/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
D | WapPushCacheTest.java | 50 byte[] location = "content://mms".getBytes(); in testGetWapMessageSize() 51 byte[] transactionId = "123".getBytes(); in testGetWapMessageSize() 62 byte[] location = "content://mms".getBytes(); in testGetWapMessageSize_withTransactionIdAppended() 63 byte[] transactionId = "123".getBytes(); in testGetWapMessageSize_withTransactionIdAppended() 77 WapPushCache.getWapMessageSize("content://mms".getBytes()) in testGetWapMessageSize_nonexistentThrows() 90 byte[] location = "content://mms".getBytes(); in testPutWapMessageSize_invalidValuePreventsInsert() 91 byte[] transactionId = "123".getBytes(); in testPutWapMessageSize_invalidValuePreventsInsert() 102 byte[] location = ("" + i).getBytes(); in testPutWapMessageSize_sizeLimitExceeded_oldestEntryRemoved() 103 byte[] transactionId = "abc".getBytes(); in testPutWapMessageSize_sizeLimitExceeded_oldestEntryRemoved() 110 assertEquals(expectedSize, WapPushCache.getWapMessageSize("250".getBytes())); in testPutWapMessageSize_sizeLimitExceeded_oldestEntryRemoved() [all …]
|
/frameworks/base/core/tests/coretests/src/com/android/internal/widget/ |
D | LockscreenCredentialTest.java | 59 assertArrayEquals("3456".getBytes(), pin.getCredential()); in testPinCredential() 74 assertArrayEquals("password".getBytes(), password.getCredential()); in testPasswordCredential() 95 assertArrayEquals("12369".getBytes(), pattern.getCredential()); in testPatternCredential() 152 assertArrayEquals(equivalentAsciiPasswords[i].getBytes(), credential.getCredential()); in testPasswordWithInvalidChars() 274 credential.passwordToHistoryHash(salt.getBytes(), hashFactor.getBytes())) in testPasswordToHistoryHash() 278 password.getBytes(), salt.getBytes(), hashFactor.getBytes())) in testPasswordToHistoryHash() 290 credential.passwordToHistoryHash(/* salt= */ null, hashFactor.getBytes())) in testPasswordToHistoryHashInvalidInput() 294 password.getBytes(), /* salt= */ null, hashFactor.getBytes())) in testPasswordToHistoryHashInvalidInput() 298 credential.passwordToHistoryHash(salt.getBytes(), /* hashFactor= */ null)) in testPasswordToHistoryHashInvalidInput() 302 password.getBytes(), salt.getBytes(), /* hashFactor= */ null)) in testPasswordToHistoryHashInvalidInput() [all …]
|
/frameworks/base/services/core/jni/stats/ |
D | SurfaceFlingerPuller.cpp | 36 optional<BytesField> getBytes(const google::protobuf::MessageLite& proto, std::string& data) { in getBytes() function 82 optional<BytesField> frameDuration = getBytes(atom.frame_duration(), frameDurationStr); in parseGlobalInfoPull() 84 getBytes(atom.render_engine_timing(), renderEngineTimeStr); in parseGlobalInfoPull() 86 getBytes(atom.sf_deadline_misses(), deadlineMissesStr); in parseGlobalInfoPull() 88 getBytes(atom.sf_prediction_errors(), predictionErrorsStr); in parseGlobalInfoPull() 128 getBytes(atom.present_to_present(), present2PresentStr); in parseLayerInfoPull() 130 getBytes(atom.present_to_present_delta(), present2PresentDeltaStr); in parseLayerInfoPull() 131 optional<BytesField> post2present = getBytes(atom.post_to_present(), post2presentStr); in parseLayerInfoPull() 133 getBytes(atom.acquire_to_present(), acquire2PresentStr); in parseLayerInfoPull() 134 optional<BytesField> latch2Present = getBytes(atom.latch_to_present(), latch2PresentStr); in parseLayerInfoPull() [all …]
|
/frameworks/base/tools/powermodel/test/com/android/powermodel/ |
D | CsvParserTest.java | 64 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEmpty() 76 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testOnlyNewline() 88 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testTwoLines() 103 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedEmpty() 116 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedText() 129 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedQuotes() 142 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedCommas() 155 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedQuotesAndCommas() 168 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testNoNewline() 181 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testNoNewlineWithCommas() [all …]
|
/frameworks/base/core/tests/coretests/src/android/app/ |
