/aosp14/frameworks/base/core/tests/coretests/src/com/android/internal/widget/ |
H A D | LockscreenCredentialTest.java | 46 assertTrue(Arrays.equals("3456".getBytes(), pin.getCredential())); in testPinCredential() 76 assertTrue(Arrays.equals("12369".getBytes(), pattern.getCredential())); in testPatternCredential() 188 credential.passwordToHistoryHash(salt.getBytes(), hashFactor.getBytes())) in testPasswordToHistoryHash() 192 password.getBytes(), salt.getBytes(), hashFactor.getBytes())) in testPasswordToHistoryHash() 207 password.getBytes(), /* salt= */ null, hashFactor.getBytes())) in testPasswordToHistoryHashInvalidInput() 215 password.getBytes(), salt.getBytes(), /* hashFactor= */ null)) in testPasswordToHistoryHashInvalidInput() 220 /* password= */ null, salt.getBytes(), hashFactor.getBytes())) in testPasswordToHistoryHashInvalidInput() 232 password.getBytes(), salt.getBytes())) in testLegacyPasswordToHash() 241 password.getBytes(), /* salt= */ null)).isNull(); in testLegacyPasswordToHashInvalidInput() 245 /* password= */ null, salt.getBytes())) in testLegacyPasswordToHashInvalidInput() [all …]
|
/aosp14/frameworks/base/services/core/jni/stats/ |
H A D | SurfaceFlingerPuller.cpp | 36 optional<BytesField> getBytes(const google::protobuf::MessageLite& proto, std::string& data) { in getBytes() function 82 optional<BytesField> frameDuration = getBytes(atom.frame_duration(), frameDurationStr); in parseGlobalInfoPull() 84 getBytes(atom.render_engine_timing(), renderEngineTimeStr); in parseGlobalInfoPull() 86 getBytes(atom.sf_deadline_misses(), deadlineMissesStr); in parseGlobalInfoPull() 88 getBytes(atom.sf_prediction_errors(), predictionErrorsStr); in parseGlobalInfoPull() 128 getBytes(atom.present_to_present(), present2PresentStr); in parseLayerInfoPull() 130 getBytes(atom.present_to_present_delta(), present2PresentDeltaStr); in parseLayerInfoPull() 131 optional<BytesField> post2present = getBytes(atom.post_to_present(), post2presentStr); in parseLayerInfoPull() 133 getBytes(atom.acquire_to_present(), acquire2PresentStr); in parseLayerInfoPull() 136 getBytes(atom.desired_to_present(), desired2PresentStr); in parseLayerInfoPull() [all …]
|
/aosp14/frameworks/base/tools/powermodel/test/com/android/powermodel/ |
H A D | CsvParserTest.java | 64 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEmpty() 76 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testOnlyNewline() 88 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testTwoLines() 103 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedEmpty() 116 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedText() 129 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedQuotes() 142 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedCommas() 155 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testEscapedQuotesAndCommas() 168 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testNoNewline() 181 final InputStream is = new ByteArrayInputStream(text.getBytes(StandardCharsets.UTF_8)); in testNoNewlineWithCommas() [all …]
|
/aosp14/frameworks/base/packages/SettingsLib/tests/robotests/src/com/android/settingslib/bluetooth/ |
