Searched defs:cmd (Results 51 - 75 of 91) sorted by relevance

1234

/system/netd/server/
H A DIptablesRestoreController.cpp125 const char* const cmd = (type == IPTABLES_PROCESS) ? local
166 if (execl(cmd,
167 cmd,
173 ALOGE("execl(%s, ...) failed: %s", cmd, strerror(errno));
H A DNatController.cpp59 const char *cmd[32]; member in struct:CommandsAndArgs
H A DMDnsSdListener.cpp417 char* cmd = argv[1]; local
419 if (strcmp(cmd, "discover") == 0) {
429 } else if (strcmp(cmd, "stop-discover") == 0) {
431 } else if (strcmp(cmd, "register") == 0) {
458 } else if (strcmp(cmd, "stop-register") == 0) {
460 } else if (strcmp(cmd, "resolve") == 0) {
472 } else if (strcmp(cmd, "stop-resolve") == 0) {
474 } else if (strcmp(cmd, "start-service") == 0) {
480 } else if (strcmp(cmd, "stop-service") == 0) {
486 } else if (strcmp(cmd, "sethostnam
[all...]
/system/nvram/client/
H A Dnvram_client.c380 const struct CommandHandler* cmd = NULL; local
383 cmd = &kCommandHandlers[i];
387 if (!cmd) {
392 if (argc - 2 != cmd->nparams) {
394 cmd->nparams, argc - 2);
413 int ret = cmd->run(nvram_device, argv + 2);
/system/tpm/trunks/
H A Dtrunks_ftdi_spi.cc162 uint8_t cmd; local
185 FtdiReadReg(TPM_ACCESS_REG, sizeof(cmd), &cmd);
187 if ((cmd & ~tpmEstablishment) != tpmRegValidSts) {
188 LOG(ERROR) << "invalid reset status: 0x" << std::hex << (unsigned)cmd;
191 cmd = requestUse;
192 FtdiWriteReg(TPM_ACCESS_REG, sizeof(cmd), &cmd);
193 FtdiReadReg(TPM_ACCESS_REG, sizeof(cmd), &cmd);
[all...]
/system/update_engine/common/
H A Dtest_utils.h74 inline int System(const std::string& cmd) { argument
75 return system(cmd.c_str());
/system/update_engine/
H A Dhardware_chromeos.cc171 vector<string> cmd = {"/usr/sbin/mosys", "-k", "ec", "info"}; local
173 bool success = Subprocess::SynchronousExec(cmd, &exit_code, &input_line);
H A Dp2p_manager.cc391 void InitiateLookup(const vector<string>& cmd, TimeDelta timeout) { argument
399 cmd, Subprocess::kSearchPath, {},
403 LOG(ERROR) << "Error spawning " << utils::StringVectorToString(cmd);
/system/bt/btif/src/
H A Dbtif_hf_client.cc726 static bt_status_t send_at_cmd(const bt_bdaddr_t* bd_addr, int cmd, int val1, argument
733 BTIF_TRACE_EVENT("%s: Cmd %d val1 %d val2 %d arg %s", __func__, cmd, val1,
735 BTA_HfClientSendAT(cb->handle, cmd, val1, val2, arg);
H A Dbtif_sock_thread.cc72 /*cmd executes in socket poll thread */
201 // add the cmd fd for read & write
228 "cmd socket is not created. socket thread may not initialized");
242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; local
246 OSI_NO_INTR(ret = send(ts[h].cmd_fdw, &cmd, sizeof(cmd), 0));
248 return ret == sizeof(cmd);
261 sock_cmd_t cmd = {CMD_REMOVE_FD, fd, 0, 0, 0}; local
264 OSI_NO_INTR(ret = send(ts[thread_handle].cmd_fdw, &cmd, sizeof(cmd),
280 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; local
311 sock_cmd_t cmd = {CMD_WAKEUP, 0, 0, 0, 0}; local
327 sock_cmd_t cmd = {CMD_EXIT, 0, 0, 0, 0}; local
413 sock_cmd_t cmd = {-1, 0, 0, 0, 0}; local
[all...]
/system/core/fastboot/
H A Dengine.cpp56 char cmd[CMD_SIZE]; member in struct:Action
77 std::string cmd = "getvar:"; local
78 cmd += key;
82 if (fb_command_response(transport, cmd.c_str(), buf)) {
109 cmdsize = vsnprintf(a->cmd, sizeof(a->cmd), fmt, ap);
112 if (cmdsize >= sizeof(a->cmd)) {
114 die("Command length (%d) exceeds maximum size (%d)", cmdsize, sizeof(a->cmd));
227 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp);
260 fprintf(stderr, "%s FAILED (%s)\n", a->cmd, res
306 fb_queue_command(const char *cmd, const char *msg) argument
[all...]
/system/core/init/
H A Daction.cpp110 Command cmd = commands_[command]; local
111 ExecuteCommand(cmd);
H A Dreboot.cpp163 RebootSystem(unsigned int cmd, const std::string& rebootTarget) { argument
165 switch (cmd) {
308 void DoReboot(unsigned int cmd, const std::string& reason, const std::string& rebootTarget, argument
316 if (cmd == ANDROID_RB_THERMOFF) { // do not wait if it is thermal
419 RebootSystem(cmd, rebootTarget);
424 unsigned int cmd = 0; local
