Home
last modified time | relevance | path

Searched refs:decode (Results 1 – 25 of 366) sorted by relevance

12345678910>>...15

/packages/modules/NetworkStack/tests/unit/src/android/net/dhcp6/
DDhcp6PacketTest.kt45 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket()
64 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_incorrectOptionLength()
83 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_lastTruncatedOption()
102 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_middleTruncatedOption()
122 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6AdvertisePacket()
145 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_unsupportedOption()
173 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6ReplyPacket()
203 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testGetMinimalPreferredValidLifetime()
231 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testStatusCodeOptionWithStatusMessage()
259 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testStatusCodeOptionWithoutStatusMessage()
[all …]
/packages/modules/AdServices/adservices/tests/unittest/service-core/src/jni/java/com/android/adservices/ohttp/
DObliviousHttpKeyConfigTest.java48 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_configuresKeyCorrectly()
64 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_emptyKeyConfig_throwsError()
74 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongKemIdLength_throwsError()
84 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_unsupportedKemId_throwsError()
95 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongPublicKeyLength_throwsError()
106 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongAlgorithmsLength_throwsError()
118 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_incompleteAlgorithmsList_throwsError()
130 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in serializeOhttpPayloadHeader_returnsCorrectHeader()
146 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in createRecipientKeyInfoBytes_returnsCorrectInfo()
163 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in createRecipientKeyInfoBytes_returnsCorrectInfo_withServerAuctionMediaTypeChange()
[all …]
DOhttpJniWrapperTest.java89 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_returnsCorrectSharedSecret()
111 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_returnsCorrectSharedSecret_withServerAuctionMediaTypeChange()
131 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_returnsCorrectResponse()
169 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_returnsCorrectResponse_withServerAuctionMediaTypeChange()
206 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_emptyPlainText_returnsNullCipherText()
240 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_emptyPlainText_returnsNullCipherText_withServerAuctionMediaTypeChange()
273 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_nullContext_throwsException()
299 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_nullContext_throwsException_withServerAuctionMediaChange()
374 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(serverPublicKey); in hpkeCtxSetupSenderWithSeed_invalidPublicKey_returnsNullArray()
395 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(serverPublicKey); in hpkeCtxSetupSenderWithSeed_invalidPublicKey_returnsNullArray_withServerAuctionMedia()
[all …]
DObliviousHttpClientTest.java54 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_unsupportedAlgorithms_throwsError()
177 BaseEncoding.base16().lowerCase().decode(testVector.responseCipherText), in decryptObliviousHttpResponse_testAllTestVectors()
204 BaseEncoding.base16().lowerCase().decode(testVector.responseCipherText), in decryptObliviousHttpResponse_testAllTestVectors_withServerAuctionMediaTypeChange()
221 BaseEncoding.base16().lowerCase().decode(keyConfigString)); in decryptObliviousHttpResponse_withAuctionResult()
242 BaseEncoding.base16().lowerCase().decode(cipherText), in decryptObliviousHttpResponse_withAuctionResult()
265 BaseEncoding.base16().lowerCase().decode(keyConfigString)); in decryptObliviousHttpResponse_withAuctionResult_withServerAuctionMediaTypeChange()
287 BaseEncoding.base16().lowerCase().decode(cipherText), in decryptObliviousHttpResponse_withAuctionResult_withServerAuctionMediaTypeChange()
/packages/modules/Wifi/framework/tests/src/android/net/wifi/util/
DHexEncodingTest.java19 import static android.net.wifi.util.HexEncoding.decode;
71 assertArraysEqual(bytes, decode(encode(bytes), false /* allowSingleChar */)); in testEncodeBytes()
75 decode(encodedLower.toCharArray(), false /* allowSingleChar */)); in testEncodeBytes()
80 assertArraysEqual(new byte[]{6}, decode("6".toCharArray(), true)); in testDecode_allow4Bit()
81 assertArraysEqual(new byte[]{6, 0x76}, decode("676".toCharArray(), true)); in testDecode_allow4Bit()
86 decode("676".toCharArray(), false /* allowSingleChar */); in testDecode_disallow4Bit()
94 decode("DEADBARD".toCharArray(), false /* allowSingleChar */); in testDecode_invalid()
103 decode("६१٧٥٥F6361646F73".toCharArray(), false /* allowSingleChar */); in testDecode_invalid()
