HomeSort by relevance Sort by last modified time
    Searched full:blacklist (Results 1 - 25 of 322) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/clang/test/Driver/
fsanitize-blacklist.c 1 // General blacklist usage.
2 // RUN: %clang -fsanitize=address -fsanitize-blacklist=%s %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST
3 // CHECK-BLACKLIST: -fsanitize-blacklist
5 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag.
6 // RUN: %clang -fsanitize-blacklist=%s %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SANITIZE
7 // CHECK-NO-SANITIZE-NOT: -fsanitize-blacklist
9 // Flag -fno-sanitize-blacklist wins if it is specified later.
10 // RUN: %clang -fsanitize=address -fsanitize-blacklist=%s -fno-sanitize-blacklist %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-BLACKLIS
    [all...]
  /external/chromium_org/chrome/browser/extensions/
test_blacklist.h 14 class Blacklist;
16 // A wrapper for an extensions::Blacklist that provides functionality for
20 explicit TestBlacklist(Blacklist* blacklist);
22 Blacklist* blacklist() { return blacklist_; } function in class:extensions::TestBlacklist
27 Blacklist* blacklist_;
admin_policy_unittest.cc 52 base::ListValue blacklist; local
53 blacklist.Append(Value::CreateStringValue("http://www.google.com"));
54 EXPECT_FALSE(ap::BlacklistedByDefault(&blacklist));
55 blacklist.Append(Value::CreateStringValue("*"));
56 EXPECT_TRUE(ap::BlacklistedByDefault(&blacklist));
58 blacklist.Clear();
59 blacklist.Append(Value::CreateStringValue("*"));
60 EXPECT_TRUE(ap::BlacklistedByDefault(&blacklist));
72 // Required extensions may load even if they're on the blacklist.
73 base::ListValue blacklist; local
87 base::ListValue blacklist; local
105 base::ListValue blacklist; local
120 base::ListValue blacklist; local
    [all...]
blacklist_unittest.cc 8 #include "chrome/browser/extensions/blacklist.h"
43 Blacklist::ScopedDatabaseManagerForTest scoped_blacklist_database_manager_;
45 Blacklist blacklist_;
63 // Mix up the blacklist.
65 std::vector<std::string> blacklist; local
66 blacklist.push_back(extension_b->id());
67 blacklist.push_back(extension_c->id());
68 blacklist_.SetFromUpdater(blacklist, "1");
77 std::vector<std::string> blacklist; local
78 blacklist.push_back(extension_b->id())
89 std::vector<std::string> blacklist; local
103 std::vector<std::string> blacklist; local
115 std::vector<std::string> blacklist; local
134 std::vector<std::string> blacklist; local
    [all...]
blacklist.h 24 // A blacklist of extensions.
25 class Blacklist : public content::NotificationObserver,
26 public base::SupportsWeakPtr<Blacklist> {
30 // Observes |blacklist| on construction and unobserves on destruction.
31 explicit Observer(Blacklist* blacklist);
39 Blacklist* blacklist_;
66 explicit Blacklist(ExtensionPrefs* prefs);
68 virtual ~Blacklist();
83 // Sets the blacklist from the updater to contain the extension IDs in |ids
    [all...]
blacklist.cc 5 #include "chrome/browser/extensions/blacklist.h"
29 // rather than a member of Blacklist because Blacklist accesses the real
116 void IsNotEmpty(const Blacklist::IsBlacklistedCallback& callback,
118 callback.Run(set.empty() ? Blacklist::NOT_BLACKLISTED
119 : Blacklist::BLACKLISTED);
124 Blacklist::Observer::Observer(Blacklist* blacklist) : blacklist_(blacklist) {
273 std::set<std::string> blacklist = pref_blacklisted_ids; local
    [all...]
test_blacklist.cc 12 #include "chrome/browser/extensions/blacklist.h"
16 TestBlacklist::TestBlacklist(Blacklist* blacklist)
17 : blacklist_(blacklist) {
admin_policy.cc 48 bool BlacklistedByDefault(const base::ListValue* blacklist) {
50 return blacklist && blacklist->Find(wildcard) != blacklist->end();
53 bool UserMayLoad(const base::ListValue* blacklist,
70 if ((!blacklist || blacklist->empty()) && (!allowed_types))
103 // Then check the admin blacklist.
104 if ((blacklist && blacklist->Find(id_value) != blacklist->end()) |
    [all...]
extension_blacklist_browsertest.cc 6 #include "chrome/browser/extensions/blacklist.h"
43 // TODO(kalman): a different approach will be needed when the blacklist
63 // blacklist, and not in any of its other extension sets.
79 Blacklist* blacklist() { function in class:extensions::ExtensionBlacklistBrowserTest
80 return ExtensionSystem::Get(profile())->blacklist();
108 Blacklist::ScopedDatabaseManagerForTest scoped_blacklist_database_manager_;
154 // Blacklist a and b.
155 blacklist()->SetFromUpdater(vector_ab, "1");
165 // Un-blacklist a
    [all...]
  /external/compiler-rt/lib/asan/lit_tests/TestCases/
default_blacklist.cc 1 // Test that ASan uses the default blacklist from resource directory.
