Searched refs:msg (Results 1 - 25 of 169) sorted by relevance

1234567

/system/extras/tests/uevents/
H A Duevents.c25 char msg[UEVENT_MSG_LEN+2]; local
33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) {
34 msg[n] = '\0';
35 msg[n+1] = '\0';
38 if (msg[i] == '\0')
39 msg[i] = ' ';
41 printf("%s\n", msg);
/system/media/camera/src/
H A Dcamera_metadata_tag_info.c710 const char *msg = "error: not an enum"; local
717 msg = "TRANSFORM_MATRIX";
721 msg = "FAST";
725 msg = "HIGH_QUALITY";
729 msg = "error: enum value out of range";
742 msg = "OFF";
746 msg = "FAST";
750 msg = "HIGH_QUALITY";
754 msg = "error: enum value out of range";
765 msg
[all...]
/system/core/libnetutils/
H A Ddhcpmsg.c24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) argument
28 memset(msg, 0, sizeof(dhcp_msg));
30 msg->op = OP_BOOTREQUEST;
31 msg->htype = HTYPE_ETHER;
32 msg->hlen = 6;
33 msg->hops = 0;
35 msg->flags = htons(FLAGS_BROADCAST);
37 msg->xid = xid;
39 memcpy(msg->chaddr, hwaddr, 6);
41 x = msg
55 init_dhcp_discover_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid) argument
73 init_dhcp_request_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid, uint32_t ipaddr, uint32_t serveraddr) argument
[all...]
H A Dpacket.h21 int send_packet(int s, int if_index, struct dhcp_msg *msg, int size,
23 int receive_packet(int s, struct dhcp_msg *msg);
H A Ddhcpclient.c166 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) argument
177 if (msg->options[0] != OPT_COOKIE1) return -1;
178 if (msg->options[1] != OPT_COOKIE2) return -1;
179 if (msg->options[2] != OPT_COOKIE3) return -1;
180 if (msg->options[3] != OPT_COOKIE4) return -1;
182 x = msg->options + 4;
232 info->ipaddr = msg->yiaddr;
249 void dump_dhcp_msg(dhcp_msg *msg, int len) argument
265 if (msg->op == OP_BOOTREQUEST)
267 else if (msg
344 send_message(int sock, int if_index, dhcp_msg *msg, int size) argument
353 is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) argument
394 dhcp_msg *msg; local
[all...]
/system/bt/embdrv/sbc/decoder/include/
H A Doi_assert.h53 #define OI_ASSERT_FAIL(msg) \
54 { OI_AssertFail(__FILE__, __LINE__, msg); }
60 #define OI_ASSERT_FAIL(msg)
/system/core/libsysutils/src/
H A DFrameworkClient.cpp16 int FrameworkClient::sendMsg(const char *msg) { argument
24 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1));
26 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno));
32 int FrameworkClient::sendMsg(const char *msg, const char *data) { argument
33 size_t bufflen = strlen(msg) + strlen(data) + 1;
39 snprintf(buffer, bufflen, "%s%s", msg, data);
/system/connectivity/shill/net/
H A Dnetlink_message_matchers.h39 const Nl80211Message* msg = static_cast<const Nl80211Message*>(arg); local
40 if (msg->command() != command) {
42 << " (it's a " << +msg->command() << ")";
55 const Nl80211Message* msg = static_cast<const Nl80211Message*>(arg); local
56 if (msg->command() != NL80211_CMD_SET_WOWLAN) {
61 if (!msg->const_attributes()->GetU32AttributeValue(NL80211_ATTR_WIPHY,
67 if (msg->const_attributes()->ConstGetNestedAttributeList(
86 const Nl80211Message* msg = reinterpret_cast<const Nl80211Message*>(arg); local
87 if (msg->command() != NL80211_CMD_TRIGGER_SCAN) {
92 if (!msg
134 const Nl80211Message* msg = reinterpret_cast<const Nl80211Message*>(arg); local
[all...]
