/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/ |
D | EapTestMessageDefinitions.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 40 hexStringToByteArray(EAP_REQUEST_TYPE_DATA); 43 public static final byte[] EAP_REQUEST_AKA = hexStringToByteArray("01" + ID + "000817050000"); 45 hexStringToByteArray("01" + ID + "000A17" + EAP_REQUEST_TYPE_DATA); 47 hexStringToByteArray("01" + ID + "000501"); 49 hexStringToByteArray("01" + ID + "00050100"); 53 public static final byte[] EAP_IDENTITY = hexStringToByteArray(EAP_IDENTITY_STRING); 55 hexStringToByteArray("02" + ID + "001501" + EAP_IDENTITY_STRING); 57 hexStringToByteArray("02" + ID + "000501"); 59 hexStringToByteArray("01" + ID + "000802AABBCC"); [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/simaka/attributes/ |
D | EapTestAttributeDefinitions.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 33 hexStringToByteArray("0F02" + AT_VERSION_LIST_DATA); 34 public static final byte[] AT_SELECTED_VERSION = hexStringToByteArray("10010001"); 36 public static final byte[] NONCE_MT = hexStringToByteArray(NONCE_MT_STRING); 37 public static final byte[] AT_NONCE_MT = hexStringToByteArray("07050000" + NONCE_MT_STRING); 38 public static final byte[] AT_PERMANENT_ID_REQ = hexStringToByteArray("0A010000"); 39 public static final byte[] AT_ANY_ID_REQ = hexStringToByteArray("0D010000"); 40 public static final byte[] AT_FULL_AUTH_ID_REQ = hexStringToByteArray("11010000"); 44 public static final byte[] IDENTITY = hexStringToByteArray(IDENTITY_STRING); 46 hexStringToByteArray("0E060011" + IDENTITY_STRING + "000000"); [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/crypto/ |
D | IkeMacPrfTest.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 192 byte[] skpBytes = TestUtils.hexStringToByteArray(PRF_KEY_HEX_STRING); in testSignBytesHmacSha1() 193 byte[] dataBytes = TestUtils.hexStringToByteArray(DATA_TO_SIGN_HEX_STRING); in testSignBytesHmacSha1() 197 byte[] expectedBytes = TestUtils.hexStringToByteArray(CALCULATED_MAC_HEX_STRING); in testSignBytesHmacSha1() 203 byte[] skpBytes = TestUtils.hexStringToByteArray(PRF_HMAC256_KEY_HEX_STRING); in testSignBytesHmacSha256() 204 byte[] dataBytes = TestUtils.hexStringToByteArray(PRF_HMAC256_DATA_TO_SIGN_HEX_STRING); in testSignBytesHmacSha256() 209 TestUtils.hexStringToByteArray(PRF_HMAC256_CALCULATED_MAC_HEX_STRING); in testSignBytesHmacSha256() 215 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testGenerateSKeySeedHmacSha1() 216 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testGenerateSKeySeedHmacSha1() 217 byte[] sharedDhKey = TestUtils.hexStringToByteArray(IKE_SHARED_DH_KEY_HEX_STRING); in testGenerateSKeySeedHmacSha1() [all …]
|
