Home
last modified time | relevance | path

Searched refs:getDecoder (Results 1 – 25 of 25) sorted by relevance

/frameworks/base/keystore/tests/src/android/security/keystore2/
DAndroidKeyStoreEdECPublicKeyTest.java68 this.encodedKeyBytes = Base64.getDecoder().decode(b64KeyBytes); in EdECTestVector()
107 final byte[] testVectorWithIncorrectOid = Base64.getDecoder().decode( in testFailedParsingOfKeysWithDifferentOid()
116 final byte[] testVectorWithIncorrectKeySize = Base64.getDecoder().decode( in testFailedParsingOfKeysWithWrongSize()
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/configupdate/
DTelephonyConfigUpdateInstallReceiverTest.java121 byte[] mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testPostInstall()
150 mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testPostInstall()
171 mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testPostInstall()
194 mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testPostInstall()
218 mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testPostInstall()
253 byte[] mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray); in testGetConfig()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
DTestData.java454 byte[] keyBytes = Base64.getDecoder().decode(INSECURE_PRIVATE_KEY_FOR_ENDPOINT1_BASE64); in getInsecurePrivateKeyForEndpoint1()
461 byte[] certPathBytes = Base64.getDecoder().decode(base64CertPath); in decodeCertPath()
/frameworks/base/services/core/java/com/android/server/signedconfig/
DSignatureVerifier.java64 byte[] key = Base64.getDecoder().decode(base64); in createKey()
98 signature = Base64.getDecoder().decode(base64Signature); in verifySignature()
DSignedConfigService.java94 config = new String(Base64.getDecoder().decode(config), StandardCharsets.UTF_8); in handlePackageBroadcast()
/frameworks/base/services/tests/RemoteProvisioningServiceTests/src/com/android/server/security/rkp/
DRemoteProvisioningShellCommandTest.java196 eq(Base64.getDecoder().decode(RemoteProvisioningShellCommand.EEK_ED25519_BASE64)), in csr_hwVersion1_withChallenge()
229 eq(Base64.getDecoder().decode(RemoteProvisioningShellCommand.EEK_P256_BASE64)), in csr_hwVersion2_withChallenge()
300 byte[] cert1Bytes = Base64.getDecoder().decode(cert1.replaceAll("\\s+", "")); in certify_sameOrderAsReceived()
301 byte[] cert2Bytes = Base64.getDecoder().decode(cert2.replaceAll("\\s+", "")); in certify_sameOrderAsReceived()
337 byte[] certBytes = Base64.getDecoder().decode(cert.replaceAll("\\s+", "")); in certify_noBlankLineBeforeTrailer()
/frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/
DTestData.java84 byte[] certPathBytes = Base64.getDecoder().decode(base64CertPath); in decodeCertPath()
/frameworks/base/services/core/java/com/android/server/security/rkp/
DRemoteProvisioningShellCommand.java172 challenge = Base64.getDecoder().decode(getNextArgRequired()); in csr()
210 return Base64.getDecoder().decode(EEK_ED25519_BASE64); in getEekChain()
212 return Base64.getDecoder().decode(EEK_P256_BASE64); in getEekChain()
/frameworks/base/core/java/android/security/keystore/recovery/
DX509CertificateParsingUtils.java51 return Base64.getDecoder().decode(string); in decodeBase64()
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/
DCertUtilsTest.java213 Base64.getDecoder().decode(SIGNATURE_BASE64), in verifyRsaSha256Signature_succeeds()
225 SIGNER_PUBLIC_KEY, Base64.getDecoder().decode(SIGNATURE_BASE64), in verifyRsaSha256Signature_throwsIfMismatchSignature()
239 Base64.getDecoder().decode(SIGNATURE_BASE64), in verifyRsaSha256Signature_throwsIfWrongKeyType()
DTestData.java287 byte[] bytes = Base64.getDecoder().decode(str); in decodeBase64Cert()
/frameworks/base/apex/blobstore/service/java/com/android/server/blob/
DBlobStoreManagerShellCommand.java153 args.digest = Base64.getDecoder().decode(getNextArgRequired()); in parseOptions()
/frameworks/base/packages/CarrierDefaultApp/src/com/android/carrierdefaultapp/
DSlicePurchaseActivity.java259 data = Base64.getDecoder().decode(split[1]); in startWebView()
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/satellite/
DSatelliteConfigParserTest.java76 private byte[] mBytesProtoBuffer = Base64.getDecoder().decode(mBase64StrForPBByteArray);
/frameworks/av/media/libmediaplayerservice/nuplayer/include/nuplayer/
DNuPlayer.h277 inline const sp<DecoderBase> &getDecoder(bool audio) { in getDecoder() function
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/certificate/
DCertUtils.java230 return Base64.getDecoder().decode(str); in decodeBase64()
/frameworks/base/services/core/java/com/android/server/pm/
DShortcutPackageInfo.java285 final byte[] decoded = Base64.getDecoder().decode(hash); in loadFromXml()
DPackageManagerShellCommand.java4037 signature = Base64.getDecoder().decode(fileDesc[3]); in processArgForStdin()
/frameworks/base/core/java/android/util/jar/
DStrictJarVerifier.java532 actual = java.util.Base64.getDecoder().decode(encodedActual); in verifyMessageDigest()
/frameworks/base/core/java/com/android/internal/os/
DZygoteConnection.java177 byte[] rawParcelData = Base64.getDecoder().decode(parsedArgs.mPreloadApp); in processCommand()
/frameworks/av/media/libmediaplayerservice/nuplayer/
DNuPlayer.cpp1214 getDecoder(audio)->initiateShutdown(); // In the middle of a seek. in onMessageReceived()
1776 getDecoder(audio)->initiateShutdown(); in handleFlushComplete()
2171 const sp<DecoderBase> &decoder = getDecoder(audio); in flushDecoder()
3162 const sp<DecoderBase> &videoDecoder = getDecoder(false/*audio*/); in onReleaseDrm()
3168 const sp<DecoderBase> &audioDecoder = getDecoder(true/*audio*/); in onReleaseDrm()
/frameworks/base/core/java/android/net/
DIkev2VpnProfile.java718 return Base64.getDecoder().decode(encoded); in decodeFromIpsecSecret()
/frameworks/libs/service_entitlement/java/com/android/libraries/entitlement/
DTs43Operation.java977 activationCode = new String(Base64.getDecoder().decode(activationCode)); in parseDownloadInfo()
/frameworks/base/tools/aapt2/integration-tests/CommandTests/
Dandroid-33.jarAndroidManifest.xml META-INF/ META-INF/MANIFEST.MF NOTICES/ NOTICES/libcore ...
/frameworks/base/config/
Dboot-image-profile.txt27387 HSPLjava/util/Base64;->getDecoder()Ljava/util/Base64$Decoder;