433 cmd = ANDROID_RB_POWEROFF;
440 cmd = ANDROID_RB_RESTART2;
459 cmd = ANDROID_RB_THERMOFF;
468 DoReboot(cmd, comman
[all...]
H A Dproperty_service.cpp401 uint32_t cmd = 0; local
402 if (!socket.RecvUint32(&cmd, &timeout_ms)) {
408 switch (cmd) {
441 LOG(ERROR) << "sys_prop: invalid command " << cmd;
/system/core/trusty/storage/interface/include/trusty/interface/
H A Dstorage.h267 * @cmd: one of enum storage_cmd
277 uint32_t cmd; member in struct:storage_msg
/system/tpm/trunks/ftdi/
H A Dmpsse.c1142 uint8_t cmd[CMD_SIZE] = {0}; local
1145 cmd[0] = TRISTATE_IO;
1146 cmd[1] = 0xFF;
1147 cmd[2] = 0xFF;
1149 return raw_write(mpsse, cmd, sizeof(cmd));
/system/bt/stack/smp/
H A Dsmp_act.cc1056 tBTM_STATUS cmd; local
1061 cmd = btm_ble_start_encrypt(p_cb->pairing_bda, true, p_data->key.p_data);
1063 cmd = btm_ble_start_encrypt(p_cb->pairing_bda, false, NULL);
1065 if (cmd != BTM_CMD_STARTED && cmd != BTM_BUSY)
/system/extras/ioshark/
H A Dioshark_bench_subr.c382 FILE *cmd; local
384 cmd = popen("getprop ro.product.name", "r");
385 if (cmd == NULL) {
390 if (fgets(dev_name, BUFSIZE, cmd) == NULL) {
396 pclose(cmd);
/system/nfc/halimpl/bcm2079x/hal/hal/
H A Dnfc_hal_dm.c521 uint8_t cmd[NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_PRE_SET_MEM_LENGTH]; local
532 p = cmd;
546 cmd, NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_PRE_SET_MEM_LENGTH,
556 *cmd
990 void nfc_hal_dm_set_nfc_wake(uint8_t cmd) { argument
992 (cmd == NFC_HAL_ASSERT_NFC_WAKE ? "ASSERT" : "DEASSERT"));
995 ** nfc_wake_active_mode cmd result of voltage on
1008 if (cmd == nfc_hal_cb.dev_cb.nfc_wake_active_mode)
1303 uint8_t cmd[NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_WRITE_SLEEP_MODE_LENGTH]; local
1312 p = cmd;
[all...]
/system/nfc/halimpl/pn54x/self-test/
H A DphNxpNciHal_SelfTest.c37 nci_data_t cmd; member in struct:nci_test_data
91 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */
107 0x05, {0x20, 0x01, 0x02, 0x00, 0x00} /* cmd */
125 0x03, {0x2F, 0x02, 0x00} /* cmd */
136 0x04, {0x2F, 0x3E, 0x01, 0x01} /* cmd */
153 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */
169 0x05, {0x20, 0x01, 0x02, 0x00, 0x00} /* cmd */
187 0x03, {0x2F, 0x02, 0x00} /* cmd */
198 0x04, {0x2F, 0x3E, 0x01, 0x00} /* cmd */
213 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */
[all...]
/system/vold/
H A DDisk.cpp298 std::vector<std::string> cmd; local
299 cmd.push_back(kSgdiskPath);
300 cmd.push_back("--android-dump");
301 cmd.push_back(mDevPath);
304 status_t res = ForkExecvp(cmd, output);
393 std::vector<std::string> cmd; local
394 cmd.push_back(kSgdiskPath);
395 cmd.push_back("--zap-all");
396 cmd.push_back(mDevPath);
400 if ((res = ForkExecvp(cmd)) !
457 std::vector<std::string> cmd; local
[all...]
H A DUtils.cpp191 std::vector<std::string> cmd; local
192 cmd.push_back(kBlkidPath);
193 cmd.push_back("-c");
194 cmd.push_back("/dev/null");
195 cmd.push_back("-s");
196 cmd.push_back("TYPE");
197 cmd.push_back("-s");
198 cmd.push_back("UUID");
199 cmd.push_back("-s");
200 cmd
280 std::string cmd; local
[all...]
/system/bt/bta/ag/
H A Dbta_ag_cmd.cc601 APPL_TRACE_DEBUG("AT cmd:%d arg_type:%d arg:%d arg:%s", command_id, arg_type,
825 void bta_ag_at_hfp_cback(tBTA_AG_SCB* p_scb, uint16_t cmd, uint8_t arg_type, argument
838 __func__, cmd, arg_type, int_arg, p_arg);
855 if (cmd < BTA_AG_LOCAL_EVT_FIRST) event = cmd;
857 switch (cmd) {
876 /* if mem dial cmd, make sure string contains only digits */
891 /* If dial cmd, make sure string contains only dial digits
1268 APPL_TRACE_DEBUG("Empty AT cmd string received");
/system/core/adb/
H A Dtransport.cpp52 const char* const kFeatureCmd = "cmd";
59 char cmd[9]; local
66 cmd[n] = (char)b;
69 cmd[4] = 0;
73 snprintf(cmd, sizeof cmd, "%08x", command);
87 func, cmd, arg0, arg1, len);
/system/core/lmkd/
H A Dlmkd.c348 int cmd = -1; local
360 cmd = ntohl(ibuf[0]);
362 switch(cmd) {
380 ALOGE("Received unknown command code %d", cmd);
387 ALOGE("Wrong control socket read length cmd=%d len=%d", cmd, len);

Completed in 3902 milliseconds

1234