/aosp14/frameworks/base/core/tests/coretests/src/android/net/ |
H A D | UriCodecTest.java | 29 assertEquals("", UriCodec.decode("", in testDecode_emptyString_returnsEmptyString() 38 UriCodec.decode("ab%2f$%C4%82%25%e0%a1%80%p", in testDecode_wrongHexDigit_fails() 51 UriCodec.decode("ab%2f$%c4%82%25%e0%a1%80%1p", in testDecode_secondHexDigitWrong_fails() 64 UriCodec.decode("ab%2f$%c4%82%25%e0%a1%80%", in testDecode_endsWithPercent_fails() 76 UriCodec.decode("ab%2f$%c4%82%25%e0%a1%80%", in testDecode_dontThrowException_appendsUnknownCharacter() 84 UriCodec.decode("ab%2f$%c4%82%25+%e0%a1%80", in testDecode_convertPlus() 93 UriCodec.decode("ab%2f$%c4%82%25%e0%a1%80", in testDecode_lastCharacter() 103 UriCodec.decode("ab%2f$%c4%82%25%e0%a1%80aa%e0%a1%80", in testDecode_secondRowOfEncoded()
|
H A D | SntpClientTest.java | 164 mServer.setServerReply(HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false)); in testRequestTime_era0ClientEra0RServer() 177 mServer.setServerReply(HexEncoding.decode(EARLY_ERA_RESPONSE.toCharArray(), false)); in testRequestTime_era0ClientEra1Server() 191 mServer.setServerReply(HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false)); in testRequestTime_era1ClientEra0Server() 204 mServer.setServerReply(HexEncoding.decode(EARLY_ERA_RESPONSE.toCharArray(), false)); in testRequestTime_era1ClientEra1Server() 316 final byte[] reply = HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false); in testIgnoreLeapNoSync() 328 final byte[] reply = HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false); in testAcceptOnlyServerAndBroadcastModes() 357 final byte[] reply = HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false); in testAcceptableStrataOnly() 378 final byte[] reply = HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false); in testZeroTransmitTime() 390 final byte[] reply = HexEncoding.decode(LATE_ERA_RESPONSE.toCharArray(), false); in testNonMatchingOriginateTime()
|
/aosp14/frameworks/base/tests/SilkFX/src/com/android/test/silkfx/hdr/ |
H A D | GainmapDecodeTest.kt | 63 private fun decode(mode: DecodeMode) { regex 112 decode(DecodeMode.Full) 115 decode(DecodeMode.Full) 118 decode(DecodeMode.Subsampled4) 121 decode(DecodeMode.Scaled66) 124 decode(DecodeMode.CropedSquared) 127 decode(DecodeMode.CropedSquaredScaled33)
|
/aosp14/frameworks/base/core/tests/coretests/src/android/util/ |
H A D | Base64Test.java | 40 byte[] out = Base64.decode(in, 0); in decodeString() 58 byte[] out = Base64.decode(in, 0); in assertBad() 135 assertEquals(BYTES, 0, Base64.decode("", 0)); in testBinaryDecode() 136 assertEquals(BYTES, 1, Base64.decode("/w==", 0)); in testBinaryDecode() 137 assertEquals(BYTES, 2, Base64.decode("/+4=", 0)); in testBinaryDecode() 138 assertEquals(BYTES, 3, Base64.decode("/+7d", 0)); in testBinaryDecode() 139 assertEquals(BYTES, 4, Base64.decode("/+7dzA==", 0)); in testBinaryDecode() 140 assertEquals(BYTES, 5, Base64.decode("/+7dzLs=", 0)); in testBinaryDecode() 141 assertEquals(BYTES, 6, Base64.decode("/+7dzLuq", 0)); in testBinaryDecode() 142 assertEquals(BYTES, 7, Base64.decode("/+7dzLuqmQ==", 0)); in testBinaryDecode() [all …]
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/accessibility/utils/ |
H A D | GestureLogParser.java | 55 actionIndex = Integer.decode(matcher.group(2)); in getMotionEventFromLogLine() 62 edgeFlags = Integer.decode(findString(line, "edgeFlags=(\\w+)")); in getMotionEventFromLogLine() 63 source = Integer.decode(findString(line, "source=(\\w+)")); in getMotionEventFromLogLine() 64 flags = Integer.decode(findString(line, "flags=(\\w+)")); in getMotionEventFromLogLine() 77 return Integer.decode(matcher.group(1)); in findInt()
