/external/autotest/tko/ |
status_lib_unittest.py | 18 blacklist = ('\r\x00', 'FOOBAR', 'BLAh') 20 raw_line = raw_line_temp % blacklist 21 cleaned = status_lib.clean_raw_line(raw_line, blacklist) 23 cleaned, raw_line_temp % (('',) * len(blacklist)))
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
android_device_unittest.py | 20 def check_blacklist_arg(blacklist): 21 self.assertTrue(blacklist is None 22 or isinstance(blacklist, device_blacklist.Blacklist))
|
cros_device.py | 22 def GetAllConnectedDevices(cls, blacklist):
|
ios_device.py | 25 def GetAllConnectedDevices(cls, blacklist):
|
/external/clang/test/CodeGenCXX/ |
cfi-blacklist.cpp | 3 // RUN: %clang_cc1 -triple %itanium_abi_triple -fvisibility hidden -fms-extensions -fsanitize=cfi-vcall -fsanitize-blacklist=%t.txt -emit-llvm -o - %s | FileCheck --check-prefix=CHECK --check-prefix=NOSTD %s
|
/external/libmojo/third_party/catapult/devil/devil/android/perf/ |
perf_control_devicetest.py | 22 devices = device_utils.DeviceUtils.HealthyDevices(blacklist=None)
|
/hardware/libhardware_legacy/include/hardware_legacy/ |
roam.h | 57 /* Pass down the blacklist BSSID and whitelist SSID to firmware. */
|
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
roamcommand.h | 28 /* BSSID blacklist */
|
/system/core/logd/ |
LogWhiteBlackList.h | 27 // White and Blacklist
|
/bionic/libc/tools/ |
genseccomp.py | 36 bionic, whitelist, blacklist = syscall_lists[0], syscall_lists[1], syscall_lists[2] 37 for x in blacklist: 39 raise RuntimeError("Blacklist item not in bionic - aborting " + str(x)) 42 raise RuntimeError("Blacklist item in whitelist - aborting " + str(x)) 44 bionic_minus_blacklist = [x for x in bionic if x not in blacklist]
|
/build/soong/cc/ |
sanitize.go | 33 "-fsanitize-blacklist=external/compiler-rt/lib/cfi/cfi_blacklist.txt" 94 // value to pass to -fsanitize-blacklist 95 Blacklist *string 380 blacklist := android.OptionalPathForModuleSrc(ctx, sanitize.Properties.Sanitize.Blacklist) 381 if blacklist.Valid() { 382 flags.CFlags = append(flags.CFlags, "-fsanitize-blacklist="+blacklist.String()) 383 flags.CFlagsDeps = append(flags.CFlagsDeps, blacklist.Path())
|
/frameworks/rs/tests/lldb/ |
README.txt | 45 [--blacklist BLACKLIST [BLACKLIST ...]] 78 --blacklist BLACKLIST [BLACKLIST ...] 79 Provide a test blacklist for skipping specific tests. 80 To specify the blacklist from the command line the 81 following can be used: --blacklist test1.py test2.py
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test___all__.py | 66 blacklist = set([
93 if m in blacklist:
|
/external/autotest/client/site_tests/video_ChromeHWDecodeUsed/ |
video_ChromeHWDecodeUsed.py | 26 blacklist = [ 34 for black_entry in blacklist:
|
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
CertBlacklistTest.java | 41 CertBlacklist blacklist = CertBlacklist.getDefault(); local 42 assertTrue(blacklist.isPublicKeyBlackListed(blacklistedCa.getPublicKey()));
|
/frameworks/base/services/core/java/com/android/server/net/ |
NetworkPolicyManagerShellCommand.java | 89 pw.println(" add restrict-background-blacklist UID"); 90 pw.println(" Adds a UID to the blacklist for restrict background usage."); 99 pw.println(" list restrict-background-blacklist"); 103 pw.println(" remove restrict-background-blacklist UID"); 104 pw.println(" Removes a UID from the blacklist for restrict background usage."); 155 case "restrict-background-blacklist": 172 case "restrict-background-blacklist": 189 case "restrict-background-blacklist":
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test___all__.py | 66 blacklist = set([ 93 if m in blacklist:
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test___all__.py | 66 blacklist = set([ 93 if m in blacklist:
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test___all__.py | 66 blacklist = set([ 93 if m in blacklist:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test___all__.py | 66 blacklist = set([ 93 if m in blacklist:
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
CertBlacklist.java | 83 logger.log(Level.WARNING, "Could not read blacklist", e); 157 logger.log(Level.WARNING, "Tried to blacklist invalid serial number " + value, e); 170 // Blacklist test cert for CTS. The cert and key can be found in 212 logger.log(Level.WARNING, "Tried to blacklist invalid pubkey " + value);
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/ |
RouteDatabase.java | 23 * A blacklist of failed routes to avoid when creating a new connection to a
|
/test/vts/tools/vts-tradefed/res/config/ |
vts-gce.xml | 25 <option name="build-blacklist" value="/home/build/google3/wireless/android/test_tools/tradefed/common/build_blacklist.txt" />
|
/external/chromium-trace/catapult/devil/devil/android/tools/ |
device_monitor_test.py | 142 blacklist = mock.Mock() 143 blacklist.Read = mock.MagicMock( 150 status = device_monitor.get_all_status(blacklist)
|
/external/guice/core/src/com/google/inject/internal/ |
State.java | 118 public void blacklist(Key<?> key, State state, Object source) { 185 * blacklist their bound keys on their parent injectors to prevent just-in-time bindings on the 188 void blacklist(Key<?> key, State state, Object source); method in interface:State
|