Home
last modified time | relevance | path

Searched defs:processPatternStrings (Results 1 – 5 of 5) sorted by relevance

/cts/hostsidetests/securitybulletin/src/android/security/cts/
DTestMedia.java93 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13180() local
193 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2016_2485() local
229 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_0817() local
364 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_0840() local
377 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13241() local
548 String processPatternStrings[] = {"media\\.swcodec"}; in testPocCVE_2020_0470() local
611 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2019_9347() local
DCVE_2017_13194.java38 String processPatternStrings[] = {"media\\.codec", "omx@\\d+?\\.\\d+?-service"}; in testPocCVE_2017_13194() local
DCVE_2020_0226.java34 String processPatternStrings[] = {"surfaceflinger"}; in testPocCVE_2020_0226() local
DCVE_2021_0439.java34 String processPatternStrings[] = {"system_server"}; in testPocCVE_2021_0439() local
DAdbUtils.java514 String... processPatternStrings) throws Exception { in runPocAssertNoCrashes()
573 ITestDevice device, String processPatternStrings[]) throws Exception { in runPocAssertNoCrashesNotVulnerable()
614 String processPatternStrings[]) throws Exception { in runPocAssertNoCrashesNotVulnerable()
638 String... processPatternStrings) throws Exception { in runPocAssertNoCrashesNotVulnerable()
707 public static void assertNoCrashes(ITestDevice device, String... processPatternStrings) in assertNoCrashes()