/external/kmod/testsuite/rootfs-pristine/test-blacklist/etc/modprobe.d/ |
modprobe.conf | 0 blacklist floppy 2 blacklist pcspkr
|
/external/skia/infra/bots/recipes/ |
test.py | 179 def blacklist(quad): function in function:dm_flags 185 blacklist('f16 _ _ dstreadshuffle') 186 blacklist('glsrgb image _ _') 187 blacklist('glessrgb image _ _') 190 blacklist('gbr-8888 image _ _') 191 blacklist('gbr-8888 colorImage _ _') 195 blacklist('pdf gm _ fontmgr_iter') 196 blacklist('pdf _ _ PANO_20121023_214540.jpg') 197 blacklist('pdf skp _ worldjournal') 198 blacklist('pdf skp _ desk_baidu.skp' [all...] |
/frameworks/base/config/ |
generate-preloaded-classes.sh | 17 echo "Usage $0 <input classes file> <blacklist file> [extra classes files]" 34 blacklist=$2 39 LC_ALL=C sort "$input" "${extra_classes_files[@]}" | uniq | grep -f "$blacklist" -v -F -x
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 83 assertEquals(badPubkey, blacklist); 89 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 96 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 106 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); local 107 assertEquals(bl.toString(), blacklist); local 114 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 125 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 135 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 142 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 149 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 156 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 166 String blacklist = IoUtils.readFileAsString(SERIAL_PATH); local 167 assertEquals(bl.toString(), blacklist); local [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/ |
device_blacklist.py | 12 class Blacklist(object): 19 """Reads the blacklist from the blacklist file. 29 blacklist = json.load(f) 30 if not isinstance(blacklist, dict): 32 self._path, blacklist) 33 blacklist = dict() 34 return blacklist 36 def Write(self, blacklist): 37 """Writes the provided blacklist to the blacklist file [all...] |
/external/chromium-trace/catapult/devil/devil/android/ |
device_blacklist.py | 14 class Blacklist(object): 21 """Reads the blacklist from the blacklist file. 27 blacklist = dict() 29 return blacklist 33 blacklist = json.load(f) 35 logger.warning('Unable to read blacklist: %s', str(e)) 38 if not isinstance(blacklist, dict): 40 self._path, blacklist) 41 blacklist = dict( [all...] |
/frameworks/base/tools/preload2/src/com/android/preload/actions/ |
ComputeThresholdXAction.java | 25 String blacklist) { 26 super(name, dataTableModel, 1, blacklist);
|
ComputeThresholdAction.java | 38 * appears in at least the number of threshold given packages. An optional blacklist can be 43 private Pattern blacklist; field in class:ComputeThresholdAction 47 * Create an action with the given parameters. The blacklist is a regular expression 51 String blacklist) { 55 if (blacklist != null) { 56 this.blacklist = Pattern.compile(blacklist); 88 Set<String> result = fromThreshold(uses, blacklist, threshold); 101 private Set<String> fromThreshold(Map<String, Set<String>> classUses, Pattern blacklist, 107 if (blacklist == null || !blacklist.matcher(e.getKey()).matches()) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist count if the BSSID was already listed. It should be called whe [all...] |
/external/chromium-trace/catapult/devil/devil/android/tools/ |
device_recovery.py | 57 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 59 blacklist): 90 if blacklist: 91 blacklist.Extend([device.adb.GetDeviceSerial()], 95 if blacklist: 96 blacklist.Extend([device.adb.GetDeviceSerial()], 105 if blacklist: 106 blacklist.Extend([device.adb.GetDeviceSerial()], 110 if blacklist: 111 blacklist.Extend([device.adb.GetDeviceSerial()] [all...] |
device_status.py | 35 def IsBlacklisted(serial, blacklist): 36 return blacklist and serial in blacklist.Read() 39 def _BatteryStatus(device, blacklist): 51 if blacklist: 52 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 77 def DeviceStatus(devices, blacklist): 82 blacklist: The current device blacklist. 123 if not IsBlacklisted(serial, blacklist) [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
device_recovery.py | 54 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 56 blacklist): 80 if blacklist: 81 blacklist.Extend([device.adb.GetDeviceSerial()], 85 if blacklist: 86 blacklist.Extend([device.adb.GetDeviceSerial()], 93 if blacklist: 94 blacklist.Extend([device.adb.GetDeviceSerial()], 98 if blacklist: 99 blacklist.Extend([device.adb.GetDeviceSerial()] [all...] |
device_status.py | 33 def IsBlacklisted(serial, blacklist): 34 return blacklist and serial in blacklist.Read() 37 def _BatteryStatus(device, blacklist): 49 if blacklist: 50 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 73 def DeviceStatus(devices, blacklist): 78 blacklist: The current device blacklist. 119 if not IsBlacklisted(serial, blacklist) [all...] |
script_common.py | 11 blacklist = (device_blacklist.Blacklist(blacklist_file) 15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
