/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
WifiConnectivityHelperTest.java | 199 * Verify that correct size BSSID blacklist and SSID whitelist are accepted. 204 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 206 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 208 blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE - 2); 210 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 214 * Verify that null BSSID blacklist or SSID whitelist is rejected. 219 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 222 assertFalse(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, null)); 226 * Verify that incorrect size BSSID blacklist is rejected. 231 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE + 1) local 242 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 254 ArrayList<String> blacklist = buildBssidBlacklist(0); local [all...] |
WifiNetworkSelectorTest.java | 184 HashSet<String> blacklist = new HashSet<String>(); local 186 blacklist, mWifiInfo, false, true, false); 213 HashSet<String> blacklist = new HashSet<String>(); local 215 blacklist, mWifiInfo, false, true, false); 243 HashSet<String> blacklist = new HashSet<String>(); local 245 blacklist, mWifiInfo, false, true, false); 252 blacklist, mWifiInfo, true, false, false); 282 HashSet<String> blacklist = new HashSet<String>(); local 284 blacklist, mWifiInfo, false, true, false); 292 blacklist, mWifiInfo, false, true, false) 322 HashSet<String> blacklist = new HashSet<String>(); local 367 HashSet<String> blacklist = new HashSet<String>(); local 413 HashSet<String> blacklist = new HashSet<String>(); local 459 HashSet<String> blacklist = new HashSet<String>(); local 504 HashSet<String> blacklist = new HashSet<String>(); local 536 HashSet<String> blacklist = new HashSet<String>(); local 632 HashSet<String> blacklist = new HashSet<String>(); local [all...] |
/external/clang/test/CodeGen/ |
ubsan-type-blacklist.cpp | 2 // RUN: echo "type:_ZTI3Foo" > %t-type.blacklist 4 // RUN: %clang_cc1 -triple x86_64-linux-gnu -fsanitize=vptr -fsanitize-recover=vptr -fsanitize-blacklist=%t-type.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=TYPE
|
address-safety-attr.cpp | 9 // RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist 10 // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s 12 // RUN: echo "src:%s" > %t.file.blacklist 13 // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s 15 // FIXME: %t.file.blacklist is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp"
|
/external/compiler-rt/test/dfsan/ |
flags.c | 1 // RUN: %clang_dfsan %s -fsanitize-blacklist=%S/Inputs/flags_abilist.txt -mllvm -dfsan-debug-nonzero-labels -o %t && %run %t 2>&1 | FileCheck %s 2 // RUN: %clang_dfsan %s -fsanitize-blacklist=%S/Inputs/flags_abilist.txt -mllvm -dfsan-debug-nonzero-labels -o %t && DFSAN_OPTIONS=warn_unimplemented=0 %run %t 2>&1 | count 0 3 // RUN: %clang_dfsan %s -fsanitize-blacklist=%S/Inputs/flags_abilist.txt -mllvm -dfsan-debug-nonzero-labels -o %t && DFSAN_OPTIONS=warn_nonzero_labels=1 %run %t 2>&1 | FileCheck --check-prefix=CHECK-NONZERO %s
|
/external/kmod/testsuite/ |
.gitignore | 9 /test-blacklist 32 /test-blacklist.log 33 /test-blacklist.trs
|
/frameworks/base/tools/preload2/src/com/android/preload/actions/ |
ComputeThresholdAction.java | 38 * appears in at least the number of threshold given packages. An optional blacklist can be 43 private Pattern blacklist; field in class:ComputeThresholdAction 47 * Create an action with the given parameters. The blacklist is a regular expression 51 String blacklist) { 55 if (blacklist != null) { 56 this.blacklist = Pattern.compile(blacklist); 88 Set<String> result = fromThreshold(uses, blacklist, threshold); 101 private Set<String> fromThreshold(Map<String, Set<String>> classUses, Pattern blacklist, 107 if (blacklist == null || !blacklist.matcher(e.getKey()).matches()) [all...] |
ComputeThresholdXAction.java | 25 String blacklist) { 26 super(name, dataTableModel, 1, blacklist);
|
/bionic/libc/tools/ |
test_genseccomp.py | 55 # Blacklist item must be in bionic 56 blacklist = cStringIO.StringIO(textwrap.dedent("""\ 60 genseccomp.get_names([bionic, whitelist, blacklist], "arm") 63 blacklist.seek(0) 65 # Test blacklist item is removed 66 blacklist = cStringIO.StringIO(textwrap.dedent("""\ 69 names = genseccomp.get_names([bionic, whitelist, blacklist], "arm64") 72 blacklist.seek(0) 76 # Blacklist item must not be in whitelist 81 genseccomp.get_names([empty, whitelist, blacklist], "arm" [all...] |
/external/curl/docs/libcurl/opts/ |
CURLMOPT_PIPELINING_SITE_BL.3 | 25 CURLMOPT_PIPELINING_SITE_BL \- pipelining host blacklist 35 Pass a NULL pointer to clear the blacklist. 37 The default value is NULL, which means that there is no blacklist.