D | IkeMacIntegrityTest.java | 94 mHmacSha1IntegrityKey = TestUtils.hexStringToByteArray(INTEGRITY_KEY_HEX_STRING); in setUp() 96 mDataToAuthenticate = TestUtils.hexStringToByteArray(DATA_TO_AUTH_HEX_STRING); in setUp() 113 byte[] expectedChecksum = TestUtils.hexStringToByteArray(CHECKSUM_HEX_STRING); in testGenerateChecksum() 120 byte[] integrityKey = TestUtils.hexStringToByteArray(AUTH_AES_CMAC_96_KEY_HEX_STRING); in testGenerateChecksumAuthAesCmac96() 125 TestUtils.hexStringToByteArray(AUTH_AES_CMAC_96_DATA_TO_SIGN_HEX_STRING)); in testGenerateChecksumAuthAesCmac96() 128 TestUtils.hexStringToByteArray(AUTH_AES_CMAC_96_CALCULATED_MAC_HEX_STRING); in testGenerateChecksumAuthAesCmac96() 140 byte[] expectedChecksum = TestUtils.hexStringToByteArray(CHECKSUM_HEX_STRING); in testGenerateChecksumWithDifferentKey() 146 byte[] integrityKey = TestUtils.hexStringToByteArray(INTEGRITY_KEY_HEX_STRING + "0000"); in testGenerateChecksumWithInvalidKey() 170 byte[] encryptionKey = TestUtils.hexStringToByteArray(INTEGRITY_KEY_HEX_STRING + "00"); in buildIpSecAlgorithmWithInvalidKey() 184 byte[] skpBytes = TestUtils.hexStringToByteArray(AUTH_AES128XCBC_KEY_HEX_STRING); in testSignBytesAuthAes128XCbc() [all …]
|
D | IkeCombinedModeCipherTest.java | 91 mAesGcmKey = TestUtils.hexStringToByteArray(KEY); in setUp() 92 mIv = TestUtils.hexStringToByteArray(IV); in setUp() 94 TestUtils.hexStringToByteArray(ENCRYPTED_PADDED_DATA_WITH_CHECKSUM); in setUp() 95 mUnencryptedPaddedData = TestUtils.hexStringToByteArray(UNENCRYPTED_PADDED_DATA); in setUp() 96 mAdditionalAuthData = TestUtils.hexStringToByteArray(ADDITIONAL_AUTH_DATA); in setUp() 104 mChaChaPolyKey = TestUtils.hexStringToByteArray(CHACHA_POLY_KEY); in setUp() 105 mChaChaPolyIv = TestUtils.hexStringToByteArray(CHACHA_POLY_IV); in setUp() 107 TestUtils.hexStringToByteArray(CHACHA_POLY_ENCRYPTED_DATA_WITH_CHECKSUM); in setUp() 108 mChaChaPolyUnencryptedData = TestUtils.hexStringToByteArray(CHACHA_POLY_UNENCRYPTED_DATA); in setUp() 110 TestUtils.hexStringToByteArray(CHACHA_POLY_ADDITIONAL_AUTH_DATA); in setUp() [all …]
|
D | IkeNormalModeCipherTest.java | 94 mAesCbcKey = TestUtils.hexStringToByteArray(ENCR_KEY_FROM_INIT_TO_RESP); in setUp() 95 mIv = TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_IV); in setUp() 97 TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_ENCRYPT_PADDED_DATA); in setUp() 99 TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_UNENCRYPTED_PADDED_DATA); in setUp() 107 mAesCtrKey = TestUtils.hexStringToByteArray(AES_CTR_KEY); in setUp() 108 mAesCtrIv = TestUtils.hexStringToByteArray(AES_CTR_IV); in setUp() 109 mAesCtrEncryptedData = TestUtils.hexStringToByteArray(AES_CTR_ENCRYPT_DATA); in setUp() 110 mAesCtrUnencryptedData = TestUtils.hexStringToByteArray(AES_CTR_UNENCRYPTED_DATA); in setUp() 154 byte[] encryptionKey = TestUtils.hexStringToByteArray(ENCR_KEY_FROM_INIT_TO_RESP + "00"); in testEncryptWithWrongKey() 167 TestUtils.hexStringToByteArray( in testDecryptWithNormalCipherWithBadPad() [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/mschapv2/ |
D | EapMsChapV2PacketDefinitions.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 26 public static final byte[] CHALLENGE_BYTES = hexStringToByteArray(CHALLENGE); 30 public static final byte[] SERVER_NAME_BYTES = hexStringToByteArray(SERVER_NAME); 32 hexStringToByteArray("01" + ID + "002E10" + CHALLENGE + SERVER_NAME); 34 public static final byte[] CHALLENGE_REQUEST_WRONG_OP_CODE = hexStringToByteArray("02"); 36 public static final byte[] SHORT_CHALLENGE_BYTES = hexStringToByteArray(SHORT_CHALLENGE); 38 hexStringToByteArray("01" + ID + "002406" + SHORT_CHALLENGE + SERVER_NAME); 40 hexStringToByteArray("01" + ID + "000110" + CHALLENGE + SERVER_NAME); 42 hexStringToByteArray("01" + ID + "00FF10" + CHALLENGE + SERVER_NAME); 45 public static final byte[] PEER_CHALLENGE_BYTES = hexStringToByteArray(PEER_CHALLENGE); [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/ |
