/external/lldb/test/source-manager/ |
main.c | 3 int main(int argc, char const *argv[]) {
|
/external/sepolicy/tools/sepolicy-analyze/ |
attribute.h | 9 int attribute_func(int argc, char **argv, policydb_t *policydb);
|
booleans.h | 9 int booleans_func(int argc, char **argv, policydb_t *policydb);
|
dups.h | 9 int dups_func(int argc, char **argv, policydb_t *policydb);
|
neverallow.h | 9 int neverallow_func(int argc, char **argv, policydb_t *policydb);
|
perm.h | 9 int permissive_func(int argc, char **argv, policydb_t *policydb);
|
typecmp.h | 9 int typecmp_func(int argc, char **argv, policydb_t *policydb);
|
/external/skia/tools/lua/ |
lua_app.cpp | 28 int tool_main(int argc, char** argv); 29 int tool_main(int argc, char** argv) { 38 if (!strcmp(argv[i], "--lua") && i < argc-1) { 39 ptr = argv[i + 1]; 40 len = strlen(argv[i + 1]); 43 data = read_into_data(argv[i]); 48 SkDebugf("failed to load %s\n", argv[i]); 57 int main(int argc, char * const argv[]) { 58 return tool_main(argc, (char**) argv);
|
/external/strace/tests/ |
set_ptracer_any.c | 10 int main(int argc, char **argv) 23 (void) execvp(argv[1], argv + 1); 24 perror(argv[1]);
|
/external/tinyalsa/ |
tinycap.c | 71 int main(int argc, char **argv) 87 "[-r rate] [-b bits] [-p period_size] [-n n_periods]\n", argv[0]); 91 file = fopen(argv[1], "wb"); 93 fprintf(stderr, "Unable to create file '%s'\n", argv[1]); 98 argv += 2; 99 while (*argv) { 100 if (strcmp(*argv, "-d") == 0) { 101 argv++; 102 if (*argv) 103 device = atoi(*argv); [all...] |
/external/valgrind/helgrind/tests/ |
cond_init_destroy.c | 2 int main(int argc, char *argv[])
|
/external/valgrind/memcheck/tests/ |
recursive-merge.c | 36 void doit (int argc, char**argv) 40 char* calls = argv[i]; 41 char* seq = argv[i]; 47 int main(int argc, char**argv) 56 doit(argc, argv); // with default value of our argument. 59 doit(argc, argv); 62 doit(argc, argv); 65 doit(argc, argv); 68 doit(argc, argv);
|
/external/valgrind/none/tests/ |
fdleak_open.c | 5 int main (int argc, char **argv)
|
fdleak_pipe.c | 4 int main (int argc, char **argv)
|
fucomip.c | 3 int main (int argc, char ** argv)
|
/ndk/tests/build/cpp-extensions/jni/ |
main.c++ | 7 int main(int argc, char** argv) {
|
/external/e2fsprogs/tests/progs/ |
test_icount.c | 63 void do_create_icount(int argc, char **argv) 70 progname = *argv; 71 argv++; argc --; 73 if (argc && !strcmp("-i", *argv)) { 75 argv++; argc--; 78 if (parse_inode(progname, "icount size", argv[0], &size)) 80 argv++; argc--; 93 void do_free_icount(int argc, char **argv) 95 if (check_icount(argv[0])) 102 void do_fetch(int argc, char **argv) [all...] |
/bootable/recovery/applypatch/ |
main.c | 26 int CheckMode(int argc, char** argv) { 30 return applypatch_check(argv[2], argc-3, argv+3); 33 int SpaceMode(int argc, char** argv) { 38 size_t bytes = strtol(argv[2], &endptr, 10); 39 if (bytes == 0 && endptr == argv[2]) { 40 printf("can't parse \"%s\" as byte count\n\n", argv[2]); 50 static int ParsePatchArgs(int argc, char** argv, 61 char* colon = strchr(argv[i], ':'); 67 if (ParseSha1(argv[i], digest) != 0) [all...] |
/external/iproute2/tc/ |
