/packages/modules/NetworkStack/tests/unit/src/android/net/dhcp6/ |
D | Dhcp6PacketTest.kt | 45 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket() 64 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_incorrectOptionLength() 83 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_lastTruncatedOption() 102 Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_middleTruncatedOption() 122 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6AdvertisePacket() 145 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6SolicitPacket_unsupportedOption() 173 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testDecodeDhcp6ReplyPacket() 203 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testGetMinimalPreferredValidLifetime() 231 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testStatusCodeOptionWithStatusMessage() 259 val packet = Dhcp6Packet.decode(bytes, bytes.size) in testStatusCodeOptionWithoutStatusMessage() [all …]
|
/packages/modules/AdServices/adservices/tests/unittest/service-core/src/jni/java/com/android/adservices/ohttp/ |
D | ObliviousHttpKeyConfigTest.java | 48 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_configuresKeyCorrectly() 64 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_emptyKeyConfig_throwsError() 74 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongKemIdLength_throwsError() 84 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_unsupportedKemId_throwsError() 95 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongPublicKeyLength_throwsError() 106 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_wrongAlgorithmsLength_throwsError() 118 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_incompleteAlgorithmsList_throwsError() 130 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in serializeOhttpPayloadHeader_returnsCorrectHeader() 146 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in createRecipientKeyInfoBytes_returnsCorrectInfo() 163 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in createRecipientKeyInfoBytes_returnsCorrectInfo_withServerAuctionMediaTypeChange() [all …]
|
D | OhttpJniWrapperTest.java | 89 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_returnsCorrectSharedSecret() 111 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_returnsCorrectSharedSecret_withServerAuctionMediaTypeChange() 131 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_returnsCorrectResponse() 169 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_returnsCorrectResponse_withServerAuctionMediaTypeChange() 206 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_emptyPlainText_returnsNullCipherText() 240 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeEncrypt_emptyPlainText_returnsNullCipherText_withServerAuctionMediaTypeChange() 273 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_nullContext_throwsException() 299 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(SERVER_PUBLIC_KEY); in hpkeCtxSetupSenderWithSeed_nullContext_throwsException_withServerAuctionMediaChange() 374 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(serverPublicKey); in hpkeCtxSetupSenderWithSeed_invalidPublicKey_returnsNullArray() 395 byte[] keyBytes = BaseEncoding.base16().lowerCase().decode(serverPublicKey); in hpkeCtxSetupSenderWithSeed_invalidPublicKey_returnsNullArray_withServerAuctionMedia() [all …]
|
D | ObliviousHttpClientTest.java | 54 byte[] bytes = BaseEncoding.base16().lowerCase().decode(keyConfigHex); in create_unsupportedAlgorithms_throwsError() 177 BaseEncoding.base16().lowerCase().decode(testVector.responseCipherText), in decryptObliviousHttpResponse_testAllTestVectors() 204 BaseEncoding.base16().lowerCase().decode(testVector.responseCipherText), in decryptObliviousHttpResponse_testAllTestVectors_withServerAuctionMediaTypeChange() 221 BaseEncoding.base16().lowerCase().decode(keyConfigString)); in decryptObliviousHttpResponse_withAuctionResult() 242 BaseEncoding.base16().lowerCase().decode(cipherText), in decryptObliviousHttpResponse_withAuctionResult() 265 BaseEncoding.base16().lowerCase().decode(keyConfigString)); in decryptObliviousHttpResponse_withAuctionResult_withServerAuctionMediaTypeChange() 287 BaseEncoding.base16().lowerCase().decode(cipherText), in decryptObliviousHttpResponse_withAuctionResult_withServerAuctionMediaTypeChange()
