawResOpenError, resName), inStream != null); in getByteArrayFromRawRes() 72 int nRead = inStream.read(byteArray, 0, byteArray.length); in getByteArrayFromRawRes()
|
/cts/tests/tests/telephony/current/src/android/telephony/cts/ |
D | TelephonyManagerTest.java | 3906 InputStream inStream = new ByteArrayInputStream(IMSI_CERT_STRING_WLAN.getBytes()); in testGetCarrierInfoForImsiEncryption() local 3908 X509Certificate cert = (X509Certificate) cf.generateCertificate(inStream); in testGetCarrierInfoForImsiEncryption() 3911 inStream = new ByteArrayInputStream(IMSI_CERT_STRING_EPDG.getBytes()); in testGetCarrierInfoForImsiEncryption() 3912 cert = (X509Certificate) cf.generateCertificate(inStream); in testGetCarrierInfoForImsiEncryption()
|