D | EapTtlsTest.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 77 hexStringToByteArray( 84 hexStringToByteArray( 95 hexStringToByteArray("6592788337ED192AA396532E0AE65579"); 97 hexStringToByteArray( 111 private static final byte[] CLIENT_HELLO_BYTES = hexStringToByteArray(CLIENT_HELLO_STRING); 146 hexStringToByteArray(SERVER_HELLO_INITIAL_FRAGMENT_STRING); 150 hexStringToByteArray(SERVER_HELLO_FINAL_FRAGMENT_STRING); 152 hexStringToByteArray( 168 hexStringToByteArray(CLIENT_FINISHED_STRING); [all …]
|
D | EapAkaPrimeTest.java | 21 import static com.android.internal.net.TestUtils.hexStringToByteArray; 57 hexStringToByteArray("7465737440616E64726F69642E6E6574"); 80 hexStringToByteArray( 86 hexStringToByteArray( 102 hexStringToByteArray( 108 hexStringToByteArray( 137 hexStringToByteArray( 142 hexStringToByteArray( 148 hexStringToByteArray( 157 hexStringToByteArray( [all …]
|
D | EapSimTest.java | 21 import static com.android.internal.net.TestUtils.hexStringToByteArray; 49 private static final byte[] NONCE = hexStringToByteArray("37f3ddd3954c4831a5ee08c574844398"); 54 hexStringToByteArray("7465737440616E64726F69642E6E6574"); 75 hexStringToByteArray( 80 private static final byte[] EMSK = hexStringToByteArray( 90 hexStringToByteArray( 96 hexStringToByteArray( 102 private static final byte[] EAP_SIM_START_REQUEST = hexStringToByteArray( 106 private static final byte[] EAP_SIM_START_RESPONSE = hexStringToByteArray( 111 private static final byte[] EAP_SIM_CHALLENGE_REQUEST = hexStringToByteArray( [all …]
|
D | EapAkaTest.java | 21 import static com.android.internal.net.TestUtils.hexStringToByteArray; 53 hexStringToByteArray("7465737440616E64726F69642E6E6574"); 67 hexStringToByteArray( 73 hexStringToByteArray( 85 hexStringToByteArray( 91 hexStringToByteArray( 120 hexStringToByteArray( 125 hexStringToByteArray( 131 hexStringToByteArray( 138 hexStringToByteArray( [all …]
|
D | EapMsChapV2Test.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 42 hexStringToByteArray("21402324255E262A28295F2B3A337C7E"); 44 hexStringToByteArray( 52 hexStringToByteArray("01110033" // EAP-Request | ID | length in bytes 58 hexStringToByteArray("0211003F" // EAP-Response | ID | length in bytes 67 hexStringToByteArray("01120047" // EAP-Request | ID | length in bytes 75 hexStringToByteArray("02120006" // EAP-Response | ID | length in bytes 78 hexStringToByteArray("01130049" // EAP-Request | ID | length in bytes 89 hexStringToByteArray("02130006" // EAP-Response | ID | length in bytes 92 private static final byte[] EAP_RESPONSE_NAK_PACKET = hexStringToByteArray("02100006031A");
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/message/ |
