HomeSort by relevance Sort by last modified time
    Searched full:blacklist (Results 26 - 50 of 409) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/clang/test/CodeGen/
asan-globals.cpp 2 // RUN: echo "global:*blacklisted_global*" > %t.blacklist
3 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist -emit-llvm -o - %s | FileCheck %s
4 // RUN: echo "src:%s" > %t.blacklist-src
5 // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST-SRC
30 // BLACKLIST-SRC: !llvm.asan.globals = !{![[EXTRA_GLOBAL:[0-9]+]], ![[GLOBAL:[0-9]+]], ![[DYN_INIT_GLOBAL:[0-9]+]], ![[BLACKLISTED_GLOBAL:[0-9]+]], ![[STATIC_VAR:[0-9]+]], ![[LITERAL:[0-9]+]]}
31 // BLACKLIST-SRC: ![[EXTRA_GLOBAL]] = !{{{.*}} ![[EXTRA_GLOBAL_LOC:[0-9]+]], !"extra_global", i1 false, i1 false}
32 // BLACKLIST-SRC: ![[EXTRA_GLOBAL_LOC]] = !{!"{{.*}}extra-source.cpp", i32 1, i32 5
    [all...]
  /external/chromium-trace/catapult/devil/devil/android/tools/
device_recovery.py 57 def RecoverDevice(device, blacklist, should_reboot=lambda device: True):
59 blacklist):
88 if blacklist:
89 blacklist.Extend([device.adb.GetDeviceSerial()],
93 if blacklist:
94 blacklist.Extend([device.adb.GetDeviceSerial()],
102 if blacklist:
103 blacklist.Extend([device.adb.GetDeviceSerial()],
107 if blacklist:
108 blacklist.Extend([device.adb.GetDeviceSerial()]
    [all...]
flash_device.py 33 parser.add_argument('--blacklist-file', help='Device blacklist file.')
38 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read()
39 if blacklist:
40 logger.critical('Device(s) in blacklist, not flashing devices:')
41 for key in blacklist:
device_status.py 35 def IsBlacklisted(serial, blacklist):
36 return blacklist and serial in blacklist.Read()
39 def _BatteryStatus(device, blacklist):
51 if blacklist:
52 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery')
75 def DeviceStatus(devices, blacklist):
80 blacklist: The current device blacklist.
121 if not IsBlacklisted(serial, blacklist)
    [all...]
script_common.py 11 if not isinstance(blacklist_file, device_blacklist.Blacklist):
12 blacklist_file = (device_blacklist.Blacklist(blacklist_file)
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 153 // set our blacklist path
166 // set our blacklist path
201 private void blacklistToFile(String blacklist) throws IOException {
203 out.write(blacklist.toString().getBytes());
235 // build the blacklist
238 // write the blacklist
249 // write that to the test blacklist
251 // set our blacklist path
262 // write that to the test blacklist
266 // set our blacklist pat
    [all...]
  /external/libmojo/third_party/catapult/devil/devil/android/tools/
script_common.py 11 blacklist = (device_blacklist.Blacklist(blacklist_file)
15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
flash_device.py 31 parser.add_argument('--blacklist-file', help='Device blacklist file.')
36 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read()
37 if blacklist:
38 logging.critical('Device(s) in blacklist, not flashing devices:')
39 for key in blacklist:
device_status.py 33 def IsBlacklisted(serial, blacklist):
34 return blacklist and serial in blacklist.Read()
37 def _BatteryStatus(device, blacklist):
49 if blacklist:
50 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery')
73 def DeviceStatus(devices, blacklist):
78 blacklist: The current device blacklist.
119 if not IsBlacklisted(serial, blacklist)
    [all...]
adb_run_shell_cmd.py 25 parser.add_argument('--blacklist-file', help='Device blacklist file.')
32 args.blacklist_file = device_blacklist.Blacklist(
35 blacklist=args.blacklist_file, device_arg=args.devices)
  /external/chromium-trace/catapult/telemetry/telemetry/internal/platform/
android_device.py 36 def GetAllConnectedDevices(cls, blacklist):
37 device_serials = GetDeviceSerials(blacklist)
49 def _ListSerialsOfHealthyOnlineDevices(blacklist):
51 for d in device_utils.DeviceUtils.HealthyDevices(blacklist)]
54 def GetDeviceSerials(blacklist):
61 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist)
83 py_utils.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600)
84 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist)
107 blacklist = device_blacklist.Blacklist(
    [all...]
