diff options
author | Elliott Hughes <enh@google.com> | 2016-03-29 22:09:36 +0200 |
---|---|---|
committer | android-build-merger <android-build-merger@google.com> | 2016-03-29 22:09:36 +0200 |
commit | ee3314d3351a0f11be04474864e7f1edd69d79cc (patch) | |
tree | c93e04a4594b814e2f01b3c210fef12a289fdba7 | |
parent | resolve merge conflicts of 5cf4701 to nyc-dev-plus-aosp (diff) | |
parent | Fix uncrypt.cpp unique_fd build breakage. (diff) | |
download | android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar.gz android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar.bz2 android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar.lz android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar.xz android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.tar.zst android_bootable_recovery-ee3314d3351a0f11be04474864e7f1edd69d79cc.zip |
-rw-r--r-- | uncrypt/uncrypt.cpp | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/uncrypt/uncrypt.cpp b/uncrypt/uncrypt.cpp index 9e3416b03..2986606e1 100644 --- a/uncrypt/uncrypt.cpp +++ b/uncrypt/uncrypt.cpp @@ -615,20 +615,20 @@ int main(int argc, char** argv) { // c3. The socket is created by init when starting the service. uncrypt // will use the socket to communicate with its caller. - unique_fd service_socket(android_get_control_socket(UNCRYPT_SOCKET.c_str())); - if (!service_socket) { + android::base::unique_fd service_socket(android_get_control_socket(UNCRYPT_SOCKET.c_str())); + if (service_socket == -1) { ALOGE("failed to open socket \"%s\": %s", UNCRYPT_SOCKET.c_str(), strerror(errno)); return 1; } - fcntl(service_socket.get(), F_SETFD, FD_CLOEXEC); + fcntl(service_socket, F_SETFD, FD_CLOEXEC); - if (listen(service_socket.get(), 1) == -1) { + if (listen(service_socket, 1) == -1) { ALOGE("failed to listen on socket %d: %s", service_socket.get(), strerror(errno)); return 1; } - unique_fd socket_fd(accept4(service_socket.get(), nullptr, nullptr, SOCK_CLOEXEC)); - if (!socket_fd) { + android::base::unique_fd socket_fd(accept4(service_socket, nullptr, nullptr, SOCK_CLOEXEC)); + if (socket_fd == -1) { ALOGE("failed to accept on socket %d: %s", service_socket.get(), strerror(errno)); return 1; } @@ -636,13 +636,13 @@ int main(int argc, char** argv) { bool success = false; switch (action) { case UNCRYPT: - success = uncrypt_wrapper(input_path, map_file, socket_fd.get()); + success = uncrypt_wrapper(input_path, map_file, socket_fd); break; case SETUP_BCB: - success = setup_bcb(socket_fd.get()); + success = setup_bcb(socket_fd); break; case CLEAR_BCB: - success = clear_bcb(socket_fd.get()); + success = clear_bcb(socket_fd); break; default: // Should never happen. ALOGE("Invalid uncrypt action code: %d", action); @@ -653,7 +653,7 @@ int main(int argc, char** argv) { // ensure the client to receive the last status code before the socket gets // destroyed. int code; - if (android::base::ReadFully(socket_fd.get(), &code, 4)) { + if (android::base::ReadFully(socket_fd, &code, 4)) { ALOGI(" received %d, exiting now", code); } else { ALOGE("failed to read the code: %s", strerror(errno)); |