/external/clang/test/Driver/ |
fsanitize-blacklist.c | 1 // General blacklist usage. 2 // RUN: %clang -fsanitize=address -fsanitize-blacklist=%s %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-BLACKLIST 3 // CHECK-BLACKLIST: -fsanitize-blacklist 5 // Ignore -fsanitize-blacklist flag if there is no -fsanitize flag. 6 // RUN: %clang -fsanitize-blacklist=%s %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-SANITIZE 7 // CHECK-NO-SANITIZE-NOT: -fsanitize-blacklist 9 // Flag -fno-sanitize-blacklist wins if it is specified later. 10 // RUN: %clang -fsanitize=address -fsanitize-blacklist=%s -fno-sanitize-blacklist %s -### 2>&1 | FileCheck %s --check-prefix=CHECK-NO-BLACKLIS [all...] |
/external/chromium_org/chrome/browser/extensions/ |
test_blacklist.h | 14 class Blacklist; 16 // A wrapper for an extensions::Blacklist that provides functionality for 20 explicit TestBlacklist(Blacklist* blacklist); 22 Blacklist* blacklist() { return blacklist_; } function in class:extensions::TestBlacklist 27 Blacklist* blacklist_;
|
admin_policy_unittest.cc | 52 base::ListValue blacklist; local 53 blacklist.Append(Value::CreateStringValue("http://www.google.com")); 54 EXPECT_FALSE(ap::BlacklistedByDefault(&blacklist)); 55 blacklist.Append(Value::CreateStringValue("*")); 56 EXPECT_TRUE(ap::BlacklistedByDefault(&blacklist)); 58 blacklist.Clear(); 59 blacklist.Append(Value::CreateStringValue("*")); 60 EXPECT_TRUE(ap::BlacklistedByDefault(&blacklist)); 72 // Required extensions may load even if they're on the blacklist. 73 base::ListValue blacklist; local 87 base::ListValue blacklist; local 105 base::ListValue blacklist; local 120 base::ListValue blacklist; local [all...] |
blacklist_unittest.cc | 8 #include "chrome/browser/extensions/blacklist.h" 43 Blacklist::ScopedDatabaseManagerForTest scoped_blacklist_database_manager_; 45 Blacklist blacklist_; 63 // Mix up the blacklist. 65 std::vector<std::string> blacklist; local 66 blacklist.push_back(extension_b->id()); 67 blacklist.push_back(extension_c->id()); 68 blacklist_.SetFromUpdater(blacklist, "1"); 77 std::vector<std::string> blacklist; local 78 blacklist.push_back(extension_b->id()) 89 std::vector<std::string> blacklist; local 103 std::vector<std::string> blacklist; local 115 std::vector<std::string> blacklist; local 134 std::vector<std::string> blacklist; local [all...] |
blacklist.h | 24 // A blacklist of extensions. 25 class Blacklist : public content::NotificationObserver, 26 public base::SupportsWeakPtr<Blacklist> { 30 // Observes |blacklist| on construction and unobserves on destruction. 31 explicit Observer(Blacklist* blacklist); 39 Blacklist* blacklist_; 66 explicit Blacklist(ExtensionPrefs* prefs); 68 virtual ~Blacklist(); 83 // Sets the blacklist from the updater to contain the extension IDs in |ids [all...] |
blacklist.cc | 5 #include "chrome/browser/extensions/blacklist.h" 29 // rather than a member of Blacklist because Blacklist accesses the real 116 void IsNotEmpty(const Blacklist::IsBlacklistedCallback& callback, 118 callback.Run(set.empty() ? Blacklist::NOT_BLACKLISTED 119 : Blacklist::BLACKLISTED); 124 Blacklist::Observer::Observer(Blacklist* blacklist) : blacklist_(blacklist) { 273 std::set<std::string> blacklist = pref_blacklisted_ids; local [all...] |
test_blacklist.cc | 12 #include "chrome/browser/extensions/blacklist.h" 16 TestBlacklist::TestBlacklist(Blacklist* blacklist) 17 : blacklist_(blacklist) {
|
admin_policy.cc | 48 bool BlacklistedByDefault(const base::ListValue* blacklist) { 50 return blacklist && blacklist->Find(wildcard) != blacklist->end(); 53 bool UserMayLoad(const base::ListValue* blacklist, 70 if ((!blacklist || blacklist->empty()) && (!allowed_types)) 103 // Then check the admin blacklist. 104 if ((blacklist && blacklist->Find(id_value) != blacklist->end()) | [all...] |
extension_blacklist_browsertest.cc | 6 #include "chrome/browser/extensions/blacklist.h" 43 // TODO(kalman): a different approach will be needed when the blacklist 63 // blacklist, and not in any of its other extension sets. 79 Blacklist* blacklist() { function in class:extensions::ExtensionBlacklistBrowserTest 80 return ExtensionSystem::Get(profile())->blacklist(); 108 Blacklist::ScopedDatabaseManagerForTest scoped_blacklist_database_manager_; 154 // Blacklist a and b. 155 blacklist()->SetFromUpdater(vector_ab, "1"); 165 // Un-blacklist a [all...] |
/external/compiler-rt/lib/asan/lit_tests/TestCases/ |
default_blacklist.cc | 1 // Test that ASan uses the default blacklist from resource directory. 3 // CHECK: fsanitize-blacklist={{.*}}asan_blacklist.txt
|