m_csum.c | 43 char **argv = *argv_p; local 49 if ((matches(*argv, "iph") == 0) || 50 (matches(*argv, "ip4h") == 0) || 51 (matches(*argv, "ipv4h") == 0)) 54 else if (matches(*argv, "icmp") == 0) 57 else if (matches(*argv, "igmp") == 0) 60 else if (matches(*argv, "tcp") == 0) 63 else if (matches(*argv, "udp") == 0) 66 else if (matches(*argv, "udplite") == 0) 69 else if ((matches(*argv, "and") == 0) | 92 char **argv = *argv_p; local [all...] |
m_mirred.c | 69 char **argv = *argv_p; local 80 if (matches(*argv, "action") == 0) { 82 } else if (matches(*argv, "egress") == 0) { 88 if (matches(*argv, "index") == 0) { 90 if (get_u32(&p.index, *argv, 10)) { 97 argv++; 101 fprintf(stderr, "was expecting egress (%s)\n", *argv); 104 } else if (!mirror && matches(*argv, "mirror") == 0) { 113 } else if (!redir && matches(*argv, "redirect") == 0) { 122 } else if ((redir || mirror) && matches(*argv, "dev") == 0) 213 char **argv = *argv_p; local [all...] |
tc_class.c | 43 int tc_class_modify(int cmd, unsigned flags, int argc, char **argv) 66 if (strcmp(*argv, "dev") == 0) { 69 duparg("dev", *argv); 70 strncpy(d, *argv, sizeof(d)-1); 71 } else if (strcmp(*argv, "classid") == 0) { 75 duparg("classid", *argv); 76 if (get_tc_classid(&handle, *argv)) 77 invarg(*argv, "invalid class ID"); 79 } else if (strcmp(*argv, "handle") == 0) { 82 } else if (strcmp(*argv, "root") == 0) [all...] |
/system/vold/ |
CryptCommandListener.cpp | 54 void CryptCommandListener::dumpArgs(int argc, char **argv, int argObscure) { 61 unsigned int len = strlen(argv[i]) + 1; // Account for space 72 strcpy(p, argv[i]); 73 p+= strlen(argv[i]); 82 void CryptCommandListener::dumpArgs(int /*argc*/, char ** /*argv*/, int /*argObscure*/) { } 113 int argc, char **argv) { 126 if (!strcmp(argv[1], "checkpw")) { 131 dumpArgs(argc, argv, 2); 132 rc = cryptfs_check_passwd(argv[2]); 133 } else if (!strcmp(argv[1], "restart")) [all...] |
/external/libxml2/ |
testRelax.c | 57 int main(int argc, char **argv) { 64 if ((!strcmp(argv[i], "-debug")) || (!strcmp(argv[i], "--debug"))) 69 if ((!strcmp(argv[i], "-memory")) || (!strcmp(argv[i], "--memory"))) { 73 if ((!strcmp(argv[i], "-noout")) || (!strcmp(argv[i], "--noout"))) { 76 if ((!strcmp(argv[i], "-tree")) || (!strcmp(argv[i], "--tree"))) { 83 if (argv[i][0] != '-') [all...] |
/external/toybox/toys/pending/ |
route.c | 35 #define TEST_ARGV(argv) if (!*argv) show_route_help() 159 static int get_action(char ***argv, struct _arglist *list) 163 if (!**argv) return 0; 165 if (!strcmp(**argv, alist->arg)) { 166 *argv += 1; 195 static void get_next_params(char **argv, struct rtentry *rt, char **netmask) 197 while (*argv) { 199 if (!strcmp(*argv, "metric")) { 200 argv++ [all...] |
/external/selinux/libselinux/utils/ |
togglesebool.c | 13 static void rollback(int argc, char **argv) 18 security_set_boolean(argv[i], 19 security_get_boolean_active(argv[i])); 23 int main(int argc, char **argv) 29 fprintf(stderr, "%s: SELinux is disabled\n", argv[0]); 35 basename(argv[0])); 40 printf("%s: ", argv[i]); 41 rc = security_get_boolean_active(argv[i]); 44 if (security_set_boolean(argv[i], 0) >= 0) { 50 rollback(i, argv); [all...] |