@@ -77,10 +77,10 @@ void test_run_adb_shell(char * shell, bool bKeepAdbRoot = false) {
7777 printf (" inject_shell_remote_process result:%s\n " , szResult);
7878}
7979
80- void test_run_shell (char * shell) {
80+ void test_run_root_shell (char * shell) {
8181 printf (" test_run_shell(%s)\n " , shell);
8282 char szResult[0x1000 ] = { 0 };
83- ssize_t ret = safe_run_shell (ROOT_KEY, shell, szResult, sizeof (szResult));
83+ ssize_t ret = run_root_shell (ROOT_KEY, shell, szResult, sizeof (szResult));
8484 printf (" test_run_shell ret val:%zd\n " , ret);
8585 printf (" test_run_shell result:%s\n " , szResult);
8686}
@@ -96,7 +96,7 @@ int main(int argc, char *argv[])
9696 " \t 3.绕过SELinux\n "
9797 " \t 4.还原SELinux\n "
9898 " \t 5.执行ROOT Shell命令\n "
99- " \t 6.执行ADBShell命令 \n "
99+ " \t 6.执行ADB Shell命令 \n "
100100 " \t 7.赋予ADB最高级别权限\n "
101101 " \t 新一代root,跟面具完全不同思路,摆脱面具被检测的弱点,完美隐藏root功能,挑战全网root检测手段,兼容安卓APP直接JNI调用,稳定、流畅、不闪退。\n "
102102 " ======================================================\n "
@@ -124,7 +124,7 @@ int main(int argc, char *argv[])
124124 for (int i = 1 ; i < argc; i++) {
125125 sstrCmd << argv[i];
126126 }
127- test_run_shell ((char *)sstrCmd.str ().c_str ());
127+ test_run_root_shell ((char *)sstrCmd.str ().c_str ());
128128 }
129129 else if (argc > 2 && strcmp (argv[0 ], " adb" ) == 0 && strcmp (argv[1 ], " shell" ) == 0 ) {
130130 std::stringstream sstrCmd;
0 commit comments