/system/netd/server/ |
H A D | IptablesRestoreController.cpp | 125 const char* const cmd = (type == IPTABLES_PROCESS) ? local 166 if (execl(cmd, 167 cmd, 173 ALOGE("execl(%s, ...) failed: %s", cmd, strerror(errno));
|
H A D | NatController.cpp | 59 const char *cmd[32]; member in struct:CommandsAndArgs
|
H A D | MDnsSdListener.cpp | 417 char* cmd = argv[1]; local 419 if (strcmp(cmd, "discover") == 0) { 429 } else if (strcmp(cmd, "stop-discover") == 0) { 431 } else if (strcmp(cmd, "register") == 0) { 458 } else if (strcmp(cmd, "stop-register") == 0) { 460 } else if (strcmp(cmd, "resolve") == 0) { 472 } else if (strcmp(cmd, "stop-resolve") == 0) { 474 } else if (strcmp(cmd, "start-service") == 0) { 480 } else if (strcmp(cmd, "stop-service") == 0) { 486 } else if (strcmp(cmd, "sethostnam [all...] |
/system/nvram/client/ |
H A D | nvram_client.c | 380 const struct CommandHandler* cmd = NULL; local 383 cmd = &kCommandHandlers[i]; 387 if (!cmd) { 392 if (argc - 2 != cmd->nparams) { 394 cmd->nparams, argc - 2); 413 int ret = cmd->run(nvram_device, argv + 2);
|
/system/tpm/trunks/ |
H A D | trunks_ftdi_spi.cc | 162 uint8_t cmd; local 185 FtdiReadReg(TPM_ACCESS_REG, sizeof(cmd), &cmd); 187 if ((cmd & ~tpmEstablishment) != tpmRegValidSts) { 188 LOG(ERROR) << "invalid reset status: 0x" << std::hex << (unsigned)cmd; 191 cmd = requestUse; 192 FtdiWriteReg(TPM_ACCESS_REG, sizeof(cmd), &cmd); 193 FtdiReadReg(TPM_ACCESS_REG, sizeof(cmd), &cmd); [all...] |
/system/update_engine/common/ |
H A D | test_utils.h | 74 inline int System(const std::string& cmd) { argument 75 return system(cmd.c_str());
|
/system/update_engine/ |
H A D | hardware_chromeos.cc | 171 vector<string> cmd = {"/usr/sbin/mosys", "-k", "ec", "info"}; local 173 bool success = Subprocess::SynchronousExec(cmd, &exit_code, &input_line);
|
H A D | p2p_manager.cc | 391 void InitiateLookup(const vector<string>& cmd, TimeDelta timeout) { argument 399 cmd, Subprocess::kSearchPath, {}, 403 LOG(ERROR) << "Error spawning " << utils::StringVectorToString(cmd);
|
/system/bt/btif/src/ |
H A D | btif_hf_client.cc | 726 static bt_status_t send_at_cmd(const bt_bdaddr_t* bd_addr, int cmd, int val1, argument 733 BTIF_TRACE_EVENT("%s: Cmd %d val1 %d val2 %d arg %s", __func__, cmd, val1, 735 BTA_HfClientSendAT(cb->handle, cmd, val1, val2, arg);
|
H A D | btif_sock_thread.cc | 72 /*cmd executes in socket poll thread */ 201 // add the cmd fd for read & write 228 "cmd socket is not created. socket thread may not initialized"); 242 sock_cmd_t cmd = {CMD_ADD_FD, fd, type, flags, user_id}; local 246 OSI_NO_INTR(ret = send(ts[h].cmd_fdw, &cmd, sizeof(cmd), 0)); 248 return ret == sizeof(cmd); 261 sock_cmd_t cmd = {CMD_REMOVE_FD, fd, 0, 0, 0}; local 264 OSI_NO_INTR(ret = send(ts[thread_handle].cmd_fdw, &cmd, sizeof(cmd), 280 sock_cmd_t cmd = {CMD_USER_PRIVATE, 0, type, size, user_id}; local 311 sock_cmd_t cmd = {CMD_WAKEUP, 0, 0, 0, 0}; local 327 sock_cmd_t cmd = {CMD_EXIT, 0, 0, 0, 0}; local 413 sock_cmd_t cmd = {-1, 0, 0, 0, 0}; local [all...] |
/system/core/fastboot/ |
H A D | engine.cpp | 56 char cmd[CMD_SIZE]; member in struct:Action 77 std::string cmd = "getvar:"; local 78 cmd += key; 82 if (fb_command_response(transport, cmd.c_str(), buf)) { 109 cmdsize = vsnprintf(a->cmd, sizeof(a->cmd), fmt, ap); 112 if (cmdsize >= sizeof(a->cmd)) { 114 die("Command length (%d) exceeds maximum size (%d)", cmdsize, sizeof(a->cmd)); 227 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp); 260 fprintf(stderr, "%s FAILED (%s)\n", a->cmd, res 306 fb_queue_command(const char *cmd, const char *msg) argument [all...] |
/system/core/init/ |
H A D | action.cpp | 110 Command cmd = commands_[command]; local 111 ExecuteCommand(cmd);
|
H A D | reboot.cpp | 163 RebootSystem(unsigned int cmd, const std::string& rebootTarget) { argument 165 switch (cmd) { 308 void DoReboot(unsigned int cmd, const std::string& reason, const std::string& rebootTarget, argument 316 if (cmd == ANDROID_RB_THERMOFF) { // do not wait if it is thermal 419 RebootSystem(cmd, rebootTarget); 424 unsigned int cmd = 0; local 433 cmd = ANDROID_RB_POWEROFF; 440 cmd = ANDROID_RB_RESTART2; 459 cmd = ANDROID_RB_THERMOFF; 468 DoReboot(cmd, comman [all...] |