H A D | BluetoothUtilsTest.java | 103 STRING_METADATA.getBytes()); in getStringMetaData_hasMetaData_getCorrectMetaData() 113 INT_METADATA.getBytes()); in getIntMetaData_hasMetaData_getCorrectMetaData() 134 BOOL_METADATA.getBytes()); in getBooleanMetaData_hasMetaData_getCorrectMetaData() 144 STRING_METADATA.getBytes()); in getUriMetaData_hasMetaData_getCorrectMetaData() 162 CONTROL_METADATA.getBytes()); in getControlUriMetaData_hasMetaData_returnsCorrectMetaData() 172 BOOL_METADATA.getBytes()); in isAdvancedDetailsHeader_untetheredHeadset_returnTrue() 190 BluetoothDevice.DEVICE_TYPE_WATCH.getBytes()); in isAdvancedDetailsHeader_deviceTypeWatch_returnTrue() 199 BluetoothDevice.DEVICE_TYPE_STYLUS.getBytes()); in isAdvancedDetailsHeader_deviceTypeStylus_returnTrue() 208 BluetoothDevice.DEVICE_TYPE_DEFAULT.getBytes()); in isAdvancedDetailsHeader_deviceTypeDefault_returnTrue() 222 BOOL_METADATA.getBytes()); in isAdvancedUntetheredDevice_untetheredHeadset_returnTrue() [all …]
|
/aosp14/frameworks/base/core/tests/coretests/src/android/os/ |
H A D | FileBridgeTest.java | 92 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteNoSync() 94 assertContents("meow".getBytes(StandardCharsets.UTF_8)); in testWriteNoSync() 99 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSync() 102 assertContents("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSync() 107 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 109 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 111 assertContents("meowcake".getBytes(StandardCharsets.UTF_8)); in testWriteSyncWrite() 123 client.write("meow".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose() 126 client.write("cake".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose() 130 assertContents("meow".getBytes(StandardCharsets.UTF_8)); in testWriteAfterClose()
|
/aosp14/frameworks/base/core/tests/coretests/src/android/app/admin/ |
H A D | PasswordMetricsTest.java | 98 "6B~0z1Z3*8A".getBytes(), /* isPin */ false); in testComputeForPassword_metrics() 110 assertEquals(4, PasswordMetrics.maxLengthSequence("1234".getBytes())); in testMaxLengthSequence() 113 assertEquals(3, PasswordMetrics.maxLengthSequence("aabc".getBytes())); in testMaxLengthSequence() 115 assertEquals(3, PasswordMetrics.maxLengthSequence("@ABC".getBytes())); in testMaxLengthSequence() 137 PasswordMetrics.computeForPasswordOrPin("1234".getBytes(), in testDetermineComplexity_lowNumeric() 144 PasswordMetrics.computeForPasswordOrPin("124".getBytes(), in testDetermineComplexity_lowNumericComplex() 151 PasswordMetrics.computeForPasswordOrPin("a!".getBytes(), in testDetermineComplexity_lowAlphabetic() 158 PasswordMetrics.computeForPasswordOrPin("a!1".getBytes(), in testDetermineComplexity_lowAlphanumeric() 165 PasswordMetrics.computeForPasswordOrPin("1238".getBytes(), in testDetermineComplexity_mediumNumericComplex() 172 PasswordMetrics.computeForPasswordOrPin("ab!c".getBytes(), in testDetermineComplexity_mediumAlphabetic() [all …]
|
/aosp14/frameworks/base/core/tests/coretests/src/android/app/ |
H A D | KeyguardManagerTest.java | 134 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_validPassword() 138 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_validPassword() 151 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_invalidPassword() 155 PASSWORD.getBytes(), in setLock_setInitialLockPermissionGranted_invalidPassword() 169 PASSWORD.getBytes(), in setLock_setInitialLockPermissionDenied() 181 PASSWORD.getBytes(), in checkLock_correctCredentials() 184 PASSWORD.getBytes(), in checkLock_correctCredentials() 188 PASSWORD.getBytes()); in checkLock_correctCredentials() 200 PASSWORD.getBytes(), in checkLock_incorrectCredentials() 203 PASSWORD.getBytes(), in checkLock_incorrectCredentials() [all …]
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/integrity/parser/ |
