Searched refs:msg (Results 1 - 25 of 112) sorted by relevance

12345

/system/extras/tests/uevents/
H A Duevents.c25 char msg[UEVENT_MSG_LEN+2]; local
33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) {
34 msg[n] = '\0';
35 msg[n+1] = '\0';
38 if (msg[i] == '\0')
39 msg[i] = ' ';
41 printf("%s\n", msg);
/system/media/camera/src/
H A Dcamera_metadata_tag_info.c698 const char *msg = "error: not an enum"; local
705 msg = "TRANSFORM_MATRIX";
709 msg = "FAST";
713 msg = "HIGH_QUALITY";
717 msg = "error: enum value out of range";
730 msg = "OFF";
734 msg = "FAST";
738 msg = "HIGH_QUALITY";
742 msg = "error: enum value out of range";
753 msg
[all...]
/system/core/libnetutils/
H A Ddhcpmsg.c24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) argument
28 memset(msg, 0, sizeof(dhcp_msg));
30 msg->op = OP_BOOTREQUEST;
31 msg->htype = HTYPE_ETHER;
32 msg->hlen = 6;
33 msg->hops = 0;
35 msg->flags = htons(FLAGS_BROADCAST);
37 msg->xid = xid;
39 memcpy(msg->chaddr, hwaddr, 6);
41 x = msg
55 init_dhcp_discover_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid) argument
73 init_dhcp_request_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid, uint32_t ipaddr, uint32_t serveraddr) argument
[all...]
H A Dpacket.h21 int send_packet(int s, int if_index, struct dhcp_msg *msg, int size,
23 int receive_packet(int s, struct dhcp_msg *msg);
H A Ddhcpclient.c166 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) argument
177 if (msg->options[0] != OPT_COOKIE1) return -1;
178 if (msg->options[1] != OPT_COOKIE2) return -1;
179 if (msg->options[2] != OPT_COOKIE3) return -1;
180 if (msg->options[3] != OPT_COOKIE4) return -1;
182 x = msg->options + 4;
232 info->ipaddr = msg->yiaddr;
249 void dump_dhcp_msg(dhcp_msg *msg, int len) argument
265 if (msg->op == OP_BOOTREQUEST)
267 else if (msg
344 send_message(int sock, int if_index, dhcp_msg *msg, int size) argument
353 is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) argument
394 dhcp_msg *msg; local
[all...]
/system/bt/embdrv/sbc/decoder/include/
H A Doi_assert.h53 #define OI_ASSERT_FAIL(msg) \
54 { OI_AssertFail(__FILE__, __LINE__, msg); }
60 #define OI_ASSERT_FAIL(msg)
/system/core/adb/
H A Dqemu_tracing.cpp63 char msg[1024]; local
66 vsnprintf(msg, sizeof(msg), fmt, args);
67 adb_write(adb_debug_qemu, msg, strlen(msg));
H A Dfile_sync_service.cpp82 syncmsg msg; local
85 msg.stat.id = ID_STAT;
88 msg.stat.mode = 0;
89 msg.stat.size = 0;
90 msg.stat.time = 0;
92 msg.stat.mode = htoll(st.st_mode);
93 msg.stat.size = htoll(st.st_size);
94 msg.stat.time = htoll(st.st_mtime);
97 return WriteFdExactly(s, &msg.stat, sizeof(msg
105 syncmsg msg; local
156 syncmsg msg; local
179 syncmsg msg; local
275 syncmsg msg; local
376 syncmsg msg; local
416 syncmsg msg; local
[all...]
H A Dadb_auth.cpp47 p->msg.command = A_AUTH;
48 p->msg.arg0 = ADB_AUTH_TOKEN;
49 p->msg.data_length = ret;
66 p->msg.command = A_AUTH;
67 p->msg.arg0 = ADB_AUTH_SIGNATURE;
68 p->msg.data_length = ret;
85 p->msg.command = A_AUTH;
86 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY;
87 p->msg.data_length = ret;
H A Dtransport_usb.cpp30 if(usb_read(t->usb, &p->msg, sizeof(amessage))){
40 if(p->msg.data_length) {
41 if(usb_read(t->usb, p->data, p->msg.data_length)){
57 unsigned size = p->msg.data_length;
59 if(usb_write(t->usb, &p->msg, sizeof(amessage))) {
63 if(p->msg.data_length == 0) return 0;
H A Dfile_sync_client.cpp84 syncmsg msg; local
86 msg.req.id = ID_QUIT;
87 msg.req.namelen = 0;
89 WriteFdExactly(fd, &msg.req, sizeof(msg.req));
96 syncmsg msg; local
103 msg.req.id = ID_LIST;
104 msg.req.namelen = htoll(len);
106 if(!WriteFdExactly(fd, &msg.req, sizeof(msg
144 syncmsg msg; local
170 syncmsg msg; local
187 syncmsg msg; local
204 syncmsg msg; local
340 syncmsg msg; local
424 syncmsg msg; local
[all...]
H A Dadb.cpp238 switch(p->msg.command){
250 label, tag, p->msg.arg0, p->msg.arg1, p->msg.data_length);
251 count = p->msg.data_length;
275 p->msg.command = A_OKAY;
276 p->msg.arg0 = local;
277 p->msg.arg1 = remote;
285 p->msg.command = A_CLSE;
286 p->msg
[all...]
/system/core/libsysutils/src/
H A DFrameworkClient.cpp16 int FrameworkClient::sendMsg(const char *msg) { argument
24 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1));
26 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno));
32 int FrameworkClient::sendMsg(const char *msg, const char *data) { argument
