Home
last modified time | relevance | path

Searched refs:argv (Results 1 – 25 of 57) sorted by relevance

123

/cts/tools/utils/
Drerun.py63 def main(argv): argument
64 if len(argv) < 3:
68 ctsPath = os.path.abspath(argv[1])
69 resultXml = os.path.abspath(argv[2])
71 if len(argv) > 3:
72 if argv[3] == "-s":
73 deviceSerial = argv[4]
89 main(sys.argv)
Dandroid_api_description_splitter.py147 if len(sys.argv) < 4:
151 xmlsplitter = XMLSplitter(sys.argv[1], sys.argv[2])
153 xmlsplitter.split(sys.argv[3])
DbuildCts.py73 def __init__(self, argv): argument
75 if len(argv) != 6:
76 print 'Usage: %s <testRoot> <ctsOutputDir> <tempDir> <androidRootDir> <docletPath>' % argv[0]
84 self.test_root = sys.argv[1]
85 self.out_dir = sys.argv[2]
86 self.temp_dir = sys.argv[3]
87 self.android_root = sys.argv[4]
88 self.doclet_path = sys.argv[5]
568 builder = CtsBuilder(sys.argv)
Drm_dup_holo_imgs.py37 def main(argv): argument
70 main(sys.argv)
/cts/suite/audio_quality/test_description/conf/
Ddetect_usb_audio.py24 def main(argv): argument
25 if len(argv) < 2:
31 while current_argv < len(argv):
32 product_list.append(argv[current_argv])
51 main(sys.argv)
/cts/hostsidetests/packagemanager/parsing/processing/
DApkGenerator.py28 aapt2 = sys.argv[1]
29 frameworkRes = sys.argv[2]
30 apkSigner = sys.argv[3]
31 keyStore = sys.argv[4]
32 genDir = sys.argv[5]
33 inputFiles = sys.argv[6:]
/cts/suite/audio_quality/executable/src/
Dmain.cpp58 int main(int argc, char *argv[]) in main() argument
61 fprintf(stderr, "%s [-l log_level][-s serial] test_xml\n", argv[0]); in main()
67 while ((opt = getopt(argc, argv, "l:s:")) != -1) { in main()
76 usage(argv[0]); in main()
81 usage(argv[0]); in main()
85 android::String8 xmlFile(argv[optind]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-4658/
Dpoc.c25 int main(int argc, char **argv) { in main() argument
32 doc = xmlReadFile(argv[1], NULL, 0); in main()
39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-5131/
Dpoc.c25 int main(int argc, char **argv) { in main() argument
32 doc = xmlReadFile(argv[1], NULL, 0); in main()
39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
/cts/suite/cts/utils/
Dgrapher.py36 def main(argv): argument
37 if len(argv) != 2:
41 (_, tests) = psr.parseReports(os.path.abspath(argv[1]))
83 main(sys.argv)
/cts/tests/aslr/src/
DAslrMallocTest.cpp140 int main(int argc, char **argv) in main() argument
142 if (argc == 3 && argPrint == argv[1]) { in main()
145 if (!android::base::ParseUint(argv[2], &size)) { in main()
155 testing::InitGoogleTest(&argc, argv); in main()
/cts/tests/tests/nativehardware/jni/
DGTestMain.cpp19 int main(int argc, char **argv) { in main() argument
20 ::testing::InitGoogleTest(&argc, argv); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9466/
Dpoc-CVE-2017-9049.c28 int main(int argc, char **argv) { in main() argument
38 xmlReadFile(argv[1], NULL, XML_PARSE_OLD10); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-6616/
Dpoc.cpp37 int main(int argc, char **argv) { in main() argument
39 (void) argv; in main()
60 sp < DataSource > dataSource = new FileSource(argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0697/
Dpoc.cpp37 int main(int argc, char *argv[]) { in main() argument
39 (void)argv; in main()
62 sp<DataSource> dataSource = dsf->CreateFromURI(NULL, argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0470/
Dpoc.cpp31 int main(int argc, char *argv[]) { in main() argument
33 (void)argv; in main()
41 FILE *inFile = fopen(argv[1], "rb"); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-3873/
Dpoc.cpp36 int main(int argc, char **argv) { in main() argument
38 (void)argv; in main()
60 sp<DataSource> dataSource = new FileSource(argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10244/
Dpoc.cpp21 int main(int argc, char **argv) { in main() argument
26 FILE *fp = fopen(argv[1], "rb"); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0381/
Dpoc.cpp80 int main(int argc, char **argv) { in main() argument
99 int fdData = open(argv[1], O_RDONLY); in main()
104 int fdInfo = open(argv[2], O_RDONLY); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0383/
Dpoc.cpp80 int main(int argc, char **argv) { in main() argument
99 int fdData = open(argv[1], O_RDONLY); in main()
104 int fdInfo = open(argv[2], O_RDONLY); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0384/
Dpoc.cpp80 int main(int argc, char **argv) { in main() argument
99 int fdData = open(argv[1], O_RDONLY); in main()
104 int fdInfo = open(argv[2], O_RDONLY); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0385/
Dpoc.cpp80 int main(int argc, char **argv) { in main() argument
99 int fdData = open(argv[1], O_RDONLY); in main()
104 int fdInfo = open(argv[2], O_RDONLY); in main()
/cts/tools/selinux/
DSELinuxNeverallowTestGen.py96 if len(sys.argv) != 3:
99 input_file = sys.argv[1]
100 output_file = sys.argv[2]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2228/
Dpoc.c63 int main(int argc, char **argv) { in main() argument
68 int file_desc = open((const char *)argv[1], O_RDONLY); in main()
/cts/hostsidetests/theme/
Dgenerate_images.py213 def main(argv): argument
228 if len(argv) is 2:
230 emulator = start_emulator(argv[1], density)
260 main(sys.argv)

123