HomeSort by relevance Sort by last modified time
    Searched full:whitelist (Results 1 - 25 of 327) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/autotest/client/site_tests/platform_ToolchainOptions/
stack_whitelist 0 # Whitelist of ELF files with an executable stack. Hint: this file should
platform_ToolchainOptions.py 29 Filter out hits found on non-comment lines in the whitelist and
30 and private whitelist.
32 @param whitelist_file: path to whitelist file
44 Filter out hits found on non-comment lines in the whitelist.
46 @param whitelist_file: path to whitelist file
50 whitelist = [x for x in f.read().splitlines()
53 self.whitelist_set = self.whitelist_set.union(set(whitelist))
57 # Does |bad_file| match any entry in the whitelist?
70 Filter out hits found in a list of whitelist files.
72 @param whitelist_files: list of paths to whitelist file
    [all...]
  /external/icu/tools/srcgen/currysrc/src/main/java/com/google/currysrc/processors/
HidePublicClasses.java 26 * Hides any public class that is not found in the whitelist.
30 private final List<TypeLocator> whitelist; field in class:HidePublicClasses
32 public HidePublicClasses(List<TypeLocator> whitelist, String reason) {
34 this.whitelist = whitelist;
42 for (TypeLocator whitelistedType : whitelist) {
55 "whitelist=" + whitelist +
  /external/autotest/site_utils/
create_attr_whitelist.py 7 """This script creates a whitelist of test attributes based on the 'suite' read
20 parser = argparse.ArgumentParser(description='Create attribute whitelist.')
22 help='Path to the file whitelist is written to. E.g. '
33 whitelist = ['suite:' + x for x in suite_list]
34 _WriteToFile(whitelist, args.path)
37 def _WriteToFile(whitelist, path):
38 """"Write the whitelist to a file under the path.
44 whitelist: a list contains all the allowed attributes.
48 attr_file.write('\n'.join(whitelist))
seed_test_attr.py 8 ATTRIBUTES either not match to SUITE or not in the attribute whitelist."""
36 # Get the whitelist path, hardcode the path currently
64 """Check whether attributes are in the attribute whitelist and match with the
69 @param path_whitelist: path to the attribute whitelist.
76 # Read the whitelist to a set, if path is invalid, throw IOError.
78 whitelist = {line.strip() for line in f.readlines() if line.strip()}
80 # Read the attr in the control files, check with whitelist and suite.
85 # Test whether attributes in the whitelist
86 if not (whitelist >= cd_attrs):
  /device/google/marlin/sepolicy/
irsc_util.te 7 # whitelist ioctl commands
cnss-daemon.te 14 # whitelist socket ioctl commands
  /external/autotest/client/site_tests/security_RootCA/
control 8 Ensures that the built-in Root CAs matches the whitelist for CrOS.
11 PURPOSE = 'Ensures that the built-in Root CAs matches the whitelist for CrOS.'
13 Fail if the nss/openssl databases fail to match each other or the whitelist.
  /external/skia/src/utils/
SkWhitelistTypefaces.cpp 50 if (fontNameStr.equals(whitelist[i].fFontName)) {
95 if (!strcmp(fontName, whitelist[i].fFontName)) {
96 if (!whitelist[i].fSerializedSub) {
97 whitelist[i].fSerializedSub = true;
140 if (!strcmp(familyName, whitelist[i].fFontName)) {
141 if (!whitelist[i].fSerializedNameOnly) {
142 whitelist[i].fSerializedNameOnly = true;
164 const char* fontName = whitelist[whitelistIndex].fFontName;
173 if (whitelist[whitelistIndex].fChecksum != checksum) {
175 if (whitelist[whitelistIndex].fChecksum)
    [all...]
SkWhitelistChecksums.cpp 13 struct Whitelist {
20 static Whitelist whitelist[] = { variable
50 static const int whitelistCount = (int) SK_ARRAY_COUNT(whitelist);
  /external/chromium-trace/catapult/dashboard/dashboard/
post_data_handler.py 25 """Checks the remote address of the request against the IP whitelist.
