Home
last modified time | relevance | path

Searched refs:adb (Results 1 – 25 of 202) sorted by relevance

123456789

/external/chromium-trace/catapult/devil/devil/utils/
Dmock_calls_test.py50 self.adb = _DummyAdb()
54 raise ValueError('(device %s) command %r is not nice' % (self.adb, cmd))
66 self.assertEquals(self.adb.Shell,
67 self.call_target(self.call.adb.Shell))
75 self.call_target(self.call.adb.Run)
79 self.call_target(self.call.adb.RunShell('cmd').append)
88 with self.patch_call(self.call.adb.Shell, return_value='hello'):
89 self.assertEquals('hello', self.adb.Shell('echo hello'))
96 with self.patch_call(self.call.adb.Shell, side_effect=ValueError):
98 self.adb.Shell('echo hello')
[all …]
/external/libmojo/third_party/catapult/devil/devil/utils/
Dmock_calls_test.py50 self.adb = _DummyAdb()
54 raise ValueError('(device %s) command %r is not nice' % (self.adb, cmd))
66 self.assertEquals(self.adb.Shell,
67 self.call_target(self.call.adb.Shell))
75 self.call_target(self.call.adb.Run)
79 self.call_target(self.call.adb.RunShell('cmd').append)
88 with self.patch_call(self.call.adb.Shell, return_value='hello'):
89 self.assertEquals('hello', self.adb.Shell('echo hello'))
96 with self.patch_call(self.call.adb.Shell, side_effect=ValueError):
98 self.adb.Shell('echo hello')
[all …]
/external/chromium-trace/catapult/devil/devil/android/sdk/
Dadb_wrapper_test.py22 self.adb = adb_wrapper.AdbWrapper('ABC12345678')
26 self.adb,
32 self.adb.DisableVerity()
38 self.adb.DisableVerity()
42 self.adb.EnableVerity()
48 self.adb.EnableVerity()
53 device_errors.AdbCommandFailedError, self.adb.EnableVerity)
58 device_errors.AdbCommandFailedError, self.adb.DisableVerity)
/external/libmojo/third_party/catapult/devil/devil/android/
Ddevice_utils_test.py67 self.assertEqual(serial_as_str, d.adb.GetDeviceSerial())
72 self.assertEqual(serial_as_unicode, d.adb.GetDeviceSerial())
78 self.assertEqual(serial, d.adb.GetDeviceSerial())
152 adb = mock.Mock(spec=adb_wrapper.AdbWrapper)
153 adb.__str__ = mock.Mock(return_value=test_serial)
154 adb.GetDeviceSerial.return_value = test_serial
155 adb.is_ready = is_ready
156 return adb
162 self.adb = _AdbWrapperMock('0123456789abcdef')
164 self.adb, default_timeout=10, default_retries=0)
[all …]
Ddevice_utils_devicetest.py37 self.adb = devices[0]
38 self.adb.WaitForDevice()
40 self.adb, default_timeout=10, default_retries=0)
88 self.adb.Push(host_file_path, device_file_path)
100 self.adb.Push(host_file_path, device_file_path)
118 self.adb.Push(host_file_path, device_file_path)
138 self.adb.Push(host_file_path1, device_file_path1)
139 self.adb.Push(host_file_path2, device_file_path2)
178 self.adb.Push(host_file_path1, device_file_path1)
179 self.adb.Push(host_file_path2, device_file_path2)
[all …]
Ddevice_utils.py265 self.adb = None
267 self.adb = _CreateAdbWrapper(device)
269 self.adb = device