H A D | BinaryFileOperationsTest.java | 24 import static com.android.server.integrity.utils.TestUtils.getBytes; 52 getBytes( in testGetStringValue() 66 getBytes( in testGetHashedStringValue() 76 APP_CERTIFICATE.getBytes(StandardCharsets.UTF_8))); in testGetHashedStringValue() 81 byte[] ruleBytes = getBytes(getValueBits(PACKAGE_NAME)); in testGetStringValue_withSizeAndHashingInfo() 93 byte[] ruleBytes = getBytes(getBits(randomValue, /* numOfBits= */ 32)); in testGetIntValue() 102 byte[] ruleBytes = getBytes(booleanValue); in testGetBooleanValue_true() 111 byte[] ruleBytes = getBytes(booleanValue); in testGetBooleanValue_false()
|
H A D | RuleBinaryParserTest.java | 117 byte[] ruleBytes = getBytes(ruleBits); in testBinaryStream_validCompoundFormula_noIndexing() 156 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_notConnector_noIndexing() 201 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_andConnector_noIndexing() 249 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validCompoundFormula_orConnector_noIndexing() 288 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_stringValue_noIndexing() 320 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_hashedValue_noIndexing() 354 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormulaWithCertificateLineage() 386 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_integerValue_noIndexing() 414 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_validAtomicFormula_booleanValue_noIndexing() 441 byte[] ruleBytes = getBytes(ruleBits); in testBinaryString_invalidAtomicFormula_noIndexing() [all …]
|
/aosp14/frameworks/base/core/tests/coretests/src/com/android/internal/os/ |
H A D | ProcTimeInStateReaderTest.java | 60 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testSimple() 77 Files.write(initialTimeInStateFile, "header1\n1 2\nheader2:\n3 4\n5 6\n7 8\n".getBytes()); in testHeaderFormat() 93 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testDifferentFile() 97 Files.write(timeInStateFile, "1 20\n3 40\n5 60\n7 80\n".getBytes()); in testDifferentFile() 107 Files.write(initialTimeInStateFile, "1 2\n3 4\n5 6\n7 8\n".getBytes()); in testWrongLength() 111 Files.write(timeInStateFile, "1 2\n3 4\n5 6\n".getBytes()); in testWrongLength() 118 Files.write(initialTimeInStateFile, "".getBytes()); in testEmptyInitialFails()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 131 byte[] encoded = content.getBytes(); in getCurrentHash() 142 byte[] derKey = Base64.decode(TEST_KEY.getBytes(), Base64.DEFAULT); in createKey() 149 byte[] derCert = Base64.decode(TEST_CERT.getBytes(), Base64.DEFAULT); in createCertificate() 157 fw.write(content.getBytes(), 0, content.length()); in makeTemporaryContentFile() 166 signer.update(content.trim().getBytes()); in createSignature() 167 signer.update(version.trim().getBytes()); in createSignature() 168 signer.update(requiredHash.getBytes()); in createSignature() 179 signer.update(content.trim().getBytes()); in verifySignature() 180 signer.update(version.trim().getBytes()); in verifySignature() 181 signer.update(requiredPrevious.trim().getBytes()); in verifySignature() [all …]
|
/aosp14/frameworks/base/libs/securebox/tests/src/com/android/security/ |
H A D | SecureBoxTest.java | 72 private static final byte[] VAULT_CHALLENGE = getBytes("Not a real vault challenge"); 73 private static final byte[] THM_KF_HASH = getBytes("12345678901234567890123456789012"); 97 private static final byte[] KEY_CLAIMANT = getBytes("asdfasdfasdfasdf"); 126 private static final byte[] TEST_SHARED_SECRET = getBytes("TEST_SHARED_SECRET"); 127 private static final byte[] TEST_HEADER = getBytes("TEST_HEADER"); 128 private static final byte[] TEST_PAYLOAD = getBytes("TEST_PAYLOAD"); 181 ArrayUtils.concat(getBytes("V1 KF_claim"), VAULT_PARAMS, VAULT_CHALLENGE), in decryptRecoveryClaim() 191 ArrayUtils.concat(getBytes("V1 THM_encrypted_recovery_key"), VAULT_PARAMS), in decryptRecoveryKey_doesNotThrowForValidAuthenticationTag() 361 private static byte[] getBytes(String str) { in getBytes() method in SecureBoxTest 362 return str.getBytes(StandardCharsets.UTF_8); in getBytes()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/power/stats/ |