|
/aosp14/frameworks/base/services/core/java/com/android/server/security/rkp/ |
H A D | RemoteProvisioningShellCommand.java | 153 challenge = Base64.getDecoder().decode(getNextArgRequired()); in csr() 191 return Base64.getDecoder().decode(EEK_ED25519_BASE64); in getEekChain() 193 return Base64.getDecoder().decode(EEK_P256_BASE64); in getEekChain() 202 .add(decode(deviceInfo.deviceInfo)) in composeCertificateRequestV1() 216 .add(decode(protectedData.protectedData)) in composeCertificateRequestV1() 228 private DataItem decode(byte[] data) throws CborException { in decode() method in RemoteProvisioningShellCommand
|
/aosp14/frameworks/base/tools/preload/ |
H A D | Record.java | 132 processName = decode(parts[3]).intern(); in Record() 135 className = vmTypeToLanguage(decode(parts[5])).intern(); in Record() 148 String decode(String rawField) { in decode() method in Record
|
/aosp14/frameworks/base/keystore/tests/src/android/security/keystore2/ |
H A D | AndroidKeyStoreEdECPublicKeyTest.java | 68 this.encodedKeyBytes = Base64.getDecoder().decode(b64KeyBytes); in EdECTestVector() 107 final byte[] testVectorWithIncorrectOid = Base64.getDecoder().decode( in testFailedParsingOfKeysWithDifferentOid() 116 final byte[] testVectorWithIncorrectKeySize = Base64.getDecoder().decode( in testFailedParsingOfKeysWithWrongSize()
|
/aosp14/frameworks/base/services/core/java/com/android/server/location/contexthub/ |
H A D | ContextHubShellCommand.java | 55 int contextHubId = Integer.decode(getNextArgRequired()); in runDisableAuth() 57 long nanoAppId = Long.decode(getNextArgRequired()); in runDisableAuth()
|
/aosp14/frameworks/base/core/java/android/util/ |
H A D | Base64.java | 119 public static byte[] decode(String str, int flags) { in decode() method in Base64 120 return decode(str.getBytes(), flags); in decode() 137 public static byte[] decode(byte[] input, int flags) { in decode() method in Base64 138 return decode(input, 0, input.length, flags); in decode() 157 public static byte[] decode(byte[] input, int offset, int len, int flags) { in decode() method in Base64
|
/aosp14/frameworks/base/services/tests/mockingservicestests/src/com/android/server/compat/overrides/ |
H A D | AppCompatOverridesParserTest.java | 257 when(mPackageManager.hasSigningCertificate(PACKAGE_1, HexEncoding.decode("aa"), in parsePackageOverrides_signatureInvalid() 279 when(mPackageManager.hasSigningCertificate(PACKAGE_1, HexEncoding.decode("bb"), in parsePackageOverrides_signatureValid() 300 when(mPackageManager.hasSigningCertificate(PACKAGE_1, HexEncoding.decode("aa"), in parsePackageOverrides_multipleSignatures() 302 when(mPackageManager.hasSigningCertificate(PACKAGE_1, HexEncoding.decode("bb"), in parsePackageOverrides_multipleSignatures() 314 when(mPackageManager.hasSigningCertificate(PACKAGE_1, HexEncoding.decode("aa"), in parsePackageOverrides_signatureOnly()
|
/aosp14/frameworks/base/packages/SettingsLib/src/com/android/settingslib/bluetooth/ |
H A D | BluetoothLeBroadcastMetadataExt.kt | 194 broadcastName = String(Base64.decode(value, Base64.NO_WRAP)) 201 .fromRawBytes(Base64.decode(value, Base64.NO_WRAP)) 209 broadcastCode = Base64.decode(value, Base64.NO_WRAP) 275 metadata = Base64.decode(value, Base64.NO_WRAP) 304 data = Base64.decode(value, Base64.NO_WRAP)
|
