/external/chromium_org/testing/ |
PRESUBMIT.py | 14 blacklist = [r'gmock.*', r'gtest.*'] 16 input_api, output_api, black_list=blacklist))
|
/frameworks/base/services/java/com/android/server/ |
CertBlacklister.java | 80 String blacklist = getValue(); local 81 if (blacklist != null) { 82 Slog.i(TAG, "Certificate blacklist changed, updating..."); 91 out.write(blacklist.getBytes()); 96 Slog.i(TAG, "Certificate blacklist updated"); 98 Slog.e(TAG, "Failed to write blacklist", e); 128 // set up the public key blacklist observer 135 // set up the serial number blacklist observer
|
/external/compiler-rt/lib/tsan/lit_tests/ |
test_output.sh | 7 BLACKLIST=$ROOTDIR/lit_tests/Helpers/blacklist.txt 15 CFLAGS="-fsanitize=thread -fsanitize-blacklist=$BLACKLIST -fPIE -O1 -g -Wall"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist
|
/external/chromium_org/chrome/browser/extensions/ |
admin_policy.h | 16 // blacklist, and forcelist imposed by admin policy. 23 bool BlacklistedByDefault(const base::ListValue* blacklist); 26 bool UserMayLoad(const base::ListValue* blacklist,
|
standard_management_policy_provider.cc | 9 #include "chrome/browser/extensions/blacklist.h" 39 const base::ListValue* blacklist = local 50 blacklist, whitelist, forcelist, allowed_types, extension, error);
|
extension_system.h | 22 class Blacklist; 90 // The blacklist is created at startup. 91 virtual Blacklist* blacklist() = 0; 141 virtual Blacklist* blacklist() OVERRIDE; // shared 177 Blacklist* blacklist(); 198 scoped_ptr<Blacklist> blacklist_; 199 // StandardManagementPolicyProvider depends on Blacklist [all...] |
test_extension_system.h | 66 virtual Blacklist* blacklist() OVERRIDE; 85 scoped_ptr<Blacklist> blacklist_;
|
standard_management_policy_provider.h | 12 class Blacklist;
|
test_extension_system.cc | 9 #include "chrome/browser/extensions/blacklist.h" 83 blacklist_.reset(new Blacklist(ExtensionPrefs::Get(profile_))); 146 Blacklist* TestExtensionSystem::blacklist() { function in class:extensions::TestExtensionSystem
|
/external/chromium/chrome/browser/ |
gpu_data_manager.h | 37 // GpuBlacklist::GetFeatureStatus, or NULL if blacklist is 51 // because the GPU blacklist could be updated. 69 // Gives ownership of the latest blacklist. This is always called on the UI 79 // Check if we should go ahead and use gpu blacklist. 83 // If flags hasn't been set and GPUInfo is available, run through blacklist
|
enumerate_modules_model_win.h | 38 // The blacklist status of the module. Suspected Bad modules have been 44 // blacklist and the module does not match the current entry in the 45 // blacklist. 47 // The module is not on the blacklist. Assume it is good. 88 // against blacklist). 95 // A structure we populate with the blacklist entries. 107 // the blacklist. This is because the same module can be described in many 111 // against the blacklist. 135 // The (currently) hard coded blacklist of known bad modules. 142 // It then normalizes the module info and matches them against a blacklist [all...] |
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager.h | 49 // http://www.chromium.org/administrators/url-blacklist-filter-format. 105 // Tracks the blacklist policies for a given profile, and updates it on changes. 131 // Returns true if |url| is blocked by the current blacklist. Must be called 135 // Returns true if |request| is blocked by the current blacklist. 142 // Replaces the current blacklist. Must be called on the IO thread. 144 virtual void SetBlacklist(scoped_ptr<URLBlacklist> blacklist); 150 // Used to delay updating the blacklist while the preferences are 154 // Updates the blacklist using the current preference values. 158 // Starts the blacklist update on the IO thread, using the filters in 171 // Used to track the policies and update the blacklist on changes [all...] |
/external/clang/test/CodeGen/ |
address-safety-attr.cpp | 3 // RUN: echo "src:%s" > %t.file.blacklist 4 // RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist 5 // RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s 6 // RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s 8 // FIXME: %t.file.blacklist is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp"
|
/external/chromium_org/chrome/browser/resources/translate_internals/ |
prefs.html | 11 <section id="prefs-language-blacklist"> 15 <section id="prefs-site-blacklist">
|
/external/chromium/net/base/ |
ssl_false_start_blacklist.h | 18 // IsMember returns true if the given host is in the blacklist. 64 return NULL; // no names with less than two labels are in the blacklist. 73 // This is the number of buckets in the blacklist hash table. (Must be a 88 // string x, x and *.x are considered to be in the blacklist. In order to 92 // included in the blacklist.