3 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
initialization-blacklist.cc 1 // Test for blacklist functionality of initialization-order checker.
3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\
4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt \
8 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\
9 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \
10 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt \
13 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc
    [all...]
blacklist.cc 1 // Test the blacklist functionality of ASan
5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp
6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \
7 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1
8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \
9 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1
10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \
11 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1
12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \
13 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&
    [all...]
  /external/compiler-rt/lib/msan/lit_tests/
default_blacklist.cc 1 // Test that MSan uses the default blacklist from resource directory.
3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
  /external/compiler-rt/lib/asan/
asan_blacklist.txt 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/compiler-rt/lib/msan/
msan_blacklist.txt 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular
2 # functions or sources. Use with care. You may set location of blacklist
3 # at compile-time using -fsanitize-blacklist=<path> flag.
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.c 2 * wpa_supplicant - Temporary BSSID blacklist
13 #include "blacklist.h"
16 * wpa_blacklist_get - Get the blacklist entry for a BSSID
19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found
29 e = wpa_s->blacklist;
41 * wpa_blacklist_add - Add an BSSID to the blacklist
43 * @bssid: BSSID to be added to the blacklist
44 * Returns: Current blacklist count on success, -1 on failure
46 * This function adds the specified BSSID to the blacklist or increases the
47 * blacklist count if the BSSID was already listed. It should be called whe
    [all...]
  /external/compiler-rt/lib/asan/lit_tests/TestCases/Helpers/
initialization-blacklist.txt 3 src:*initialization-blacklist-extra2.cc=init
  /frameworks/base/services/tests/servicestests/src/com/android/server/
CertBlacklisterTest.java 53 // read the contents of the pubkey blacklist
54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
56 assertEquals("", blacklist);
60 // build a new thing to blacklist
65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
67 assertEquals(badPubkey, blacklist);
75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
76 assertEquals(badPubkey, blacklist);
82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
83 assertEquals(badPubkey, blacklist);
89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local
107 assertEquals(bl.toString(), blacklist); local
114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local
167 assertEquals(bl.toString(), blacklist); local
    [all...]
  /external/chromium_org/chrome/browser/policy/
url_blacklist_manager_unittest.cc 50 virtual void SetBlacklist(scoped_ptr<URLBlacklist> blacklist) OVERRIDE {
52 URLBlacklistManager::SetBlacklist(blacklist.Pass());
183 ListValue* blacklist = new ListValue; local
184 blacklist->Append(new StringValue("*.google.com"));
187 pref_service_.SetManagedPref(prefs::kUrlBlacklist, blacklist);
312 URLBlacklist blacklist; local
317 blacklist.Block(blocked.get());
318 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com")));
319 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com/")));
320 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com/whatever")))
465 URLBlacklist blacklist; local
    [all...]
  /external/clang/test/CodeGen/
ubsan-blacklist.c 2 // RUN: echo "fun:hash" > %t-func.blacklist
3 // RUN: echo "src:%s" > %t-file.blacklist
5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC
6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE
8 // FIXME: %t-file.blacklist contains DOSish paths.
  /external/compiler-rt/lib/tsan/lit_tests/
blacklist.cc 1 // Test blacklist functionality for TSan.
4 // RUN: -fsanitize-blacklist=%p/Helpers/blacklist.txt \
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 135 // set our blacklist path
148 // set our blacklist path
183 private void blacklistToFile(String blacklist) throws IOException {
185 out.write(blacklist.toString().getBytes());
217 // build the blacklist
220 // write the blacklist
231 // write that to the test blacklist
233 // set our blacklist path
245 // write that to the test blacklist
249 // set our blacklist pat
    [all...]
  /external/chromium_org/gpu/config/
gpu_blacklist_unittest.cc 30 " \"name\": \"gpu blacklist\",\n"
49 scoped_ptr<GpuBlacklist> blacklist(GpuBlacklist::Create());
50 EXPECT_TRUE(blacklist->LoadList(json, GpuBlacklist::kAllOs));
51 std::set<int> type = blacklist->MakeDecision(
80 scoped_ptr<GpuBlacklist> blacklist(GpuBlacklist::Create());
81 EXPECT_TRUE(blacklist->LoadList(
83 EXPECT_FALSE(blacklist->contains_unknown_fields());
  /external/chromium_org/third_party/ots/test/
test_unmalicious_fonts.sh 9 BLACKLIST=./BLACKLIST.txt
12 if [ ! -r "$BLACKLIST" ] ; then
13 echo "$BLACKLIST is not found."
49 egrep -i -e "^$base" "$BLACKLIST" > /dev/null 2>&1 || "$CHECKER" "$1" > /dev/null 2>&1 || (echo ; echo "FAIL: $1 (Run $CHECKER $1 for more information.)")
  /external/chromium/chrome/browser/resources/
software_rendering_list.json 28 // 10. "blacklist" is a list of gpu feature strings, valid values include
61 "blacklist": [
76 "blacklist": [
88 "blacklist": [
100 "blacklist": [
113 "blacklist": [
127 "blacklist": [
142 "blacklist": [
162 "blacklist": [
182 "blacklist":
    [all...]

Completed in 514 milliseconds

1 2 3 4 5 6 7 8 91011>>