/aosp14/frameworks/base/packages/Shell/src/com/android/shell/ |
H A D | HeapDumpProvider.java | 66 String tag = Uri.decode(path); in delete() 78 String tag = Uri.decode(path); in openFile()
|
/aosp14/frameworks/base/core/java/android/net/ |
H A D | MailTo.java | 87 m.mHeaders.put(Uri.decode(nameval[0]).toLowerCase(Locale.ROOT), in parse() 88 nameval.length > 1 ? Uri.decode(nameval[1]) : null); in parse()
|
H A D | UriCodec.java | 76 public static String decode( in decode() method in UriCodec 163 builder.append(decoder.decode(byteBuffer)); in flushDecodingByteAccumulator()
|
/aosp14/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | FontsContractTest.java | 54 Base64.decode("e04fd020ea3a6910a2d808002b30", Base64.DEFAULT); 57 Base64.decode("e04fd020ea3a6910a2d808002b30", Base64.DEFAULT); 59 Base64.decode("e04fd020ea3a6910a2d808002b32", Base64.DEFAULT); 285 byte[] wrongCert = Base64.decode("this is a wrong cert", Base64.DEFAULT); in testGetProvider_providerIsNonSystemAppWrongCerts() 312 byte[] wrongCert = Base64.decode("this is a wrong cert", Base64.DEFAULT); in testGetProvider_providerIsNonSystemAppMoreCerts() 350 Base64.decode("this is a wrong cert", Base64.DEFAULT))); in testGetProvider_providerIsNonSystemAppCorrectCertsSeveralSets()
|
/aosp14/frameworks/base/services/core/java/com/android/server/stats/pull/ |
H A D | SettingsStatsUtil.java | 143 final byte[] decode = Base64.decode(base64, Base64.NO_PADDING | Base64.NO_WRAP); in getList() 146 list = StringListParamProto.parseFrom(decode); in getList()
|
/aosp14/frameworks/base/services/core/java/com/android/server/media/ |
H A D | VolumeCtrl.java | 88 stream = Integer.decode(cmd.getNextArgRequired()).intValue(); in run() 93 volIndex = Integer.decode(cmd.getNextArgRequired()).intValue(); in run()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | TestData.java | 454 byte[] keyBytes = Base64.getDecoder().decode(INSECURE_PRIVATE_KEY_FOR_ENDPOINT1_BASE64); in getInsecurePrivateKeyForEndpoint1() 461 byte[] certPathBytes = Base64.getDecoder().decode(base64CertPath); in decodeCertPath()
|
/aosp14/frameworks/base/services/core/java/com/android/server/signedconfig/ |
H A D | SignatureVerifier.java | 64 byte[] key = Base64.getDecoder().decode(base64); in createKey() 98 signature = Base64.getDecoder().decode(base64Signature); in verifySignature()
|
/aosp14/frameworks/base/errorprone/tests/res/libcore/util/ |
H A D | HexEncoding.java | 24 public static byte[] decode(String encoded) { in decode() method in HexEncoding
|
/aosp14/frameworks/base/errorprone/tests/res/android/util/ |
H A D | Base64.java | 20 public static byte[] decode(String str, int flags) { in decode() method in Base64
|
/aosp14/frameworks/base/core/java/com/android/internal/os/ |
H A D | ZygoteArguments.java | 340 mEffectiveCapabilities = Long.decode(capStrings[0]); in parseArgs() 343 mPermittedCapabilities = Long.decode(capStrings[0]); in parseArgs() 344 mEffectiveCapabilities = Long.decode(capStrings[1]); in parseArgs()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 142 byte[] derKey = Base64.decode(TEST_KEY.getBytes(), Base64.DEFAULT); in createKey() 149 byte[] derCert = Base64.decode(TEST_CERT.getBytes(), Base64.DEFAULT); in createCertificate() 182 return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT)); in verifySignature()
|
/aosp14/frameworks/base/core/tests/coretests/src/android/security/keystore/recovery/ |
H A D | TestData.java | 84 byte[] certPathBytes = Base64.getDecoder().decode(base64CertPath); in decodeCertPath()
|