D | KeyguardManagerTest.java | 134 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_validPassword() 138 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_validPassword() 151 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_invalidPassword() 155 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_invalidPassword() 169 PASSWORD.getBytes(), in setLock_setInitialLockPermissionDenied() 182 byte[] validPin = "1234".getBytes(); in setLock_validatesCredential() 197 PASSWORD.getBytes(), in checkLock_correctCredentials() 200 PASSWORD.getBytes(), in checkLock_correctCredentials() 204 PASSWORD.getBytes()); in checkLock_correctCredentials() 216 PASSWORD.getBytes(), in checkLock_incorrectCredentials() [all …]
|
/frameworks/base/core/tests/coretests/src/android/os/ |
D | FileBridgeTest.java | 110 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteNoSync() 112 assertContents("meow".getBytes(StandardCharsets.UTF_8)); in testWriteNoSync() 118 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSync() 121 assertContents("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSync() 127 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 129 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 131 assertContents("meowcake".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 145 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose() 148 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose() 152 assertContents("meow".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/integrity/parser/ |
D | BinaryFileOperationsTest.java | 24 import static com.android.server.integrity.utils.TestUtils.getBytes; 52 getBytes( in testGetStringValue() 66 getBytes( in testGetHashedStringValue() 76 APP_CERTIFICATE.getBytes(StandardCharsets.UTF_8))); in testGetHashedStringValue() 81 byte[] ruleBytes = getBytes(getValueBits(PACKAGE_NAME)); in testGetStringValue_withSizeAndHashingInfo() 93 byte[] ruleBytes = getBytes(getBits(randomValue, /* numOfBits= */ 32)); in testGetIntValue() 102 byte[] ruleBytes = getBytes(booleanValue); in testGetBooleanValue_true() 111 byte[] ruleBytes = getBytes(booleanValue); in testGetBooleanValue_false()
|
D | RuleBinaryParserTest.java | 31 import static com.android.server.integrity.utils.TestUtils.getBytes; 97 getBytes(getBits(DEFAULT_FORMAT_VERSION, FORMAT_VERSION_BITS)); 117 byte[] ruleBytes = getBytes(ruleBits); in testBinaryStream_validCompoundFormula_noIndexing() 156 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_notConnector_noIndexing() 201 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_andConnector_noIndexing() 249 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_orConnector_noIndexing() 288 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_stringValue_noIndexing() 320 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_hashedValue_noIndexing() 332 appCertificate.getBytes(StandardCharsets.UTF_8)), in testBinaryString_validAtomicFormula_hashedValue_noIndexing() 354 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormulaWithCertificateLineage() [all …]
|
/frameworks/base/core/tests/coretests/src/com/android/internal/os/ |
D | ProcTimeInStateReaderTest.java | 63 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testSimple() 80 Files.write(initialTimeInStateFile, "header1\n1 2\nheader2:\n3 4\n5 6\n7 8\n".getBytes()); in testHeaderFormat() 96 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testDifferentFile() 100 Files.write(timeInStateFile, "1 20\n3 40\n5 60\n7 80\n".getBytes()); in testDifferentFile() 110 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testWrongLength() 114 Files.write(timeInStateFile, "1 2\n3 4\n5 6\n".getBytes()); in testWrongLength() 121 Files.write(initialTimeInStateFile, "".getBytes()); in testEmptyInitialFails()
|
/frameworks/opt/telephony/tests/telephonytests/src/android/telephony/ims/ |