|
/packages/modules/Wifi/framework/tests/src/android/net/wifi/util/ |
D | HexEncodingTest.java | 19 import static android.net.wifi.util.HexEncoding.decode; 71 assertArraysEqual(bytes, decode(encode(bytes), false /* allowSingleChar */)); in testEncodeBytes() 75 decode(encodedLower.toCharArray(), false /* allowSingleChar */)); in testEncodeBytes() 80 assertArraysEqual(new byte[]{6}, decode("6".toCharArray(), true)); in testDecode_allow4Bit() 81 assertArraysEqual(new byte[]{6, 0x76}, decode("676".toCharArray(), true)); in testDecode_allow4Bit() 86 decode("676".toCharArray(), false /* allowSingleChar */); in testDecode_disallow4Bit() 94 decode("DEADBARD".toCharArray(), false /* allowSingleChar */); in testDecode_invalid() 103 decode("६१٧٥٥F6361646F73".toCharArray(), false /* allowSingleChar */); in testDecode_invalid() 109 decode("#%6361646F73".toCharArray(), false /* allowSingleChar */); in testDecode_invalid()
|
/packages/services/Car/tools/telemetry/lua-interpreter/tests/ |
D | app_test.py | 45 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 58 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 74 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 87 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 103 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 116 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 128 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 140 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser') 152 rendered_html = BeautifulSoup(response.data.decode('UTF-8'), 'html.parser')
|
/packages/modules/Wifi/framework/java/android/net/wifi/util/ |
D | HexEncoding.java | 107 public static byte[] decode(String encoded) throws IllegalArgumentException { in decode() method in HexEncoding 108 return decode(encoded.toCharArray()); in decode() 118 public static byte[] decode(String encoded, boolean allowSingleChar) in decode() method in HexEncoding 120 return decode(encoded.toCharArray(), allowSingleChar); in decode() 129 public static byte[] decode(char[] encoded) throws IllegalArgumentException { in decode() method in HexEncoding 130 return decode(encoded, false); in decode() 140 public static byte[] decode(char[] encoded, boolean allowSingleChar) in decode() method in HexEncoding
|
/packages/modules/Virtualization/authfs/src/fsverity/ |
D | editor.rs | 376 hex::decode("3d248ca542a24fc62d1c43b916eae5016878e2533c88238480b26128a1f1af95")? in test_verified_writer_no_write() 389 hex::decode("cd0875ca59c7d37e962c5e8f5acd3770750ac80225e2df652ce5672fd34500af")? in test_verified_writer_from_zero() 398 hex::decode("2901b849fda2d91e3929524561c4a47e77bb64734319759507b2029f18b9cc52")? in test_verified_writer_from_zero() 407 hex::decode("7545409b556071554d18973a29b96409588c7cda4edd00d5586b27a11e1a523b")? in test_verified_writer_from_zero() 420 hex::decode("a23fc5130d3d7b3323fc4b4a5e79d5d3e9ddf3a3f5872639e867713512c6702f")? in test_verified_writer_unaligned() 429 hex::decode("d16d4c1c186d757e646f76208b21254f50d7f07ea07b1505ff48b2a6f603f989")? in test_verified_writer_unaligned() 442 hex::decode("4df2aefd8c2a9101d1d8770dca3ede418232eabce766bb8e020395eae2e97103")? in test_verified_writer_with_hole() 451 hex::decode("47d5da26f6934484e260630a69eb2eebb21b48f69bc8fbf8486d1694b7dba94f")? in test_verified_writer_with_hole() 460 hex::decode("8bd118821fb4aff26bb4b51d485cc481a093c68131b7f4f112e9546198449752")? in test_verified_writer_with_hole() 473 hex::decode("4c433d8640c888b629dc673d318cbb8d93b1eebcc784d9353e07f09f0dcfe707")? in test_verified_writer_various_writes() [all …]
|
D | builder.rs | 162 hex::decode("3d248ca542a24fc62d1c43b916eae5016878e2533c88238480b26128a1f1af95")?, in merkle_tree_empty_file() 172 hex::decode("cd0875ca59c7d37e962c5e8f5acd3770750ac80225e2df652ce5672fd34500af")?, in merkle_tree_file_size_less_than_or_equal_to_4k() 183 hex::decode("2901b849fda2d91e3929524561c4a47e77bb64734319759507b2029f18b9cc52")?, in merkle_tree_more_sizes() 188 hex::decode("2a476d58eb80394052a3a783111e1458ac3ecf68a7878183fed86ca0ff47ec0d")?, in merkle_tree_more_sizes() 194 hex::decode("26b7c190a34e19f420808ee7ec233b09fa6c34543b5a9d2950530114c205d14f")?, in merkle_tree_more_sizes() 200 hex::decode("316835d9be1c95b5cd55d07ae7965d651689efad186e26cbf680e40b683a3262")?, in merkle_tree_more_sizes() 218 hex::decode("7d3c0d2e1dc54230b20ed875f5f3a4bd3f9873df601936b3ca8127d4db3548f3")?, in merkle_tree_non_sequential()
