/cts/tests/tests/debuggerd/ |
D | debuggerd_cts_crasher.cpp | 29 int main(int argc, char** argv) { in main() argument 33 if (strcmp(argv[1], "crash_without_crash_detail") == 0) { in main() 36 if (strcmp(argv[1], "crash_with_single_crash_detail") == 0) { in main() 40 if (strcmp(argv[1], "crash_with_multiple_crash_details") == 0) { in main() 45 if (strcmp(argv[1], "crash_with_unregistered_crash_details") == 0) { in main() 51 if (strcmp(argv[1], "crash_with_binary_crash_detail") == 0) { in main() 55 if (strcmp(argv[1], "crash_with_single_crash_detail_many_used") == 0) { in main() 66 if (strcmp(argv[1], "crash_with_changing_crash_detail") == 0) { in main()
|
/cts/tests/signature/api-check/scripts/ |
D | transform_expected_failures.py | 42 if len(sys.argv) < 2 or sys.argv[1] == "": 45 if len(sys.argv) > 3: 48 if len(sys.argv) == 2: 49 TransformExpectedFailures().transform(sys.argv[1]) 51 TransformExpectedFailures().transform(sys.argv[1], sys.argv[2])
|
/cts/tools/utils/ |
D | rerun.py | 63 def main(argv): argument 64 if len(argv) < 3: 68 ctsPath = os.path.abspath(argv[1]) 69 resultXml = os.path.abspath(argv[2]) 71 if len(argv) > 3: 72 if argv[3] == "-s": 73 deviceSerial = argv[4] 89 main(sys.argv)
|
D | android_api_description_splitter.py | 147 if len(sys.argv) < 4: 151 xmlsplitter = XMLSplitter(sys.argv[1], sys.argv[2]) 153 xmlsplitter.split(sys.argv[3])
|
/cts/hostsidetests/packagemanager/parsing/processing/ |
D | ApkGenerator.py | 28 aapt2 = sys.argv[1] 29 frameworkRes = sys.argv[2] 30 apkSigner = sys.argv[3] 31 keyStore = sys.argv[4] 32 genDir = sys.argv[5] 33 inputFiles = sys.argv[6:]
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-4658/ |
D | poc.c | 25 int main(int argc, char **argv) { in main() argument 32 doc = xmlReadFile(argv[1], NULL, 0); in main() 39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-5131/ |
D | poc.c | 25 int main(int argc, char **argv) { in main() argument 32 doc = xmlReadFile(argv[1], NULL, 0); in main() 39 xmlXPathNewParserContext((xmlChar *)argv[2], xpathCtx); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21261/ |
D | poc.cpp | 34 int main(int argc, char **argv) { in main() argument 43 error = FT_New_Face(library, argv[2], face_index, &face); in main() 45 if (strcmp(argv[1], "CVE-2022-27406")) { in main()
|
/cts/suite/cts/utils/ |
D | grapher.py | 36 def main(argv): argument 37 if len(argv) != 2: 41 (_, tests) = psr.parseReports(os.path.abspath(argv[1])) 83 main(sys.argv)
|
/cts/tests/tests/nativeresources/jni/ |
D | GTestMain.cpp | 19 int main(int argc, char **argv) { in main() argument 20 ::testing::InitGoogleTest(&argc, argv); in main()
|
/cts/tests/tests/nativehardware/jni/ |
D | GTestMain.cpp | 19 int main(int argc, char **argv) { in main() argument 20 ::testing::InitGoogleTest(&argc, argv); in main()
|
/cts/hostsidetests/multidevices/bluetooth/ |
D | bluetooth_multi_devices_test.py | 97 if '--' in sys.argv: 98 index = sys.argv.index('--') 99 sys.argv = sys.argv[:1] + sys.argv[index + 1:]
|
/cts/tests/tests/companion/multidevice/host/ |
D | cdm_multi_device_test.py | 86 if '--' in sys.argv: 87 index = sys.argv.index('--') 88 sys.argv = sys.argv[:1] + sys.argv[index + 1:]
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9466/ |
D | poc-CVE-2017-9049.c | 31 int main(int argc, char **argv) { in main() argument 41 xmlReadFile(argv[1], NULL, XML_PARSE_OLD10); in main()
|
/cts/tests/aslr/src/ |
D | AslrMallocTest.cpp | 140 int main(int argc, char **argv) in main() argument 142 if (argc == 3 && argPrint == argv[1]) { in main() 145 if (!android::base::ParseUint(argv[2], &size)) { in main() 155 testing::InitGoogleTest(&argc, argv); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-40114/ |
D | poc.cpp | 24 int main(int argc, char* argv[]) { in main() argument 27 const char* descriptorFilePath = argv[1]; in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-6616/ |
D | poc.cpp | 37 int main(int argc, char **argv) { in main() argument 39 (void) argv; in main() 60 sp < DataSource > dataSource = new FileSource(argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2017-0697/ |
D | poc.cpp | 37 int main(int argc, char *argv[]) { in main() argument 39 (void)argv; in main() 62 sp<DataSource> dataSource = dsf->CreateFromURI(NULL, argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2180/ |
D | poc.c | 51 int main(int argc, char **argv) { in main() argument 53 int fileDescriptor = open((const char *)argv[1], O_RDONLY); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-10244/ |
D | poc.cpp | 21 int main(int argc, char **argv) { in main() argument 26 FILE *fp = fopen(argv[1], "rb"); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2015-3873/ |
D | poc.cpp | 36 int main(int argc, char **argv) { in main() argument 38 (void)argv; in main() 60 sp<DataSource> dataSource = new FileSource(argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0034/ |
D | poc.cpp | 51 int32_t main(int32_t argc, char **argv) { in main() argument 53 (void)argv; in main() 64 fp = fopen(argv[1], "rb"); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0470/ |
D | poc.cpp | 31 int main(int argc, char *argv[]) { in main() argument 33 (void)argv; in main() 41 FILE *inFile = fopen(argv[1], "rb"); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2023-21127/ |
D | poc.cpp | 31 int main(int argc, char **argv) { in main() argument 37 extractor->setDataSource(nullptr /* httpService */, argv[1]); in main()
|
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2228/ |
D | poc.c | 63 int main(int argc, char **argv) { in main() argument 68 int file_desc = open((const char *)argv[1], O_RDONLY); in main()
|