H A D | KernelWakelockReaderTest.java | 52 public byte[] getBytes() throws Exception { in getBytes() method in KernelWakelockReaderTest.ProcFileBuilder 110 byte[] buffer = new ProcFileBuilder().getBytes(); in testOnlyHeader() 122 .getBytes(); in testOneWakelock() 141 .getBytes(); in testTwoWakelocks() 157 .getBytes(); in testDuplicateWakelocksAccumulate() 176 .getBytes(); in testWakelocksBecomeStale() 185 .getBytes(); in testWakelocksBecomeStale() 291 .getBytes(); in testAggregateStatsNoNativeWakelocks() 330 .getBytes(); in testAggregateStatsBothKernelAndNativeWakelocks() 356 .getBytes(); in testAggregateStatsUpdate() [all …]
|
/aosp14/frameworks/base/services/tests/wmtests/src/com/android/server/wm/ |
H A D | WindowTracingTest.java | 164 "TEST_WHERE".getBytes(StandardCharsets.UTF_8))); in tracing_endsUpInFile() 166 "TEST_WM_PROTO".getBytes(StandardCharsets.UTF_8))); in tracing_endsUpInFile() 188 byte[] haystack = "hello_world".getBytes(StandardCharsets.UTF_8); in test_containsBytes() 190 "hello".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 192 "world".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 194 "world".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 196 "world_".getBytes(StandardCharsets.UTF_8))); in test_containsBytes() 198 "absent".getBytes(StandardCharsets.UTF_8))); in test_containsBytes()
|
/aosp14/frameworks/base/core/java/com/android/internal/util/ |
H A D | TraceBuffer.java | 69 byte[] getBytes(P proto); in getBytes() method 89 public byte[] getBytes(ProtoOutputStream proto) { in getBytes() method in TraceBuffer.ProtoOutputStreamProvider 90 return proto.getBytes(); in getBytes() 96 os.write(encapsulatingProto.getBytes()); in write() 98 byte[] protoBytes = protoOutputStream.getBytes(); in write() 156 .anyMatch(p -> Arrays.equals(mProtoProvider.getBytes(p), other)); in contains()
|
/aosp14/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | EnterpriseSpecificIdCalculator.java | 120 final byte[] serialNumber = getPaddedSerialNumber().getBytes(); in calculateEnterpriseId() 121 final byte[] imei = getPaddedImei().getBytes(); in calculateEnterpriseId() 122 final byte[] meid = getPaddedMeid().getBytes(); in calculateEnterpriseId() 123 final byte[] macAddress = mMacAddress.getBytes(); in calculateEnterpriseId() 132 final byte[] dpcPackage = getPaddedProfileOwnerName(profileOwnerPackage).getBytes(); in calculateEnterpriseId() 133 final byte[] enterpriseId = getPaddedEnterpriseId(enterpriseIdString).getBytes(); in calculateEnterpriseId()
|
/aosp14/frameworks/base/services/robotests/backup/src/com/android/server/backup/keyvalue/ |