|
/packages/modules/Uwb/service/tests/src/com/android/server/uwb/util/ |
D | HexTest.java | 74 assertArrayEquals(mBytes, Hex.decode(mLower)); in testDecodeLower() 79 assertArrayEquals(mBytes, Hex.decode(mUpper)); in testDecodeUpper() 84 assertArrayEquals(new byte[0], Hex.decode("")); in testDecodeEmptyString() 89 assertThat(Hex.decode("fff")) in testDecodeOddLength() 95 Hex.decode("g0"); in testDecodeIllegalHighNibble() 100 Hex.decode("0g"); in testDecodeIllegalLowNibble()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/ |
D | EapMessageTest.java | 70 EapMessage result = EapMessage.decode(EAP_SUCCESS_PACKET); in testDecode() 78 result = EapMessage.decode(EAP_REQUEST_SIM_START_PACKET); in testDecode() 88 EapMessage.decode(INVALID_CODE_PACKET); in testDecodeInvalidCode() 97 EapMessage.decode(INCOMPLETE_HEADER_PACKET); in testDecodeIncompleteHeader() 106 EapMessage.decode(SHORT_PACKET); in testDecodeShortPacket() 115 EapMessage.decode(LONG_SUCCESS_PACKET); in testDecodeSuccessIncorrectLength() 124 EapMessage.decode(REQUEST_MISSING_TYPE_PACKET); in testDecodeMissingTypeData() 133 EapMessage.decode(REQUEST_UNSUPPORTED_TYPE_PACKET); in testDecodeUnsupportedEapType() 155 EapMessage result = EapMessage.decode(eapMessage.encode()); in testEncodeDecode() 165 byte[] result = EapMessage.decode(EAP_REQUEST_SIM_START_PACKET).encode(); in testDecodeEncode() [all …]
|
/packages/modules/Connectivity/staticlibs/tests/unit/src/com/android/net/module/util/ |
D | DomainUtilsTest.java | 179 ByteBuffer buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames() 180 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames() 188 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames() 189 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames() 197 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames() 198 suffixStringList = DomainUtils.decode(buffer, false /* compression */); in testDecodeDomainNames() 206 buffer = ByteBuffer.wrap(HexEncoding.decode(suffixes)); in testDecodeDomainNames() 207 suffixStringList = DomainUtils.decode(buffer, true /* compression */); in testDecodeDomainNames()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/statemachine/ |
D | EapAkaIdentityStateTest.java | 75 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIdentityRequest() 81 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIdentityRequest() 93 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessWithoutIdentityRequestAttributes() 98 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessWithoutIdentityRequestAttributes() 112 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMultipleIdentityRequestAttributes() 117 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMultipleIdentityRequestAttributes() 129 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessImsiUnavailable() 135 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessImsiUnavailable() 153 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessTransitionToChallengeState() 160 verify(mMockEapAkaTypeDataDecoder, times(2)).decode(DUMMY_EAP_TYPE_DATA); in testProcessTransitionToChallengeState()
|
D | EapAkaPrimeChallengeStateTest.java | 120 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapIdentity() 128 verify(mMockTypeDataDecoder, times(2)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapIdentity() 142 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity() 149 verify(mMockTypeDataDecoder, times(2)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity() 155 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity() 163 verify(mMockTypeDataDecoder, times(4)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testTransitionWithEapAkaPrimeIdentity() 181 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdf() 185 verify(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdf() 202 doReturn(decodeResult).when(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdfInput() 206 verify(mMockTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtKdfInput() [all …]
