/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/chromium-trace/catapult/devil/devil/android/ |
device_blacklist.py | 12 class Blacklist(object): 19 """Reads the blacklist from the blacklist file. 29 blacklist = json.load(f) 30 if not isinstance(blacklist, dict): 32 self._path, blacklist) 33 blacklist = dict() 34 return blacklist 36 def Write(self, blacklist): 37 """Writes the provided blacklist to the blacklist file [all...] |
/external/skia/tools/ |
dm_flags.py | 90 blacklist = [] 95 blacklist.extend('msaa16 gm _ colorwheelnative'.split(' ')) 96 blacklist.extend('pdf gm _ fontmgr_iter_factory'.split(' ')) 100 blacklist.extend('pdf gm _ fontmgr_iter'.split(' ')) 101 blacklist.extend('pdf _ _ PANO_20121023_214540.jpg'.split(' ')) 102 blacklist.extend('pdf skp _ worldjournal'.split(' ')) 103 blacklist.extend('pdf skp _ desk_baidu.skp'.split(' ')) 104 blacklist.extend('pdf skp _ desk_wikipedia.skp'.split(' ')) 107 blacklist.extend('gpu skp _ _ msaa skp _ _'.split(' ')) 108 blacklist.extend('msaa16 gm _ tilemodesProcess'.split(' ') [all...] |
/frameworks/base/tools/preload2/src/com/android/preload/actions/ |
ComputeThresholdXAction.java | 25 String blacklist) { 26 super(name, dataTableModel, 1, blacklist);
|
ComputeThresholdAction.java | 39 * appears in at least the number of threshold given packages. An optional blacklist can be 44 private Pattern blacklist; field in class:ComputeThresholdAction 48 * Create an action with the given parameters. The blacklist is a regular expression 52 String blacklist) { 56 if (blacklist != null) { 57 this.blacklist = Pattern.compile(blacklist); 89 Set<String> result = fromThreshold(uses, blacklist, threshold); 104 private Set<String> fromThreshold(Map<String, Set<String>> classUses, Pattern blacklist, 110 if (blacklist == null || !blacklist.matcher(e.getKey()).matches()) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist count if the BSSID was already listed. It should be called whe [all...] |
/external/libcxx/utils/sym_check/ |
sym_match.py | 14 '--blacklist', dest='blacklist', 24 if not args.regexes and args.blacklist is None: 25 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 27 if args.blacklist: 28 search_list = util.read_blacklist(args.blacklist)
|
/device/huawei/angler/ |
releasetools.py | 21 # the partition table, so blacklist it. 188 # blacklist any partitions that match the source image 189 blacklist = DEFAULT_BOOTLOADER_OTA_BLACKLIST 191 if ti not in blacklist: 198 blacklist.append(ti.name) 202 if i.name not in blacklist] 205 WriteBootloader(info, target_imagefile.data, blacklist) 236 blacklist = [] 238 blacklist.append("modem") 239 WriteHuaweiBootPartitionImages(info, target_radio_img, blacklist) [all...] |
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
android_device.py | 37 def GetAllConnectedDevices(cls, blacklist): 38 device_serials = GetDeviceSerials(blacklist) 50 def _ListSerialsOfHealthyOnlineDevices(blacklist): 52 for d in device_utils.DeviceUtils.HealthyDevices(blacklist) 56 def GetDeviceSerials(blacklist): 63 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 85 util.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600) 86 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 108 blacklist = device_blacklist.Blacklist( [all...] |
desktop_device.py | 14 def GetAllConnectedDevices(cls, blacklist):
|
device.py | 31 def GetAllConnectedDevices(cls, blacklist):
|
/external/chromium-trace/catapult/devil/devil/android/tools/ |
script_common.py | 11 blacklist = (device_blacklist.Blacklist(blacklist_file) 15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
|
flash_device.py | 31 parser.add_argument('--blacklist-file', help='Device blacklist file.') 36 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read() 37 if blacklist: 38 logging.critical('Device(s) in blacklist, not flashing devices:') 39 for key in blacklist:
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
security_OpenSSLBlacklist.py | 17 def verify(self, blacklist='/dev/null'): 19 (blacklist, VERIFY, self.ca, self.cert)) 22 def fetch(self, blacklist='/dev/null'): 24 'https://127.0.0.1:4433/' % (blacklist, self.ca)) 44 raise error.TestFail('Certificate does not verify with nonempty blacklist.') 54 error.TestFail('Fetch without blacklist fails.'))
