Lines Matching defs:msg

188     char msg[1024];
191 vsnprintf(msg, sizeof(msg), fmt, args);
192 adb_write(adb_debug_qemu, msg, strlen(msg));
232 switch(p->msg.command){
244 label, tag, p->msg.arg0, p->msg.arg1, p->msg.data_length);
245 count = p->msg.data_length;
269 p->msg.command = A_OKAY;
270 p->msg.arg0 = local;
271 p->msg.arg1 = remote;
279 p->msg.command = A_CLSE;
280 p->msg.arg0 = local;
281 p->msg.arg1 = remote;
319 cp->msg.command = A_CNXN;
320 cp->msg.arg0 = A_VERSION;
321 cp->msg.arg1 = MAX_PAYLOAD;
322 cp->msg.data_length = fill_connect_data((char *)cp->data,
341 p->msg.command = A_AUTH;
342 p->msg.arg0 = ADB_AUTH_TOKEN;
343 p->msg.data_length = ret;
360 p->msg.command = A_AUTH;
361 p->msg.arg0 = ADB_AUTH_SIGNATURE;
362 p->msg.data_length = ret;
379 p->msg.command = A_AUTH;
380 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY;
381 p->msg.data_length = ret;
496 D("handle_packet() %c%c%c%c\n", ((char*) (&(p->msg.command)))[0],
497 ((char*) (&(p->msg.command)))[1],
498 ((char*) (&(p->msg.command)))[2],
499 ((char*) (&(p->msg.command)))[3]);
502 switch(p->msg.command){
504 if(p->msg.arg0){
532 if (p->msg.arg0 == ADB_AUTH_TOKEN) {
535 send_auth_response(p->data, p->msg.data_length, t);
540 } else if (p->msg.arg0 == ADB_AUTH_SIGNATURE) {
541 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) {
549 } else if (p->msg.arg0 == ADB_AUTH_RSAPUBLICKEY) {
550 adb_auth_confirm_key(p->data, p->msg.data_length, t);
557 name[p->msg.data_length > 0 ? p->msg.data_length - 1 : 0] = 0;
560 send_close(0, p->msg.arg0, t);
562 s->peer = create_remote_socket(p->msg.arg0, t);
572 if((s = find_local_socket(p->msg.arg1))) {
574 s->peer = create_remote_socket(p->msg.arg0, t);
584 if((s = find_local_socket(p->msg.arg1))) {
592 if((s = find_local_socket(p->msg.arg1))) {
593 unsigned rid = p->msg.arg0;
594 p->len = p->msg.data_length;
606 printf("handle_packet: what is %08x?!\n", p->msg.command);