D | IkeEncryptedPayloadBodyTest.java | 196 TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_UNENCRYPTED_DATA); in setUp() 202 mDataToAuthenticate = TestUtils.hexStringToByteArray(hexStringToAuthenticate); in setUp() 204 TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_ENCRYPT_PADDED_DATA); in setUp() 206 TestUtils.hexStringToByteArray( in setUp() 213 mChecksum = TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_CHECKSUM); in setUp() 214 mIv = TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_IV); in setUp() 215 mPadding = TestUtils.hexStringToByteArray(IKE_AUTH_INIT_REQUEST_PADDING); in setUp() 228 mAesCbcKey = TestUtils.hexStringToByteArray(ENCR_KEY_FROM_INIT_TO_RESP); in setUp() 233 mHmacSha1IntegrityKey = TestUtils.hexStringToByteArray(INTE_KEY_FROM_INIT_TO_RESP); in setUp() 242 mAesGcmMsgKey = TestUtils.hexStringToByteArray(AES_GCM_MSG_ENCR_KEY); in setUp() [all …]
|
D | IkeSaPayloadTest.java | 266 byte[] inputPacket = TestUtils.hexStringToByteArray(ATTRIBUTE_RAW_PACKET); in testDecodeAttribute() 282 byte[] expectedBytes = TestUtils.hexStringToByteArray(ATTRIBUTE_RAW_PACKET); in testEncodeAttribute() 289 byte[] inputPacket = TestUtils.hexStringToByteArray(ENCR_TRANSFORM_RAW_PACKET); in testDecodeEncryptionTransform() 305 byte[] inputPacket = TestUtils.hexStringToByteArray(ENCR_TRANSFORM_RAW_PACKET); in testDecodeEncryptionTransformWithInvalidKeyLength() 326 byte[] expectedBytes = TestUtils.hexStringToByteArray(ENCR_TRANSFORM_RAW_PACKET); in testEncodeEncryptionTransform() 351 byte[] inputPacket = TestUtils.hexStringToByteArray(PRF_TRANSFORM_RAW_PACKET); in testDecodePrfTransform() 370 byte[] expectedBytes = TestUtils.hexStringToByteArray(PRF_TRANSFORM_RAW_PACKET); in testEncodePrfTransform() 386 byte[] inputPacket = TestUtils.hexStringToByteArray(INTEG_TRANSFORM_RAW_PACKET); in testDecodeIntegrityTransform() 402 byte[] inputPacket = TestUtils.hexStringToByteArray(INTEG_TRANSFORM_RAW_PACKET); in testDecodeIntegrityTransformWithUnrecognizedAttribute() 421 byte[] expectedBytes = TestUtils.hexStringToByteArray(INTEG_TRANSFORM_RAW_PACKET); in testEncodeIntegrityTransform() [all …]
|
D | IkeKePayloadTest.java | 104 byte[] inputPacket = TestUtils.hexStringToByteArray(KE_PAYLOAD_RAW_PACKET); in testDecodeIkeKePayload() 111 byte[] keyExchangeData = TestUtils.hexStringToByteArray(KEY_EXCHANGE_DATA_RAW_PACKET); in testDecodeIkeKePayload() 123 byte[] inputPacket = TestUtils.hexStringToByteArray(badKeyPayloadPacket); in testDecodeIkeKePayloadWithInvalidKeData() 134 byte[] inputPacket = TestUtils.hexStringToByteArray(KE_PAYLOAD_RAW_PACKET); in testEncodeIkeKePayload() 141 TestUtils.hexStringToByteArray(KE_PAYLOAD_GENERIC_HEADER + KE_PAYLOAD_RAW_PACKET); in testEncodeIkeKePayload() 173 byte[] remotePublicKey = TestUtils.hexStringToByteArray(REMOTE_PUBLIC_KEY_1024); in testGetSharedKey1024Modp() 178 byte[] expectedSharedKeyBytes = TestUtils.hexStringToByteArray(EXPECTED_SHARED_KEY_1024); in testGetSharedKey1024Modp() 215 byte[] remotePublicKey = TestUtils.hexStringToByteArray(publicKeyRemoteHex); in testGetSharedKey1536Modp() 220 byte[] expectedSharedKeyBytes = TestUtils.hexStringToByteArray(expectedSharedKeyHex); in testGetSharedKey1536Modp() 226 byte[] remotePublicKey = TestUtils.hexStringToByteArray(REMOTE_PUBLIC_KEY_1024); in testGetSharedkeyWithInvalidRemoteKey() [all …]