H A D | KeyValueBackupTaskTest.java | 355 .isEqualTo("pmState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 357 .isEqualTo("packageState".getBytes()); in testRunTask_whenQueueEmpty_doesNotChangeStateFiles() 571 .isEqualTo("package2State".getBytes()); in testRunTask_whenOnePackageAndWithPmState_doesNotInitializeTransportOrResetState() 786 .isEqualTo("newState".getBytes()); in testRunTask_whenSecondAgentUnavailable_commitsFirstAgentState() 881 .isEqualTo("packageState".getBytes()); in testRunTask_whenTransportGetBackupQuotaThrows_doesNotTouchFiles() 1024 .isEqualTo("oldState".getBytes()); in testRunTask_whenAgentOnBackupThrows_updatesFilesAndCleansUp() 1120 .isEqualTo("oldState".getBytes()); in testRunTask_whenAgentUsesProhibitedKey_updatesFilesAndCleansUp() 1395 .isEqualTo("newState".getBytes()); in testRunTask_whenFinishBackupSucceeds_updatesFilesAndCleansUp() 1418 .isEqualTo("newState".getBytes()); in testRunTask_whenFinishBackupSucceedsForPm_cleansUp() 1544 .isEqualTo("oldState".getBytes()); in testRunTask_whenTransportRejectsPackage_updatesFilesAndCleansUp() [all …]
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncTaskTest.java | 98 "mdata".getBytes(StandardCharsets.UTF_8); 143 TEST_CREDENTIAL.getBytes(), in setUp() 202 "4567".getBytes()), in hashCredentialsBySaltedSha256_returnsDifferentHashEvenIfConcatIsSame() 204 "567".getBytes()))); in hashCredentialsBySaltedSha256_returnsDifferentHashEvenIfConcatIsSame() 284 /*credential=*/ password.getBytes(), in run_useScryptToHashPasswordInTestMode() 325 /*credential=*/ pattern.getBytes(), in run_useSha256ToHashPatternInProdMode() 519 TEST_CREDENTIAL.getBytes()); in run_sendsEncryptedKeysIfAvailableToSync_withRawPublicKey() 642 password.getBytes(), in run_setsCorrectTypeForPassword() 673 /*credential=*/ pin.getBytes(), in run_setsCorrectTypeForPin() 704 "12345".getBytes(), in run_setsCorrectTypeForPattern() [all …]
|
H A D | TestOnlyInsecureCertificateHelperTest.java | 30 LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, "secret12345".getBytes())).isFalse(); in testDoesCredentailSupportInsecureMode_forNonWhitelistedPassword() 32 LockPatternUtils.CREDENTIAL_TYPE_PASSWORD, "1234".getBytes())).isFalse(); in testDoesCredentailSupportInsecureMode_forNonWhitelistedPassword() 39 TrustedRootCertificates.INSECURE_PASSWORD_PREFIX.getBytes())).isTrue(); in testDoesCredentailSupportInsecureMode_forWhitelistedPassword() 43 (TrustedRootCertificates.INSECURE_PASSWORD_PREFIX + "12").getBytes())).isTrue(); in testDoesCredentailSupportInsecureMode_forWhitelistedPassword() 50 TrustedRootCertificates.INSECURE_PASSWORD_PREFIX.getBytes())).isFalse(); in testDoesCredentailSupportInsecureMode_Pattern() 53 TrustedRootCertificates.INSECURE_PASSWORD_PREFIX.getBytes())).isFalse(); in testDoesCredentailSupportInsecureMode_Pattern()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/certificate/ |
H A D | CertUtilsTest.java | 124 assertThat(CertUtils.decodeBase64("VEVTVA==")).isEqualTo("TEST".getBytes(UTF_8)); in decodeBase64_succeeds() 139 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlRootNode_succeeds() 150 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_singleLevel_succeeds() 157 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_multipleLevels_succeeds() 164 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistFalse_succeedsIfNotExist() 173 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistAtLeastOne_throwsIfNotExist() 186 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistExactlyOne_throwsIfNotExist() 199 Element root = CertUtils.getXmlRootNode(XML_STR.getBytes(UTF_8)); in getXmlNodeContents_mustExistExactlyOne_throwsIfMultipleExist() 214 SIGNED_STR.getBytes(UTF_8)); in verifyRsaSha256Signature_succeeds() 219 byte[] modifiedBytes = SIGNED_STR.getBytes(UTF_8); in verifyRsaSha256Signature_throwsIfMismatchSignature() [all …]
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/utils/ |
