Home | History | Annotate | Download | only in server

Lines Matching defs:argv

260                                                       int argc, char **argv) {
266 if (!strcmp(argv[1], "list")) {
292 if (!strcmp(argv[1], "getcfg")) {
301 if (ifc_get_info(argv[2], &addr.s_addr, &prefixLength, &flags)) {
307 if (ifc_get_hwaddr(argv[2], (void *) hwaddr)) {
308 ALOGW("Failed to retrieve HW addr for %s (%s)", argv[2], strerror(errno));
338 } else if (!strcmp(argv[1], "setcfg")) {
351 if (!inet_aton(argv[3], &addr)) {
355 if (ifc_set_addr(argv[2], addr.s_addr)) {
362 if (addr.s_addr != 0 && ifc_set_prefixLength(argv[2], atoi(argv[4]))) {
371 char *flag = argv[i];
373 ALOGD("Trying to bring up %s", argv[2]);
374 if (ifc_up(argv[2])) {
381 ALOGD("Trying to bring down %s", argv[2]);
382 if (ifc_down(argv[2])) {
408 } else if (!strcmp(argv[1], "clearaddrs")) {
410 ALOGD("Clearing all IP addresses on %s", argv[2]);
412 ifc_clear_addresses(argv[2]);
416 } else if (!strcmp(argv[1], "ipv6privacyextensions")) {
423 int enable = !strncmp(argv[3], "enable", 7);
424 if (sInterfaceCtrl->setIPv6PrivacyExtensions(argv[2], enable) == 0) {
431 } else if (!strcmp(argv[1], "ipv6")) {
439 int enable = !strncmp(argv[3], "enable", 7);
440 if (sInterfaceCtrl->setEnableIPv6(argv[2], enable) == 0) {
447 } else if (!strcmp(argv[1], "ipv6ndoffload")) {
454 int enable = !strncmp(argv[3], "enable", 7);
455 if (sInterfaceCtrl->setIPv6NdOffload(argv[2], enable) == 0) {
462 } else if (!strcmp(argv[1], "setmtu")) {
468 if (sInterfaceCtrl->setMtu(argv[2], argv[3]) == 0) {
489 int /* argc */, char ** /* argv */) {
506 int argc, char **argv) {
514 if (!strcmp(argv[1], "status")) {
521 } else if (!strcmp(argv[1], "enable")) {
523 } else if (!strcmp(argv[1], "disable")) {
544 int argc, char **argv) {
552 if (!strcmp(argv[1], "stop")) {
554 } else if (!strcmp(argv[1], "status")) {
563 if (!strcmp(argv[1], "interface") && !strcmp(argv[2], "list")) {
569 } else if (!strcmp(argv[1], "dns") && !strcmp(argv[2], "list")) {
590 if (!strcmp(argv[1], "start")) {
601 if (!inet_aton(argv[arg_index++], &(addrs[array_index++]))) {
609 } else if (!strcmp(argv[1], "interface")) {
610 if (!strcmp(argv[2], "add")) {
611 rc = sTetherCtrl->tetherInterface(argv[3]);
612 } else if (!strcmp(argv[2], "remove")) {
613 rc = sTetherCtrl->untetherInterface(argv[3]);
614 /* else if (!strcmp(argv[2], "list")) handled above */
620 } else if (!strcmp(argv[1], "dns")) {
621 if (!strcmp(argv[2], "set")) {
626 unsigned netId = stringToNetId(argv[3]);
627 rc = sTetherCtrl->setDnsForwarders(netId, &argv[4], argc - 4);
628 /* else if (!strcmp(argv[2], "list")) handled above */
654 int argc, char **argv) {
665 if (!strcmp(argv[1], "enable") && argc >= 4) {
666 rc = sNatCtrl->enableNat(argv[2], argv[3]);
671 } else if (!strcmp(argv[1], "disable") && argc >= 4) {
674 rc |= sNatCtrl->disableNat(argv[2], argv[3]);
694 int argc, char **argv) {
702 if (!strcmp(argv[1], "attach")) {
708 if (!inet_aton(argv[3], &l)) {
712 if (!inet_aton(argv[4], &r)) {
716 if ((argc > 3) && (!inet_aton(argv[5], &dns1))) {
720 if ((argc > 4) && (!inet_aton(argv[6], &dns2))) {
724 rc = sPppCtrl->attachPppd(argv[2], l, r, dns1, dns2);
725 } else if (!strcmp(argv[1], "detach")) {
726 rc = sPppCtrl->detachPppd(argv[2]);
746 int argc, char **argv) {
760 if (!strcmp(argv[1], "startap")) {
762 } else if (!strcmp(argv[1], "stopap")) {
764 } else if (!strcmp(argv[1], "fwreload")) {
765 rc = sSoftapCtrl->fwReloadSoftap(argc, argv);
766 } else if (!strcmp(argv[1], "status")) {
772 } else if (!strcmp(argv[1], "set")) {
