/external/clang/test/CodeGen/ |
asan-globals.cpp | 2 // RUN: echo "global:*blacklisted_global*" > %t.blacklist 3 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist -emit-llvm -o - %s | FileCheck %s 4 // RUN: echo "src:%s" > %t.blacklist-src 5 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST-SRC 30 // BLACKLIST-SRC: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[BLACKLISTED_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]} 31 // BLACKLIST-SRC: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false} 32 // BLACKLIST-SRC: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5 [all...] |
/external/chromium-trace/catapult/devil/devil/android/tools/ |
device_recovery.py | 57 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 59 blacklist): 88 if blacklist: 89 blacklist.Extend([device.adb.GetDeviceSerial()], 93 if blacklist: 94 blacklist.Extend([device.adb.GetDeviceSerial()], 102 if blacklist: 103 blacklist.Extend([device.adb.GetDeviceSerial()], 107 if blacklist: 108 blacklist.Extend([device.adb.GetDeviceSerial()] [all...] |
flash_device.py | 33 parser.add_argument('--blacklist-file', help='Device blacklist file.') 38 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read() 39 if blacklist: 40 logger.critical('Device(s) in blacklist, not flashing devices:') 41 for key in blacklist:
|
device_status.py | 35 def IsBlacklisted(serial, blacklist): 36 return blacklist and serial in blacklist.Read() 39 def _BatteryStatus(device, blacklist): 51 if blacklist: 52 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 75 def DeviceStatus(devices, blacklist): 80 blacklist: The current device blacklist. 121 if not IsBlacklisted(serial, blacklist) [all...] |
script_common.py | 11 if not isinstance(blacklist_file, device_blacklist.Blacklist): 12 blacklist_file = (device_blacklist.Blacklist(blacklist_file)
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 153 // set our blacklist path 166 // set our blacklist path 201 private void blacklistToFile(String blacklist) throws IOException { 203 out.write(blacklist.toString().getBytes()); 235 // build the blacklist 238 // write the blacklist 249 // write that to the test blacklist 251 // set our blacklist path 262 // write that to the test blacklist 266 // set our blacklist pat [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
script_common.py | 11 blacklist = (device_blacklist.Blacklist(blacklist_file) 15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
|
flash_device.py | 31 parser.add_argument('--blacklist-file', help='Device blacklist file.') 36 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read() 37 if blacklist: 38 logging.critical('Device(s) in blacklist, not flashing devices:') 39 for key in blacklist:
|
device_status.py | 33 def IsBlacklisted(serial, blacklist): 34 return blacklist and serial in blacklist.Read() 37 def _BatteryStatus(device, blacklist): 49 if blacklist: 50 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 73 def DeviceStatus(devices, blacklist): 78 blacklist: The current device blacklist. 119 if not IsBlacklisted(serial, blacklist) [all...] |
adb_run_shell_cmd.py | 25 parser.add_argument('--blacklist-file', help='Device blacklist file.') 32 args.blacklist_file = device_blacklist.Blacklist( 35 blacklist=args.blacklist_file, device_arg=args.devices)
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
android_device.py | 36 def GetAllConnectedDevices(cls, blacklist): 37 device_serials = GetDeviceSerials(blacklist) 49 def _ListSerialsOfHealthyOnlineDevices(blacklist): 51 for d in device_utils.DeviceUtils.HealthyDevices(blacklist)] 54 def GetDeviceSerials(blacklist): 61 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 83 py_utils.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600) 84 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 107 blacklist = device_blacklist.Blacklist( [all...] |
/external/compiler-rt/test/tsan/ |
blacklist2.cc | 3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist 4 // RUN: echo "fun:*CallTouchGlobal*" >> %t.blacklist 6 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t
|
/external/skia/infra/bots/ |
zip_utils.py | 17 def filtered(names, blacklist): 20 for pattern in blacklist: 25 def zip(target_dir, zip_file, blacklist=None): # pylint: disable=W0622 29 blacklist = blacklist or [] 32 d[:] = filtered(d, blacklist) 33 for filename in filtered(f, blacklist):
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
security_OpenSSLBlacklist.py | 17 def verify(self, blacklist='/dev/null'): 19 (blacklist, VERIFY, self.ca, self.cert)) 22 def fetch(self, blacklist='/dev/null'): 24 'https://127.0.0.1:4433/' % (blacklist, self.ca)) 44 raise error.TestFail('Certificate does not verify with nonempty blacklist.') 54 error.TestFail('Fetch without blacklist fails.'))
|
/external/libcxx/utils/ |
sym_match.py | 23 '--blacklist', dest='blacklist', 33 if not args.regexes and args.blacklist is None: 34 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 36 if args.blacklist: 37 search_list = util.read_blacklist(args.blacklist)
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/utils/sym_check/ |
sym_match.py | 23 '--blacklist', dest='blacklist', 33 if not args.regexes and args.blacklist is None: 34 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 36 if args.blacklist: 37 search_list = util.read_blacklist(args.blacklist)
|
/external/chromium-trace/catapult/devil/devil/android/ |
device_blacklist_test.py | 20 test_blacklist = device_blacklist.Blacklist(blacklist_file.name) 29 test_blacklist = device_blacklist.Blacklist(blacklist_file.name)
|
/external/libyuv/files/tools_libyuv/ubsan/ |
vptr_blacklist.txt | 2 # UBSan vptr blacklist. 11 # adding libyuv-specific blacklist entries.
|
/external/llvm/test/tools/sancov/ |
blacklist.test | 2 RUN: sancov -covered-functions -blacklist %p/Inputs/fun_blacklist.txt %p/Inputs/test-linux_x86_64 %p/Inputs/test-linux_x86_64.0.sancov | FileCheck %s 3 RUN: sancov -covered-functions -blacklist %p/Inputs/src_blacklist.txt %p/Inputs/test-linux_x86_64 %p/Inputs/test-linux_x86_64.1.sancov | FileCheck --check-prefix=CHECK1 %s
|
/external/webrtc/tools/ubsan/ |
vptr_blacklist.txt | 2 # UBSan vptr blacklist. 11 # adding WebRTC-specific blacklist entries.
|
/frameworks/base/services/core/java/com/android/server/ |
CertBlacklister.java | 80 String blacklist = getValue(); local 81 if (blacklist != null) { 82 Slog.i(TAG, "Certificate blacklist changed, updating..."); 91 out.write(blacklist.getBytes()); 96 Slog.i(TAG, "Certificate blacklist updated"); 98 Slog.e(TAG, "Failed to write blacklist", e); 128 // set up the public key blacklist observer 135 // set up the serial number blacklist observer
|
/device/huawei/angler/ |
releasetools.py | 21 # the partition table, so blacklist it. 188 # blacklist any partitions that match the source image 189 blacklist = DEFAULT_BOOTLOADER_OTA_BLACKLIST 191 if ti not in blacklist: 198 blacklist.append(ti.name) 202 if i.name not in blacklist] 205 WriteBootloader(info, target_imagefile.data, blacklist) 236 blacklist = [] 238 blacklist.append("modem") 239 WriteHuaweiBootPartitionImages(info, target_radio_img, blacklist) [all...] |
/external/autotest/client/site_tests/security_NetworkListeners/ |
baseline | 2 # list, consider offsetting it with a blacklist in
|
baseline.arc | 2 # list, consider offsetting it with a blacklist in
|
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.h | 2 * wpa_supplicant - Temporary BSSID blacklist
|