/cts/tools/utils/ |
D | rerun.py | 63 def main(argv): argument 64 if len(argv) < 3: 68 ctsPath = os.path.abspath(argv[1]) 69 resultXml = os.path.abspath(argv[2]) 71 if len(argv) > 3: 72 if argv[3] == "-s": 73 deviceSerial = argv[4] 89 main(sys.argv)
|
D | android_api_description_splitter.py | 147 if len(sys.argv) < 4: 151 xmlsplitter = XMLSplitter(sys.argv[1], sys.argv[2]) 153 xmlsplitter.split(sys.argv[3])
|
D | buildCts.py | 73 def __init__(self, argv): argument 75 if len(argv) != 6: 76 print 'Usage: %s <testRoot> <ctsOutputDir> <tempDir> <androidRootDir> <docletPath>' % argv[0] 84 self.test_root = sys.argv[1] 85 self.out_dir = sys.argv[2] 86 self.temp_dir = sys.argv[3] 87 self.android_root = sys.argv[4] 88 self.doclet_path = sys.argv[5] 568 builder = CtsBuilder(sys.argv)
|
D | rm_dup_holo_imgs.py | 37 def main(argv): argument 70 main(sys.argv)
|
/cts/suite/audio_quality/test_description/conf/ |
D | detect_usb_audio.py | 24 def main(argv): argument 25 if len(argv) < 2: 31 while current_argv < len(argv): 32 product_list.append(argv[current_argv]) 51 main(sys.argv)
|
/cts/hostsidetests/packagemanager/parsing/processing/ |
D | ApkGenerator.py | 28 aapt2 = sys.argv[1] 29 frameworkRes = sys.argv[2] 30 apkSigner = sys.argv[3] 31 keyStore = sys.argv[4] 32 genDir = sys.argv[5] 33 inputFiles = sys.argv[6:]
|
/cts/suite/audio_quality/executable/src/ |
D | main.cpp | 58 int main(int argc, char *argv[]) in main() argument 61 fprintf(stderr, "%s [-l log_level][-s serial] test_xml\n", argv[0]); in main() 67 while ((opt = getopt(argc, argv, "l:s:")) != -1) { in main() 76 usage(argv[0]); in main() 81 usage(argv[0]); in main() 85 android::String8 xmlFile(argv[optind]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-4658/ |
D | poc.c | 25 int main(int argc, char **argv) { in main() argument 32 doc = xmlReadFile(argv[1], NULL, 0); in main() 39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-5131/ |
D | poc.c | 25 int main(int argc, char **argv) { in main() argument 32 doc = xmlReadFile(argv[1], NULL, 0); in main() 39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
|
/cts/suite/cts/utils/ |
D | grapher.py | 36 def main(argv): argument 37 if len(argv) != 2: 41 (_, tests) = psr.parseReports(os.path.abspath(argv[1])) 83 main(sys.argv)
|
/cts/tests/aslr/src/ |
D | AslrMallocTest.cpp | 140 int main(int argc, char **argv) in main() argument 142 if (argc == 3 && argPrint == argv[1]) { in main() 145 if (!android::base::ParseUint(argv[2], &size)) { in main() 155 testing::InitGoogleTest(&argc, argv); in main()
|
/cts/tests/tests/nativehardware/jni/ |
D | GTestMain.cpp | 19 int main(int argc, char **argv) { in main() argument 20 ::testing::InitGoogleTest(&argc, argv); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9466/ |
D | poc-CVE-2017-9049.c | 28 int main(int argc, char **argv) { in main() argument 38 xmlReadFile(argv[1], NULL, XML_PARSE_OLD10); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-6616/ |
D | poc.cpp | 37 int main(int argc, char **argv) { in main() argument 39 (void) argv; in main() 60 sp < DataSource > dataSource = new FileSource(argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0697/ |
D | poc.cpp | 37 int main(int argc, char *argv[]) { in main() argument 39 (void)argv; in main() 62 sp<DataSource> dataSource = dsf->CreateFromURI(NULL, argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0470/ |
D | poc.cpp | 31 int main(int argc, char *argv[]) { in main() argument 33 (void)argv; in main() 41 FILE *inFile = fopen(argv[1], "rb"); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-3873/ |
D | poc.cpp | 36 int main(int argc, char **argv) { in main() argument 38 (void)argv; in main() 60 sp<DataSource> dataSource = new FileSource(argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10244/ |
D | poc.cpp | 21 int main(int argc, char **argv) { in main() argument 26 FILE *fp = fopen(argv[1], "rb"); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0381/ |
D | poc.cpp | 80 int main(int argc, char **argv) { in main() argument 99 int fdData = open(argv[1], O_RDONLY); in main() 104 int fdInfo = open(argv[2], O_RDONLY); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0383/ |
D | poc.cpp | 80 int main(int argc, char **argv) { in main() argument 99 int fdData = open(argv[1], O_RDONLY); in main() 104 int fdInfo = open(argv[2], O_RDONLY); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0384/ |
D | poc.cpp | 80 int main(int argc, char **argv) { in main() argument 99 int fdData = open(argv[1], O_RDONLY); in main() 104 int fdInfo = open(argv[2], O_RDONLY); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0385/ |
D | poc.cpp | 80 int main(int argc, char **argv) { in main() argument 99 int fdData = open(argv[1], O_RDONLY); in main() 104 int fdInfo = open(argv[2], O_RDONLY); in main()
|
/cts/tools/selinux/ |
D | SELinuxNeverallowTestGen.py | 96 if len(sys.argv) != 3: 99 input_file = sys.argv[1] 100 output_file = sys.argv[2]
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2228/ |
D | poc.c | 63 int main(int argc, char **argv) { in main() argument 68 int file_desc = open((const char *)argv[1], O_RDONLY); in main()
|
/cts/hostsidetests/theme/ |
D | generate_images.py | 213 def main(argv): argument 228 if len(argv) is 2: 230 emulator = start_emulator(argv[1], density) 260 main(sys.argv)
|