/system/extras/tests/uevents/ |
H A D | uevents.c | 25 char msg[UEVENT_MSG_LEN+2]; local 33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) { 34 msg[n] = '\0'; 35 msg[n+1] = '\0'; 38 if (msg[i] == '\0') 39 msg[i] = ' '; 41 printf("%s\n", msg);
|
/system/media/camera/src/ |
H A D | camera_metadata_tag_info.c | 710 const char *msg = "error: not an enum"; local 717 msg = "TRANSFORM_MATRIX"; 721 msg = "FAST"; 725 msg = "HIGH_QUALITY"; 729 msg = "error: enum value out of range"; 742 msg = "OFF"; 746 msg = "FAST"; 750 msg = "HIGH_QUALITY"; 754 msg = "error: enum value out of range"; 765 msg [all...] |
/system/core/libnetutils/ |
H A D | dhcpmsg.c | 24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) argument 28 memset(msg, 0, sizeof(dhcp_msg)); 30 msg->op = OP_BOOTREQUEST; 31 msg->htype = HTYPE_ETHER; 32 msg->hlen = 6; 33 msg->hops = 0; 35 msg->flags = htons(FLAGS_BROADCAST); 37 msg->xid = xid; 39 memcpy(msg->chaddr, hwaddr, 6); 41 x = msg 55 init_dhcp_discover_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid) argument 73 init_dhcp_request_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid, uint32_t ipaddr, uint32_t serveraddr) argument [all...] |
H A D | packet.h | 21 int send_packet(int s, int if_index, struct dhcp_msg *msg, int size, 23 int receive_packet(int s, struct dhcp_msg *msg);
|
H A D | dhcpclient.c | 166 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) argument 177 if (msg->options[0] != OPT_COOKIE1) return -1; 178 if (msg->options[1] != OPT_COOKIE2) return -1; 179 if (msg->options[2] != OPT_COOKIE3) return -1; 180 if (msg->options[3] != OPT_COOKIE4) return -1; 182 x = msg->options + 4; 232 info->ipaddr = msg->yiaddr; 249 void dump_dhcp_msg(dhcp_msg *msg, int len) argument 265 if (msg->op == OP_BOOTREQUEST) 267 else if (msg 344 send_message(int sock, int if_index, dhcp_msg *msg, int size) argument 353 is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) argument 394 dhcp_msg *msg; local [all...] |
/system/bt/embdrv/sbc/decoder/include/ |
H A D | oi_assert.h | 53 #define OI_ASSERT_FAIL(msg) \ 54 { OI_AssertFail(__FILE__, __LINE__, msg); } 60 #define OI_ASSERT_FAIL(msg)
|
/system/core/libsysutils/src/ |
H A D | FrameworkClient.cpp | 16 int FrameworkClient::sendMsg(const char *msg) { argument 24 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1)); 26 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno)); 32 int FrameworkClient::sendMsg(const char *msg, const char *data) { argument 33 size_t bufflen = strlen(msg) + strlen(data) + 1; 39 snprintf(buffer, bufflen, "%s%s", msg, data);
|
/system/connectivity/shill/net/ |
H A D | netlink_message_matchers.h | 39 const Nl80211Message* msg = static_cast<const Nl80211Message*>(arg); local 40 if (msg->command() != command) { 42 << " (it's a " << +msg->command() << ")"; 55 const Nl80211Message* msg = static_cast<const Nl80211Message*>(arg); local 56 if (msg->command() != NL80211_CMD_SET_WOWLAN) { 61 if (!msg->const_attributes()->GetU32AttributeValue(NL80211_ATTR_WIPHY, 67 if (msg->const_attributes()->ConstGetNestedAttributeList( 86 const Nl80211Message* msg = reinterpret_cast<const Nl80211Message*>(arg); local 87 if (msg->command() != NL80211_CMD_TRIGGER_SCAN) { 92 if (!msg 134 const Nl80211Message* msg = reinterpret_cast<const Nl80211Message*>(arg); local [all...] |
/system/core/adb/ |