33 size_t bufflen = strlen(msg) + strlen(data) + 1;
39 snprintf(buffer, bufflen, "%s%s", msg, data);
/system/core/include/sysutils/
H A DFrameworkClient.h16 int sendMsg(const char *msg);
17 int sendMsg(const char *msg, const char *data);
H A DSocketClient.h48 int sendMsg(int code, const char *msg, bool addErrno);
49 int sendMsg(int code, const char *msg, bool addErrno, bool useCmdNum);
50 int sendMsg(const char *msg);
/system/keymaster/
H A Dandroid_keymaster_messages_test.cpp68 EmptyKeymasterResponse msg(ver);
69 msg.error = KM_ERROR_OK;
71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5));
77 EmptyKeymasterResponse msg(ver);
78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4));
185 GetKeyCharacteristicsResponse msg(ver);
186 msg.error = KM_ERROR_OK;
187 msg.enforced.Reinitialize(params, array_length(params));
188 msg
467 GetVersionRequest msg; local
482 GetVersionResponse msg; local
[all...]
/system/gatekeeper/tests/
H A Dgatekeeper_messages_test.cpp54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL);
55 SizedBuffer serialized_msg(msg.GetSerializedSize());
56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length);
68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled);
84 SizedBuffer serialized_msg(msg.GetSerializedSize());
85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length);
97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password);
115 SizedBuffer serialized_msg(msg
218 VerifyResponse msg; local
229 VerifyRequest msg; local
240 EnrollResponse msg; local
251 EnrollRequest msg; local
296 Message msg; local
[all...]
/system/core/fingerprintd/
H A DFingerprintDaemonProxy.cpp44 void FingerprintDaemonProxy::hal_notify_callback(const fingerprint_msg_t *msg) { argument
52 switch (msg->type) {
54 ALOGD("onError(%d)", msg->data.error);
55 callback->onError(device, msg->data.error);
58 ALOGD("onAcquired(%d)", msg->data.acquired.acquired_info);
59 callback->onAcquired(device, msg->data.acquired.acquired_info);
63 msg->data.authenticated.finger.fid,
64 msg->data.authenticated.finger.gid);
65 if (msg->data.authenticated.finger.fid != 0) {
66 const uint8_t* hat = reinterpret_cast<const uint8_t *>(&msg
[all...]
/system/bt/stack/avdt/
H A Davdt_ccb_act.c167 p_data->msg.discover_rsp.p_sep_info = sep_info;
168 p_data->msg.discover_rsp.num_seps = 0;
176 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use;
177 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1;
178 sep_info[p_data->msg.discover_rsp.num_seps].media_type = p_scb->cs.media_type;
179 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep;
181 p_data->msg.discover_rsp.num_seps++;
208 (tAVDT_CTRL *)(&p_data->msg.discover_rsp));
229 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid);
231 p_data->msg
717 tAVDT_MSG msg; local
[all...]
/system/core/init/
H A Dlog.cpp31 char msg[512]; local
32 vsnprintf(msg, sizeof(msg), fmt, ap);
37 iov[1].iov_base = msg;
38 iov[1].iov_len = strlen(msg);
/system/core/logwrapper/
H A Dlogwrapper.c28 void fatal(const char *msg) { argument
29 fprintf(stderr, "%s", msg);
30 ALOG(LOG_ERROR, "logwrapper", "%s", msg);
/system/core/logd/tests/
H A Dlogd_test.cpp190 log_msg *msg, unsigned int version, int lid) {
191 switch(msg->entry.hdr_size) {
196 case sizeof(msg->entry_v2):
203 fprintf(stderr, "%s: v%u[%u] ", prefix, version, msg->len());
205 fprintf(stderr, "hdr_size=%u ", msg->entry.hdr_size);
208 msg->entry.pid, msg->entry.tid, msg->entry.sec, msg->entry.nsec);
213 fprintf(stderr, "euid=%u ", msg
189 dump_log_msg(const char *prefix, log_msg *msg, unsigned int version, int lid) argument
272 log_msg msg; local
[all...]
/system/core/libcutils/
H A Ddebugger.c46 debugger_msg_t msg; local
47 memset(&msg, 0, sizeof(msg));
48 msg.tid = tid;
49 msg.action = action;
70 if (send_request(sock_fd, &msg, sizeof(msg)) < 0) {
/system/core/debuggerd/test/
H A Dlog_fake.cpp47 extern "C" int __android_log_buf_write(int, int, const char* tag, const char* msg) { argument
50 g_fake_log_buf += msg;
/system/bt/bta/av/
H A Dbta_av_api.c412 p_buf->msg.op_id = rc_id;
413 p_buf->msg.state = key_state;
414 p_buf->msg.p_pass_data = NULL;
415 p_buf->msg.pass_len = 0;
440 p_buf->msg.hdr.ctype = cmd_code;
441 p_buf->msg.hdr.subunit_type = AVRC_SUB_PANEL;
442 p_buf->msg.hdr.subunit_id = 0;
443 p_buf->msg.company_id = p_bta_av_cfg->company_id;
445 p_buf->msg.vendor_len = len;
448 p_buf->msg
[all...]

Completed in 414 milliseconds

12345