|
/external/libcxx/utils/ |
sym_match.py | 23 '--blacklist', dest='blacklist', 33 if not args.regexes and args.blacklist is None: 34 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 36 if args.blacklist: 37 search_list = util.read_blacklist(args.blacklist)
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/utils/sym_check/ |
sym_match.py | 23 '--blacklist', dest='blacklist', 33 if not args.regexes and args.blacklist is None: 34 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 36 if args.blacklist: 37 search_list = util.read_blacklist(args.blacklist)
|
/external/skia/infra/bots/ |
zip_utils.py | 17 def filtered(names, blacklist): 20 for pattern in blacklist: 25 def zip(target_dir, zip_file, blacklist=None): # pylint: disable=W0622 29 blacklist = blacklist or [] 32 d[:] = filtered(d, blacklist) 33 for filename in filtered(f, blacklist):
|
/device/huawei/angler/ |
releasetools.py | 21 # the partition table, so blacklist it. 188 # blacklist any partitions that match the source image 189 blacklist = DEFAULT_BOOTLOADER_OTA_BLACKLIST 191 if ti not in blacklist: 198 blacklist.append(ti.name) 202 if i.name not in blacklist] 205 WriteBootloader(info, target_imagefile.data, blacklist) 236 blacklist = [] 238 blacklist.append("modem") 239 WriteHuaweiBootPartitionImages(info, target_radio_img, blacklist) [all...] |
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
security_OpenSSLBlacklist.py | 17 def verify(self, blacklist='/dev/null'): 19 (blacklist, VERIFY, self.ca, self.cert)) 22 def fetch(self, blacklist='/dev/null'): 24 'https://127.0.0.1:4433/' % (blacklist, self.ca)) 44 raise error.TestFail('Certificate does not verify with nonempty blacklist.') 54 error.TestFail('Fetch without blacklist fails.'))
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
WifiConnectivityHelperTest.java | 199 * Verify that correct size BSSID blacklist and SSID whitelist are accepted. 204 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 206 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 208 blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE - 2); 210 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 214 * Verify that null BSSID blacklist or SSID whitelist is rejected. 219 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 222 assertFalse(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, null)); 226 * Verify that incorrect size BSSID blacklist is rejected. 231 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE + 1) local 242 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); local 254 ArrayList<String> blacklist = buildBssidBlacklist(0); local [all...] |
WifiNetworkSelectorTest.java | 212 HashSet<String> blacklist = new HashSet<String>(); local 214 blacklist, mWifiInfo, false, true, false); 242 HashSet<String> blacklist = new HashSet<String>(); local 244 blacklist, mWifiInfo, false, true, false); 273 HashSet<String> blacklist = new HashSet<String>(); local 275 blacklist, mWifiInfo, false, true, false); 282 blacklist, mWifiInfo, true, false, false); 313 HashSet<String> blacklist = new HashSet<String>(); local 315 blacklist, mWifiInfo, false, true, false); 323 blacklist, mWifiInfo, false, true, false) 354 HashSet<String> blacklist = new HashSet<String>(); local 400 HashSet<String> blacklist = new HashSet<String>(); local 444 HashSet<String> blacklist = new HashSet<String>(); local 477 HashSet<String> blacklist = new HashSet<String>(); local 574 HashSet<String> blacklist = new HashSet<String>(); local 902 HashSet<String> blacklist = new HashSet<String>(); local 952 HashSet<String> blacklist = new HashSet<>(); local 982 HashSet<String> blacklist = new HashSet<>(); local 1018 HashSet<String> blacklist = new HashSet<>(); local 1046 HashSet<String> blacklist = new HashSet<>(); local [all...] |
/packages/apps/Camera2/src/com/android/camera/settings/ |
ResolutionSetting.java | 77 final String blacklist = cameraFacing == OneCamera.Facing.FRONT ? mResolutionBlackListFront local 92 blacklist); 114 String blacklist = ""; local 116 blacklist = mResolutionBlackListBack; 118 blacklist = mResolutionBlackListFront; 133 ResolutionUtil.isBlackListed(pictureSize, blacklist); 154 blacklist);
|
/bionic/libc/tools/ |
test_genseccomp.py | 55 # Blacklist item must be in bionic 56 blacklist = cStringIO.StringIO(textwrap.dedent("""\ 60 genseccomp.get_names([bionic, whitelist, blacklist], "arm") 63 blacklist.seek(0) 65 # Test blacklist item is removed 66 blacklist = cStringIO.StringIO(textwrap.dedent("""\ 69 names = genseccomp.get_names([bionic, whitelist, blacklist], "arm64") 72 blacklist.seek(0) 76 # Blacklist item must not be in whitelist 81 genseccomp.get_names([empty, whitelist, blacklist], "arm" [all...] |
/external/skia/infra/bots/recipe_modules/skia_swarming/examples/ |
full.py | 18 blacklist=['*.pyc'])
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CheckHandshake.java | 31 Set<String> blacklist = Collections.singleton("sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw="); 36 if (blacklist.contains(pin)) {
|