|
/external/chromium_org/chrome/browser/translate/ |
translate_prefs.cc | 347 // Get the union of the blacklist and the Accept languages, and set this to 350 // should be translated instead of the blacklist. The blacklist is no longer 446 const ListValue* blacklist = prefs_->GetList(pref_id); local 447 return (blacklist && !blacklist->empty() && IsValueInList(blacklist, value)); 454 ListValue* blacklist = update.Get(); local 455 if (!blacklist) { 456 NOTREACHED() << "Unregistered translate blacklist pref" 466 ListValue* blacklist = update.Get(); local 486 const ListValue* blacklist = prefs_->GetList(pref_id); local [all...] |
/external/chromium_org/chrome/common/extensions/ |
extension_constants.cc | 54 // TODO(battre): Delete the HTTP URL once the blacklist is downloaded via HTTPS. 56 "http://www.gstatic.com/chrome/extensions/blacklist"; 58 "https://www.gstatic.com/chrome/extensions/blacklist"; 79 // The extension blacklist URL is returned from the update service and 80 // therefore not determined by Chromium. If the location of the blacklist file 83 // of a blacklist: 84 // http://www.gstatic.com/chrome/extensions/blacklist/l_0_0_0_7.txt
|
/external/chromium/chrome/browser/translate/ |
translate_prefs.cc | 224 const ListValue* blacklist = prefs_->GetList(pref_id); local 225 return (blacklist && !blacklist->empty() && IsValueInList(blacklist, value)); 232 ListValue* blacklist = update.Get(); local 233 if (!blacklist) { 234 NOTREACHED() << "Unregistered translate blacklist pref"; 237 blacklist->Append(new StringValue(value)); 247 ListValue* blacklist = update.Get(); local 248 if (!blacklist) { [all...] |
/external/chromium_org/third_party/WebKit/Source/core/page/ |
UserStyleSheet.h | 45 UserStyleSheet(const String& source, const KURL& url, const Vector<String>& whitelist, const Vector<String>& blacklist, UserContentInjectedFrames injectedFrames, UserStyleLevel level) 49 , m_blacklist(blacklist) 58 const Vector<String>& blacklist() const { return m_blacklist; } function in class:WebCore::UserStyleSheet
|
/external/clang/docs/ |
SanitizerSpecialCaseList.rst | 29 ``-fsanitize-blacklist`` flag. See :doc:`UsersManual` for details. 43 $ cat blacklist.txt 48 $ clang -fsanitize=address -fsanitize-blacklist=blacklist.txt foo.c ; ./a.out
|
/frameworks/base/services/java/com/android/server/location/ |
LocationBlacklist.java | 37 * This is a silent blacklist. Applications can still call Location Manager 72 if (D) Slog.d(TAG, "blacklist: " + Arrays.toString(mBlacklist)); 82 * Return true if in blacklist 83 * (package name matches blacklist, and does not match whitelist)
|
/external/bouncycastle/patches/ |
README | 29 - Blacklist fraudulent Comodo certificates in PKIXCertPathValidatorSpi 30 - Blacklist compromised DigiNotar Root CA by public key to block cross-signed intermediates
|
/external/chromium_org/chrome/browser/ |
enumerate_modules_model_win.h | 40 // The blacklist status of the module. Suspected Bad modules have been 46 // blacklist and the module does not match the current entry in the 47 // blacklist. 49 // The module is not on the blacklist. Assume it is good. 97 // against blacklist). 104 // A structure we populate with the blacklist entries. 117 // the blacklist. This is because the same module can be described in many 121 // against the blacklist. 145 // The (currently) hard coded blacklist of known bad modules. 152 // It then normalizes the module info and matches them against a blacklist [all...] |
/external/chromium_org/tools/grit/grit/testdata/ |
GoogleDesktop.adm | 12 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
18 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-pop"
24 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
30 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
38 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
46 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
54 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
62 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
70 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1"
78 KEYNAME "Software\Policies\Google\Google Desktop\Preferences\blacklist-1" [all...] |