  /external/compiler-rt/test/tsan/
blacklist2.cc 3 // RUN: echo "fun:*Blacklisted_Thread2*" > %t.blacklist
4 // RUN: echo "fun:*CallTouchGlobal*" >> %t.blacklist
6 // RUN: %clangxx_tsan -O1 %s -fsanitize-blacklist=%t.blacklist -o %t
  /external/skia/infra/bots/
zip_utils.py 17 def filtered(names, blacklist):
20 for pattern in blacklist:
25 def zip(target_dir, zip_file, blacklist=None): # pylint: disable=W0622
29 blacklist = blacklist or []
32 d[:] = filtered(d, blacklist)
33 for filename in filtered(f, blacklist):
  /external/autotest/client/site_tests/security_OpenSSLBlacklist/
security_OpenSSLBlacklist.py 17 def verify(self, blacklist='/dev/null'):
19 (blacklist, VERIFY, self.ca, self.cert))
22 def fetch(self, blacklist='/dev/null'):
24 'https://127.0.0.1:4433/' % (blacklist, self.ca))
44 raise error.TestFail('Certificate does not verify with nonempty blacklist.')
54 error.TestFail('Fetch without blacklist fails.'))
  /external/libcxx/utils/
sym_match.py 23 '--blacklist', dest='blacklist',
33 if not args.regexes and args.blacklist is None:
34 sys.stderr.write('Either a regex or a blacklist must be specified.\n')
36 if args.blacklist:
37 search_list = util.read_blacklist(args.blacklist)
  /prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/utils/sym_check/
sym_match.py 23 '--blacklist', dest='blacklist',
33 if not args.regexes and args.blacklist is None:
34 sys.stderr.write('Either a regex or a blacklist must be specified.\n')
36 if args.blacklist:
37 search_list = util.read_blacklist(args.blacklist)
  /external/chromium-trace/catapult/devil/devil/android/
device_blacklist_test.py 20 test_blacklist = device_blacklist.Blacklist(blacklist_file.name)
29 test_blacklist = device_blacklist.Blacklist(blacklist_file.name)
  /external/libyuv/files/tools_libyuv/ubsan/
vptr_blacklist.txt 2 # UBSan vptr blacklist.
11 # adding libyuv-specific blacklist entries.
  /external/llvm/test/tools/sancov/
blacklist.test 2 RUN: sancov -covered-functions -blacklist %p/Inputs/fun_blacklist.txt %p/Inputs/test-linux_x86_64 %p/Inputs/test-linux_x86_64.0.sancov | FileCheck %s
3 RUN: sancov -covered-functions -blacklist %p/Inputs/src_blacklist.txt %p/Inputs/test-linux_x86_64 %p/Inputs/test-linux_x86_64.1.sancov | FileCheck --check-prefix=CHECK1 %s
  /external/webrtc/tools/ubsan/
vptr_blacklist.txt 2 # UBSan vptr blacklist.
11 # adding WebRTC-specific blacklist entries.
  /frameworks/base/services/core/java/com/android/server/
CertBlacklister.java 80 String blacklist = getValue(); local
81 if (blacklist != null) {
82 Slog.i(TAG, "Certificate blacklist changed, updating...");
91 out.write(blacklist.getBytes());
96 Slog.i(TAG, "Certificate blacklist updated");
98 Slog.e(TAG, "Failed to write blacklist", e);
128 // set up the public key blacklist observer
135 // set up the serial number blacklist observer
  /device/huawei/angler/
releasetools.py 21 # the partition table, so blacklist it.
188 # blacklist any partitions that match the source image
189 blacklist = DEFAULT_BOOTLOADER_OTA_BLACKLIST
191 if ti not in blacklist:
198 blacklist.append(ti.name)
202 if i.name not in blacklist]
205 WriteBootloader(info, target_imagefile.data, blacklist)
236 blacklist = []
238 blacklist.append("modem")
239 WriteHuaweiBootPartitionImages(info, target_radio_img, blacklist)
    [all...]
  /external/autotest/client/site_tests/security_NetworkListeners/
baseline 2 # list, consider offsetting it with a blacklist in
baseline.arc 2 # list, consider offsetting it with a blacklist in
  /external/wpa_supplicant_8/wpa_supplicant/
blacklist.h 2 * wpa_supplicant - Temporary BSSID blacklist

Completed in 906 milliseconds

12 3 4 5 6 7 8 91011>>