Lines Matching refs:message

79  * obtain a key request message and send it to the license server, then provide
459 * the provisioning server. The request message data is obtained using
469 * server. The request message data is obtained using {@link #getKeyRequest}.
576 Log.e(TAG, "Unknown message type " + msg.what);
695 * Get the opaque message data
709 * Get the default URL to use when sending the key request message to a
761 * @param optionalParameters are included in the key request message to
762 * allow a client application to provide additional message parameters to the server.
836 * Get the opaque message data
851 * message to a server, if known. The app may prefer to use a different
918 * secure stop message to the server which verifies the signature and notifies the
921 * received the message using releaseSecureStops().
935 * Process the SecureStop server response message ssRelease. After authenticating
936 * the message, remove the SecureStops identified in the response.
1043 @NonNull byte[] keyId, @NonNull byte[] message);
1047 @NonNull byte[] keyId, @NonNull byte[] message, @NonNull byte[] signature);
1114 * @param message the data for which a signature is to be computed
1117 public byte[] sign(@NonNull byte[] keyid, @NonNull byte[] message) {
1118 return signNative(MediaDrm.this, mSessionId, keyid, message);
1126 * @param message the data to verify
1131 @NonNull byte[] keyid, @NonNull byte[] message, @NonNull byte[] signature) {
1132 return verifyNative(MediaDrm.this, mSessionId, keyid, message, signature);
1179 * Get the opaque message data
1186 * message to a server, if known. The app may prefer to use a different
1282 @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message);
1291 * @param message the data for which a signature is to be computed
1298 @NonNull byte[] wrappedKey, @NonNull byte[] message) {
1299 return signRSANative(this, sessionId, algorithm, wrappedKey, message);