109 decode("#%6361646F73".toCharArray(), false /* allowSingleChar */); in testDecode_invalid()
/packages/services/Car/tools/telemetry/lua-interpreter/tests/
Dapp_test.py45 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
58 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
74 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
87 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
103 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
116 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
128 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
140 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
152 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
/packages/modules/Wifi/framework/java/android/net/wifi/util/
DHexEncoding.java107 public static byte[] decode(String encoded) throws IllegalArgumentException { in decode() method in HexEncoding
108 return decode(encoded.toCharArray()); in decode()
118 public static byte[] decode(String encoded, boolean allowSingleChar) in decode() method in HexEncoding
120 return decode(encoded.toCharArray(), allowSingleChar); in decode()
129 public static byte[] decode(char[] encoded) throws IllegalArgumentException { in decode() method in HexEncoding
130 return decode(encoded, false); in decode()
140 public static byte[] decode(char[] encoded, boolean allowSingleChar) in decode() method in HexEncoding
/packages/modules/Virtualization/authfs/src/fsverity/
Deditor.rs376 hex::decode("3d248ca542a24fc62d1c43b916eae5016878e2533c88238480b26128a1f1af95")? in test_verified_writer_no_write()
389 hex::decode("cd0875ca59c7d37e962c5e8f5acd3770750ac80225e2df652ce5672fd34500af")? in test_verified_writer_from_zero()
398 hex::decode("2901b849fda2d91e3929524561c4a47e77bb64734319759507b2029f18b9cc52")? in test_verified_writer_from_zero()
407 hex::decode("7545409b556071554d18973a29b96409588c7cda4edd00d5586b27a11e1a523b")? in test_verified_writer_from_zero()
420 hex::decode("a23fc5130d3d7b3323fc4b4a5e79d5d3e9ddf3a3f5872639e867713512c6702f")? in test_verified_writer_unaligned()
429 hex::decode("d16d4c1c186d757e646f76208b21254f50d7f07ea07b1505ff48b2a6f603f989")? in test_verified_writer_unaligned()
442 hex::decode("4df2aefd8c2a9101d1d8770dca3ede418232eabce766bb8e020395eae2e97103")? in test_verified_writer_with_hole()
451 hex::decode("47d5da26f6934484e260630a69eb2eebb21b48f69bc8fbf8486d1694b7dba94f")? in test_verified_writer_with_hole()
460 hex::decode("8bd118821fb4aff26bb4b51d485cc481a093c68131b7f4f112e9546198449752")? in test_verified_writer_with_hole()
473 hex::decode("4c433d8640c888b629dc673d318cbb8d93b1eebcc784d9353e07f09f0dcfe707")? in test_verified_writer_various_writes()
[all …]
Dbuilder.rs162 hex::decode("3d248ca542a24fc62d1c43b916eae5016878e2533c88238480b26128a1f1af95")?, in merkle_tree_empty_file()
172 hex::decode("cd0875ca59c7d37e962c5e8f5acd3770750ac80225e2df652ce5672fd34500af")?, in merkle_tree_file_size_less_than_or_equal_to_4k()
183 hex::decode("2901b849fda2d91e3929524561c4a47e77bb64734319759507b2029f18b9cc52")?, in merkle_tree_more_sizes()
188 hex::decode("2a476d58eb80394052a3a783111e1458ac3ecf68a7878183fed86ca0ff47ec0d")?, in merkle_tree_more_sizes()
194 hex::decode("26b7c190a34e19f420808ee7ec233b09fa6c34543b5a9d2950530114c205d14f")?, in merkle_tree_more_sizes()
200 hex::decode("316835d9be1c95b5cd55d07ae7965d651689efad186e26cbf680e40b683a3262")?, in merkle_tree_more_sizes()
218 hex::decode("7d3c0d2e1dc54230b20ed875f5f3a4bd3f9873df601936b3ca8127d4db3548f3")?, in merkle_tree_non_sequential()
/packages/modules/Uwb/service/tests/src/com/android/server/uwb/util/
DHexTest.java74 assertArrayEquals(mBytes, Hex.decode(mLower)); in testDecodeLower()
79 assertArrayEquals(mBytes, Hex.decode(mUpper)); in testDecodeUpper()
84 assertArrayEquals(new byte[0], Hex.decode("")); in testDecodeEmptyString()
89 assertThat(Hex.decode("fff")) in testDecodeOddLength()
95 Hex.decode("g0"); in testDecodeIllegalHighNibble()
100 Hex.decode("0g"); in testDecodeIllegalLowNibble()
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/
DEapMessageTest.java70 EapMessage result = EapMessage.decode(EAP_SUCCESS_PACKET); in testDecode()
78 result = EapMessage.decode(EAP_REQUEST_SIM_START_PACKET); in testDecode()
88 EapMessage.decode(INVALID_CODE_PACKET); in testDecodeInvalidCode()
97 EapMessage.decode(INCOMPLETE_HEADER_PACKET); in testDecodeIncompleteHeader()
106 EapMessage.decode(SHORT_PACKET); in testDecodeShortPacket()
115 EapMessage.decode(LONG_SUCCESS_PACKET); in testDecodeSuccessIncorrectLength()
124 EapMessage.decode(REQUEST_MISSING_TYPE_PACKET); in testDecodeMissingTypeData()
133 EapMessage.decode(REQUEST_UNSUPPORTED_TYPE_PACKET); in testDecodeUnsupportedEapType()
155 EapMessage result = EapMessage.decode(eapMessage.encode()); in testEncodeDecode()
165 byte[] result = EapMessage.decode(EAP_REQUEST_SIM_START_PACKET).encode(); in testDecodeEncode()
[all …]
/packages/modules/Connectivity/staticlibs/tests/unit/src/com/android/net/module/util/
DDomainUtilsTest.java179 ByteBuffer buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames()
180 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames()
188 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames()