initialization-blacklist.cc | 1 // Test for blacklist functionality of initialization-order checker. 3 // RUN: %clangxx_asan -O0 %s %p/Helpers/initialization-blacklist-extra.cc\ 4 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 5 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt \ 8 // RUN: %clangxx_asan -O1 %s %p/Helpers/initialization-blacklist-extra.cc\ 9 // RUN: %p/Helpers/initialization-blacklist-extra2.cc \ 10 // RUN: -fsanitize-blacklist=%p/Helpers/initialization-blacklist.txt \ 13 // RUN: %clangxx_asan -O2 %s %p/Helpers/initialization-blacklist-extra.cc [all...] |
blacklist.cc | 1 // Test the blacklist functionality of ASan 5 // RUN: echo "src:*blacklist-extra.cc" >> %tmp 6 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O0 %s -o %t \ 7 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 8 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O1 %s -o %t \ 9 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 10 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O2 %s -o %t \ 11 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>&1 12 // RUN: %clangxx_asan -fsanitize-blacklist=%tmp -O3 %s -o %t \ 13 // RUN: %p/Helpers/blacklist-extra.cc && %t 2>& [all...] |
/external/compiler-rt/lib/msan/lit_tests/ |
default_blacklist.cc | 1 // Test that MSan uses the default blacklist from resource directory. 3 // CHECK: fsanitize-blacklist={{.*}}msan_blacklist.txt
|
/external/compiler-rt/lib/asan/ |
asan_blacklist.txt | 0 # Blacklist for AddressSanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/compiler-rt/lib/msan/ |
msan_blacklist.txt | 0 # Blacklist for MemorySanitizer. Turns off instrumentation of particular 2 # functions or sources. Use with care. You may set location of blacklist 3 # at compile-time using -fsanitize-blacklist=<path> flag.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist count if the BSSID was already listed. It should be called whe [all...] |
/external/compiler-rt/lib/asan/lit_tests/TestCases/Helpers/ |
initialization-blacklist.txt | 3 src:*initialization-blacklist-extra2.cc=init
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 50 virtual void SetBlacklist(scoped_ptr<URLBlacklist> blacklist) OVERRIDE { 52 URLBlacklistManager::SetBlacklist(blacklist.Pass()); 183 ListValue* blacklist = new ListValue; local 184 blacklist->Append(new StringValue("*.google.com")); 187 pref_service_.SetManagedPref(prefs::kUrlBlacklist, blacklist); 312 URLBlacklist blacklist; local 317 blacklist.Block(blocked.get()); 318 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com"))); 319 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com/"))); 320 EXPECT_TRUE(blacklist.IsURLBlocked(GURL("http://google.com/whatever"))) 465 URLBlacklist blacklist; local [all...] |
/external/clang/test/CodeGen/ |
ubsan-blacklist.c | 2 // RUN: echo "fun:hash" > %t-func.blacklist 3 // RUN: echo "src:%s" > %t-file.blacklist 5 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC 6 // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE 8 // FIXME: %t-file.blacklist contains DOSish paths.
|
/external/compiler-rt/lib/tsan/lit_tests/ |
blacklist.cc | 1 // Test blacklist functionality for TSan. 4 // RUN: -fsanitize-blacklist=%p/Helpers/blacklist.txt \
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 135 // set our blacklist path 148 // set our blacklist path 183 private void blacklistToFile(String blacklist) throws IOException { 185 out.write(blacklist.toString().getBytes()); 217 // build the blacklist 220 // write the blacklist 231 // write that to the test blacklist 233 // set our blacklist path 245 // write that to the test blacklist 249 // set our blacklist pat [all...] |
/external/chromium_org/gpu/config/ |
gpu_blacklist_unittest.cc | 30 " \"name\": \"gpu blacklist\",\n" 49 scoped_ptr<GpuBlacklist> blacklist(GpuBlacklist::Create()); 50 EXPECT_TRUE(blacklist->LoadList(json, GpuBlacklist::kAllOs)); 51 std::set<int> type = blacklist->MakeDecision( 80 scoped_ptr<GpuBlacklist> blacklist(GpuBlacklist::Create()); 81 EXPECT_TRUE(blacklist->LoadList( 83 EXPECT_FALSE(blacklist->contains_unknown_fields());
|
/external/chromium_org/third_party/ots/test/ |
test_unmalicious_fonts.sh | 9 BLACKLIST=./BLACKLIST.txt 12 if [ ! -r "$BLACKLIST" ] ; then 13 echo "$BLACKLIST is not found." 49 egrep -i -e "^$base" "$BLACKLIST" > /dev/null 2>&1 || "$CHECKER" "$1" > /dev/null 2>&1 || (echo ; echo "FAIL: $1 (Run $CHECKER $1 for more information.)")
|
/external/chromium/chrome/browser/resources/ |
software_rendering_list.json | 28 // 10. "blacklist" is a list of gpu feature strings, valid values include 61 "blacklist": [ 76 "blacklist": [ 88 "blacklist": [ 100 "blacklist": [ 113 "blacklist": [ 127 "blacklist": [ 142 "blacklist": [ 162 "blacklist": [ 182 "blacklist": [all...] |