Lines Matching refs:cli

94 int CryptCommandListener::sendGenericOkFailOnBool(SocketClient *cli, bool success) {
96 return cli->sendMsg(ResponseCode::CommandOkay, "Command succeeded", false);
98 return cli->sendMsg(ResponseCode::OperationFailed, "Command failed", false);
129 static bool check_argc(SocketClient *cli, const std::string &subcommand, int argc,
145 cli->sendMsg(ResponseCode::CommandSyntaxError, message.c_str(), false);
173 int CryptCommandListener::CryptfsCmd::runCommand(SocketClient *cli,
175 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) {
176 cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run cryptfs commands", false);
181 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing subcommand", false);
189 if (!check_argc(cli, subcommand, argc, 3, "<passwd>")) return 0;
193 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
200 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
249 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
261 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
273 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
278 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
284 if (!check_argc(cli, subcommand, argc, 3, "<passwd>")) return 0;
288 if (!check_argc(cli, subcommand, argc, 3, "<fieldname>")) return 0;
298 cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", false);
309 cli->sendMsg(ResponseCode::CryptfsGetfieldResult, valbuf, false);
313 if (!check_argc(cli, subcommand, argc, 4, "<fieldname> <value>")) return 0;
317 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
325 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
330 cli->sendMsg(ResponseCode::PasswordTypeResult, "password", false);
333 cli->sendMsg(ResponseCode::PasswordTypeResult, "pattern", false);
336 cli->sendMsg(ResponseCode::PasswordTypeResult, "pin", false);
339 cli->sendMsg(ResponseCode::PasswordTypeResult, "default", false);
343 cli->sendMsg(ResponseCode::OpFailedStorageNotFound, "Error", false);
347 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
355 cli->sendMsg(ResponseCode::CommandOkay, message, false);
363 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
370 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
377 if (!check_argc(cli, subcommand, argc, 2, "")) return 0;
378 return sendGenericOkFailOnBool(cli, e4crypt_init_user0());
381 if (!check_argc(cli, subcommand, argc, 5, "<user> <serial> <ephemeral>")) return 0;
382 return sendGenericOkFailOnBool(cli, e4crypt_vold_create_user_key(
386 if (!check_argc(cli, subcommand, argc, 3, "<user>")) return 0;
387 return sendGenericOkFailOnBool(cli, e4crypt_destroy_user_key(atoi(argv[2])));
390 if (!check_argc(cli, subcommand, argc, 6, "<user> <serial> <token> <secret>")) return 0;
391 return sendGenericOkFailOnBool(cli, e4crypt_add_user_key_auth(
395 if (!check_argc(cli, subcommand, argc, 3, "<user>")) return 0;
396 return sendGenericOkFailOnBool(cli, e4crypt_fixate_newest_user_key_auth(atoi(argv[2])));
399 if (!check_argc(cli, subcommand, argc, 6, "<user> <serial> <token> <secret>")) return 0;
400 return sendGenericOkFailOnBool(cli, e4crypt_unlock_user_key(
404 if (!check_argc(cli, subcommand, argc, 3, "<user>")) return 0;
405 return sendGenericOkFailOnBool(cli, e4crypt_lock_user_key(atoi(argv[2])));
408 if (!check_argc(cli, subcommand, argc, 6, "<uuid> <user> <serial> <flags>")) return 0;
409 return sendGenericOkFailOnBool(cli, e4crypt_prepare_user_storage(
413 if (!check_argc(cli, subcommand, argc, 5, "<uuid> <user> <flags>")) return 0;
414 return sendGenericOkFailOnBool(cli,
418 if (!check_argc(cli, subcommand, argc, 3, "<path>")) return 0;
419 return sendGenericOkFailOnBool(cli,
424 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown cryptfs subcommand", false);
432 cli->sendMsg(ResponseCode::CommandOkay, msg, false);