Home
last modified time | relevance | path

Searched refs:args (Results 1 – 7 of 7) sorted by relevance

/bootable/recovery/edify/
Dexpr.c404 char** args = malloc(count * sizeof(char*)); in ReadArgs() local
409 args[i] = Evaluate(state, argv[i]); in ReadArgs()
410 if (args[i] == NULL) { in ReadArgs()
414 free(args[j]); in ReadArgs()
416 free(args); in ReadArgs()
419 *(va_arg(v, char**)) = args[i]; in ReadArgs()
422 free(args); in ReadArgs()
430 Value** args = malloc(count * sizeof(Value*)); in ReadValueArgs() local
435 args[i] = EvaluateValue(state, argv[i]); in ReadValueArgs()
436 if (args[i] == NULL) { in ReadValueArgs()
[all …]
Dparser.y46 } args; member
52 %type <args> arglist
/bootable/recovery/updater/
Dinstall.c674 static struct perm_parsed_args ParsePermArgs(State * state, int argc, char** args) { in ParsePermArgs() argument
683 if (strcmp("uid", args[i]) == 0) { in ParsePermArgs()
685 if (sscanf(args[i+1], "%" SCNd64, &uid) == 1) { in ParsePermArgs()
689 uiPrintf(state, "ParsePermArgs: invalid UID \"%s\"\n", args[i + 1]); in ParsePermArgs()
694 if (strcmp("gid", args[i]) == 0) { in ParsePermArgs()
696 if (sscanf(args[i+1], "%" SCNd64, &gid) == 1) { in ParsePermArgs()
700 uiPrintf(state, "ParsePermArgs: invalid GID \"%s\"\n", args[i + 1]); in ParsePermArgs()
705 if (strcmp("mode", args[i]) == 0) { in ParsePermArgs()
707 if (sscanf(args[i+1], "%" SCNi32, &mode) == 1) { in ParsePermArgs()
711 uiPrintf(state, "ParsePermArgs: invalid mode \"%s\"\n", args[i + 1]); in ParsePermArgs()
[all …]
/bootable/recovery/
Dinstall.cpp125 const char** args = (const char**)malloc(sizeof(char*) * 5); in try_update_binary() local
126 args[0] = binary; in try_update_binary()
127 args[1] = EXPAND(RECOVERY_API_VERSION); // defined in Android.mk in try_update_binary()
130 args[2] = temp; in try_update_binary()
131 args[3] = (char*)path; in try_update_binary()
132 args[4] = NULL; in try_update_binary()
138 execv(binary, (char* const*)args); in try_update_binary()
/bootable/recovery/minadbd/
Dservices.cpp47 const char* args = reinterpret_cast<const char*>(data); in sideload_host_service() local
50 if (sscanf(args, "%d:%d", &file_size, &block_size) != 2) { in sideload_host_service()
51 printf("bad sideload-host arguments: %s\n", args); in sideload_host_service()
/bootable/recovery/mtdutils/
Dflash_image.c36 va_list args; in die() local
37 va_start(args, msg); in die()
39 vsnprintf(buf, sizeof(buf), msg, args); in die()
40 va_end(args); in die()
/bootable/recovery/minzip/
DZip.c639 CopyProcessArgs *args = (CopyProcessArgs *)cookie; in copyProcessFunction() local
640 if (dataLen <= args->bufLen) { in copyProcessFunction()
641 memcpy(args->buf, data, dataLen); in copyProcessFunction()
642 args->buf += dataLen; in copyProcessFunction()
643 args->bufLen -= dataLen; in copyProcessFunction()
655 CopyProcessArgs args; in mzReadZipEntry() local
658 args.buf = buf; in mzReadZipEntry()
659 args.bufLen = bufLen; in mzReadZipEntry()
661 (void *)&args); in mzReadZipEntry()