/external/autotest/client/site_tests/platform_ToolchainOptions/ |
stack_whitelist | 0 # Whitelist of ELF files with an executable stack. Hint: this file should
|
platform_ToolchainOptions.py | 29 Filter out hits found on non-comment lines in the whitelist and 30 and private whitelist. 32 @param whitelist_file: path to whitelist file 44 Filter out hits found on non-comment lines in the whitelist. 46 @param whitelist_file: path to whitelist file 50 whitelist = [x for x in f.read().splitlines() 53 self.whitelist_set = self.whitelist_set.union(set(whitelist)) 57 # Does |bad_file| match any entry in the whitelist? 70 Filter out hits found in a list of whitelist files. 72 @param whitelist_files: list of paths to whitelist file [all...] |
/external/icu/tools/srcgen/currysrc/src/main/java/com/google/currysrc/processors/ |
HidePublicClasses.java | 26 * Hides any public class that is not found in the whitelist. 30 private final List<TypeLocator> whitelist; field in class:HidePublicClasses 32 public HidePublicClasses(List<TypeLocator> whitelist, String reason) { 34 this.whitelist = whitelist; 42 for (TypeLocator whitelistedType : whitelist) { 55 "whitelist=" + whitelist +
|
/external/autotest/site_utils/ |
create_attr_whitelist.py | 7 """This script creates a whitelist of test attributes based on the 'suite' read 20 parser = argparse.ArgumentParser(description='Create attribute whitelist.') 22 help='Path to the file whitelist is written to. E.g. ' 33 whitelist = ['suite:' + x for x in suite_list] 34 _WriteToFile(whitelist, args.path) 37 def _WriteToFile(whitelist, path): 38 """"Write the whitelist to a file under the path. 44 whitelist: a list contains all the allowed attributes. 48 attr_file.write('\n'.join(whitelist))
|
seed_test_attr.py | 8 ATTRIBUTES either not match to SUITE or not in the attribute whitelist.""" 36 # Get the whitelist path, hardcode the path currently 64 """Check whether attributes are in the attribute whitelist and match with the 69 @param path_whitelist: path to the attribute whitelist. 76 # Read the whitelist to a set, if path is invalid, throw IOError. 78 whitelist = {line.strip() for line in f.readlines() if line.strip()} 80 # Read the attr in the control files, check with whitelist and suite. 85 # Test whether attributes in the whitelist 86 if not (whitelist >= cd_attrs):
|
/device/google/marlin/sepolicy/ |
irsc_util.te | 7 # whitelist ioctl commands
|
cnss-daemon.te | 14 # whitelist socket ioctl commands
|
/external/autotest/client/site_tests/security_RootCA/ |
control | 8 Ensures that the built-in Root CAs matches the whitelist for CrOS. 11 PURPOSE = 'Ensures that the built-in Root CAs matches the whitelist for CrOS.' 13 Fail if the nss/openssl databases fail to match each other or the whitelist.
|
/external/skia/src/utils/ |
SkWhitelistTypefaces.cpp | 50 if (fontNameStr.equals(whitelist[i].fFontName)) { 95 if (!strcmp(fontName, whitelist[i].fFontName)) { 96 if (!whitelist[i].fSerializedSub) { 97 whitelist[i].fSerializedSub = true; 140 if (!strcmp(familyName, whitelist[i].fFontName)) { 141 if (!whitelist[i].fSerializedNameOnly) { 142 whitelist[i].fSerializedNameOnly = true; 164 const char* fontName = whitelist[whitelistIndex].fFontName; 173 if (whitelist[whitelistIndex].fChecksum != checksum) { 175 if (whitelist[whitelistIndex].fChecksum) [all...] |
SkWhitelistChecksums.cpp | 13 struct Whitelist { 20 static Whitelist whitelist[] = { variable 50 static const int whitelistCount = (int) SK_ARRAY_COUNT(whitelist);
|
/external/chromium-trace/catapult/dashboard/dashboard/ |
post_data_handler.py | 25 """Checks the remote address of the request against the IP whitelist. 30 whitelist = utils.GetIpWhitelist() 31 if not whitelist or self.request.remote_addr in whitelist: 45 'IP address %s not in IP whitelist!' % self.request.remote_addr, 403)
|
/sdk/build/ |
windows_sdk_whitelist.mk | 0 # Whitelist of SDK projects that can be built for the SDK on Windows 8 # This file defines a whitelist of projects that can be built in the Windows 26 # Whitelist of SDK specific projects that do NOT need Java (e.g. C libraries) 41 # Whitelist of SDK specific projects that DO require Java
|
/frameworks/compile/libbcc/lib/Renderscript/ |
RSScreenFunctionsPass.cpp | 37 std::vector<std::string> &whiteList = stubList; 53 // c. it is present in the whitelist 62 if (isPresent(whiteList, FName.str())) 71 std::sort(whiteList.begin(), whiteList.end());
|
