Home
last modified time | relevance | path

Searched refs:String8 (Results 1 – 9 of 9) sorted by relevance

/cts/tests/tests/drm/lib/
DTestPlugin.h31 DrmConstraints* onGetConstraints(int uniqueId, const String8* path, int action);
33 DrmMetadata* onGetMetadata(int uniqueId, const String8* path);
41 bool onCanHandle(int uniqueId, const String8& path);
46 const String8& rightsPath, const String8& contentPath);
50 String8 onGetOriginalMimeType(int uniqueId, const String8& path, int fd);
52 int onGetDrmObjectType(int uniqueId, const String8& path, const String8& mimeType);
54 int onCheckRightsStatus(int uniqueId, const String8& path, int action);
62 int uniqueId, const String8& path, int action, const ActionDescription& description);
64 status_t onRemoveRights(int uniqueId, const String8& path);
DTestPlugin.cpp55 DrmMetadata* TestPlugIn::onGetMetadata(int uniqueId, const String8* path) { in onGetMetadata()
60 int uniqueId, const String8* path, int action) { in onGetConstraints()
87 const String8& rightsPath, const String8& contentPath) { in onSaveRights()
95 bool TestPlugIn::onCanHandle(int uniqueId, const String8& path) { in onCanHandle()
99 String8 TestPlugIn::onGetOriginalMimeType(int uniqueId, const String8& path, int fd) { in onGetOriginalMimeType()
100 return String8("video/none"); in onGetOriginalMimeType()
104 int uniqueId, const String8& path, const String8& mimeType) { in onGetDrmObjectType()
108 int TestPlugIn::onCheckRightsStatus(int uniqueId, const String8& path, int action) { in onCheckRightsStatus()
123 bool TestPlugIn::onValidateAction(int uniqueId, const String8& path, in onValidateAction()
128 status_t TestPlugIn::onRemoveRights(int uniqueId, const String8& path) { in onRemoveRights()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0415/
Dpoc.cpp60 bufferConsumer->setConsumerName(String8("dddddddddddddddd")); in main()
61 String8 str = bufferProducer->getConsumerName(); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21276/
Dpoc.cpp33 String8 kEmptyString = String8("");
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0318/
Dpoc.cpp36 data.writeString8(String8("com.android.systemui.doze.DozeScreenBrightness")); in poc()
108 String8 nm = s.getName(); in get_sensor_list()
110 String8 vd = s.getVendor(); in get_sensor_list()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-3913/
Dpoc.cpp37 const KeyedVector<String8, String8> *headers) { in setDataSource() argument
47 status_t setDataSource(const String8& rtpParams) { return OK; } in setDataSource()
/cts/hostsidetests/securitybulletin/securityPatch/Bug-137878930/
Dpoc.cpp28 using ::android::String8;
98 const String8 &appPackageName) { in makeDrmPlugin()
115 drmPlugin = makeDrmPlugin(drmFactories[i], uuid, String8("ele7enxxh")); in createPlugin()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0421/
Dpoc.cpp48 android::String8 str1{VULNERABLE_STRING}; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2025/
Dpoc.cpp48 String8 packageName("hexb1n");