/system/core/adb/
H A Dfile_sync_service.cpp83 syncmsg msg; local
84 msg.stat.id = ID_STAT;
90 msg.stat.mode = st.st_mode;
91 msg.stat.size = st.st_size;
92 msg.stat.time = st.st_mtime;
94 return WriteFdExactly(s, &msg.stat, sizeof(msg.stat));
100 syncmsg msg; local
101 msg.dent.id = ID_DENT;
112 msg
139 syncmsg msg; local
151 syncmsg msg; local
260 syncmsg msg; local
359 syncmsg msg; local
[all...]
H A Dadb_auth.cpp47 p->msg.command = A_AUTH;
48 p->msg.arg0 = ADB_AUTH_TOKEN;
49 p->msg.data_length = ret;
66 p->msg.command = A_AUTH;
67 p->msg.arg0 = ADB_AUTH_SIGNATURE;
68 p->msg.data_length = ret;
85 p->msg.command = A_AUTH;
86 p->msg.arg0 = ADB_AUTH_RSAPUBLICKEY;
87 p->msg.data_length = ret;
H A Dtransport_usb.cpp30 if(usb_read(t->usb, &p->msg, sizeof(amessage))){
40 if(p->msg.data_length) {
41 if(usb_read(t->usb, p->data, p->msg.data_length)){
57 unsigned size = p->msg.data_length;
59 if(usb_write(t->usb, &p->msg, sizeof(amessage))) {
63 if(p->msg.data_length == 0) return 0;
/system/core/base/
H A Derrors_windows.cpp49 std::string msg; local
50 if (!android::base::WideToUTF8(msgbuf, &msg)) {
57 msg = android::base::Trim(msg);
63 android::base::StringAppendF(&msg, " (%lu)", error_code);
64 return msg;
/system/keymaster/
H A Dandroid_keymaster_messages_test.cpp68 EmptyKeymasterResponse msg(ver);
69 msg.error = KM_ERROR_OK;
71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5));
77 EmptyKeymasterResponse msg(ver);
78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4));
185 GetKeyCharacteristicsResponse msg(ver);
186 msg.error = KM_ERROR_OK;
187 msg.enforced.Reinitialize(params, array_length(params));
188 msg
477 GetVersionRequest msg; local
492 GetVersionResponse msg; local
[all...]
/system/core/include/sysutils/
H A DFrameworkClient.h16 int sendMsg(const char *msg);
17 int sendMsg(const char *msg, const char *data);
/system/core/trusty/gatekeeper/
H A Dtrusty_gatekeeper_ipc.c50 struct gatekeeper_message *msg = malloc(msg_size); local
51 msg->cmd = cmd;
52 memcpy(msg->payload, in, in_size);
54 ssize_t rc = write(handle_, msg, msg_size);
55 free(msg);
75 msg = (struct gatekeeper_message *) out;
77 if ((cmd | GK_RESP_BIT) != msg->cmd) {
78 ALOGE("invalid command (%d)\n", msg->cmd);
/system/core/debuggerd/
H A Dsignal_sender.cpp88 signal_message msg; local
89 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg)));
93 } else if (rc != sizeof(msg)) {
100 if (msg.tid > 0) {
101 if (syscall(SYS_tgkill, msg.pid, msg.tid, msg.signal) != 0) {
105 if (kill(msg.pid, msg
155 signal_message msg = {.pid = pid, .tid = tid, .signal = signal }; local
[all...]
/system/gatekeeper/tests/
H A Dgatekeeper_messages_test.cpp54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL);
55 SizedBuffer serialized_msg(msg.GetSerializedSize());
56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length);
68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled);
84 SizedBuffer serialized_msg(msg.GetSerializedSize());
85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length);
97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size));
114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password);
115 SizedBuffer serialized_msg(msg
218 VerifyResponse msg; local
229 VerifyRequest msg; local
240 EnrollResponse msg; local
251 EnrollRequest msg; local
296 Message msg; local
[all...]