30 whitelist = utils.GetIpWhitelist()
31 if not whitelist or self.request.remote_addr in whitelist:
45 'IP address %s not in IP whitelist!' % self.request.remote_addr, 403)
  /sdk/build/
windows_sdk_whitelist.mk 0 # Whitelist of SDK projects that can be built for the SDK on Windows
8 # This file defines a whitelist of projects that can be built in the Windows
26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries)
41 # Whitelist of SDK specific projects that DO require Java
  /frameworks/compile/libbcc/lib/Renderscript/
RSScreenFunctionsPass.cpp 37 std::vector<std::string> &whiteList = stubList;
53 // c. it is present in the whitelist
62 if (isPresent(whiteList, FName.str()))
71 std::sort(whiteList.begin(), whiteList.end());
generate-whitelist.sh 5 # sh generate-whitelist.sh RSStubsWhiteList $ANDROID_BUILD_TOP/frameworks/rs/driver/rsdRuntimeStubs.cpp $ANDROID_BUILD_TOP/frameworks/rs/cpu_ref/rsCpuRuntimeStubs.cpp $ANDROID_BUILD_TOP/frameworks/rs/cpu_ref/rsCpuRuntimeMath.cpp
11 whitelist=`grep "{ \"_Z" $STUB_FILES | awk '{print $3}' | sort | uniq`
56 $whitelist
  /cts/hostsidetests/net/src/com/android/cts/net/
HostsideRestrictBackgroundNetworkTests.java 66 // Make sure whitelist is revoked when package is removed
154 // TODO: currently power-save mode and idle uses the same whitelist, so this test would be
198 // TODO: currently power-save mode and idle uses the same whitelist, so this test would be
246 final String output = runCommand("cmd netpolicy list restrict-background-whitelist ");
251 Log.v(TAG, "whitelist check for uid " + uid + " doesn't match yet (expected "
255 fail("whitelist check for uid " + uid + " failed: expected "
263 assertDelayedCommand("dumpsys deviceidle whitelist =" + packageName,
285 runCommand("cmd netpolicy add restrict-background-whitelist " + uid);
290 Log.i(TAG, "Adding package " + packageName + " to power-save-mode whitelist");
293 runCommand("dumpsys deviceidle whitelist +" + packageName)
    [all...]
  /build/core/tasks/check_boot_jars/
check_boot_jars.py 15 # The compiled whitelist RE.
20 """ Load and compile whitelist regular expressions from filename.
35 'Cannot compile package whitelist regular expression: %r',
  /packages/inputmethods/LatinIME/dictionaries/
sample.combined 17 # into the dictionary is to add shortcut targets and maybe a whitelist
22 # value between 0 and 14, or the special value `whitelist' which becomes
23 # 15, which is then taken to be the whitelist target of this word.
37 shortcut=whitelisted,f=whitelist
  /prebuilts/go/darwin-x86/src/cmd/vet/whitelist/
whitelist.go 5 // Package whitelist defines exceptions for the vet tool.
6 package whitelist // import "cmd/vet/whitelist" package
10 // is a slice or a struct, so we whitelist all the standard package
  /prebuilts/go/linux-x86/src/cmd/vet/whitelist/
whitelist.go 5 // Package whitelist defines exceptions for the vet tool.
6 package whitelist // import "cmd/vet/whitelist" package
10 // is a slice or a struct, so we whitelist all the standard package
  /frameworks/base/docs/html/training/basics/network-ops/
data-saver.jd 20 <li><a href="#request-whitelist">Request whitelist permissions</a></li>
43 whitelist specific apps to allow background metered data usage even when Data
131 <h3 id="request-whitelist">
132 Requesting whitelist permissions
136 If your app needs to use data in the background, it can request whitelist
193 restriction setting, package UIDs currently on a whitelist, and the network
216 <code>$ adb shell cmd netpolicy add restrict-background-whitelist
221 Adds the specified package UID to the whitelist to allow background metered
226 <code>$ adb shell cmd netpolicy remove restrict-background-whitelist
    [all...]
  /packages/apps/UnifiedEmail/src/com/google/android/mail/common/html/parser/
HtmlWhitelist.java 32 * or null if the given name is not in the whitelist.
42 * or null if the given name is not in the whitelist.
  /external/autotest/site_utils/presubmit_hooks/
check_control_files.py 120 def CheckSuitesAttrMatch(ctrl_data, whitelist, test_name):
122 Check whether ATTRIBUTES match to SUITE and also in the whitelist.
128 @param whitelist: whitelist set parsed from the attribute_whitelist file.
133 # unmatch case 1: attributes not in the whitelist.
134 if not (whitelist >= ctrl_data.attributes):
135 attribute_diff = ctrl_data.attributes - whitelist
137 'Attribute(s): %s not in the whitelist in control file for test'
186 # Parse the whitelist set from file, hardcode the filepath to the whitelist
    [all...]
  /external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/
StyleEscapeFunction.java 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping
29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any
30 * characters not in the whitelist.
  /external/autotest/client/site_tests/logging_CrashServices/
control 17 Crash all valid Chrome OS processes from a whitelist, and confirm
  /external/autotest/client/site_tests/platform_StackProtector/
platform_StackProtector.py 14 wfile = open(os.path.join(self.bindir, 'whitelist'))
15 whitelist = wfile.read().splitlines()
17 return set(whitelist)
68 # Subtract any files that were on the whitelist.

Completed in 705 milliseconds

1 2 3 4 5 6 7 8 91011>>