Searched refs:String8 (Results 1 – 9 of 9) sorted by relevance
/cts/tests/tests/drm/lib/ |
D | TestPlugin.h | 31 DrmConstraints* onGetConstraints(int uniqueId, const String8* path, int action); 33 DrmMetadata* onGetMetadata(int uniqueId, const String8* path); 41 bool onCanHandle(int uniqueId, const String8& path); 46 const String8& rightsPath, const String8& contentPath); 50 String8 onGetOriginalMimeType(int uniqueId, const String8& path, int fd); 52 int onGetDrmObjectType(int uniqueId, const String8& path, const String8& mimeType); 54 int onCheckRightsStatus(int uniqueId, const String8& path, int action); 62 int uniqueId, const String8& path, int action, const ActionDescription& description); 64 status_t onRemoveRights(int uniqueId, const String8& path);
|
D | TestPlugin.cpp | 55 DrmMetadata* TestPlugIn::onGetMetadata(int uniqueId, const String8* path) { in onGetMetadata() 60 int uniqueId, const String8* path, int action) { in onGetConstraints() 87 const String8& rightsPath, const String8& contentPath) { in onSaveRights() 95 bool TestPlugIn::onCanHandle(int uniqueId, const String8& path) { in onCanHandle() 99 String8 TestPlugIn::onGetOriginalMimeType(int uniqueId, const String8& path, int fd) { in onGetOriginalMimeType() 100 return String8("video/none"); in onGetOriginalMimeType() 104 int uniqueId, const String8& path, const String8& mimeType) { in onGetDrmObjectType() 108 int TestPlugIn::onCheckRightsStatus(int uniqueId, const String8& path, int action) { in onCheckRightsStatus() 123 bool TestPlugIn::onValidateAction(int uniqueId, const String8& path, in onValidateAction() 128 status_t TestPlugIn::onRemoveRights(int uniqueId, const String8& path) { in onRemoveRights()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0415/ |
D | poc.cpp | 60 bufferConsumer->setConsumerName(String8("dddddddddddddddd")); in main() 61 String8 str = bufferProducer->getConsumerName(); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21276/ |
D | poc.cpp | 33 String8 kEmptyString = String8("");
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0318/ |
D | poc.cpp | 36 data.writeString8(String8("com.android.systemui.doze.DozeScreenBrightness")); in poc() 108 String8 nm = s.getName(); in get_sensor_list() 110 String8 vd = s.getVendor(); in get_sensor_list()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-3913/ |
D | poc.cpp | 37 const KeyedVector<String8, String8> *headers) { in setDataSource() argument 47 status_t setDataSource(const String8& rtpParams) { return OK; } in setDataSource()
|
/cts/hostsidetests/securitybulletin/securityPatch/Bug-137878930/ |
D | poc.cpp | 28 using ::android::String8; 98 const String8 &appPackageName) { in makeDrmPlugin() 115 drmPlugin = makeDrmPlugin(drmFactories[i], uuid, String8("ele7enxxh")); in createPlugin()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0421/ |
D | poc.cpp | 48 android::String8 str1{VULNERABLE_STRING}; in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2025/ |
D | poc.cpp | 48 String8 packageName("hexb1n");
|