/system/connectivity/shill/test-scripts/
H A Dconnection_manager.js27 var msg = {
32 window.parent.postMessage(msg, chromeos.connectionManager.parent_page_url_);
36 var msg = {
40 window.parent.postMessage(msg, chromeos.connectionManager.parent_page_url_);
/system/connectivity/shill/shims/
H A Dset_apn_helper.c55 DBusMessage *msg; local
84 msg = dbus_message_new_method_call(CONNMAN_SERVICE,
88 if (msg == NULL) {
94 dbus_message_set_no_reply(msg, TRUE);
96 dbus_message_iter_init_append(msg, &iter);
121 dbus_message_unref(msg);
138 dbus_connection_send(conn, msg, NULL);
140 dbus_message_unref(msg);
/system/core/fingerprintd/
H A DFingerprintDaemonProxy.cpp44 void FingerprintDaemonProxy::hal_notify_callback(const fingerprint_msg_t *msg) { argument
52 switch (msg->type) {
54 ALOGD("onError(%d)", msg->data.error);
55 callback->onError(device, msg->data.error);
58 ALOGD("onAcquired(%d)", msg->data.acquired.acquired_info);
59 callback->onAcquired(device, msg->data.acquired.acquired_info);
63 msg->data.authenticated.finger.fid,
64 msg->data.authenticated.finger.gid);
65 if (msg->data.authenticated.finger.fid != 0) {
66 const uint8_t* hat = reinterpret_cast<const uint8_t *>(&msg
[all...]
/system/bt/stack/avdt/
H A Davdt_ccb_act.c164 p_data->msg.discover_rsp.p_sep_info = sep_info;
165 p_data->msg.discover_rsp.num_seps = 0;
173 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use;
174 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1;
175 sep_info[p_data->msg.discover_rsp.num_seps].media_type = p_scb->cs.media_type;
176 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep;
178 p_data->msg.discover_rsp.num_seps++;
205 (tAVDT_CTRL *)(&p_data->msg.discover_rsp));
226 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid);
228 p_data->msg
714 tAVDT_MSG msg; local
[all...]
/system/connectivity/dhcp_client/
H A Ddhcp_message_unittest.cc181 DHCPMessage msg; local
184 &msg));
185 EXPECT_EQ(kDHCPMessageTypeOffer, msg.message_type());
187 msg.transaction_id());
189 msg.server_identifier());
191 msg.lease_time());
193 msg.your_ip_address());
195 msg.client_hardware_address().GetConstData(),
196 msg.client_hardware_address().GetLength()));
200 DHCPMessage msg; local
219 DHCPMessage msg; local
[all...]
/system/core/logwrapper/
H A Dlogwrapper.c28 void fatal(const char *msg) { argument
29 fprintf(stderr, "%s", msg);
30 ALOG(LOG_ERROR, "logwrapper", "%s", msg);
/system/connectivity/apmanager/
H A Ddevice_info.cc106 void DeviceInfo::OnWiFiPhyInfoReceived(const shill::Nl80211Message& msg) { argument
108 if (msg.command() != shill::NewWiphyMessage::kCommand) {
110 << msg.command();
115 if (!msg.const_attributes()->GetStringAttributeValue(NL80211_ATTR_WIPHY_NAME,
128 device->ParseWiphyCapability(msg);
134 void DeviceInfo::LinkMsgHandler(const RTNLMessage& msg) { argument
135 DCHECK(msg.type() == RTNLMessage::kTypeLink);
138 if (!msg.HasAttribute(IFLA_IFNAME)) {
142 ByteString b(msg.GetAttribute(IFLA_IFNAME));
145 int dev_index = msg
219 shill::GetInterfaceMessage msg; local
235 OnWiFiInterfaceInfoReceived(const shill::Nl80211Message& msg) argument
280 OnWiFiInterfacePhyInfoReceived( uint32_t iface_index, const shill::Nl80211Message& msg) argument
[all...]
/system/core/fs_mgr/
H A Dfs_mgr_slotselect.c44 struct bootloader_message msg; local
66 num_read = TEMP_FAILURE_RETRY(read(misc_fd, &msg, sizeof(msg)));
69 if (num_read != sizeof(msg)) {
75 if (msg.slot_suffix[0] == '\0')
77 strncpy(out_suffix, msg.slot_suffix, suffix_len);

Completed in 1037 milliseconds

1234567