|
D | IkeAuthDigitalSignPayloadTest.java | 90 TestUtils.hexStringToByteArray("0001000200030004"); 92 TestUtils.hexStringToByteArray("0001000200"); 97 TestUtils.hexStringToByteArray(IKE_INIT_RESP_HEX_STRING); 99 TestUtils.hexStringToByteArray(NONCE_INIT_HEX_STRING); 101 TestUtils.hexStringToByteArray(ID_RESP_PAYLOAD_BODY_HEX_STRING); 102 private static final byte[] PRF_RESP_KEY = TestUtils.hexStringToByteArray(SKP_RESP_HEX_STRING); 115 TestUtils.hexStringToByteArray(AUTH_PAYLOAD_BODY_GENERIC_DIGITAL_SIGN_HEX_STRING); in testDecodeGenericDigitalSignPayload() 121 assertArrayEquals(dsPayload.signature, TestUtils.hexStringToByteArray(SIGNATURE)); in testDecodeGenericDigitalSignPayload() 179 TestUtils.hexStringToByteArray( in verifySignAndEncode() 187 TestUtils.hexStringToByteArray(AUTH_PAYLOAD_BODY_GENERIC_DIGITAL_SIGN_HEX_STRING); in testVerifyInboundSignature() [all …]
|
D | IkeConfigPayloadTest.java | 95 TestUtils.hexStringToByteArray(CONFIG_REQ_PAYLOAD_HEX); 97 TestUtils.hexStringToByteArray(CONFIG_RESP_PAYLOAD_HEX); 108 TestUtils.hexStringToByteArray("00010004c0000264"); 110 TestUtils.hexStringToByteArray("00010000"); 113 TestUtils.hexStringToByteArray("00020000"); 118 TestUtils.hexStringToByteArray("08080808"); 120 TestUtils.hexStringToByteArray("00030000"); 125 TestUtils.hexStringToByteArray("00060004c00002c8"); 127 TestUtils.hexStringToByteArray("00060000"); 130 TestUtils.hexStringToByteArray("c0000264fffffff0"); [all …]
|
D | IkeIdPayloadTest.java | 109 TestUtils.hexStringToByteArray(IPV4_ADDR_ID_PAYLOAD_RESPONDER_BODY_HEX_STRING); in testDecodeIpv4AddrIdPayload() 122 TestUtils.hexStringToByteArray(IPV6_ADDR_ID_PAYLOAD_RESPONDER_BODY_HEX_STRING); in testDecodeIpv6AddrIdPayload() 134 byte[] inputPacket = TestUtils.hexStringToByteArray(FQDN_ID_PAYLOAD_BODY_HEX_STRING); in testDecodeFqdnIdPayload() 147 byte[] inputPacket = TestUtils.hexStringToByteArray(RFC822_ADDR_ID_PAYLOAD_BODY_HEX_STRING); in testDecodeRfc822AddrIdPayload() 159 byte[] inputPacket = TestUtils.hexStringToByteArray(KEY_ID_PAYLOAD_BODY_HEX_STRING); in testDecodeKeyIdPayload() 171 byte[] inputPacket = TestUtils.hexStringToByteArray(ASN1_DN_PAYLOAD_BODY_HEX_STRING); in testDecodeDerAsn1DnIdPayload() 187 TestUtils.hexStringToByteArray(ASN1_DN_INVALID_PAYLOAD_BODY_HEX_STRING); in testDecodeInvalidDerAsn1DnIdPayload() 198 TestUtils.hexStringToByteArray(IPV4_ADDR_ID_PAYLOAD_RESPONDER_BODY_HEX_STRING); in testDecodeUnsupportedIdType() 217 TestUtils.hexStringToByteArray(IPV4_ADDR_ID_PAYLOAD_RESPONDER_HEX_STRING); in testConstructAndEncodeIpv4AddrIdPayload() 230 TestUtils.hexStringToByteArray(IPV6_ADDR_ID_PAYLOAD_RESPONDER_HEX_STRING); in testConstructAndEncodeIpv6AddrIdPayload() [all …]
|
