/system/extras/tests/uevents/ |
H A D | uevents.c | 25 char msg[UEVENT_MSG_LEN+2]; local 33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) { 34 msg[n] = '\0'; 35 msg[n+1] = '\0'; 38 if (msg[i] == '\0') 39 msg[i] = ' '; 41 printf("%s\n", msg);
|
/system/media/camera/src/ |
H A D | camera_metadata_tag_info.c | 698 const char *msg = "error: not an enum"; local 705 msg = "TRANSFORM_MATRIX"; 709 msg = "FAST"; 713 msg = "HIGH_QUALITY"; 717 msg = "error: enum value out of range"; 730 msg = "OFF"; 734 msg = "FAST"; 738 msg = "HIGH_QUALITY"; 742 msg = "error: enum value out of range"; 753 msg [all...] |
/system/core/libnetutils/ |
H A D | dhcpmsg.c | 24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) argument 28 memset(msg, 0, sizeof(dhcp_msg)); 30 msg->op = OP_BOOTREQUEST; 31 msg->htype = HTYPE_ETHER; 32 msg->hlen = 6; 33 msg->hops = 0; 35 msg->flags = htons(FLAGS_BROADCAST); 37 msg->xid = xid; 39 memcpy(msg->chaddr, hwaddr, 6); 41 x = msg 55 init_dhcp_discover_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid) argument 73 init_dhcp_request_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid, uint32_t ipaddr, uint32_t serveraddr) argument [all...] |
H A D | packet.h | 21 int send_packet(int s, int if_index, struct dhcp_msg *msg, int size, 23 int receive_packet(int s, struct dhcp_msg *msg);
|
H A D | dhcpclient.c | 166 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) argument 177 if (msg->options[0] != OPT_COOKIE1) return -1; 178 if (msg->options[1] != OPT_COOKIE2) return -1; 179 if (msg->options[2] != OPT_COOKIE3) return -1; 180 if (msg->options[3] != OPT_COOKIE4) return -1; 182 x = msg->options + 4; 232 info->ipaddr = msg->yiaddr; 249 void dump_dhcp_msg(dhcp_msg *msg, int len) argument 265 if (msg->op == OP_BOOTREQUEST) 267 else if (msg 344 send_message(int sock, int if_index, dhcp_msg *msg, int size) argument 353 is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) argument 394 dhcp_msg *msg; local [all...] |
/system/bt/embdrv/sbc/decoder/include/ |
H A D | oi_assert.h | 53 #define OI_ASSERT_FAIL(msg) \ 54 { OI_AssertFail(__FILE__, __LINE__, msg); } 60 #define OI_ASSERT_FAIL(msg)
|
/system/core/adb/ |
H A D | qemu_tracing.cpp | 63 char msg[1024]; local 66 vsnprintf(msg, sizeof(msg), fmt, args); 67 adb_write(adb_debug_qemu, msg, strlen(msg));
|
H A D | file_sync_service.cpp | 82 syncmsg msg; local 85 msg.stat.id = ID_STAT; 88 msg.stat.mode = 0; 89 msg.stat.size = 0; 90 msg.stat.time = 0; 92 msg.stat.mode = htoll(st.st_mode); 93 msg.stat.size = htoll(st.st_size); 94 msg.stat.time = htoll(st.st_mtime); 97 return WriteFdExactly(s, &msg.stat, sizeof(msg 105 syncmsg msg; local 156 syncmsg msg; local 179 syncmsg msg; local 275 syncmsg msg; local 376 syncmsg msg; local 416 syncmsg msg; local [all...] |
H A D | adb_auth.cpp | 47 p->msg.command = A_AUTH; 48 p->msg.arg0 = ADB_AUTH_TOKEN; 49 p->msg.data_length = ret; 66 p->msg.command = A_AUTH; 67 p->msg.arg0 = ADB_AUTH_SIGNATURE; 68 p->msg.data_length = ret; 85 p->msg.command = A_AUTH; 86 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY; 87 p->msg.data_length = ret;
|
H A D | transport_usb.cpp | 30 if(usb_read(t->usb, &p->msg, sizeof(amessage))){ 40 if(p->msg.data_length) { 41 if(usb_read(t->usb, p->data, p->msg.data_length)){ 57 unsigned size = p->msg.data_length; 59 if(usb_write(t->usb, &p->msg, sizeof(amessage))) { 63 if(p->msg.data_length == 0) return 0;
|
H A D | file_sync_client.cpp | 84 syncmsg msg; local 86 msg.req.id = ID_QUIT; 87 msg.req.namelen = 0; 89 WriteFdExactly(fd, &msg.req, sizeof(msg.req)); 96 syncmsg msg; local 103 msg.req.id = ID_LIST; 104 msg.req.namelen = htoll(len); 106 if(!WriteFdExactly(fd, &msg.req, sizeof(msg 144 syncmsg msg; local 170 syncmsg msg; local 187 syncmsg msg; local 204 syncmsg msg; local 340 syncmsg msg; local 424 syncmsg msg; local [all...] |
H A D | adb.cpp | 238 switch(p->msg.command){ 250 label, tag, p->msg.arg0, p->msg.arg1, p->msg.data_length); 251 count = p->msg.data_length; 275 p->msg.command = A_OKAY; 276 p->msg.arg0 = local; 277 p->msg.arg1 = remote; 285 p->msg.command = A_CLSE; 286 p->msg [all...] |
/system/core/libsysutils/src/ |
H A D | FrameworkClient.cpp | 16 int FrameworkClient::sendMsg(const char *msg) { argument 24 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1)); 26 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno)); 32 int FrameworkClient::sendMsg(const char *msg, const char *data) { argument 33 size_t bufflen = strlen(msg) + strlen(data) + 1; 39 snprintf(buffer, bufflen, "%s%s", msg, data);