D | RcsConfigTest.java | 189 RcsConfig.updateConfigForSub(mContext, FAKE_SUB_ID, TEST_RCS_CONFIG.getBytes(), false); in testLoadAndUpdateConfigForSub() 191 assertTrue(Arrays.equals(updatedData, TEST_RCS_CONFIG.getBytes())); in testLoadAndUpdateConfigForSub() 201 byte[] compressedData = RcsConfig.compressGzip(TEST_RCS_CONFIG.getBytes()); in testCompressAndDecompress() 202 assertFalse(Arrays.equals(compressedData, TEST_RCS_CONFIG.getBytes())); in testCompressAndDecompress() 204 assertTrue(Arrays.equals(decompressedData, TEST_RCS_CONFIG.getBytes())); in testCompressAndDecompress() 215 RcsConfig config = new RcsConfig(TEST_RCS_CONFIG.getBytes()); in testParseConfig() 226 RcsConfig config = new RcsConfig(TEST_RCS_CONFIG.getBytes()); in testGetCharacteristic() 240 RcsConfig config = new RcsConfig(TEST_RCS_CONFIG.getBytes()); in testSetAndMoveCharacteristic() 264 RcsConfig config = new RcsConfig(TEST_RCS_CONFIG.getBytes()); in testGetDuplicateParmInDifferentCharacteristics() 287 RcsConfig config = new RcsConfig(xml.getBytes()); in testIsRcsVolteSingleRegistrationSupported()
|
/frameworks/base/packages/SettingsLib/tests/robotests/src/com/android/settingslib/bluetooth/ |
D | BluetoothUtilsTest.java | 135 BluetoothDevice.METADATA_IS_UNTETHERED_HEADSET)).thenReturn("false".getBytes()); in getBtRainbowDrawableWithDescription_normalHeadset_returnAdaptiveIcon() 148 STRING_METADATA.getBytes()); in getStringMetaData_hasMetaData_getCorrectMetaData() 158 INT_METADATA.getBytes()); in getIntMetaData_hasMetaData_getCorrectMetaData() 179 BOOL_METADATA.getBytes()); in getBooleanMetaData_hasMetaData_getCorrectMetaData() 189 STRING_METADATA.getBytes()); in getUriMetaData_hasMetaData_getCorrectMetaData() 207 CONTROL_METADATA.getBytes()); in getControlUriMetaData_hasMetaData_returnsCorrectMetaData() 217 BOOL_METADATA.getBytes()); in isAdvancedDetailsHeader_untetheredHeadset_returnTrue() 226 BluetoothDevice.DEVICE_TYPE_UNTETHERED_HEADSET.getBytes()); in isAdvancedDetailsHeader_deviceTypeUntetheredHeadset_returnTrue() 235 BluetoothDevice.DEVICE_TYPE_WATCH.getBytes()); in isAdvancedDetailsHeader_deviceTypeWatch_returnTrue() 244 BluetoothDevice.DEVICE_TYPE_STYLUS.getBytes()); in isAdvancedDetailsHeader_deviceTypeStylus_returnTrue() [all …]
|
/frameworks/base/libs/securebox/tests/src/com/android/security/ |
D | SecureBoxTest.java | 72 private static final byte[] VAULT_CHALLENGE = getBytes("Not a real vault challenge"); 73 private static final byte[] THM_KF_HASH = getBytes("12345678901234567890123456789012"); 97 private static final byte[] KEY_CLAIMANT = getBytes("asdfasdfasdfasdf"); 126 private static final byte[] TEST_SHARED_SECRET = getBytes("TEST_SHARED_SECRET"); 127 private static final byte[] TEST_HEADER = getBytes("TEST_HEADER"); 128 private static final byte[] TEST_PAYLOAD = getBytes("TEST_PAYLOAD"); 181 ArrayUtils.concat(getBytes("V1 KF_claim"), VAULT_PARAMS, VAULT_CHALLENGE), in decryptRecoveryClaim() 191 ArrayUtils.concat(getBytes("V1 THM_encrypted_recovery_key"), VAULT_PARAMS), in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag() 361 private static byte[] getBytes(String str) { in getBytes() method in SecureBoxTest 362 return str.getBytes(StandardCharsets.UTF_8); in getBytes()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
D | CertPinInstallReceiverTest.java | 131 byte[] encoded = content.getBytes(); in getCurrentHash() 142 byte[] derKey = Base64.decode(TEST_KEY.getBytes(), Base64.DEFAULT); in createKey() 149 byte[] derCert = Base64.decode(TEST_CERT.getBytes(), Base64.DEFAULT); in createCertificate() 157 fw.write(content.getBytes(), 0, content.length()); in makeTemporaryContentFile() 166 signer.update(content.trim().getBytes()); in createSignature() 167 signer.update(version.trim().getBytes()); in createSignature() 168 signer.update(requiredHash.getBytes()); in createSignature() 179 signer.update(content.trim().getBytes()); in verifySignature() 180 signer.update(version.trim().getBytes()); in verifySignature() 181 signer.update(requiredPrevious.trim().getBytes()); in verifySignature() [all …]
|
/frameworks/base/services/tests/wmtests/src/com/android/server/wm/ |
D | WindowTracingTest.java | 164 "TEST_WHERE".getBytes(StandardCharsets.UTF_8))); in tracing_endsUpInFile() 166 "TEST_WM_PROTO".getBytes(StandardCharsets.UTF_8))); in tracing_endsUpInFile() 188 byte[] haystack = "hello_world".getBytes(StandardCharsets.UTF_8); in test_containsBytes() 190 "hello".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 192 "world".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 194 "world".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 196 "world_".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 198 "absent".getBytes(StandardCharsets.UTF_8))); in test_containsBytes()