293 return self.adb.GetDeviceSerial() == str(other)
305 return self.adb.GetDeviceSerial() < other.adb.GetDeviceSerial()
309 return self.adb.GetDeviceSerial()
326 return self.adb.GetState() == 'device'
402 self.adb.Root()
572 self.adb.WaitForDevice()
600 self.adb.Reboot()
[all …]
/external/chromium-trace/catapult/devil/devil/android/
Ddevice_utils_test.py68 self.assertEqual(serial_as_str, d.adb.GetDeviceSerial())
73 self.assertEqual(serial_as_unicode, d.adb.GetDeviceSerial())
79 self.assertEqual(serial, d.adb.GetDeviceSerial())
153 adb = mock.Mock(spec=adb_wrapper.AdbWrapper)
154 adb.__str__ = mock.Mock(return_value=test_serial)
155 adb.GetDeviceSerial.return_value = test_serial
156 adb.is_ready = is_ready
157 return adb
163 self.adb = _AdbWrapperMock('0123456789abcdef')
165 self.adb, default_timeout=10, default_retries=0)
[all …]
Ddevice_utils_devicetest.py38 self.adb = adb_wrapper.AdbWrapper(self.serial)
39 self.adb.WaitForDevice()
41 self.adb, default_timeout=10, default_retries=0)
89 self.adb.Push(host_file_path, device_file_path)
101 self.adb.Push(host_file_path, device_file_path)
119 self.adb.Push(host_file_path, device_file_path)
139 self.adb.Push(host_file_path1, device_file_path1)
140 self.adb.Push(host_file_path2, device_file_path2)
180 self.adb.Push(host_file_path1, device_file_path1)
181 self.adb.Push(host_file_path2, device_file_path2)
[all …]
/external/gemmlowp/scripts/
Dtest-android.sh59 adb root
66 adb shell mkdir -p /data/local/tmp
73 adb push $EXE /data/local/tmp
80 echo adb shell "/data/local/tmp/$EXE $TESTARGS"
82 adb shell "/data/local/tmp/$EXE $TESTARGS" | tee "log-$EXE"
Dci-test.sh6 adb push ./libs/* /data/local/tmp
7 adb shell /data/local/tmp/benchmark
8 adb shell /data/local/tmp/correctness_meta_gemm
/external/chromium-trace/catapult/systrace/atrace_helper/
DMakefile13 adb push libs/armeabi-v7a/atrace_helper /data/local/tmp/atrace_helper
16 adb shell /data/local/tmp/atrace_helper -c 1
19 adb shell /data/local/tmp/atrace_helper -c 1 -m -o /data/local/tmp/dump.json
20 adb pull /data/local/tmp/dump.json /tmp/dump.json
24 adb shell "time /data/local/tmp/atrace_helper -c 1 -m -o /dev/null"
/external/libusb/android/
DREADME62 adb shell su -c "mount -o remount,rw /system"
65 adb push obj/local/armeabi/libusb1.0.so /sdcard/
66 adb shell su -c "cat > /system/lib/libusb1.0.so < /sdcard/libusb1.0.so"
67 adb shell rm /sdcard/libusb1.0.so
72 adb push "obj/local/armeabi/$B" /sdcard/
73 adb shell su -c "cat > /system/bin/$B < /sdcard/$B"
74 adb shell su -c "chmod 0755 /system/bin/$B"
75 adb shell rm "/sdcard/$B"
79 adb shell su -c "mount -o remount,ro /system"
82 adb shell su -c "listdevs"
[all …]
/external/v8/tools/
Dandroid-ll-prof.sh53 adb -p "$DEPLOY" sync data
55 adb shell "cd /data/local/tmp/v8;\
59 adb pull /data/local/tmp/v8/v8.log .
60 adb pull /data/local/tmp/v8/v8.log.ll .
61 adb pull /data/perf.data .