|
/system/core/include/sysutils/ |
H A D | FrameworkClient.h | 16 int sendMsg(const char *msg); 17 int sendMsg(const char *msg, const char *data);
|
H A D | SocketClient.h | 48 int sendMsg(int code, const char *msg, bool addErrno); 49 int sendMsg(int code, const char *msg, bool addErrno, bool useCmdNum); 50 int sendMsg(const char *msg);
|
/system/keymaster/ |
H A D | android_keymaster_messages_test.cpp | 68 EmptyKeymasterResponse msg(ver); 69 msg.error = KM_ERROR_OK; 71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5)); 77 EmptyKeymasterResponse msg(ver); 78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); 185 GetKeyCharacteristicsResponse msg(ver); 186 msg.error = KM_ERROR_OK; 187 msg.enforced.Reinitialize(params, array_length(params)); 188 msg 467 GetVersionRequest msg; local 482 GetVersionResponse msg; local [all...] |
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); 55 SizedBuffer serialized_msg(msg.GetSerializedSize()); 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); 84 SizedBuffer serialized_msg(msg.GetSerializedSize()); 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); 115 SizedBuffer serialized_msg(msg 218 VerifyResponse msg; local 229 VerifyRequest msg; local 240 EnrollResponse msg; local 251 EnrollRequest msg; local 296 Message msg; local [all...] |
/system/core/fingerprintd/ |
H A D | FingerprintDaemonProxy.cpp | 44 void FingerprintDaemonProxy::hal_notify_callback(const fingerprint_msg_t *msg) { argument 52 switch (msg->type) { 54 ALOGD("onError(%d)", msg->data.error); 55 callback->onError(device, msg->data.error); 58 ALOGD("onAcquired(%d)", msg->data.acquired.acquired_info); 59 callback->onAcquired(device, msg->data.acquired.acquired_info); 63 msg->data.authenticated.finger.fid, 64 msg->data.authenticated.finger.gid); 65 if (msg->data.authenticated.finger.fid != 0) { 66 const uint8_t* hat = reinterpret_cast<const uint8_t *>(&msg [all...] |
/system/bt/stack/avdt/ |
H A D | avdt_ccb_act.c | 167 p_data->msg.discover_rsp.p_sep_info = sep_info; 168 p_data->msg.discover_rsp.num_seps = 0; 176 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use; 177 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1; 178 sep_info[p_data->msg.discover_rsp.num_seps].media_type = p_scb->cs.media_type; 179 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep; 181 p_data->msg.discover_rsp.num_seps++; 208 (tAVDT_CTRL *)(&p_data->msg.discover_rsp)); 229 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid); 231 p_data->msg 717 tAVDT_MSG msg; local [all...] |
/system/core/init/ |
H A D | log.cpp | 31 char msg[512]; local 32 vsnprintf(msg, sizeof(msg), fmt, ap); 37 iov[1].iov_base = msg; 38 iov[1].iov_len = strlen(msg);
|
/system/core/logwrapper/ |
H A D | logwrapper.c | 28 void fatal(const char *msg) { argument 29 fprintf(stderr, "%s", msg); 30 ALOG(LOG_ERROR, "logwrapper", "%s", msg);
|
/system/core/logd/tests/ |
H A D | logd_test.cpp | 190 log_msg *msg, unsigned int version, int lid) { 191 switch(msg->entry.hdr_size) { 196 case sizeof(msg->entry_v2): 203 fprintf(stderr, "%s: v%u[%u] ", prefix, version, msg->len()); 205 fprintf(stderr, "hdr_size=%u ", msg->entry.hdr_size); 208 msg->entry.pid, msg->entry.tid, msg->entry.sec, msg->entry.nsec); 213 fprintf(stderr, "euid=%u ", msg 189 dump_log_msg(const char *prefix, log_msg *msg, unsigned int version, int lid) argument 272 log_msg msg; local [all...] |
/system/core/libcutils/ |
H A D | debugger.c | 46 debugger_msg_t msg; local 47 memset(&msg, 0, sizeof(msg)); 48 msg.tid = tid; 49 msg.action = action; 70 if (send_request(sock_fd, &msg, sizeof(msg)) < 0) {
|
/system/core/debuggerd/test/ |
H A D | log_fake.cpp | 47 extern "C" int __android_log_buf_write(int, int, const char* tag, const char* msg) { argument 50 g_fake_log_buf += msg;
|
/system/bt/bta/av/ |
H A D | bta_av_api.c | 412 p_buf->msg.op_id = rc_id; 413 p_buf->msg.state = key_state; 414 p_buf->msg.p_pass_data = NULL; 415 p_buf->msg.pass_len = 0; 440 p_buf->msg.hdr.ctype = cmd_code; 441 p_buf->msg.hdr.subunit_type = AVRC_SUB_PANEL; 442 p_buf->msg.hdr.subunit_id = 0; 443 p_buf->msg.company_id = p_bta_av_cfg->company_id; 445 p_buf->msg.vendor_len = len; 448 p_buf->msg [all...] |