/system/extras/tests/uevents/ |
H A D | uevents.c | 25 char msg[UEVENT_MSG_LEN+2]; local 33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) { 34 msg[n] = '\0'; 35 msg[n+1] = '\0'; 38 if (msg[i] == '\0') 39 msg[i] = ' '; 41 printf("%s\n", msg);
|
/system/media/camera/src/ |
H A D | camera_metadata_tag_info.c | 712 const char *msg = "error: not an enum"; local 719 msg = "TRANSFORM_MATRIX"; 723 msg = "FAST"; 727 msg = "HIGH_QUALITY"; 731 msg = "error: enum value out of range"; 744 msg = "OFF"; 748 msg = "FAST"; 752 msg = "HIGH_QUALITY"; 756 msg = "error: enum value out of range"; 767 msg [all...] |
/system/core/trusty/storage/proxy/ |
H A D | storage.h | 21 int storage_file_delete(struct storage_msg *msg, 24 int storage_file_open(struct storage_msg *msg, 27 int storage_file_close(struct storage_msg *msg, 30 int storage_file_write(struct storage_msg *msg, 33 int storage_file_read(struct storage_msg *msg, 36 int storage_file_get_size(struct storage_msg *msg, 39 int storage_file_set_size(struct storage_msg *msg,
|
H A D | ipc.c | 67 ssize_t ipc_get_msg(struct storage_msg *msg, void *req_buf, size_t req_buf_len) argument 70 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {req_buf, req_buf_len}}; 81 if ((size_t)rc < sizeof(*msg)) { 87 if (msg->size != (uint32_t)rc) { 89 msg->cmd, msg->size, (uint32_t)rc); 93 return rc - sizeof(*msg); 96 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size) argument 99 struct iovec iovs[2] = {{msg, sizeo [all...] |
H A D | proxy.c | 98 static int handle_req(struct storage_msg *msg, const void *req, size_t req_len) argument 102 if ((msg->flags & STORAGE_MSG_FLAG_POST_COMMIT) && 103 (msg->cmd != STORAGE_RPMB_SEND)) { 108 ALOGE("cmd 0x%x: post commit option is not implemented\n", msg->cmd); 109 msg->result = STORAGE_ERR_UNIMPLEMENTED; 110 return ipc_respond(msg, NULL, 0); 113 if (msg->flags & STORAGE_MSG_FLAG_PRE_COMMIT) { 116 msg->result = STORAGE_ERR_GENERIC; 117 return ipc_respond(msg, NULL, 0); 121 switch (msg 170 struct storage_msg msg; local [all...] |
H A D | ipc.h | 23 ssize_t ipc_get_msg(struct storage_msg *msg, void *req_buf, size_t req_buf_len); 24 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size);
|
H A D | rpmb.h | 22 int rpmb_send(struct storage_msg *msg, const void *r, size_t req_len);
|
H A D | storage.c | 162 int storage_file_delete(struct storage_msg *msg, argument 171 msg->result = STORAGE_ERR_NOT_VALID; 179 msg->result = STORAGE_ERR_NOT_VALID; 186 msg->result = STORAGE_ERR_GENERIC; 201 msg->result = translate_errno(rc); 206 msg->result = STORAGE_NO_ERROR; 211 return ipc_respond(msg, NULL, 0); 215 int storage_file_open(struct storage_msg *msg, argument 225 msg->result = STORAGE_ERR_NOT_VALID; 233 msg 298 storage_file_close(struct storage_msg *msg, const void *r, size_t req_len) argument 338 storage_file_write(struct storage_msg *msg, const void *r, size_t req_len) argument 368 storage_file_read(struct storage_msg *msg, const void *r, size_t req_len) argument 407 storage_file_get_size(struct storage_msg *msg, const void *r, size_t req_len) argument 440 storage_file_set_size(struct storage_msg *msg, const void *r, size_t req_len) argument [all...] |
/system/core/libnetutils/ |
H A D | dhcpmsg.c | 24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) argument 28 memset(msg, 0, sizeof(dhcp_msg)); 30 msg->op = OP_BOOTREQUEST; 31 msg->htype = HTYPE_ETHER; 32 msg->hlen = 6; 33 msg->hops = 0; 35 msg->flags = htons(FLAGS_BROADCAST); 37 msg->xid = xid; 39 memcpy(msg->chaddr, hwaddr, 6); 41 x = msg 55 init_dhcp_discover_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid) argument 73 init_dhcp_request_msg(dhcp_msg *msg, void *hwaddr, uint32_t xid, uint32_t ipaddr, uint32_t serveraddr) argument [all...] |