H A D | file_sync_service.cpp | 83 syncmsg msg; local 84 msg.stat.id = ID_STAT; 90 msg.stat.mode = st.st_mode; 91 msg.stat.size = st.st_size; 92 msg.stat.time = st.st_mtime; 94 return WriteFdExactly(s, &msg.stat, sizeof(msg.stat)); 100 syncmsg msg; local 101 msg.dent.id = ID_DENT; 112 msg 139 syncmsg msg; local 151 syncmsg msg; local 260 syncmsg msg; local 359 syncmsg msg; local [all...] |
H A D | adb_auth.cpp | 47 p->msg.command = A_AUTH; 48 p->msg.arg0 = ADB_AUTH_TOKEN; 49 p->msg.data_length = ret; 66 p->msg.command = A_AUTH; 67 p->msg.arg0 = ADB_AUTH_SIGNATURE; 68 p->msg.data_length = ret; 85 p->msg.command = A_AUTH; 86 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY; 87 p->msg.data_length = ret;
|
H A D | transport_usb.cpp | 30 if(usb_read(t->usb, &p->msg, sizeof(amessage))){ 40 if(p->msg.data_length) { 41 if(usb_read(t->usb, p->data, p->msg.data_length)){ 57 unsigned size = p->msg.data_length; 59 if(usb_write(t->usb, &p->msg, sizeof(amessage))) { 63 if(p->msg.data_length == 0) return 0;
|
/system/core/base/ |
H A D | errors_windows.cpp | 49 std::string msg; local 50 if (!android::base::WideToUTF8(msgbuf, &msg)) { 57 msg = android::base::Trim(msg); 63 android::base::StringAppendF(&msg, " (%lu)", error_code); 64 return msg;
|
/system/keymaster/ |
H A D | android_keymaster_messages_test.cpp | 68 EmptyKeymasterResponse msg(ver); 69 msg.error = KM_ERROR_OK; 71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5)); 77 EmptyKeymasterResponse msg(ver); 78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); 185 GetKeyCharacteristicsResponse msg(ver); 186 msg.error = KM_ERROR_OK; 187 msg.enforced.Reinitialize(params, array_length(params)); 188 msg 477 GetVersionRequest msg; local 492 GetVersionResponse msg; local [all...] |
/system/core/include/sysutils/ |
H A D | FrameworkClient.h | 16 int sendMsg(const char *msg); 17 int sendMsg(const char *msg, const char *data);
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper_ipc.c | 50 struct gatekeeper_message *msg = malloc(msg_size); local 51 msg->cmd = cmd; 52 memcpy(msg->payload, in, in_size); 54 ssize_t rc = write(handle_, msg, msg_size); 55 free(msg); 75 msg = (struct gatekeeper_message *) out; 77 if ((cmd | GK_RESP_BIT) != msg->cmd) { 78 ALOGE("invalid command (%d)\n", msg->cmd);
|
/system/core/debuggerd/ |
H A D | signal_sender.cpp | 88 signal_message msg; local 89 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg))); 93 } else if (rc != sizeof(msg)) { 100 if (msg.tid > 0) { 101 if (syscall(SYS_tgkill, msg.pid, msg.tid, msg.signal) != 0) { 105 if (kill(msg.pid, msg 155 signal_message msg = {.pid = pid, .tid = tid, .signal = signal }; local [all...] |
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); 55 SizedBuffer serialized_msg(msg.GetSerializedSize()); 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); 84 SizedBuffer serialized_msg(msg.GetSerializedSize()); 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); 115 SizedBuffer serialized_msg(msg 218 VerifyResponse msg; local 229 VerifyRequest msg; local 240 EnrollResponse msg; local 251 EnrollRequest msg; local 296 Message msg; local [all...] |
/system/connectivity/shill/test-scripts/ |
H A D | connection_manager.js | 27 var msg = { 32 window.parent.postMessage(msg, chromeos.connectionManager.parent_page_url_); 36 var msg = { 40 window.parent.postMessage(msg, chromeos.connectionManager.parent_page_url_);