generate-whitelist.sh | 5 # sh generate-whitelist.sh RSStubsWhiteList $ANDROID_BUILD_TOP/frameworks/rs/driver/rsdRuntimeStubs.cpp $ANDROID_BUILD_TOP/frameworks/rs/cpu_ref/rsCpuRuntimeStubs.cpp $ANDROID_BUILD_TOP/frameworks/rs/cpu_ref/rsCpuRuntimeMath.cpp 11 whitelist=`grep "{ \"_Z" $STUB_FILES | awk '{print $3}' | sort | uniq` 56 $whitelist
|
/cts/hostsidetests/net/src/com/android/cts/net/ |
HostsideRestrictBackgroundNetworkTests.java | 66 // Make sure whitelist is revoked when package is removed 154 // TODO: currently power-save mode and idle uses the same whitelist, so this test would be 198 // TODO: currently power-save mode and idle uses the same whitelist, so this test would be 246 final String output = runCommand("cmd netpolicy list restrict-background-whitelist "); 251 Log.v(TAG, "whitelist check for uid " + uid + " doesn't match yet (expected " 255 fail("whitelist check for uid " + uid + " failed: expected " 263 assertDelayedCommand("dumpsys deviceidle whitelist =" + packageName, 285 runCommand("cmd netpolicy add restrict-background-whitelist " + uid); 290 Log.i(TAG, "Adding package " + packageName + " to power-save-mode whitelist"); 293 runCommand("dumpsys deviceidle whitelist +" + packageName) [all...] |
/build/core/tasks/check_boot_jars/ |
check_boot_jars.py | 15 # The compiled whitelist RE. 20 """ Load and compile whitelist regular expressions from filename. 35 'Cannot compile package whitelist regular expression: %r',
|
/packages/inputmethods/LatinIME/dictionaries/ |
sample.combined | 17 # into the dictionary is to add shortcut targets and maybe a whitelist 22 # value between 0 and 14, or the special value `whitelist' which becomes 23 # 15, which is then taken to be the whitelist target of this word. 37 shortcut=whitelisted,f=whitelist
|
/prebuilts/go/darwin-x86/src/cmd/vet/whitelist/ |
whitelist.go | 5 // Package whitelist defines exceptions for the vet tool. 6 package whitelist // import "cmd/vet/whitelist" package 10 // is a slice or a struct, so we whitelist all the standard package
|
/prebuilts/go/linux-x86/src/cmd/vet/whitelist/ |
whitelist.go | 5 // Package whitelist defines exceptions for the vet tool. 6 package whitelist // import "cmd/vet/whitelist" package 10 // is a slice or a struct, so we whitelist all the standard package
|
/frameworks/base/docs/html/training/basics/network-ops/ |
data-saver.jd | 20 <li><a href="#request-whitelist">Request whitelist permissions</a></li> 43 whitelist specific apps to allow background metered data usage even when Data 131 <h3 id="request-whitelist"> 132 Requesting whitelist permissions 136 If your app needs to use data in the background, it can request whitelist 193 restriction setting, package UIDs currently on a whitelist, and the network 216 <code>$ adb shell cmd netpolicy add restrict-background-whitelist 221 Adds the specified package UID to the whitelist to allow background metered 226 <code>$ adb shell cmd netpolicy remove restrict-background-whitelist [all...] |
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/html/parser/ |
HtmlWhitelist.java | 32 * or null if the given name is not in the whitelist. 42 * or null if the given name is not in the whitelist.
|
/external/autotest/site_utils/presubmit_hooks/ |
check_control_files.py | 120 def CheckSuitesAttrMatch(ctrl_data, whitelist, test_name): 122 Check whether ATTRIBUTES match to SUITE and also in the whitelist. 128 @param whitelist: whitelist set parsed from the attribute_whitelist file. 133 # unmatch case 1: attributes not in the whitelist. 134 if not (whitelist >= ctrl_data.attributes): 135 attribute_diff = ctrl_data.attributes - whitelist 137 'Attribute(s): %s not in the whitelist in control file for test' 186 # Parse the whitelist set from file, hardcode the filepath to the whitelist [all...] |
/external/jsilver/src/com/google/clearsilver/jsilver/functions/escape/ |
StyleEscapeFunction.java | 25 * characters that are not part of a whitelist of safe characters. This replicates the autoescaping 29 * characters to escape. The StyleAttrEscapeFunction instead applies a whitelist, and strips out any 30 * characters not in the whitelist.
|
/external/autotest/client/site_tests/logging_CrashServices/ |
control | 17 Crash all valid Chrome OS processes from a whitelist, and confirm
|
/external/autotest/client/site_tests/platform_StackProtector/ |
platform_StackProtector.py | 14 wfile = open(os.path.join(self.bindir, 'whitelist')) 15 whitelist = wfile.read().splitlines() 17 return set(whitelist) 68 # Subtract any files that were on the whitelist.
|