|
/frameworks/base/core/java/com/android/internal/util/ |
D | TraceBuffer.java | 69 byte[] getBytes(P proto); in getBytes() method 89 public byte[] getBytes(ProtoOutputStream proto) { in getBytes() method in TraceBuffer.ProtoOutputStreamProvider 90 return proto.getBytes(); in getBytes() 96 os.write(encapsulatingProto.getBytes()); in write() 98 byte[] protoBytes = protoOutputStream.getBytes(); in write() 156 .anyMatch(p -> Arrays.equals(mProtoProvider.getBytes(p), other)); in contains()
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/data/ |
D | TrafficDescriptorTest.java | 38 byte[] rawBytes = osAppId.getBytes(); in testEnterpriseOsAppId() 51 byte[] rawBytes = osAppId.getBytes(); in testUrllcOsAppId() 63 byte[] rawBytes = osAppId.getBytes(); in testEmbbOsAppId() 80 .setOsAppId(osAppId.getBytes()) in testInvalidOsId() 91 .setOsAppId(osAppId.getBytes()) in testInvalidAppId()
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
D | EnterpriseSpecificIdCalculator.java | 141 final byte[] serialNumber = getPaddedSerialNumber().getBytes(); in calculateEnterpriseId() 142 final byte[] imei = getPaddedImei().getBytes(); in calculateEnterpriseId() 143 final byte[] meid = getPaddedMeid().getBytes(); in calculateEnterpriseId() 144 final byte[] macAddress = mMacAddress.getBytes(); in calculateEnterpriseId() 153 final byte[] dpcPackage = getPaddedProfileOwnerName(profileOwnerPackage).getBytes(); in calculateEnterpriseId() 154 final byte[] enterpriseId = getPaddedEnterpriseId(enterpriseIdString).getBytes(); in calculateEnterpriseId()
|
/frameworks/base/services/tests/powerstatstests/src/com/android/server/power/stats/ |
D | KernelWakelockReaderTest.java | 68 public byte[] getBytes() throws Exception { in getBytes() method in KernelWakelockReaderTest.ProcFileBuilder 70 byte[] data = mStringBuilder.toString().getBytes(Charset.forName("UTF-8")); in getBytes() 136 byte[] buffer = new ProcFileBuilder().getBytes(); in testOnlyHeader() 149 .getBytes(); in testOneWakelock() 170 .getBytes(); in testTwoWakelocks() 187 .getBytes(); in testDuplicateWakelocksAccumulate() 207 .getBytes(); in testWakelocksBecomeStale() 216 .getBytes(); in testWakelocksBecomeStale() 329 .getBytes(); in testAggregateStatsNoNativeWakelocks() 370 .getBytes(); in testAggregateStatsBothKernelAndNativeWakelocks() [all …]
|
/frameworks/base/services/tests/servicestests/src/com/android/server/utils/ |
D | TraceBufferTest.java | 97 byte[] toWrite1Bytes = toWrite1.getBytes(); in test_addItemMustOverwriteOne() 102 byte[] toWrite2Bytes = toWrite2.getBytes(); in test_addItemMustOverwriteOne() 109 byte[] toWrite3Bytes = toWrite3.getBytes(); in test_addItemMustOverwriteOne() 137 byte[] toWriteSmall1Bytes = toWriteSmall1.getBytes(); in test_addItemMustOverwriteMultiple() 142 byte[] toWriteSmall2Bytes = toWriteSmall2.getBytes(); in test_addItemMustOverwriteMultiple() 149 byte[] toWriteBigBytes = toWriteBig.getBytes(); in test_addItemMustOverwriteMultiple()
|
/frameworks/base/core/java/com/android/internal/inputmethod/ |
D | InputConnectionProtoDumper.java | 70 return proto.getBytes(); in buildGetTextAfterCursorProto() 93 return proto.getBytes(); in buildGetTextBeforeCursorProto() 115 return proto.getBytes(); in buildGetSelectedTextProto() 152 return proto.getBytes(); in buildGetSurroundingTextProto() 172 return proto.getBytes(); in buildGetCursorCapsModeProto() 204 return proto.getBytes(); in buildGetExtractedTextProto()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
D | KeySyncTaskTest.java | 100 "mdata".getBytes(StandardCharsets.UTF_8); 105 "V1 THM_encrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 145 TEST_CREDENTIAL.getBytes(), in setUp() 173 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials.getBytes()), in hashCredentialsBySaltedSha256_returnsSameHashForSameCredentialsAndSalt() 174 KeySyncTask.hashCredentialsBySaltedSha256(salt, credentials.getBytes())); in hashCredentialsBySaltedSha256_returnsSameHashForSameCredentialsAndSalt() 183 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password1234".getBytes()), in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentCredentials() 184 KeySyncTask.hashCredentialsBySaltedSha256(salt, "password12345".getBytes()))); in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentCredentials() 194 credentials.getBytes()), in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentSalt() 196 credentials.getBytes()))); in hashCredentialsBySaltedSha256_returnsDifferentHashForDifferentSalt() 204 "4567".getBytes()), in hashCredentialsBySaltedSha256_returnsDifferentHashEvenIfConcatIsSame() [all …]