189 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames()
197 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames()
198 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames()
206 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames()
207 suffixStringList = DomainUtils.decode(buffer, true /* compression */); in testDecodeDomainNames()
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/statemachine/
DEapAkaIdentityStateTest.java75 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIdentityRequest()
81 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIdentityRequest()
93 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessWithoutIdentityRequestAttributes()
98 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessWithoutIdentityRequestAttributes()
112 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMultipleIdentityRequestAttributes()
117 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMultipleIdentityRequestAttributes()
129 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessImsiUnavailable()
135 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessImsiUnavailable()
153 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessTransitionToChallengeState()
160 verify(mMockEapAkaTypeDataDecoder, times(2)).decode(DUMMY_EAP_TYPE_DATA); in testProcessTransitionToChallengeState()
DEapAkaPrimeChallengeStateTest.java120 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapIdentity()
128 verify(mMockTypeDataDecoder, times(2)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapIdentity()
142 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity()
149 verify(mMockTypeDataDecoder, times(2)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity()
155 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity()
163 verify(mMockTypeDataDecoder, times(4)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity()
181 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdf()
185 verify(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdf()
202 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdfInput()
206 verify(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdfInput()
[all …]
DEapAkaChallengeStateTest.java182 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtRand()
187 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtRand()
202 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtAutn()
207 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtAutn()
222 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtMac()
227 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtMac()
285 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationNullResponse()
296 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationNullResponse()
319 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationInvalidTag()
330 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationInvalidTag()
[all …]
DEapSimMethodStateMachineTest.java121 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications()
125 verify(mMockEapSimTypeDataDecoder).decode(DUMMY_EAP_TYPE_DATA); in testEapSimFailsOnMultipleSimNotifications()
132 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications()
140 verify(mMockEapSimTypeDataDecoder, times(3)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications()
145 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications()
151 verify(mMockEapSimTypeDataDecoder, times(4)).decode(DUMMY_EAP_TYPE_DATA); in testEapSimFailsOnMultipleSimNotifications()
/packages/modules/Connectivity/tests/unit/java/com/android/server/connectivity/mdns/
DMdnsResponseDecoderTests.java217 responses = decode(decoder, data); in setUp()
224 responses = decode(decoder, data); in testDecodeWithNullServiceType()
292 verifyResponse(decode(decoder, data6)); in testDecodeIPv6AnswerPacket()
301 verifyResponse(decode(decoder, data6)); in testDecodeCaseInsensitiveMatch()
363 responses = decode(decoder, matterDuplicateHostname); in decode_singleHostname_multipleSrvRecords_flagEnabled_multipleCompleteResponses()
392 responses = decode(decoder, matterDuplicateHostname); in decode_singleHostname_multipleSrvRecords_flagDisabled_singleCompleteResponse()
413 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv4AddressChange()
438 final ArraySet<MdnsResponse> changes = decode( in testDecodeWithIpv4AddressRemove()
458 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv6AddressChange()
482 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv6AddressRemoved()
[all …]
/packages/modules/Bluetooth/system/blueberry/tests/gd_sl4a/hci/
Dle_advanced_scanning_test.py67 return random_address_bytes.decode('utf-8').upper()
113 return public_address_bytes.decode('utf-8').upper()
124 return public_address_bytes.decode('utf-8').upper()
196 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8")))
205 self.__get_test_irk().decode("utf-8"))
230 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8")))
242 self.__get_test_irk().decode("utf-8"))
267 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8")))
277 self.__get_test_irk().decode("utf-8"))
468 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8")))
[all …]