|
/system/connectivity/shill/shims/ |
H A D | set_apn_helper.c | 55 DBusMessage *msg; local 84 msg = dbus_message_new_method_call(CONNMAN_SERVICE, 88 if (msg == NULL) { 94 dbus_message_set_no_reply(msg, TRUE); 96 dbus_message_iter_init_append(msg, &iter); 121 dbus_message_unref(msg); 138 dbus_connection_send(conn, msg, NULL); 140 dbus_message_unref(msg);
|
/system/core/fingerprintd/ |
H A D | FingerprintDaemonProxy.cpp | 44 void FingerprintDaemonProxy::hal_notify_callback(const fingerprint_msg_t *msg) { argument 52 switch (msg->type) { 54 ALOGD("onError(%d)", msg->data.error); 55 callback->onError(device, msg->data.error); 58 ALOGD("onAcquired(%d)", msg->data.acquired.acquired_info); 59 callback->onAcquired(device, msg->data.acquired.acquired_info); 63 msg->data.authenticated.finger.fid, 64 msg->data.authenticated.finger.gid); 65 if (msg->data.authenticated.finger.fid != 0) { 66 const uint8_t* hat = reinterpret_cast<const uint8_t *>(&msg [all...] |
/system/bt/stack/avdt/ |
H A D | avdt_ccb_act.c | 164 p_data->msg.discover_rsp.p_sep_info = sep_info; 165 p_data->msg.discover_rsp.num_seps = 0; 173 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use; 174 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1; 175 sep_info[p_data->msg.discover_rsp.num_seps].media_type = p_scb->cs.media_type; 176 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep; 178 p_data->msg.discover_rsp.num_seps++; 205 (tAVDT_CTRL *)(&p_data->msg.discover_rsp)); 226 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid); 228 p_data->msg 714 tAVDT_MSG msg; local [all...] |
/system/connectivity/dhcp_client/ |
H A D | dhcp_message_unittest.cc | 181 DHCPMessage msg; local 184 &msg)); 185 EXPECT_EQ(kDHCPMessageTypeOffer, msg.message_type()); 187 msg.transaction_id()); 189 msg.server_identifier()); 191 msg.lease_time()); 193 msg.your_ip_address()); 195 msg.client_hardware_address().GetConstData(), 196 msg.client_hardware_address().GetLength())); 200 DHCPMessage msg; local 219 DHCPMessage msg; local [all...] |
/system/core/logwrapper/ |
H A D | logwrapper.c | 28 void fatal(const char *msg) { argument 29 fprintf(stderr, "%s", msg); 30 ALOG(LOG_ERROR, "logwrapper", "%s", msg);
|
/system/connectivity/apmanager/ |
H A D | device_info.cc | 106 void DeviceInfo::OnWiFiPhyInfoReceived(const shill::Nl80211Message& msg) { argument 108 if (msg.command() != shill::NewWiphyMessage::kCommand) { 110 << msg.command(); 115 if (!msg.const_attributes()->GetStringAttributeValue(NL80211_ATTR_WIPHY_NAME, 128 device->ParseWiphyCapability(msg); 134 void DeviceInfo::LinkMsgHandler(const RTNLMessage& msg) { argument 135 DCHECK(msg.type() == RTNLMessage::kTypeLink); 138 if (!msg.HasAttribute(IFLA_IFNAME)) { 142 ByteString b(msg.GetAttribute(IFLA_IFNAME)); 145 int dev_index = msg 219 shill::GetInterfaceMessage msg; local 235 OnWiFiInterfaceInfoReceived(const shill::Nl80211Message& msg) argument 280 OnWiFiInterfacePhyInfoReceived( uint32_t iface_index, const shill::Nl80211Message& msg) argument [all...] |
/system/core/fs_mgr/ |
H A D | fs_mgr_slotselect.c | 44 struct bootloader_message msg; local 66 num_read = TEMP_FAILURE_RETRY(read(misc_fd, &msg, sizeof(msg))); 69 if (num_read != sizeof(msg)) { 75 if (msg.slot_suffix[0] == '\0') 77 strncpy(out_suffix, msg.slot_suffix, suffix_len);
|