/external/boringssl/src/crypto/asn1/
Dtasn_utl.c223 const ASN1_ADB *adb; in asn1_do_adb() local
233 adb = ASN1_ADB_ptr(tt->item); in asn1_do_adb()
236 sfld = offset2ptr(*pval, adb->offset); in asn1_do_adb()
240 if (!adb->null_tt) { in asn1_do_adb()
243 return adb->null_tt; in asn1_do_adb()
260 for (atbl = adb->tbl, i = 0; i < adb->tblcount; i++, atbl++) { in asn1_do_adb()
269 if (!adb->default_tt) { in asn1_do_adb()
272 return adb->default_tt; in asn1_do_adb()
/external/skia/bin/
Ddroid19 adb push $path //data/local/tmp/
20 adb push resources //data/local/tmp/
21 adb shell "chmod +x //data/local/tmp/$name"
22 adb shell "cd //data/local/tmp; ./$name $args"
/external/libcxx/utils/libcxx/android/test/
Dformat.py8 import libcxx.android.adb as adb namespace
66 adb.mkdir(self._working_directory(exec_file))
67 adb.push(exec_path, self._wd_path(exec_file, exec_file))
76 adb.push(df_path, df_dev_path)
78 except adb.AdbError as ex:
/external/flatbuffers/android/
Dbuild_apk.sh105 adb devices -l | \
125 adb() { function
331 adb ${adb_device} uninstall "${uninstall_package_name}" 1>&2 > /dev/null || \
338 local -r adb_install_result=$(adb ${adb_device} install "${install_apk}")
352 adb ${adb_device} shell cat system/build.prop | \
360 adb ${adb_device} logcat -c
374 adb ${adb_device} logcat | \
406 adb ${adb_device} shell am start ${adb_stop_activity} -n \
/external/flatbuffers/samples/android/
Dbuild_apk.sh105 adb devices -l | \
125 adb() { function
331 adb ${adb_device} uninstall "${uninstall_package_name}" 1>&2 > /dev/null || \
338 local -r adb_install_result=$(adb ${adb_device} install "${install_apk}")
352 adb ${adb_device} shell cat system/build.prop | \
360 adb ${adb_device} logcat -c
374 adb ${adb_device} logcat | \
406 adb ${adb_device} shell am start ${adb_stop_activity} -n \
/external/apache-harmony/jdwp/
DAndroid_debug_config.mk109 $(hide) while [ `adb wait-for-device shell getprop dev.bootcomplete | grep -c 1` -eq 0 ]; \
126 adb root
127 adb wait-for-device shell stop
128 adb remount
129 adb sync
130 adb reboot
132 adb shell $$(jdwp_test_runtime_target) -cp $(jdwp_test_classpath_target) \
/external/libvpx/libvpx/test/android/
DREADME13 Note: Both adb and ndk-build are available prebuilt at:
20 4) Transfer files to device using adb. Ensure you have proper permissions for
23 adb push /path/to/test_files /data/local/tmp
24 adb push /path/to/built_libs /data/local/tmp
29 adb shell
/external/compiler-rt/test/asan/android_commands/
Dandroid_common.py11 def adb(args, attempts = 1): function
34 adb(['pull', path, tmp], 5)
43 adb(['push', path, tmp_path], 5)
44 adb(['shell', 'cp "%s" "%s" 2>&1' % (tmp_path, dst_path)], 5)
/external/libmojo/third_party/catapult/devil/devil/android/tools/
Ddevice_recovery.py55 if device_status.IsBlacklisted(device.adb.GetDeviceSerial(),
75 device.adb.Root()
76 device.adb.Shell('echo b > /proc/sysrq-trigger', expect_status=None,
81 blacklist.Extend([device.adb.GetDeviceSerial()],
86 blacklist.Extend([device.adb.GetDeviceSerial()],
94 blacklist.Extend([device.adb.GetDeviceSerial()],
99 blacklist.Extend([device.adb.GetDeviceSerial()],
/external/deqp/targets/android/
Dlaunch.bat2 adb %* forward tcp:50016 tcp:50016
3 adb %* shell setprop log.tag.dEQP DEBUG
4 adb %* shell am start -n com.drawelements.deqp/.execserver.ServiceStarter
/external/chromium-trace/catapult/devil/devil/android/tools/
Ddevice_recovery.py58 if device_status.IsBlacklisted(device.adb.GetDeviceSerial(),
80 device.adb.Root()
85 device.adb.Shell('echo b > /proc/sysrq-trigger', expect_status=None,
91 blacklist.Extend([device.adb.GetDeviceSerial()],
96 blacklist.Extend([device.adb.GetDeviceSerial()],
106 blacklist.Extend([device.adb.GetDeviceSerial()],
111 blacklist.Extend([device.adb.GetDeviceSerial()],
/external/skia/experimental/tools/
Dandroid_skp_capture.sh13 if ! command -v adb > /dev/null 2>&1; then
15 adb() { function
30 adb shell "setprop '${key}' '${remote_path}'"

123456789