HomeSort by relevance Sort by last modified time
    Searched full:blacklist (Results 76 - 100 of 409) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/autotest/tko/
status_lib.py 24 def clean_raw_line(raw_line, blacklist=DEFAULT_BLACKLIST):
26 return re.sub('|'.join(blacklist), '', raw_line)
  /external/bouncycastle/patches/
README 29 - Blacklist fraudulent Comodo certificates in PKIXCertPathValidatorSpi
30 - Blacklist compromised DigiNotar Root CA by public key to block cross-signed intermediates
  /external/chromium-trace/catapult/devil/devil/android/tools/
screenshot.py 27 parser.add_argument('--blacklist-file', help='Device blacklist JSON file.')
provision_devices.py 90 blacklist = (device_blacklist.Blacklist(blacklist_file)
95 devices = script_common.GetDevices(devices, blacklist)
98 if blacklist:
99 logging.error('Local device blacklist: %s', blacklist.Read())
137 parallel_devices.pMap(ProvisionDevice, steps, blacklist, reboot_timeout)
139 blacklisted_devices = blacklist.Read() if blacklist else []
148 def ProvisionDevice(device, steps, blacklist, reboot_timeout=None)
    [all...]
  /external/clang/include/clang/Basic/
SanitizerBlacklist.h 1 //===--- SanitizerBlacklist.h - Blacklist for sanitizers --------*- C++ -*-===//
10 // User-provided blacklist used to disable/alter instrumentation done in
  /external/clang/test/CodeGen/
sanitize-address-field-padding.cpp 2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist
3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist
4 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.type.blacklist -Rsanitize-address -emit-llvm -o - %s 2>&1 | FileCheck %s
5 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.type.blacklist -Rsanitize-address -emit-llvm -o - %s -O1 -mconstructor-aliases 2>&1 | FileCheck %s --check-prefix=WITH_CTOR_ALIASES
6 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.file.blacklist -Rsanitize-address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=FILE_BLACKLIST
  /external/libmojo/third_party/catapult/devil/devil/android/tools/
screenshot.py 25 parser.add_argument('--blacklist-file', help='Device blacklist JSON file.')
  /external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/
CheckHandshake.java 31 Set<String> blacklist = Collections.singleton("sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw=");
36 if (blacklist.contains(pin)) {
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
WifiConnectivityHelper.java 73 Log.e(TAG, "Invalid firmware roaming capabilities: max num blacklist bssid="
80 Log.d(TAG, "Firmware roaming supported with capabilities: max num blacklist bssid="
100 * Get the maximum size of BSSID blacklist firmware supports.
103 * maximum size of the BSSID blacklist firmware supports.
152 Log.e(TAG, "Invalid BSSID blacklist size " + blacklistSize + " SSID whitelist size "
153 + whitelistSize + ". Max blacklist size: " + mMaxNumBlacklistBssid
  /external/autotest/server/cros/dynamic_suite/
frontend_wrappers.py 72 # blacklist: Exceptions that we raise immediately if caught.
74 blacklist = (ImportError, error.RPCException, proxy.JSONRPCException,
92 is_blacklisted = isinstance(exc, blacklist)
100 blacklist=[ImportError, error.RPCException,
135 blacklist=[ImportError, error.RPCException,
  /external/autotest/client/site_tests/video_VideoEncodeAccelerator/
video_VideoEncodeAccelerator.py 50 blacklist = {
59 if board in blacklist:
60 return ' --gtest_filter=-' + ':'.join(blacklist[board])
  /system/bt/service/test/
advertise_data_unittest.cc 89 uint8_t blacklist[] = {HCI_EIR_FLAGS_TYPE, HCI_EIR_OOB_BD_ADDR_TYPE, local
92 for (size_t i = 0; i < sizeof(blacklist); i++) {
93 const std::vector<uint8_t> data{0x02, blacklist[i], 0x00};
  /toolchain/binutils/binutils-2.25/config/
mmap.m4 21 [# Add a system to this blacklist if
34 [# Add a system to this blacklist if it has mmap() but /dev/zero
71 [# Add a system to this blacklist if it has mmap() and MAP_ANON or
  /frameworks/base/services/core/java/com/android/server/policy/
PolicyControl.java 190 private Filter(ArraySet<String> whitelist, ArraySet<String> blacklist) {
192 mBlacklist = blacklist;
220 dump("blacklist", mBlacklist, pw); pw.print(']');
245 ArraySet<String> blacklist = new ArraySet<String>(); local
250 blacklist.add(token);
255 return new Filter(whitelist, blacklist);
  /external/autotest/client/site_tests/video_ChromeRTCHWDecodeUsed/
video_ChromeRTCHWDecodeUsed.py 29 blacklist = [
40 for black_entry in blacklist:
  /external/autotest/client/site_tests/video_VideoSanity/
video_VideoSanity.py 31 blacklist = [
41 for (blacklist_board, blacklist_arc_mode) in blacklist:
  /external/clang/lib/Basic/
SanitizerBlacklist.cpp 1 //===--- SanitizerBlacklist.cpp - Blacklist for sanitizers ----------------===//
10 // User-provided blacklist used to disable/alter instrumentation done in
  /external/curl/lib/
pipeline.c 169 struct curl_llist *blacklist = local
172 if(blacklist) {
175 curr = blacklist->head;
251 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
261 struct curl_llist *blacklist = local
264 if(blacklist) {
267 curr = blacklist->head;
322 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
  /external/kmod/testsuite/
test-blacklist.c 30 /* good luck bulding a kmod_list outside of the library... makes this blacklist
100 [TC_ROOTFS] = TESTSUITE_ROOTFS "test-blacklist/",
  /external/libyuv/files/build_overrides/
build.gni 33 rebase_path("//tools_libyuv/msan/blacklist.txt", root_build_dir)
35 rebase_path("//tools_libyuv/ubsan/blacklist.txt", root_build_dir)
  /external/libyuv/files/tools/ubsan/
blacklist.txt 2 # UBSan blacklist.
51 # Bounds blacklist.
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_module_tests.c 14 #include "blacklist.h"
67 wpa_printf(MSG_ERROR, "blacklist module test failure");
  /system/netd/server/
FirewallController.h 30 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
32 enum FirewallType { WHITELIST, BLACKLIST };
  /tools/test/connectivity/acts/framework/tests/
acts_import_unit_test.py 50 BLACKLIST = [
77 if any(full_path.endswith(e) for e in BLACKLIST):
  /bionic/libc/
SECCOMP_BLACKLIST.TXT 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file

Completed in 1301 milliseconds

1 2 34 5 6 7 8 91011>>