|
D | EapAkaChallengeStateTest.java | 182 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtRand() 187 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtRand() 202 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtAutn() 207 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtAutn() 222 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtMac() 227 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessMissingAtMac() 285 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationNullResponse() 296 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationNullResponse() 319 doReturn(decodeResult).when(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationInvalidTag() 330 verify(mMockEapAkaTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testProcessIccAuthenticationInvalidTag() [all …]
|
D | EapSimMethodStateMachineTest.java | 121 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications() 125 verify(mMockEapSimTypeDataDecoder).decode(DUMMY_EAP_TYPE_DATA); in testEapSimFailsOnMultipleSimNotifications() 132 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications() 140 verify(mMockEapSimTypeDataDecoder, times(3)).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications() 145 doReturn(decodeResult).when(mMockEapSimTypeDataDecoder).decode(eq(DUMMY_EAP_TYPE_DATA)); in testEapSimFailsOnMultipleSimNotifications() 151 verify(mMockEapSimTypeDataDecoder, times(4)).decode(DUMMY_EAP_TYPE_DATA); in testEapSimFailsOnMultipleSimNotifications()
|
/packages/modules/Connectivity/tests/unit/java/com/android/server/connectivity/mdns/ |
D | MdnsResponseDecoderTests.java | 217 responses = decode(decoder, data); in setUp() 224 responses = decode(decoder, data); in testDecodeWithNullServiceType() 292 verifyResponse(decode(decoder, data6)); in testDecodeIPv6AnswerPacket() 301 verifyResponse(decode(decoder, data6)); in testDecodeCaseInsensitiveMatch() 363 responses = decode(decoder, matterDuplicateHostname); in decode_singleHostname_multipleSrvRecords_flagEnabled_multipleCompleteResponses() 392 responses = decode(decoder, matterDuplicateHostname); in decode_singleHostname_multipleSrvRecords_flagDisabled_singleCompleteResponse() 413 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv4AddressChange() 438 final ArraySet<MdnsResponse> changes = decode( in testDecodeWithIpv4AddressRemove() 458 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv6AddressChange() 482 final ArraySet<MdnsResponse> updatedResponses = decode( in testDecodeWithIpv6AddressRemoved() [all …]
|
/packages/modules/Bluetooth/system/blueberry/tests/gd_sl4a/hci/ |
D | le_advanced_scanning_test.py | 67 return random_address_bytes.decode('utf-8').upper() 113 return public_address_bytes.decode('utf-8').upper() 124 return public_address_bytes.decode('utf-8').upper() 196 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8"))) 205 self.__get_test_irk().decode("utf-8")) 230 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8"))) 242 self.__get_test_irk().decode("utf-8")) 267 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8"))) 277 self.__get_test_irk().decode("utf-8")) 468 (PUBLIC_ADDRESS, addr_type, self.__get_test_irk().decode("utf-8"))) [all …]
|
/packages/apps/Nfc/testutils/pn532/ |
D | pn532.py | 164 self.log.debug("Sending broadcast %s", hexlify(broadcast).decode()) 218 self.log.debug("Constructed frame " + hexlify(bytearray(frame)).decode()) 240 if hexlify(frame).decode() != "0000ff00ff00": 241 self.log.error("Did not get ACK frame, got %s", hexlify(frame).decode()) 248 if hexlify(frame[0:3]).decode() != "0000ff": 250 "Unexpected start to frame, got %s", hexlify(frame[0:3]).decode() 287 hexlify(frame).decode(), 288 hexlify(data_packet).decode(),
|
/packages/modules/Connectivity/staticlibs/tests/unit/src/com/android/net/module/util/netlink/ |