773 rc = sSoftapCtrl->setSoftap(argc, argv);
793 const char **argv = const_cast<const char **>(margv);
800 if (!strcmp(argv[1], "setnetdns")) {
803 rc = sResolverCtrl->setDnsServers(strtoul(argv[2], NULL, 0), argv[3], &argv[4], argc - 4);
809 } else if (!strcmp(argv[1], "clearnetdns")) { // "resolver clearnetdns <netId>"
811 rc = sResolverCtrl->clearDnsServers(strtoul(argv[2], NULL, 0));
817 } else if (!strcmp(argv[1], "flushnet")) { // "resolver flushnet <netId>"
819 rc = sResolverCtrl->flushDnsCache(strtoul(argv[2], NULL, 0));
862 int CommandListener::BandwidthControlCmd::runCommand(SocketClient *cli, int argc, char **argv) {
868 ALOGV("bwctrlcmd: argc=%d %s %s ...", argc, argv[0], argv[1]);
870 if (!strcmp(argv[1], "enable")) {
876 if (!strcmp(argv[1], "disable")) {
882 if (!strcmp(argv[1], "removequota") || !strcmp(argv[1], "rq")) {
887 int rc = sBandwidthCtrl->removeInterfaceSharedQuota(argv[2]);
892 if (!strcmp(argv[1], "getquota") || !strcmp(argv[1], "gq")) {
911 if (!strcmp(argv[1], "getiquota") || !strcmp(argv[1], "giq")) {
918 int rc = sBandwidthCtrl->getInterfaceQuota(argv[2], &bytes);
930 if (!strcmp(argv[1], "setquota") || !strcmp(argv[1], "sq")) {
935 int rc = sBandwidthCtrl->setInterfaceSharedQuota(argv[2], atoll(argv[3]));
939 if (!strcmp(argv[1], "setquotas") || !strcmp(argv[1], "sqs")) {
947 rc = sBandwidthCtrl->setInterfaceSharedQuota(argv[q], atoll(argv[2]));
950 asprintf(&msg, "bandwidth setquotas %s %s failed", argv[2], argv[q]);
961 if (!strcmp(argv[1], "removequotas") || !strcmp(argv[1], "rqs")) {
969 rc = sBandwidthCtrl->removeInterfaceSharedQuota(argv[q]);
972 asprintf(&msg, "bandwidth removequotas %s failed", argv[q]);
983 if (!strcmp(argv[1], "removeiquota") || !strcmp(argv[1], "riq")) {
988 int rc = sBandwidthCtrl->removeInterfaceQuota(argv[2]);
993 if (!strcmp(argv[1], "setiquota") || !strcmp(argv[1], "siq")) {
998 int rc = sBandwidthCtrl->setInterfaceQuota(argv[2], atoll(argv[3]));
1003 if (!strcmp(argv[1], "addnaughtyapps") || !strcmp(argv[1], "ana")) {
1008 int rc = sBandwidthCtrl->addNaughtyApps(argc - 2, argv + 2);
1014 if (!strcmp(argv[1], "removenaughtyapps") || !strcmp(argv[1], "rna")) {
1019 int rc = sBandwidthCtrl->removeNaughtyApps(argc - 2, argv + 2);
1023 if (!strcmp(argv[1], "happybox")) {
1028 if (!strcmp(argv[2], "enable")) {
1034 if (!strcmp(argv[2], "disable")) {
1042 if (!strcmp(argv[1], "addniceapps") || !strcmp(argv[1], "aha")) {
1047 int rc = sBandwidthCtrl->addNiceApps(argc - 2, argv + 2);
1051 if (!strcmp(argv[1], "removeniceapps") || !strcmp(argv[1], "rha")) {
1056 int rc = sBandwidthCtrl->removeNiceApps(argc - 2, argv + 2);
1060 if (!strcmp(argv[1], "setglobalalert") || !strcmp(argv[1], "sga")) {
1065 int rc = sBandwidthCtrl->setGlobalAlert(atoll(argv[2]));
1069 if (!strcmp(argv[1], "debugsettetherglobalalert") || !strcmp(argv[1], "dstga")) {
1080 if (!strcmp(argv[1], "removeglobalalert") || !strcmp(argv[1], "rga")) {
1090 if (!strcmp(argv[1], "debugremovetetherglobalalert") || !strcmp(argv[1], "drtga")) {
1101 if (!strcmp(argv[1], "setsharedalert") || !strcmp(argv[1], "ssa")) {
1106 int rc = sBandwidthCtrl->setSharedAlert(atoll(argv[2]));
1111 if (!strcmp(argv[1], "removesharedalert") || !strcmp(argv[1], "rsa")) {
1121 if (!strcmp(argv[1], "setinterfacealert") || !strcmp(argv[1], "sia")) {
1126 int rc = sBandwidthCtrl->setInterfaceAlert(argv[2], atoll(argv[3]));
1131 if (!strcmp(argv[1], "removeinterfacealert") || !strcmp(argv[1], "ria")) {
1136 int rc = sBandwidthCtrl->removeInterfaceAlert(argv[2]);
1141 if (!strcmp(argv[1], "gettetherstats") || !strcmp(argv[1], "gts")) {