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/ |
D | CertUtilsTest.java | 124 assertThat(CertUtils.decodeBase64("VEVTVA==")).isEqualTo("TEST".getBytes(UTF_8)); in decodeBase64_succeeds() 139 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlRootNode_succeeds() 150 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_singleLevel_succeeds() 157 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_multipleLevels_succeeds() 164 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistFalse_succeedsIfNotExist() 173 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistAtLeastOne_throwsIfNotExist() 186 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistExactlyOne_throwsIfNotExist() 199 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistExactlyOne_throwsIfMultipleExist() 214 SIGNED_STR.getBytes(UTF_8)); in verifyRsaSha256Signature_succeeds() 219 byte[] modifiedBytes = SIGNED_STR.getBytes(UTF_8); in verifyRsaSha256Signature_throwsIfMismatchSignature() [all …]
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
D | WeakEscrowTokenTests.java | 62 final byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenActivatedImmediatelyIfNoUserPassword() 75 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenActivatedLaterWithUserPassword() 96 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokensRemovedIfCredentialChanged() 125 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenRemovedListenerRegistered() 140 byte[] token0 = "some-high-entropy-secure-token-0".getBytes(); in testWeakTokenRemovedListenerUnregistered() 141 byte[] token1 = "some-high-entropy-secure-token-1".getBytes(); in testWeakTokenRemovedListenerUnregistered() 160 byte[] token = "some-high-entropy-secure-token".getBytes(); in testUnlockUserWithToken_weakEscrowToken()
|
/frameworks/base/services/robotests/backup/src/com/android/server/backup/keyvalue/ |
D | KeyValueBackupTaskTest.java | 349 Files.write(getStateFile(mTransport, PM_PACKAGE), "pmState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 350 Files.write(getStateFile(mTransport, PACKAGE_1), "packageState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 355 .isEqualTo("pmState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 357 .isEqualTo("packageState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 475 Files.write(getStateFile(mTransport, PACKAGE_1), "oldState".getBytes()); in testRunTask_whenPackageWithOldStateAndIncremental_passesOldStateToAgent() 479 assertThat(agentMock.oldState).isEqualTo("oldState".getBytes()); in testRunTask_whenPackageWithOldStateAndIncremental_passesOldStateToAgent() 488 Files.write(getStateFile(mTransport, PACKAGE_1), "oldState".getBytes()); in testRunTask_whenPackageWithOldStateAndNonIncremental_passesEmptyOldStateToAgent() 546 Files.write(getStateFile(mTransport, PACKAGE_2), "package2State".getBytes()); in testRunTask_whenOnePackageAndNoPmState_initializesTransportAndResetsState() 565 Files.write(getStateFile(mTransport, PACKAGE_2), "package2State".getBytes()); in testRunTask_whenOnePackageAndWithPmState_doesNotInitializeTransportOrResetState() 571 .isEqualTo("package2State".getBytes()); in testRunTask_whenOnePackageAndWithPmState_doesNotInitializeTransportOrResetState() [all …]
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
D | KeySyncUtils.java | 56 "V1 THM_encrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 58 "V1 locally_encrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 60 "V1 encrypted_application_key".getBytes(StandardCharsets.UTF_8); 62 "V1 KF_claim".getBytes(StandardCharsets.UTF_8); 64 "V1 reencrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 66 private static final byte[] THM_KF_HASH_PREFIX = "THM_KF_hash".getBytes(StandardCharsets.UTF_8);
|