Lines Matching refs:msg

194     char msg[1024];
197 vsnprintf(msg, sizeof(msg), fmt, args);
198 adb_write(adb_debug_qemu, msg, strlen(msg));
238 switch(p->msg.command){
250 label, tag, p->msg.arg0, p->msg.arg1, p->msg.data_length);
251 count = p->msg.data_length;
275 p->msg.command = A_OKAY;
276 p->msg.arg0 = local;
277 p->msg.arg1 = remote;
285 p->msg.command = A_CLSE;
286 p->msg.arg0 = local;
287 p->msg.arg1 = remote;
322 static void send_msg_with_header(int fd, const char* msg, size_t msglen) {
328 writex(fd, msg, msglen);
332 static void send_msg_with_okay(int fd, const char* msg, size_t msglen) {
338 writex(fd, msg, msglen);
345 cp->msg.command = A_CNXN;
346 cp->msg.arg0 = A_VERSION;
347 cp->msg.arg1 = MAX_PAYLOAD;
348 cp->msg.data_length = fill_connect_data((char *)cp->data,
367 p->msg.command = A_AUTH;
368 p->msg.arg0 = ADB_AUTH_TOKEN;
369 p->msg.data_length = ret;
386 p->msg.command = A_AUTH;
387 p->msg.arg0 = ADB_AUTH_SIGNATURE;
388 p->msg.data_length = ret;
405 p->msg.command = A_AUTH;
406 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY;
407 p->msg.data_length = ret;
528 D("handle_packet() %c%c%c%c\n", ((char*) (&(p->msg.command)))[0],
529 ((char*) (&(p->msg.command)))[1],
530 ((char*) (&(p->msg.command)))[2],
531 ((char*) (&(p->msg.command)))[3]);
534 switch(p->msg.command){
536 if(p->msg.arg0){
564 if (p->msg.arg0 == ADB_AUTH_TOKEN) {
568 send_auth_response(p->data, p->msg.data_length, t);
573 } else if (p->msg.arg0 == ADB_AUTH_SIGNATURE) {
574 if (adb_auth_verify(t->token, p->data, p->msg.data_length)) {
582 } else if (p->msg.arg0 == ADB_AUTH_RSAPUBLICKEY) {
583 adb_auth_confirm_key(p->data, p->msg.data_length, t);
588 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 == 0) {
590 name[p->msg.data_length > 0 ? p->msg.data_length - 1 : 0] = 0;
593 send_close(0, p->msg.arg0, t);
595 s->peer = create_remote_socket(p->msg.arg0, t);
604 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 != 0) {
605 if((s = find_local_socket(p->msg.arg1, 0))) {
608 s->peer = create_remote_socket(p->msg.arg0, t);
611 } else if (s->peer->id == p->msg.arg0) {
616 p->msg.arg0, p->msg.arg1, s->peer->id, p->msg.arg1, t->serial);
623 if (t->online && p->msg.arg1 != 0) {
624 if((s = find_local_socket(p->msg.arg1, p->msg.arg0))) {
625 /* According to protocol.txt, p->msg.arg0 might be 0 to indicate
635 if (p->msg.arg0 == 0 && s->peer && s->peer->transport != t) {
637 p->msg.arg1, t->serial, s->peer->transport->serial);
646 if (t->online && p->msg.arg0 != 0 && p->msg.arg1 != 0) {
647 if((s = find_local_socket(p->msg.arg1, p->msg.arg0))) {
648 unsigned rid = p->msg.arg0;
649 p->len = p->msg.data_length;
661 printf("handle_packet: what is %08x?!\n", p->msg.command);