1148 tetherStats.intIface = argc > 2 ? argv[2] : "";
1149 tetherStats.extIface = argc > 3 ? argv[3] : "";
1173 int CommandListener::IdletimerControlCmd::runCommand(SocketClient *cli, int argc, char **argv) {
1180 ALOGV("idletimerctrlcmd: argc=%d %s %s ...", argc, argv[0], argv[1]);
1182 if (!strcmp(argv[1], "enable")) {
1191 if (!strcmp(argv[1], "disable")) {
1199 if (!strcmp(argv[1], "add")) {
1205 argv[2], atoi(argv[3]), argv[4])) {
1212 if (!strcmp(argv[1], "remove")) {
1219 argv[2], atoi(argv[3]), argv[4])) {
1253 char **argv) {
1259 if (!strcmp(argv[1], "enable")) {
1263 if (!strcmp(argv[1], "disable")) {
1267 if (!strcmp(argv[1], "is_enabled")) {
1272 if (!strcmp(argv[1], "set_interface_rule")) {
1279 const char* iface = argv[2];
1280 FirewallRule rule = parseRule(argv[3]);
1286 if (!strcmp(argv[1], "set_egress_source_rule")) {
1294 const char* addr = argv[2];
1295 FirewallRule rule = parseRule(argv[3]);
1301 if (!strcmp(argv[1], "set_egress_dest_rule")) {
1309 const char* addr = argv[2];
1310 int port = atoi(argv[3]);
1311 FirewallRule rule = parseRule(argv[4]);
1319 if (!strcmp(argv[1], "set_uid_rule")) {
1327 int uid = atoi(argv[2]);
1328 FirewallRule rule = parseRule(argv[3]);
1342 char **argv) {
1349 if (!strcmp(argv[1], "stop")) {
1350 rc = sClatdCtrl->stopClatd(argv[2]);
1351 } else if (!strcmp(argv[1], "status")) {
1353 asprintf(&tmp, "Clatd status: %s", (sClatdCtrl->isClatdStarted(argv[2]) ?
1358 } else if (!strcmp(argv[1], "start")) {
1359 rc = sClatdCtrl->startClatd(argv[2]);
1394 int CommandListener::NetworkCommand::runCommand(SocketClient* client, int argc, char** argv) {
1404 if (!strcmp(argv[1], "route")) {
1412 if (!strcmp(argv[nextArg], "legacy")) {
1415 uid = strtoul(argv[nextArg++], NULL, 0);
1419 if (!strcmp(argv[nextArg], "add")) {
1421 } else if (strcmp(argv[nextArg], "remove")) {
1430 unsigned netId = stringToNetId(argv[nextArg++]);
1431 const char* interface = argv[nextArg++];
1432 const char* destination = argv[nextArg++];
1433 const char* nexthop = argc > nextArg ? argv[nextArg] : NULL;
1451 if (!strcmp(argv[1], "interface")) {
1455 unsigned netId = stringToNetId(argv[3]);
1456 if (!strcmp(argv[2], "add")) {
1457 if (int ret = sNetCtrl->addInterfaceToNetwork(netId, argv[4])) {
1460 } else if (!strcmp(argv[2], "remove")) {
1461 if (int ret = sNetCtrl->removeInterfaceFromNetwork(netId, argv[4])) {
1475 if (!strcmp(argv[1], "create")) {
1479 unsigned netId = stringToNetId(argv[2]);
1480 if (argc == 6 && !strcmp(argv[3], "vpn")) {
1481 bool hasDns = atoi(argv[4]);
1482 bool secure = atoi(argv[5]);
1491 permission = stringToPermission(argv[3]);
1505 if (!strcmp(argv[1], "destroy")) {
1509 unsigned netId = stringToNetId(argv[2]);
1519 if (!strcmp(argv[1], "default")) {
1524 if (!strcmp(argv[2], "set")) {
1528 netId = stringToNetId(argv[3]);
1529 } else if (strcmp(argv[2], "clear")) {
1543 if (!strcmp(argv[1], "permission")) {
1549 if (!strcmp(argv[3], "set")) {
1550 permission = stringToPermission(argv[4]);
1555 } else if (strcmp(argv[3], "clear")) {
1564 unsigned id = strtoul(argv[nextArg], &endPtr, 0);
1565 if (!*argv[nextArg] || *endPtr) {
1570 if (!strcmp(argv[2], "user")) {
1572 } else if (!strcmp(argv[2], "network")) {
1585 if (!strcmp(argv[1], "users")) {
1589 unsigned netId = stringToNetId(argv[3]);
1591 if (!uidRanges.parseFrom(argc - 4, argv + 4)) {
1594 if (!strcmp(argv[2], "add")) {
1598 } else if (!strcmp(argv[2], "remove")) {
1611 if (!strcmp(argv[1], "protect")) {
1617 uids.push_back(strtoul(argv[i], NULL, 0));
1619 if (!strcmp(argv[2], "allow")) {
1621 } else if (!strcmp(argv[2], "deny")) {