H A D | packet.h | 21 int send_packet(int s, int if_index, struct dhcp_msg *msg, int size, 23 int receive_packet(int s, struct dhcp_msg *msg);
|
H A D | dhcpclient.c | 164 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) argument 175 if (msg->options[0] != OPT_COOKIE1) return -1; 176 if (msg->options[1] != OPT_COOKIE2) return -1; 177 if (msg->options[2] != OPT_COOKIE3) return -1; 178 if (msg->options[3] != OPT_COOKIE4) return -1; 180 x = msg->options + 4; 230 info->ipaddr = msg->yiaddr; 247 void dump_dhcp_msg(dhcp_msg *msg, int len) argument 263 if (msg->op == OP_BOOTREQUEST) 265 else if (msg 342 send_message(int sock, int if_index, dhcp_msg *msg, int size) argument 351 is_valid_reply(dhcp_msg *msg, dhcp_msg *reply, int sz) argument 392 dhcp_msg *msg; local [all...] |
/system/bt/embdrv/sbc/decoder/include/ |
H A D | oi_assert.h | 56 #define OI_ASSERT_FAIL(msg) \ 57 { OI_AssertFail(__FILE__, __LINE__, msg); } 62 #define OI_ASSERT_FAIL(msg)
|
/system/core/libsysutils/src/ |
H A D | FrameworkClient.cpp | 32 int FrameworkClient::sendMsg(const char *msg) { argument 40 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1)); 42 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno)); 48 int FrameworkClient::sendMsg(const char *msg, const char *data) { argument 49 size_t bufflen = strlen(msg) + strlen(data) + 1; 55 snprintf(buffer, bufflen, "%s%s", msg, data);
|
/system/core/trusty/storage/lib/ |
H A D | storage.c | 57 static ssize_t check_response(struct storage_msg *msg, ssize_t res) argument 62 if ((size_t)res < sizeof(*msg)) { 63 ALOGE("invalid msg length (%zd < %zd)\n", res, sizeof(*msg)); 67 ALOGV("cmd 0x%x: server returned %u\n", msg->cmd, msg->result); 69 switch(msg->result) { 71 return res - sizeof(*msg); 83 ALOGE("cmd 0x%x: is unhandles command\n", msg->cmd); 93 ALOGE("cmd 0x%x: internal server error\n", msg 146 struct storage_msg msg = { .cmd = STORAGE_FILE_OPEN, .flags = _to_msg_flags(opflags)}; local 168 struct storage_msg msg = { .cmd = STORAGE_FILE_CLOSE }; local 182 struct storage_msg msg = { .cmd = STORAGE_FILE_DELETE, .flags = _to_msg_flags(opflags)}; local 193 struct storage_msg msg = { .cmd = STORAGE_FILE_READ }; local 228 struct storage_msg msg = { .cmd = STORAGE_FILE_WRITE, .flags = msg_flags, }; local 270 struct storage_msg msg = { .cmd = STORAGE_FILE_SET_SIZE, .flags = _to_msg_flags(opflags)}; local 281 struct storage_msg msg = { .cmd = STORAGE_FILE_GET_SIZE }; local 303 struct storage_msg msg = { local [all...] |
/system/core/base/ |
H A D | errors_windows.cpp | 49 std::string msg; local 50 if (!android::base::WideToUTF8(msgbuf, &msg)) { 57 msg = android::base::Trim(msg); 63 android::base::StringAppendF(&msg, " (%lu)", error_code); 64 return msg;
|
/system/keymaster/ |
H A D | android_keymaster_messages_test.cpp | 68 EmptyKeymasterResponse msg(ver); 69 msg.error = KM_ERROR_OK; 71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5)); 77 EmptyKeymasterResponse msg(ver); 78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; 80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); 185 GetKeyCharacteristicsResponse msg(ver); 186 msg.error = KM_ERROR_OK; 187 msg.enforced.Reinitialize(params, array_length(params)); 188 msg 477 GetVersionRequest msg; local 492 GetVersionResponse msg; local [all...] |
/system/core/adb/ |