D | InetDiagSocketTest.java | 100 HexEncoding.decode(INET_DIAG_REQ_V2_UDP_INET4_HEX.toCharArray(), false); 135 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_HEX.toCharArray(), false); 172 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET_INET_DIAG_HEX.toCharArray(), false); 218 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_NO_ID_SPECIFIED_HEX.toCharArray(), false); 273 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_V4_MAPPED_HEX.toCharArray(), false); 313 HexEncoding.decode(INET_DIAG_REQ_V2_TCP_INET6_DESTROY_HEX.toCharArray(), false); 471 HexEncoding.decode("00".toCharArray(), false), in assertInetDiagMsg2() 476 HexEncoding.decode("850A0C00".toCharArray(), false), in assertInetDiagMsg2() 522 HexEncoding.decode((INET_DIAG_MSG_HEX_MALFORMED).toCharArray(), false)); in testParseInetDiagResponseMalformedNlAttr() 559 HexEncoding.decode((INET_DIAG_MSG_HEX_TRUNCATED).toCharArray(), false)); in testParseInetDiagResponseTruncatedNlAttr() [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/simaka/ |
D | EapSimTypeDataTest.java | 92 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(EAP_SIM_START_SUBTYPE); in testDecode() 113 mEapSimTypeDataDecoder.decode(EAP_SIM_CHALLENGE_REQUEST); in testDecodeEncode() 121 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(null); in testDecodeNullTypeData() 128 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(INVALID_SUBTYPE); in testDecodeInvalidSubtype() 136 mEapSimTypeDataDecoder.decode(TYPE_DATA_INVALID_AT_RAND); in testDecodeInvalidAtRand() 143 DecodeResult<EapSimTypeData> result = mEapSimTypeDataDecoder.decode(SHORT_TYPE_DATA); in testDecodeShortPacket() 151 mEapSimTypeDataDecoder.decode(TYPE_DATA_INVALID_ATTRIBUTE); in testDecodeInvalidEapAttribute() 170 mEapSimTypeDataDecoder.decode(EAP_SIM_START_DUPLICATE_ATTRIBUTES); in testDecodeDuplicateAttributes()
|
/packages/modules/AdServices/shared/libraries/device-side/java/com/android/adservices/shared/proto/ |
D | ProtoParser.java | 53 byte[] decode = getDecodedPropertyValue(property, value); in parseBase64EncodedStringToProto() 54 if (Objects.isNull(decode)) { in parseBase64EncodedStringToProto() 60 proto = parser.parseFrom(decode); in parseBase64EncodedStringToProto() 78 return Base64.decode(base64value, Base64.NO_PADDING | Base64.NO_WRAP); in getDecodedPropertyValue()
|
/packages/modules/Connectivity/thread/tests/cts/src/android/net/thread/cts/ |
D | PendingOperationalDatasetTest.java | 167 .decode( in fromThreadTlvs_openthreadTlvs_success() 185 .isEqualTo(base16().lowerCase().decode("a74182f4d3f4de41")); in fromThreadTlvs_openthreadTlvs_success() 189 .isEqualTo(base16().lowerCase().decode("ed916e454d96fd00184f10a6f5c9e1d3")); in fromThreadTlvs_openthreadTlvs_success() 193 .isEqualTo(base16().lowerCase().decode("264f78414adc683191863d968f72d1b7")); in fromThreadTlvs_openthreadTlvs_success() 207 base16().decode("3308000000000001000034040000012C"); in fromThreadTlvs_completePendingDatasetTlvs_success() 225 final byte[] pendingTimestampAndDelayTimerTlvs = base16().decode("34040000012C"); in fromThreadTlvs_PendingTimestampTlvIsMissing_throwsIllegalArgument() 239 final byte[] pendingTimestampAndDelayTimerTlvs = base16().decode("33080000000000010000"); in fromThreadTlvs_delayTimerTlvIsMissing_throwsIllegalArgument()
|
/packages/modules/Bluetooth/system/stack/test/btm/ |
D | sco_hci_test.cc | 285 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F() 292 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F() 302 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F() 309 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), in TEST_F() 319 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), in TEST_F() 328 ASSERT_EQ(bluetooth::audio::sco::wbs::decode(&decoded), size_t(0)); in TEST_F() 338 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F() 345 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), in TEST_F() 355 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), in TEST_F() 364 ASSERT_EQ(bluetooth::audio::sco::swb::decode(&decoded), size_t(0)); in TEST_F() [all …]
|
/packages/modules/OnDevicePersonalization/tests/federatedcomputetests/src/com/android/federatedcompute/services/encryption/jni/ |
D | HpkeJniTest.java | 27 private static final byte[] sCiphertext = decode( 32 private static final byte[] sPublicKey = Base64.getDecoder().decode(PUBLIC_KEY_BASE64); 33 private static final byte[] sPrivateKey = Base64.getDecoder().decode(PRIVATE_KEY_BASE64); 159 private static byte[] decode(String value) { in decode() method in HpkeJniTest 160 return Base64.getDecoder().decode(value.getBytes()); in decode()
|