From 05534209f104a435d91042fd4b816aaaae7b7b54 Mon Sep 17 00:00:00 2001 From: Vojtech Bocek Date: Wed, 11 Sep 2013 08:11:56 +0200 Subject: Add TWFunc::Exec_Cmd() with no 'result' agrument Signed-off-by: Vojtech Bocek Change-Id: Id8acff1ac9b3c7e4b562c80562a8ff42a1d132b9 --- openrecoveryscript.cpp | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) (limited to 'openrecoveryscript.cpp') diff --git a/openrecoveryscript.cpp b/openrecoveryscript.cpp index 88b382974..fee6fe9a4 100644 --- a/openrecoveryscript.cpp +++ b/openrecoveryscript.cpp @@ -314,8 +314,7 @@ int OpenRecoveryScript::run_script_file(void) { } else if (strcmp(command, "cmd") == 0) { DataManager::SetValue("tw_action_text2", "Running Command"); if (cindex != 0) { - string status; - TWFunc::Exec_Cmd(value, status); + TWFunc::Exec_Cmd(value); } else { LOGERR("No value given for cmd\n"); } @@ -364,14 +363,13 @@ int OpenRecoveryScript::run_script_file(void) { return 1; } if (install_cmd && DataManager::GetIntValue(TW_HAS_INJECTTWRP) == 1 && DataManager::GetIntValue(TW_INJECT_AFTER_ZIP) == 1) { - string status; gui_print("Injecting TWRP into boot image...\n"); TWPartition* Boot = PartitionManager.Find_Partition_By_Path("/boot"); if (Boot == NULL || Boot->Current_File_System != "emmc") - TWFunc::Exec_Cmd("injecttwrp --dump /tmp/backup_recovery_ramdisk.img /tmp/injected_boot.img --flash", status); + TWFunc::Exec_Cmd("injecttwrp --dump /tmp/backup_recovery_ramdisk.img /tmp/injected_boot.img --flash"); else { string injectcmd = "injecttwrp --dump /tmp/backup_recovery_ramdisk.img /tmp/injected_boot.img --flash bd=" + Boot->Actual_Block_Device; - TWFunc::Exec_Cmd(injectcmd.c_str(), status); + TWFunc::Exec_Cmd(injectcmd.c_str()); } gui_print("TWRP injection complete.\n"); } -- cgit v1.2.3