H A D | TraceBufferTest.java | 97 byte[] toWrite1Bytes = toWrite1.getBytes(); in test_addItemMustOverwriteOne() 102 byte[] toWrite2Bytes = toWrite2.getBytes(); in test_addItemMustOverwriteOne() 109 byte[] toWrite3Bytes = toWrite3.getBytes(); in test_addItemMustOverwriteOne() 137 byte[] toWriteSmall1Bytes = toWriteSmall1.getBytes(); in test_addItemMustOverwriteMultiple() 142 byte[] toWriteSmall2Bytes = toWriteSmall2.getBytes(); in test_addItemMustOverwriteMultiple() 149 byte[] toWriteBigBytes = toWriteBig.getBytes(); in test_addItemMustOverwriteMultiple()
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | WeakEscrowTokenTests.java | 62 final byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenActivatedImmediatelyIfNoUserPassword() 75 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenActivatedLaterWithUserPassword() 96 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokensRemovedIfCredentialChanged() 125 byte[] token = "some-high-entropy-secure-token".getBytes(); in testWeakTokenRemovedListenerRegistered() 140 byte[] token0 = "some-high-entropy-secure-token-0".getBytes(); in testWeakTokenRemovedListenerUnregistered() 141 byte[] token1 = "some-high-entropy-secure-token-1".getBytes(); in testWeakTokenRemovedListenerUnregistered() 160 byte[] token = "some-high-entropy-secure-token".getBytes(); in testUnlockUserWithToken_weakEscrowToken()
|
/aosp14/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
H A D | KeySyncUtils.java | 56 "V1 THM_encrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 58 "V1 locally_encrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 60 "V1 encrypted_application_key".getBytes(StandardCharsets.UTF_8); 62 "V1 KF_claim".getBytes(StandardCharsets.UTF_8); 64 "V1 reencrypted_recovery_key".getBytes(StandardCharsets.UTF_8); 66 private static final byte[] THM_KF_HASH_PREFIX = "THM_KF_hash".getBytes(StandardCharsets.UTF_8);
|
/aosp14/frameworks/base/services/tests/servicestests/src/com/android/server/integrity/serializer/ |
H A D | RuleBinarySerializerTest.java | 144 getBytes( in testBinaryString_emptyRules() 209 getBytes( in testBinaryStream_serializeValidCompoundFormula() 247 byteArrayOutputStream.write(getBytes(expectedBits)); in testBinaryString_serializeValidCompoundFormula_notConnector() 297 byteArrayOutputStream.write(getBytes(expectedBits)); in testBinaryString_serializeValidCompoundFormula_andConnector() 347 byteArrayOutputStream.write(getBytes(expectedBits)); in testBinaryString_serializeValidCompoundFormula_orConnector() 380 byteArrayOutputStream.write(getBytes(expectedBits)); in testBinaryString_serializeValidAtomicFormula_stringValue() 501 byte[] expectedRules = getBytes(expectedBits); in testBinaryString_serializeFormatVersion() 566 getBytes( in testBinaryString_verifyManyRulesAreIndexedCorrectly() 588 getBytes( in testBinaryString_verifyManyRulesAreIndexedCorrectly() 601 getBytes( in testBinaryString_verifyManyRulesAreIndexedCorrectly() [all …]
|
/aosp14/frameworks/base/core/tests/coretests/src/android/graphics/ |
H A D | FontListParserTest.java | 222 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unpaired_family() 239 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unpaired_font() 258 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unpaired_axis() 275 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unclosed_family() 292 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unclosed_font() 311 try (InputStream is = new ByteArrayInputStream(xml.getBytes(StandardCharsets.UTF_8))) { in invalidXml_unclosed_axis() 378 xml.getBytes(StandardCharsets.UTF_8)); in readFamilies() 389 xml.getBytes(StandardCharsets.UTF_8)); in readFamily() 399 xml.getBytes(StandardCharsets.UTF_8)); in readNamedFamily()
|