D | IkeDeletePayloadTest.java | 56 ByteBuffer.wrap(TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING)); in testDecodeDeleteIkePayload() 75 ByteBuffer.wrap(TestUtils.hexStringToByteArray(DELETE_CHILD_PAYLOAD_HEX_STRING)); in testDecodeDeleteChildPayload() 95 byte[] deletePayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testDecodeWithInvalidProtocol() 110 byte[] deletePayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testDecodeWithInvalidSpiSize() 125 byte[] deletePayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testDecodeWithInvalidNumSpi() 140 byte[] deletePayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testDecodeWithInvalidNumSpiAndSpiSize() 202 byte[] expectedPayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testEncodeForIke() 215 TestUtils.hexStringToByteArray(DELETE_CHILD_PAYLOAD_HEX_STRING); in testEncodeWithSingleChildSa() 231 TestUtils.hexStringToByteArray(DELETE_MULTIPLE_CHILD_PAYLOAD_HEX_STRING); in testEncodeWithMultipleChildSas() 239 byte[] expectedPayloadBytes = TestUtils.hexStringToByteArray(DELETE_IKE_PAYLOAD_HEX_STRING); in testPayloadLengthForIke() [all …]
|
D | IkeAuthPayloadTest.java | 97 byte[] inputPacket = TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_HEX_STRING); in testDecodeIkeAuthPayload() 104 TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_SIGNATURE_HEX_STRING); in testDecodeIkeAuthPayload() 110 byte[] inputPacket = TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_HEX_STRING); in testDecodeIkeAuthPayloadWithUnsupportedMethod() 121 byte[] skpBytes = TestUtils.hexStringToByteArray(PSK_SKP_HEX_STRING); in testGetSignedOctets() 122 byte[] idBytes = TestUtils.hexStringToByteArray(PSK_ID_PAYLOAD_HEX_STRING); in testGetSignedOctets() 123 byte[] ikeInitRequest = TestUtils.hexStringToByteArray(PSK_IKE_INIT_REQUEST_HEX_STRING); in testGetSignedOctets() 124 byte[] nonceResp = TestUtils.hexStringToByteArray(PSK_NONCE_RESP_HEX_STRING); in testGetSignedOctets() 129 byte[] expectedBytes = TestUtils.hexStringToByteArray(PSK_INIT_SIGNED_OCTETS); in testGetSignedOctets()
|
D | IkeAuthPskPayloadTest.java | 69 private static final byte[] PSK = TestUtils.hexStringToByteArray(PSK_HEX_STRING); 71 TestUtils.hexStringToByteArray(PSK_IKE_INIT_REQUEST_HEX_STRING); 72 private static final byte[] NONCE = TestUtils.hexStringToByteArray(PSK_NONCE_RESP_HEX_STRING); 74 TestUtils.hexStringToByteArray(PSK_ID_INITIATOR_PAYLOAD_HEX_STRING); 75 private static final byte[] PRF_KEY = TestUtils.hexStringToByteArray(PSK_SKP_HEX_STRING); 77 TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_SIGNATURE_HEX_STRING); 98 byte[] expectedPayload = TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_HEX_STRING); in testBuildOutboundIkeAuthPskPayload() 108 byte[] payloadBody = TestUtils.hexStringToByteArray(PSK_AUTH_PAYLOAD_BODY_HEX_STRING); in buildPskPayload()
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/ipsec/ike/ |
D | SaRecordTest.java | 175 byte[] sKeySeed = TestUtils.hexStringToByteArray(IKE_SKEYSEED_HEX_STRING); in testMakeIkeSaRecord() 176 byte[] nonceInit = TestUtils.hexStringToByteArray(IKE_NONCE_INIT_HEX_STRING); in testMakeIkeSaRecord() 177 byte[] nonceResp = TestUtils.hexStringToByteArray(IKE_NONCE_RESP_HEX_STRING); in testMakeIkeSaRecord() 206 TestUtils.hexStringToByteArray(IKE_SK_D_HEX_STRING), ikeSaRecord.getSkD()); in testMakeIkeSaRecord() 208 TestUtils.hexStringToByteArray(IKE_SK_AUTH_INIT_HEX_STRING), in