Home
last modified time | relevance | path

Searched refs:argv (Results 1 – 25 of 70) sorted by relevance

123

/cts/tests/tests/debuggerd/
Ddebuggerd_cts_crasher.cpp29 int main(int argc, char** argv) { in main() argument
33 if (strcmp(argv[1], "crash_without_crash_detail") == 0) { in main()
36 if (strcmp(argv[1], "crash_with_single_crash_detail") == 0) { in main()
40 if (strcmp(argv[1], "crash_with_multiple_crash_details") == 0) { in main()
45 if (strcmp(argv[1], "crash_with_unregistered_crash_details") == 0) { in main()
51 if (strcmp(argv[1], "crash_with_binary_crash_detail") == 0) { in main()
55 if (strcmp(argv[1], "crash_with_single_crash_detail_many_used") == 0) { in main()
66 if (strcmp(argv[1], "crash_with_changing_crash_detail") == 0) { in main()
/cts/tests/signature/api-check/scripts/
Dtransform_expected_failures.py42 if len(sys.argv) < 2 or sys.argv[1] == "":
45 if len(sys.argv) > 3:
48 if len(sys.argv) == 2:
49 TransformExpectedFailures().transform(sys.argv[1])
51 TransformExpectedFailures().transform(sys.argv[1], sys.argv[2])
/cts/tools/utils/
Drerun.py63 def main(argv): argument
64 if len(argv) < 3:
68 ctsPath = os.path.abspath(argv[1])
69 resultXml = os.path.abspath(argv[2])
71 if len(argv) > 3:
72 if argv[3] == "-s":
73 deviceSerial = argv[4]
89 main(sys.argv)
Dandroid_api_description_splitter.py147 if len(sys.argv) < 4:
151 xmlsplitter = XMLSplitter(sys.argv[1], sys.argv[2])
153 xmlsplitter.split(sys.argv[3])
/cts/hostsidetests/packagemanager/parsing/processing/
DApkGenerator.py28 aapt2 = sys.argv[1]
29 frameworkRes = sys.argv[2]
30 apkSigner = sys.argv[3]
31 keyStore = sys.argv[4]
32 genDir = sys.argv[5]
33 inputFiles = sys.argv[6:]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-4658/
Dpoc.c25 int main(int argc, char **argv) { in main() argument
32 doc = xmlReadFile(argv[1], NULL, 0); in main()
39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-5131/
Dpoc.c25 int main(int argc, char **argv) { in main() argument
32 doc = xmlReadFile(argv[1], NULL, 0); in main()
39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21261/
Dpoc.cpp34 int main(int argc, char **argv) { in main() argument
43 error = FT_New_Face(library, argv[2], face_index, &face); in main()
45 if (strcmp(argv[1], "CVE-2022-27406")) { in main()
/cts/suite/cts/utils/
Dgrapher.py36 def main(argv): argument
37 if len(argv) != 2:
41 (_, tests) = psr.parseReports(os.path.abspath(argv[1]))
83 main(sys.argv)
/cts/tests/tests/nativeresources/jni/
DGTestMain.cpp19 int main(int argc, char **argv) { in main() argument
20 ::testing::InitGoogleTest(&argc, argv); in main()
/cts/tests/tests/nativehardware/jni/
DGTestMain.cpp19 int main(int argc, char **argv) { in main() argument
20 ::testing::InitGoogleTest(&argc, argv); in main()
/cts/hostsidetests/multidevices/bluetooth/
Dbluetooth_multi_devices_test.py97 if '--' in sys.argv:
98 index = sys.argv.index('--')
99 sys.argv = sys.argv[:1] + sys.argv[index + 1:]
/cts/tests/tests/companion/multidevice/host/
Dcdm_multi_device_test.py86 if '--' in sys.argv:
87 index = sys.argv.index('--')
88 sys.argv = sys.argv[:1] + sys.argv[index + 1:]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9466/
Dpoc-CVE-2017-9049.c31 int main(int argc, char **argv) { in main() argument
41 xmlReadFile(argv[1], NULL, XML_PARSE_OLD10); in main()
/cts/tests/aslr/src/
DAslrMallocTest.cpp140 int main(int argc, char **argv) in main() argument
142 if (argc == 3 && argPrint == argv[1]) { in main()
145 if (!android::base::ParseUint(argv[2], &size)) { in main()
155 testing::InitGoogleTest(&argc, argv); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-40114/
Dpoc.cpp24 int main(int argc, char* argv[]) { in main() argument
27 const char* descriptorFilePath = argv[1]; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-6616/
Dpoc.cpp37 int main(int argc, char **argv) { in main() argument
39 (void) argv; in main()
60 sp < DataSource > dataSource = new FileSource(argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0697/
Dpoc.cpp37 int main(int argc, char *argv[]) { in main() argument
39 (void)argv; in main()
62 sp<DataSource> dataSource = dsf->CreateFromURI(NULL, argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2180/
Dpoc.c51 int main(int argc, char **argv) { in main() argument
53 int fileDescriptor = open((const char *)argv[1], O_RDONLY); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10244/
Dpoc.cpp21 int main(int argc, char **argv) { in main() argument
26 FILE *fp = fopen(argv[1], "rb"); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-3873/
Dpoc.cpp36 int main(int argc, char **argv) { in main() argument
38 (void)argv; in main()
60 sp<DataSource> dataSource = new FileSource(argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0034/
Dpoc.cpp51 int32_t main(int32_t argc, char **argv) { in main() argument
53 (void)argv; in main()
64 fp = fopen(argv[1], "rb"); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0470/
Dpoc.cpp31 int main(int argc, char *argv[]) { in main() argument
33 (void)argv; in main()
41 FILE *inFile = fopen(argv[1], "rb"); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21127/
Dpoc.cpp31 int main(int argc, char **argv) { in main() argument
37 extractor->setDataSource(nullptr /* httpService */, argv[1]); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2228/
Dpoc.c63 int main(int argc, char **argv) { in main() argument
68 int file_desc = open((const char *)argv[1], O_RDONLY); in main()

123