/hardware/interfaces/drm/1.0/ |
IDrmPluginListener.hal | 36 * @param sessionId identifies the session the event originated from 39 oneway sendEvent(EventType eventType, SessionId sessionId, 47 * @param sessionId identifies the session the event originated from 52 oneway sendExpirationUpdate(SessionId sessionId, int64_t expiryTimeInMS); 59 * @param sessionId identifies the session the event originated from 65 oneway sendKeysChange(SessionId sessionId, vec<KeyStatus> keyStatusList,
|
IDrmPlugin.hal | 32 * in the sessionId parameter. 40 * @return sessionId the session ID for the newly opened session 42 openSession() generates (Status status, SessionId sessionId); 47 * @param sessionId the session id the call applies to 50 * opened, BAD_VALUE if the sessionId is invalid or ERROR_DRM_INVALID_STATE 53 closeSession(SessionId sessionId) generates (Status status); 61 * @param scope may be a sessionId or a keySetId, depending on the 63 * scope should be set to the sessionId the keys will be provided to [all...] |
types.hal | 224 typedef vec<uint8_t> SessionId;
|
/hardware/interfaces/drm/1.1/ |
IDrmPlugin.hal | 29 import @1.0::SessionId; 60 * @return sessionId the session ID for the newly opened session 63 SessionId sessionId); 75 * @param scope may be a sessionId or a keySetId, depending on the 77 * scope should be set to the sessionId the keys will be provided 169 * @param sessionId the session id the call applies to 172 * session is not opened, BAD_VALUE if the sessionId is invalid or 177 getSecurityLevel(vec<uint8_t> sessionId) generates(Status status,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
wtsapi32.h | 51 DWORD SessionId; 57 DWORD SessionId; 66 DWORD SessionId; 73 DWORD SessionId; 170 WINBOOL WINAPI WTSQuerySessionInformationW(HANDLE hServer,DWORD SessionId,WTS_INFO_CLASS WTSInfoClass,LPWSTR *ppBuffer,DWORD *pBytesReturned); 171 WINBOOL WINAPI WTSQuerySessionInformationA(HANDLE hServer,DWORD SessionId,WTS_INFO_CLASS WTSInfoClass,LPSTR *ppBuffer,DWORD *pBytesReturned); 176 WINBOOL WINAPI WTSSendMessageW(HANDLE hServer,DWORD SessionId,LPWSTR pTitle,DWORD TitleLength,LPWSTR pMessage,DWORD MessageLength,DWORD Style,DWORD Timeout,DWORD *pResponse,WINBOOL bWait); 177 WINBOOL WINAPI WTSSendMessageA(HANDLE hServer,DWORD SessionId,LPSTR pTitle,DWORD TitleLength,LPSTR pMessage,DWORD MessageLength,DWORD Style,DWORD Timeout,DWORD *pResponse,WINBOOL bWait); 178 WINBOOL WINAPI WTSDisconnectSession(HANDLE hServer,DWORD SessionId,WINBOOL bWait); 179 WINBOOL WINAPI WTSLogoffSession(HANDLE hServer,DWORD SessionId,WINBOOL bWait) [all...] |
ntddcdvd.h | 82 DVD_SESSION_ID SessionId; 138 DVD_SESSION_ID SessionId;
|
evntcons.h | 86 ULONG SessionId;
|
iscsidsc.h | 149 ISCSI_UNIQUE_SESSION_ID SessionId; 160 ISCSI_UNIQUE_SESSION_ID SessionId; 226 ISCSI_UNIQUE_SESSION_ID SessionId; 237 ISCSI_UNIQUE_SESSION_ID SessionId;
|
netioapi.h | 378 NET_IF_COMPARTMENT_ID NETIOAPI_API_ GetSessionCompartmentId (ULONG SessionId); 379 NETIO_STATUS NETIOAPI_API_ SetSessionCompartmentId (ULONG SessionId, NET_IF_COMPARTMENT_ID CompartmentId);
|
rpcdcep.h | 241 UUID SessionId;
|
winternl.h | 77 ULONG SessionId; 684 ULONG SessionId; [all...] |
rpcdce.h | 447 typedef RPC_STATUS (__RPC_API *RPC_NEW_HTTP_PROXY_CHANNEL)(RPC_HTTP_REDIRECTOR_STAGE RedirectorStage,unsigned short *ServerName,unsigned short *ServerPort,unsigned short *RemoteUser,unsigned short *AuthType,void *ResourceUuid,void *Metadata,void *SessionId,void *Interface,void *Reserved,unsigned __LONG32 Flags,unsigned short **NewServerName,unsigned short **NewServerPort);
|
/hardware/interfaces/drm/1.0/vts/functional/ |