H A D | property_service.cpp | 401 uint32_t cmd = 0; local 402 if (!socket.RecvUint32(&cmd, &timeout_ms)) { 408 switch (cmd) { 441 LOG(ERROR) << "sys_prop: invalid command " << cmd;
|
/system/core/trusty/storage/interface/include/trusty/interface/ |
H A D | storage.h | 267 * @cmd: one of enum storage_cmd 277 uint32_t cmd; member in struct:storage_msg
|
/system/tpm/trunks/ftdi/ |
H A D | mpsse.c | 1142 uint8_t cmd[CMD_SIZE] = {0}; local 1145 cmd[0] = TRISTATE_IO; 1146 cmd[1] = 0xFF; 1147 cmd[2] = 0xFF; 1149 return raw_write(mpsse, cmd, sizeof(cmd));
|
/system/bt/stack/smp/ |
H A D | smp_act.cc | 1056 tBTM_STATUS cmd; local 1061 cmd = btm_ble_start_encrypt(p_cb->pairing_bda, true, p_data->key.p_data); 1063 cmd = btm_ble_start_encrypt(p_cb->pairing_bda, false, NULL); 1065 if (cmd != BTM_CMD_STARTED && cmd != BTM_BUSY)
|
/system/extras/ioshark/ |
H A D | ioshark_bench_subr.c | 382 FILE *cmd; local 384 cmd = popen("getprop ro.product.name", "r"); 385 if (cmd == NULL) { 390 if (fgets(dev_name, BUFSIZE, cmd) == NULL) { 396 pclose(cmd);
|
/system/nfc/halimpl/bcm2079x/hal/hal/ |
H A D | nfc_hal_dm.c | 521 uint8_t cmd[NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_PRE_SET_MEM_LENGTH]; local 532 p = cmd; 546 cmd, NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_PRE_SET_MEM_LENGTH, 556 *cmd 990 void nfc_hal_dm_set_nfc_wake(uint8_t cmd) { argument 992 (cmd == NFC_HAL_ASSERT_NFC_WAKE ? "ASSERT" : "DEASSERT")); 995 ** nfc_wake_active_mode cmd result of voltage on 1008 if (cmd == nfc_hal_cb.dev_cb.nfc_wake_active_mode) 1303 uint8_t cmd[NFC_HAL_BT_HCI_CMD_HDR_SIZE + HCI_BRCM_WRITE_SLEEP_MODE_LENGTH]; local 1312 p = cmd; [all...] |
/system/nfc/halimpl/pn54x/self-test/ |
H A D | phNxpNciHal_SelfTest.c | 37 nci_data_t cmd; member in struct:nci_test_data 91 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */ 107 0x05, {0x20, 0x01, 0x02, 0x00, 0x00} /* cmd */ 125 0x03, {0x2F, 0x02, 0x00} /* cmd */ 136 0x04, {0x2F, 0x3E, 0x01, 0x01} /* cmd */ 153 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */ 169 0x05, {0x20, 0x01, 0x02, 0x00, 0x00} /* cmd */ 187 0x03, {0x2F, 0x02, 0x00} /* cmd */ 198 0x04, {0x2F, 0x3E, 0x01, 0x00} /* cmd */ 213 0x04, {0x20, 0x00, 0x01, 0x00} /* cmd */ [all...] |
/system/vold/ |
H A D | Disk.cpp | 298 std::vector<std::string> cmd; local 299 cmd.push_back(kSgdiskPath); 300 cmd.push_back("--android-dump"); 301 cmd.push_back(mDevPath); 304 status_t res = ForkExecvp(cmd, output); 393 std::vector<std::string> cmd; local 394 cmd.push_back(kSgdiskPath); 395 cmd.push_back("--zap-all"); 396 cmd.push_back(mDevPath); 400 if ((res = ForkExecvp(cmd)) ! 457 std::vector<std::string> cmd; local [all...] |
H A D | Utils.cpp | 191 std::vector<std::string> cmd; local 192 cmd.push_back(kBlkidPath); 193 cmd.push_back("-c"); 194 cmd.push_back("/dev/null"); 195 cmd.push_back("-s"); 196 cmd.push_back("TYPE"); 197 cmd.push_back("-s"); 198 cmd.push_back("UUID"); 199 cmd.push_back("-s"); 200 cmd 280 std::string cmd; local [all...] |
/system/bt/bta/ag/ |
H A D | bta_ag_cmd.cc | 601 APPL_TRACE_DEBUG("AT cmd:%d arg_type:%d arg:%d arg:%s", command_id, arg_type, 825 void bta_ag_at_hfp_cback(tBTA_AG_SCB* p_scb, uint16_t cmd, uint8_t arg_type, argument 838 __func__, cmd, arg_type, int_arg, p_arg); 855 if (cmd < BTA_AG_LOCAL_EVT_FIRST) event = cmd; 857 switch (cmd) { 876 /* if mem dial cmd, make sure string contains only digits */ 891 /* If dial cmd, make sure string contains only dial digits 1268 APPL_TRACE_DEBUG("Empty AT cmd string received");
|
/system/core/adb/ |
H A D | transport.cpp | 52 const char* const kFeatureCmd = "cmd"; 59 char cmd[9]; local 66 cmd[n] = (char)b; 69 cmd[4] = 0; 73 snprintf(cmd, sizeof cmd, "%08x", command); 87 func, cmd, arg0, arg1, len);
|
/system/core/lmkd/ |
H A D | lmkd.c | 348 int cmd = -1; local 360 cmd = ntohl(ibuf[0]); 362 switch(cmd) { 380 ALOGE("Received unknown command code %d", cmd); 387 ALOGE("Wrong control socket read length cmd=%d len=%d", cmd, len);
|