|
/packages/apps/Camera2/src/com/android/camera/settings/ |
ResolutionSetting.java | 77 final String blacklist = cameraFacing == OneCamera.Facing.FRONT ? mResolutionBlackListFront local 92 blacklist); 114 String blacklist = ""; local 116 blacklist = mResolutionBlackListBack; 118 blacklist = mResolutionBlackListFront; 133 ResolutionUtil.isBlackListed(pictureSize, blacklist); 154 blacklist);
|
/device/moto/shamu/ |
releasetools.py | 5 # the partition table, so blacklist it. 172 # blacklist any partitions that match the source image 173 blacklist = DEFAULT_BOOTLOADER_OTA_BLACKLIST 175 if ti not in blacklist: 181 blacklist.append(ti.name) 184 whitelist = [ i.name for i in tm.unpacked_images if i.name not in blacklist ] 187 WriteBootloader(info, target_imagefile.data, blacklist) 215 blacklist = [] 217 blacklist.append('modem') 218 WriteMotobootPartitionImages(info, target_radio_img, blacklist) [all...] |
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 31 Set<String> blacklist = Collections.singleton("sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw="); 36 if (blacklist.contains(pin)) {
|
/external/autotest/client/common_lib/cros/ |
retry.py | 114 def retry(ExceptionToCheck, timeout_min=1.0, delay_sec=3, blacklist=None): 119 magically become good. Will raise exceptions in blacklist as well. 134 @param blacklist: a list of exceptions that will be raised without retrying 153 exception_tuple = () if blacklist is None else tuple(blacklist)
|
/frameworks/base/services/core/java/com/android/server/ |
CertBlacklister.java | 80 String blacklist = getValue(); local 81 if (blacklist != null) { 82 Slog.i(TAG, "Certificate blacklist changed, updating..."); 91 out.write(blacklist.getBytes()); 96 Slog.i(TAG, "Certificate blacklist updated"); 98 Slog.e(TAG, "Failed to write blacklist", e); 128 // set up the public key blacklist observer 135 // set up the serial number blacklist observer
|
/external/autotest/server/cros/dynamic_suite/ |
frontend_wrappers.py | 55 # blacklist: Exceptions that we raise immediately if caught. 57 blacklist = (ImportError, error.RPCException, proxy.JSONRPCException, 75 is_blacklisted = isinstance(exc, blacklist) 83 blacklist=[ImportError, error.RPCException, 118 blacklist=[ImportError, error.RPCException,
|
/external/autotest/tko/ |
status_lib.py | 24 def clean_raw_line(raw_line, blacklist=DEFAULT_BLACKLIST): 26 return re.sub('|'.join(blacklist), '', raw_line)
|
status_lib_unittest.py | 18 blacklist = ('\r\x00', 'FOOBAR', 'BLAh') 20 raw_line = raw_line_temp % blacklist 21 cleaned = status_lib.clean_raw_line(raw_line, blacklist) 23 cleaned, raw_line_temp % (('',) * len(blacklist)))
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/tuner/ |
StatusBarSwitch.java | 65 // If not enabled add to blacklist. 81 private void setList(Set<String> blacklist) { 84 TextUtils.join(",", blacklist), ActivityManager.getCurrentUser());
|
/external/curl/lib/ |
pipeline.c | 169 struct curl_llist *blacklist = local 172 if(blacklist) { 175 curr = blacklist->head; 251 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */ 261 struct curl_llist *blacklist = local 264 if(blacklist) { 267 curr = blacklist->head; 317 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
|
/system/bt/service/test/ |
advertise_data_unittest.cpp | 93 uint8_t blacklist[] = { local 103 for (size_t i = 0; i < sizeof(blacklist); i++) { 104 const std::vector<uint8_t> data{ 0x02, blacklist[i], 0x00 };
|