testMakeIkeSaRecord() 211 TestUtils.hexStringToByteArray(IKE_SK_AUTH_RESP_HEX_STRING), in testMakeIkeSaRecord() 214 TestUtils.hexStringToByteArray(IKE_SK_ENCR_INIT_HEX_STRING), in testMakeIkeSaRecord() 217 TestUtils.hexStringToByteArray(IKE_SK_ENCR_RESP_HEX_STRING), in testMakeIkeSaRecord() 220 TestUtils.hexStringToByteArray(IKE_SK_PRF_INIT_HEX_STRING), ikeSaRecord.getSkPi()); in testMakeIkeSaRecord() 222 TestUtils.hexStringToByteArray(IKE_SK_PRF_RESP_HEX_STRING), ikeSaRecord.getSkPr()); in testMakeIkeSaRecord() [all …]
|
/packages/modules/IPsec/tests/iketests/src/java/com/android/internal/net/eap/message/ttls/ |
D | EapTtlsAvpTest.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 46 hexStringToByteArray(AVP_DUMMY_DATA_PADDING_REQUIRED); 48 hexStringToByteArray(AVP_DUMMY_DATA_PADDING_NOT_REQUIRED); 70 hexStringToByteArray(EAP_MESSAGE_AVP_WITHOUT_VENDOR_ID_PADDING_REQUIRED); 72 hexStringToByteArray(EAP_MESSAGE_AVP_WITH_VENDOR_ID_PADDING_REQUIRED); 74 hexStringToByteArray( 80 hexStringToByteArray( 86 hexStringToByteArray( 92 hexStringToByteArray( 97 hexStringToByteArray( [all …]
|
D | EapTtlsTypeDataTest.java | 19 import static com.android.internal.net.TestUtils.hexStringToByteArray; 41 hexStringToByteArray(EAP_TTLS_REQUEST_DATA); 44 hexStringToByteArray("00" + EAP_TTLS_REQUEST_DATA); 46 hexStringToByteArray("20" + EAP_TTLS_REQUEST_DATA); 48 hexStringToByteArray("80" + "00000000" + EAP_TTLS_REQUEST_DATA); 49 private static final byte[] EAP_TTLS_REQUEST_START = hexStringToByteArray("20"); 51 private static final byte[] EAP_TTLS_REQUEST_START_NOT_SET = hexStringToByteArray("00"); 52 private static final byte[] EAP_TTLS_RESPONSE_ACK = hexStringToByteArray("00");
|
/packages/modules/IPsec/tests/iketests/src/java/android/net/ipsec/ike/ |
D | IkeTrafficSelectorTest.java | 103 TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING + TS_IPV4_TWO_HEX_STRING); in testDecodeIkeTrafficSelectors() 145 byte[] expectedBytes = TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING); in testBuildAndEncodeIkeTrafficSelector() 198 byte[] tsBytes = TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING); in testDecodeIkeTrafficSelectorWithInvalidTsType() 212 byte[] tsBytes = TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING); in testDecodeIkeTrafficSelectorWithInvalidIpProtocol() 226 byte[] tsBytes = TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING + "FFFF"); in testDecodeIkeTrafficSelectorWithExpectedTrailing() 239 byte[] tsBytes = TestUtils.hexStringToByteArray(TS_IPV4_ONE_HEX_STRING); in testDecodeIkeTrafficSelectorWithInvalidTsLength() 256 byte[] tsBytes = TestUtils.hexStringToByteArray(TX_IPV4_INVALID_PORT_RANGE_HEX_STRING); in testDecodeIkeTrafficSelectorWithInvalidPortRange() 269 byte[] tsBytes = TestUtils.hexStringToByteArray(TX_IPV4_INVALID_ADDRESS_RANGE_HEX_STRING); in testDecodeIkeTrafficSelectorWithInvalidAddressRange() 348 byte[] expectedBytes = TestUtils.hexStringToByteArray(TS_IPV6_THREE_HEX_ADDRESS); in testBuildAndEncodeIpv6TrafficSelector() 402 byte[] tsBytes = TestUtils.hexStringToByteArray(TS_IPV6_THREE_HEX_ADDRESS); in testDecodeIpv6TS() [all …]
|