drm_hal_clearkey_test.cpp | 49 using ::android::hardware::drm::V1_0::SessionId; 282 SessionId openSession(); 283 void closeSession(const SessionId& sessionId); 284 hidl_vec<uint8_t> loadKeys(const SessionId& sessionId, const KeyType& type); 331 SessionId DrmHalClearkeyPluginTest::openSession() { 332 SessionId sessionId; 335 [&sessionId](Status status, const SessionId& id) [all...] |
drm_hal_vendor_test.cpp | 56 using ::android::hardware::drm::V1_0::SessionId; 344 SessionId openSession(); 345 void closeSession(const SessionId& sessionId); 348 hidl_vec<uint8_t> loadKeys(const SessionId& sessionId, 423 SessionId DrmHalVendorPluginTest::openSession() { 424 SessionId sessionId; 426 auto res = drmPlugin->openSession([&](Status status, const SessionId& id) [all...] |
/hardware/interfaces/drm/1.1/vts/functional/ |
drm_hal_clearkey_test.cpp | 51 using ::android::hardware::drm::V1_0::SessionId; 167 SessionId openSession(); 168 SessionId openSession(SecurityLevel level); 169 void closeSession(const SessionId& sessionId); 170 hidl_vec<uint8_t> loadKeys(const SessionId& sessionId, const KeyType& type); 273 SessionId DrmHalClearkeyTest::openSession() { 274 SessionId sessionId; [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
IpmiNetFnChassis.h | 169 UINT32 SessionId;
239 UINT8 SessionId[4];
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/TlsLib/ |
TlsConfig.c | 356 @param[in] SessionId Session ID data used for session resumption. 368 IN UINT8 *SessionId, 378 if (TlsConn == NULL || TlsConn->Ssl == NULL || SessionId == NULL) { 388 CopyMem (Session->session_id, SessionId, Session->session_id_length); 786 @param[in,out] SessionId Buffer to contain the returned session ID. 798 IN OUT UINT8 *SessionId, 809 if (TlsConn == NULL || TlsConn->Ssl == NULL || SessionId == NULL || SessionIdLen == NULL) { 819 CopyMem (SessionId, SslSessionId, *SessionIdLen);
|
/frameworks/av/media/libeffects/lvm/wrapper/Bundle/ |
EffectBundle.h | 69 int SessionId; /* Current session id */
|
EffectBundle.cpp | 188 int32_t sessionId, 198 ALOGV("\n\tEffectCreate start session %d", sessionId); 212 // Find sessionNo: if one already exists for the sessionId use it, 215 if (SessionIndex[i] == sessionId) { 221 // do not break; allow loop to continue to search for a sessionId match. 230 SessionIndex[sessionNo] = sessionId; 231 ALOGV("\tEffectCreate: Allocating sessionNo %d for sessionId %d\n", sessionNo, sessionId); 237 ALOGV("\tEffectCreate - This is the first effect in current sessionId %d sessionNo %d", 238 sessionId, sessionNo) [all...] |
/external/webrtc/webrtc/p2p/base/ |
transportchannel.h | 68 virtual const std::string SessionId() const { return std::string(); }
|
dtlstransportchannel.h | 122 const std::string SessionId() const override { return channel_->SessionId(); }
|
p2ptransportchannel.cc | 425 SessionId(), transport_name(), component(), ice_ufrag_, ice_pwd_)); [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Include/Library/ |
TlsLib.h | 406 @param[in] SessionId Session ID data used for session resumption. 418 IN UINT8 *SessionId, 619 @param[in,out] SessionId Buffer to contain the returned session ID. 631 IN OUT UINT8 *SessionId,
|
/frameworks/av/drm/mediadrm/plugins/clearkey/hidl/include/ |
DrmPlugin.h | 41 using ::android::hardware::drm::V1_0::SessionId; 62 Return<Status> closeSession(const hidl_vec<uint8_t>& sessionId) override; 85 Return<Status> removeKeys(const hidl_vec<uint8_t>& sessionId) { 86 if (sessionId.size() == 0) { 93 const hidl_vec<uint8_t>& sessionId, 96 if (sessionId.size() == 0 || keySetId.size() == 0) { 103 const hidl_vec<uint8_t>& sessionId, 139 Return<void> getSecurityLevel(const hidl_vec<uint8_t>& sessionId, 159 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { 160 if (sessionId.size() == 0 || algorithm.size() == 0) [all...] |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/ |
jsse.jar | |