Lines Matching refs:argc

90     int runCommand(SocketClient *c, int argc, char **argv) {
92 return mWrappedCmd->runCommand(c, argc, argv);
128 int argc, char **argv) {
129 if (argc < 2) {
155 if (argc < 3) {
208 if (argc < 4) {
238 for (int i = index; i < argc; i++) {
285 if (argc != 4) {
300 if (argc != 4) {
316 if (argc != 4) {
331 if (argc != 4) {
357 int /* argc */, char ** /* argv */) {
373 int CommandListener::IpFwdCmd::runCommand(SocketClient *cli, int argc, char **argv) {
377 if (argc == 2) {
389 } else if (argc == 3) {
400 } else if (argc == 4) {
434 int argc, char **argv) {
437 if (argc < 2) {
452 } else if (argc == 3) {
470 if (argc < 4) {
476 if (argc % 2 == 1) {
481 const int num_addrs = argc - 2;
484 for (int arg_index = 2; arg_index < argc; arg_index++) {
505 if (argc < 5) {
510 rc = gCtls->tetherCtrl.setDnsForwarders(netId, &argv[4], argc - 4);
537 int argc, char **argv) {
540 if (argc < 5) {
548 if (!strcmp(argv[1], "enable") && argc >= 4) {
554 } else if (!strcmp(argv[1], "disable") && argc >= 4) {
577 int argc, char **argv) {
580 if (argc < 3) {
599 if ((argc > 3) && (!inet_aton(argv[5], &dns1))) {
603 if ((argc > 4) && (!inet_aton(argv[6], &dns2))) {
628 int CommandListener::ResolverCmd::runCommand(SocketClient *cli, int argc, char **margv) {
632 if (argc < 3) {
642 if (!parseAndExecuteSetNetDns(netId, argc, argv)) {
648 if (argc == 3) {
669 bool CommandListener::ResolverCmd::parseAndExecuteSetNetDns(int netId, int argc,
673 if (argc < 5) {
676 int end = argc;
714 int CommandListener::BandwidthControlCmd::runCommand(SocketClient *cli, int argc, char **argv) {
715 if (argc < 2) {
720 ALOGV("bwctrlcmd: argc=%d %s %s ...", argc, argv[0], argv[1]);
735 if (argc != 3) {
746 if (argc != 2) {
765 if (argc != 3) {
783 if (argc != 4) {
793 if (argc < 4) {
798 for (int q = 3; argc >= 4; q++, argc--) {
815 if (argc < 3) {
820 for (int q = 2; argc >= 3; q++, argc--) {
836 if (argc != 3) {
846 if (argc != 4) {
856 if (argc < 3) {
860 int rc = gCtls->bandwidthCtrl.addNaughtyApps(argc - 2, argv + 2);
867 if (argc < 3) {
871 int rc = gCtls->bandwidthCtrl.removeNaughtyApps(argc - 2, argv + 2);
876 if (argc < 3) {
880 int rc = gCtls->bandwidthCtrl.addNiceApps(argc - 2, argv + 2);
885 if (argc < 3) {
889 int rc = gCtls->bandwidthCtrl.removeNiceApps(argc - 2, argv + 2);
894 if (argc != 3) {
903 if (argc != 4) {
914 if (argc != 2) {
924 if (argc != 4) {
935 if (argc != 3) {
945 if (argc != 2) {
955 if (argc != 4) {
965 if (argc != 3) {
977 if (argc < 2 || argc > 4) {
981 tetherStats.intIface = argc > 2 ? argv[2] : "";
982 tetherStats.extIface = argc > 3 ? argv[3] : "";
984 if (argc <= 2 && gCtls->natCtrl.ifacePairList.empty()) {
1006 int CommandListener::IdletimerControlCmd::runCommand(SocketClient *cli, int argc, char **argv) {
1008 if (argc < 2) {
1013 ALOGV("idletimerctrlcmd: argc=%d %s %s ...", argc, argv[0], argv[1]);
1033 if (argc != 5) {
1046 if (argc != 5) {
1114 int CommandListener::FirewallCmd::runCommand(SocketClient *cli, int argc,
1116 if (argc < 2) {
1122 if (argc != 3) {
1142 if (argc != 4) {
1156 if (argc != 5) {
1177 if (argc != 3) {
1190 if (argc != 3) {
1209 int CommandListener::ClatdCmd::runCommand(SocketClient *cli, int argc,
1212 if (argc < 3) {
1267 int CommandListener::StrictCmd::runCommand(SocketClient *cli, int argc,
1269 if (argc < 2) {
1284 if (argc != 4) {
1332 int CommandListener::NetworkCommand::runCommand(SocketClient* client, int argc, char** argv) {
1333 if (argc < 2) {
1343 if (argc < 6 || argc > 9) {
1364 if (argc < nextArg + 3 || argc > nextArg + 4) {
1371 const char* nexthop = argc > nextArg ? argv[nextArg] : NULL;
1390 if (argc != 5) {
1414 if (argc < 3) {
1418 if (argc == 6 && !strcmp(argv[3], "vpn")) {
1424 } else if (argc > 4) {
1428 if (argc == 4) {
1444 if (argc != 3) {
1458 if (argc < 3) {
1463 if (argc < 4) {
1482 if (argc < 5) {
1496 if (nextArg == argc) {
1507 for (; nextArg < argc; ++nextArg) {
1536 if (argc < 4) {
1541 if (!uidRanges.parseFrom(argc - 4, argv + 4)) {
1562 if (argc < 4) {
1566 for (int i = 3; i < argc; ++i) {