|
CURLMOPT_PIPELINING_SERVER_BL.3 | 25 CURLMOPT_PIPELINING_SERVER_BL \- pipelining server blacklist 37 in the blacklist, i.e "Server: Ninja 1.2.3" and "Server: Ninja 1.4.0" can 40 Pass a NULL pointer to clear the blacklist. 42 The default value is NULL, which means that there is no blacklist.
|
/external/skia/gn/ |
find_headers.py | 12 # then write them to skia.h with a small blacklist. 20 blacklist = { variable 33 if f.endswith('.h') and f not in blacklist:
|
/external/chromium-trace/catapult/devil/devil/android/tools/ |
adb_run_shell_cmd.py | 31 parser.add_argument('--blacklist-file', help='Device blacklist file.') 38 args.blacklist_file = device_blacklist.Blacklist( 41 blacklist=args.blacklist_file, device_arg=args.devices)
|
device_monitor.py | 162 def get_all_status(blacklist): 168 healthy_devices = device_utils.DeviceUtils.HealthyDevices(blacklist) 176 if blacklist: 177 for device, reason in blacklist.Read().iteritems(): 189 blacklist file every 60 seconds and dumps the data to DEVICE_FILE. 195 parser.add_argument('--blacklist-file', help='Path to device blacklist file.') 215 blacklist = (device_blacklist.Blacklist(args.blacklist_file) 218 logging.info('Device monitor running with pid %d, adb: %s, blacklist: %s' [all...] |
/external/clang/test/Frontend/ |
dependency-gen.c | 23 // RUN: echo "fun:foo" > %t.blacklist 24 // RUN: %clang -MD -MF - %s -fsyntax-only -fsanitize=cfi-vcall -flto -fvisibility=hidden -fsanitize-blacklist=%t.blacklist -I ./ | FileCheck -check-prefix=CHECK-SEVEN %s 25 // CHECK-SEVEN: .blacklist
|
/system/netd/server/ |
FirewallController.cpp | 60 // If no rules are set, it's in BLACKLIST mode 61 mFirewallType = BLACKLIST; 136 if (mFirewallType == BLACKLIST) { 137 // Unsupported in BLACKLIST mode 160 if (mFirewallType == BLACKLIST) { 161 // Unsupported in BLACKLIST mode 185 if (mFirewallType == BLACKLIST) { 186 // Unsupported in BLACKLIST mode 221 return BLACKLIST; 227 return BLACKLIST; [all...] |
/packages/apps/Camera2/src/com/android/camera/settings/ |
ResolutionSetting.java | 77 final String blacklist = cameraFacing == OneCamera.Facing.FRONT ? mResolutionBlackListFront local 92 blacklist); 114 String blacklist = ""; local 116 blacklist = mResolutionBlackListBack; 118 blacklist = mResolutionBlackListFront; 133 ResolutionUtil.isBlackListed(pictureSize, blacklist); 154 blacklist);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/tuner/ |
StatusBarSwitch.java | 66 // If not enabled add to blacklist. 82 private void setList(Set<String> blacklist) { 85 TextUtils.join(",", blacklist), ActivityManager.getCurrentUser());
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
desktop_device.py | 14 def GetAllConnectedDevices(cls, blacklist):
|
device.py | 31 def GetAllConnectedDevices(cls, blacklist):
|
/external/clang/docs/ |
SanitizerSpecialCaseList.rst | 29 ``-fsanitize-blacklist`` flag. See :doc:`UsersManual` for details. 43 $ cat blacklist.txt 48 $ clang -fsanitize=address -fsanitize-blacklist=blacklist.txt foo.c ; ./a.out
|
/external/libmojo/mojo/public/tools/bindings/ |
blink_bindings_configuration.gni | 25 blacklist = [
|
/external/v8/testing/gmock_custom/gmock/internal/custom/ |
gmock-port.h | 16 // <20120322 below implies pre-4.7.0. In addition we blacklist several version
|
/frameworks/base/services/core/java/com/android/server/location/ |
LocationBlacklist.java | 37 * This is a silent blacklist. Applications can still call Location Manager 72 if (D) Slog.d(TAG, "blacklist: " + Arrays.toString(mBlacklist)); 82 * Return true if in blacklist 83 * (package name matches blacklist, and does not match whitelist)
|
/frameworks/rs/tests/lldb/ |
config.py | 85 def blacklist(self): member in class:Config 86 '''Provide a test blacklist for skipping specific tests. 88 To specify the blacklist from the command line the following can be 89 used: --blacklist test1.py test2.py ...'''
|