/external/autotest/tko/ |
status_lib.py | 24 def clean_raw_line(raw_line, blacklist=DEFAULT_BLACKLIST): 26 return re.sub('|'.join(blacklist), '', raw_line)
|
/external/bouncycastle/patches/ |
README | 29 - Blacklist fraudulent Comodo certificates in PKIXCertPathValidatorSpi 30 - Blacklist compromised DigiNotar Root CA by public key to block cross-signed intermediates
|
/external/chromium-trace/catapult/devil/devil/android/tools/ |
screenshot.py | 27 parser.add_argument('--blacklist-file', help='Device blacklist JSON file.')
|
provision_devices.py | 90 blacklist = (device_blacklist.Blacklist(blacklist_file) 95 devices = script_common.GetDevices(devices, blacklist) 98 if blacklist: 99 logging.error('Local device blacklist: %s', blacklist.Read()) 137 parallel_devices.pMap(ProvisionDevice, steps, blacklist, reboot_timeout) 139 blacklisted_devices = blacklist.Read() if blacklist else [] 148 def ProvisionDevice(device, steps, blacklist, reboot_timeout=None) [all...] |
/external/clang/include/clang/Basic/ |
SanitizerBlacklist.h | 1 //===--- SanitizerBlacklist.h - Blacklist for sanitizers --------*- C++ -*-===// 10 // User-provided blacklist used to disable/alter instrumentation done in
|
/external/clang/test/CodeGen/ |
sanitize-address-field-padding.cpp | 2 // RUN: echo 'type:SomeNamespace::BlacklistedByName=field-padding' > %t.type.blacklist 3 // RUN: echo 'src:*sanitize-address-field-padding.cpp=field-padding' > %t.file.blacklist 4 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.type.blacklist -Rsanitize-address -emit-llvm -o - %s 2>&1 | FileCheck %s 5 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.type.blacklist -Rsanitize-address -emit-llvm -o - %s -O1 -mconstructor-aliases 2>&1 | FileCheck %s --check-prefix=WITH_CTOR_ALIASES 6 // RUN: %clang_cc1 -triple x86_64-unknown-unknown -fsanitize=address -fsanitize-address-field-padding=1 -fsanitize-blacklist=%t.file.blacklist -Rsanitize-address -emit-llvm -o - %s 2>&1 | FileCheck %s --check-prefix=FILE_BLACKLIST
|
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
screenshot.py | 25 parser.add_argument('--blacklist-file', help='Device blacklist JSON file.')
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 31 Set<String> blacklist = Collections.singleton("sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw="); 36 if (blacklist.contains(pin)) {
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiConnectivityHelper.java | 73 Log.e(TAG, "Invalid firmware roaming capabilities: max num blacklist bssid=" 80 Log.d(TAG, "Firmware roaming supported with capabilities: max num blacklist bssid=" 100 * Get the maximum size of BSSID blacklist firmware supports. 103 * maximum size of the BSSID blacklist firmware supports. 152 Log.e(TAG, "Invalid BSSID blacklist size " + blacklistSize + " SSID whitelist size " 153 + whitelistSize + ". Max blacklist size: " + mMaxNumBlacklistBssid
|
/external/autotest/server/cros/dynamic_suite/ |
frontend_wrappers.py | 72 # blacklist: Exceptions that we raise immediately if caught. 74 blacklist = (ImportError, error.RPCException, proxy.JSONRPCException, 92 is_blacklisted = isinstance(exc, blacklist) 100 blacklist=[ImportError, error.RPCException, 135 blacklist=[ImportError, error.RPCException,
|
/external/autotest/client/site_tests/video_VideoEncodeAccelerator/ |
video_VideoEncodeAccelerator.py | 50 blacklist = { 59 if board in blacklist: 60 return ' --gtest_filter=-' + ':'.join(blacklist[board])
|
/system/bt/service/test/ |
advertise_data_unittest.cc | 89 uint8_t blacklist[] = {HCI_EIR_FLAGS_TYPE, HCI_EIR_OOB_BD_ADDR_TYPE, local 92 for (size_t i = 0; i < sizeof(blacklist); i++) { 93 const std::vector<uint8_t> data{0x02, blacklist[i], 0x00};
|
/toolchain/binutils/binutils-2.25/config/ |
mmap.m4 | 21 [# Add a system to this blacklist if 34 [# Add a system to this blacklist if it has mmap() but /dev/zero 71 [# Add a system to this blacklist if it has mmap() and MAP_ANON or
|
/frameworks/base/services/core/java/com/android/server/policy/ |
PolicyControl.java | 190 private Filter(ArraySet<String> whitelist, ArraySet<String> blacklist) { 192 mBlacklist = blacklist; 220 dump("blacklist", mBlacklist, pw); pw.print(']'); 245 ArraySet<String> blacklist = new ArraySet<String>(); local 250 blacklist.add(token); 255 return new Filter(whitelist, blacklist);
|
/external/autotest/client/site_tests/video_ChromeRTCHWDecodeUsed/ |
video_ChromeRTCHWDecodeUsed.py | 29 blacklist = [ 40 for black_entry in blacklist:
|
/external/autotest/client/site_tests/video_VideoSanity/ |
video_VideoSanity.py | 31 blacklist = [ 41 for (blacklist_board, blacklist_arc_mode) in blacklist:
|
/external/clang/lib/Basic/ |
SanitizerBlacklist.cpp | 1 //===--- SanitizerBlacklist.cpp - Blacklist for sanitizers ----------------===// 10 // User-provided blacklist used to disable/alter instrumentation done in
|
/external/curl/lib/ |
pipeline.c | 169 struct curl_llist *blacklist = local 172 if(blacklist) { 175 curr = blacklist->head; 251 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */ 261 struct curl_llist *blacklist = local 264 if(blacklist) { 267 curr = blacklist->head; 322 /* This might be NULL if sites == NULL, i.e the blacklist is cleared */
|
/external/kmod/testsuite/ |
test-blacklist.c | 30 /* good luck bulding a kmod_list outside of the library... makes this blacklist 100 [TC_ROOTFS] = TESTSUITE_ROOTFS "test-blacklist/",
|
/external/libyuv/files/build_overrides/ |
build.gni | 33 rebase_path("//tools_libyuv/msan/blacklist.txt", root_build_dir) 35 rebase_path("//tools_libyuv/ubsan/blacklist.txt", root_build_dir)
|
/external/libyuv/files/tools/ubsan/ |
blacklist.txt | 2 # UBSan blacklist. 51 # Bounds blacklist.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_module_tests.c | 14 #include "blacklist.h" 67 wpa_printf(MSG_ERROR, "blacklist module test failure");
|
/system/netd/server/ |
FirewallController.h | 30 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed 32 enum FirewallType { WHITELIST, BLACKLIST };
|
/tools/test/connectivity/acts/framework/tests/ |
acts_import_unit_test.py | 50 BLACKLIST = [ 77 if any(full_path.endswith(e) for e in BLACKLIST):
|
/bionic/libc/ |
SECCOMP_BLACKLIST.TXT | 5 # Any entry in the blacklist must be in the syscalls file and not be in the whitelist file
|