H A D | file_sync_service.cpp | 107 syncmsg msg = {}; local 108 msg.stat_v1.id = ID_LSTAT_V1; 112 msg.stat_v1.mode = st.st_mode; 113 msg.stat_v1.size = st.st_size; 114 msg.stat_v1.time = st.st_mtime; 115 return WriteFdExactly(s, &msg.stat_v1, sizeof(msg.stat_v1)); 119 syncmsg msg = {}; local 120 msg.stat_v2.id = id; 132 msg 152 syncmsg msg; local 191 syncmsg msg; local 203 syncmsg msg; local 317 syncmsg msg; local 416 syncmsg msg; local [all...] |
/system/core/include/sysutils/ |
H A D | FrameworkClient.h | 16 int sendMsg(const char *msg); 17 int sendMsg(const char *msg, const char *data);
|
/system/core/libsysutils/include/sysutils/ |
H A D | FrameworkClient.h | 16 int sendMsg(const char *msg); 17 int sendMsg(const char *msg, const char *data);
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper_ipc.c | 53 struct gatekeeper_message *msg = malloc(msg_size); local 54 msg->cmd = cmd; 55 memcpy(msg->payload, in, in_size); 57 ssize_t rc = write(handle_, msg, msg_size); 58 free(msg); 78 msg = (struct gatekeeper_message *) out; 80 if ((cmd | GK_RESP_BIT) != msg->cmd) { 81 ALOGE("invalid command (%d)\n", msg->cmd);
|
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_ipc.c | 54 struct keymaster_message *msg = malloc(msg_size); local 55 msg->cmd = cmd; 56 memcpy(msg->payload, in, in_size); 58 ssize_t rc = write(handle_, msg, msg_size); 59 free(msg); 79 msg = (struct keymaster_message *) out; 81 if ((cmd | KEYMASTER_RESP_BIT) != msg->cmd) { 82 ALOGE("invalid command (%d)", msg->cmd);
|
/system/extras/simpleperf/ |
H A D | UnixSocket_test.cpp | 68 Message* msg = reinterpret_cast<Message*>(read_buf.data()); local 69 size_t aligned_len = Align(msg->len, UnixSocketMessageAlignment); 71 msg = reinterpret_cast<Message*>(read_buf.data()); 72 ASSERT_EQ(msg->len, msg->type + sizeof(UnixSocketMessage)); 73 read_data.insert(read_data.end(), msg->data, msg->data + msg->type); 84 // For each message received from the server, the client replies a msg 86 auto receive_message_callback = [&](const UnixSocketMessage& msg) { 132 UnixSocketMessage msg; local 158 UnixSocketMessage msg; local [all...] |
/system/core/debuggerd/ |
H A D | signal_sender.cpp | 91 signal_message msg; local 92 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg))); 96 } else if (rc != sizeof(msg)) { 103 if (msg.tid > 0) { 104 if (syscall(SYS_tgkill, msg.pid, msg.tid, msg.signal) != 0) { 108 if (kill(msg.pid, msg 158 signal_message msg = {.pid = pid, .tid = tid, .signal = signal }; local [all...] |
H A D | util.cpp | 35 msghdr msg = { local 38 auto cmsg = CMSG_FIRSTHDR(&msg); 44 return TEMP_FAILURE_RETRY(sendmsg(sockfd, &msg, 0)); 51 msghdr msg = { local 58 auto cmsg = CMSG_FIRSTHDR(&msg); 63 ssize_t result = TEMP_FAILURE_RETRY(recvmsg(sockfd, &msg, 0)); 69 bool received_fd = msg.msg_controllen == sizeof(cmsg_buf); 74 if ((msg.msg_flags & MSG_TRUNC) != 0) { 77 } else if ((msg.msg_flags & MSG_CTRUNC) != 0) {
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); 55 SizedBuffer serialized_msg(msg.GetSerializedSize()); 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 68 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); 84 SizedBuffer serialized_msg(msg.GetSerializedSize()); 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); 97 ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), password_size)); 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); 115 SizedBuffer serialized_msg(msg 218 VerifyResponse msg; local 229 VerifyRequest msg; local 240 EnrollResponse msg; local 251 EnrollRequest msg; local 296 Message msg; local [all...] |