/packages/apps/Nfc/testutils/pn532/
Dpn532.py164 self.log.debug("Sending broadcast %s", hexlify(broadcast).decode())
218 self.log.debug("Constructed frame " + hexlify(bytearray(frame)).decode())
240 if hexlify(frame).decode() != "0000ff00ff00":
241 self.log.error("Did not get ACK frame, got %s", hexlify(frame).decode())
248 if hexlify(frame[0:3]).decode() != "0000ff":
250 "Unexpected start to frame, got %s", hexlify(frame[0:3]).decode()
287 hexlify(frame).decode(),
288 hexlify(data_packet).decode(),
/packages/modules/Connectivity/staticlibs/tests/unit/src/com/android/net/module/util/netlink/
DInetDiagSocketTest.java100 HexEncoding.decode(INET_DIAG_REQ_V2_UDP_INET4_HEX.toCharArray(), false);
135 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_HEX.toCharArray(), false);
172 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET_INET_DIAG_HEX.toCharArray(), false);
218 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_NO_ID_SPECIFIED_HEX.toCharArray(), false);
273 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_V4_MAPPED_HEX.toCharArray(), false);
313 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_DESTROY_HEX.toCharArray(), false);
471 HexEncoding.decode("00".toCharArray(), false), in assertInetDiagMsg2()
476 HexEncoding.decode("850A0C00".toCharArray(), false), in assertInetDiagMsg2()
522 HexEncoding.decode((INET_DIAG_MSG_HEX_MALFORMED).toCharArray(), false)); in testParseInetDiagResponseMalformedNlAttr()
559 HexEncoding.decode((INET_DIAG_MSG_HEX_TRUNCATED).toCharArray(), false)); in testParseInetDiagResponseTruncatedNlAttr()
[all …]
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/simaka/
DEapSimTypeDataTest.java92 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(EAP_SIM_START_SUBTYPE); in testDecode()
113 mEapSimTypeDataDecoder.decode(EAP_SIM_CHALLENGE_REQUEST); in testDecodeEncode()
121 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(null); in testDecodeNullTypeData()
128 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(INVALID_SUBTYPE); in testDecodeInvalidSubtype()
136 mEapSimTypeDataDecoder.decode(TYPE_DATA_INVALID_AT_RAND); in testDecodeInvalidAtRand()
143 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(SHORT_TYPE_DATA); in testDecodeShortPacket()
151 mEapSimTypeDataDecoder.decode(TYPE_DATA_INVALID_ATTRIBUTE); in testDecodeInvalidEapAttribute()
170 mEapSimTypeDataDecoder.decode(EAP_SIM_START_DUPLICATE_ATTRIBUTES); in testDecodeDuplicateAttributes()
/packages/modules/AdServices/shared/libraries/device-side/java/com/android/adservices/shared/proto/
DProtoParser.java53 byte[] decode = getDecodedPropertyValue(property, value); in parseBase64EncodedStringToProto()
54 if (Objects.isNull(decode)) { in parseBase64EncodedStringToProto()
60 proto = parser.parseFrom(decode); in parseBase64EncodedStringToProto()
78 return Base64.decode(base64value, Base64.NO_PADDING | Base64.NO_WRAP); in getDecodedPropertyValue()
/packages/modules/Connectivity/thread/tests/cts/src/android/net/thread/cts/
DPendingOperationalDatasetTest.java167 .decode( in fromThreadTlvs_openthreadTlvs_success()
185 .isEqualTo(base16().lowerCase().decode("a74182f4d3f4de41")); in fromThreadTlvs_openthreadTlvs_success()
189 .isEqualTo(base16().lowerCase().decode("ed916e454d96fd00184f10a6f5c9e1d3")); in fromThreadTlvs_openthreadTlvs_success()
193 .isEqualTo(base16().lowerCase().decode("264f78414adc683191863d968f72d1b7")); in fromThreadTlvs_openthreadTlvs_success()
207 base16().decode("3308000000000001000034040000012C"); in fromThreadTlvs_completePendingDatasetTlvs_success()
225 final byte[] pendingTimestampAndDelayTimerTlvs = base16().decode("34040000012C"); in fromThreadTlvs_PendingTimestampTlvIsMissing_throwsIllegalArgument()
239 final byte[] pendingTimestampAndDelayTimerTlvs = base16().decode("33080000000000010000"); in fromThreadTlvs_delayTimerTlvIsMissing_throwsIllegalArgument()
/packages/modules/Bluetooth/system/stack/test/btm/
Dsco_hci_test.cc285 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F()
292 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F()
302 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F()
309 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), in TEST_F()
319 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), in TEST_F()
328 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F()
338 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F()
345 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), in TEST_F()
355 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), in TEST_F()
364 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F()
[all …]
/packages/modules/OnDevicePersonalization/tests/federatedcomputetests/src/com/android/federatedcompute/services/encryption/jni/
DHpkeJniTest.java27 private static final byte[] sCiphertext = decode(
32 private static final byte[] sPublicKey = Base64.getDecoder().decode(PUBLIC_KEY_BASE64);
33 private static final byte[] sPrivateKey = Base64.getDecoder().decode(PRIVATE_KEY_BASE64);
159 private static byte[] decode(String value) { in decode() method in HpkeJniTest
160 return Base64.getDecoder().decode(value.getBytes()); in decode()

12345678910>>...15