/prebuilts/go/darwin-x86/src/cmd/vet/internal/whitelist/ |
whitelist.go | 5 // Package whitelist defines exceptions for the vet tool. 6 package whitelist package
|
/prebuilts/go/linux-x86/src/cmd/vet/internal/whitelist/ |
whitelist.go | 5 // Package whitelist defines exceptions for the vet tool. 6 package whitelist package
|
/external/icu/tools/srcgen/currysrc/src/main/java/com/google/currysrc/processors/ |
HidePublicClasses.java | 26 * Hides any public class that is not found in the whitelist. 30 private final List<TypeLocator> whitelist; field in class:HidePublicClasses 32 public HidePublicClasses(List<TypeLocator> whitelist, String reason) { 34 this.whitelist = whitelist; 42 for (TypeLocator whitelistedType : whitelist) { 55 "whitelist=" + whitelist +
|
/external/libchrome/base/trace_event/ |
event_name_filter_unittest.cc | 22 TEST(TraceEventNameFilterTest, Whitelist) { 26 // No events should be filtered if the whitelist is empty. 29 auto whitelist = MakeUnique<EventNameFilter::EventNamesWhitelist>(); local 30 whitelist->insert("foo"); 31 whitelist->insert("bar"); 32 filter = MakeUnique<EventNameFilter>(std::move(whitelist));
|
/external/python/cpython3/Lib/test/test_tools/ |
test_sundry.py | 19 # added for a script it should be added to the whitelist below. 22 whitelist = ['reindent', 'pdeps', 'gprof2html', 'md5sum'] variable in class:TestSundryScripts 30 skiplist = blacklist + whitelist + windows_only + other
|
/external/chromium-trace/catapult/systrace/atrace_helper/jni/ |
main.cc | 29 std::set<std::string> whitelist; local 33 whitelist.insert(entry); 35 if (whitelist.empty()) 38 prog->set_full_dump_whitelist(whitelist);
|
/external/v8/src/debug/ |
debug-evaluate.h | 65 Handle<StringSet> whitelist; member in struct:v8::internal::DebugEvaluate::ContextBuilder::ContextChainElement
|
/prebuilts/go/darwin-x86/src/cmd/vet/all/ |
main.go | 9 // maintained in the whitelist directory. 107 type whitelist map[string]int type 109 // load adds entries from the whitelist file, if present, for os/arch to w. 110 func (w whitelist) load(goos string, goarch string) { 148 path := filepath.Join("whitelist", filename) 198 // Load whitelist(s). 199 w := make(whitelist) 265 // Vet error with no match in the whitelist. Print it. 294 fmt.Fprintln(&buf, "unmatched whitelist entries:")
|
/prebuilts/go/linux-x86/src/cmd/vet/all/ |
main.go | 9 // maintained in the whitelist directory. 107 type whitelist map[string]int type 109 // load adds entries from the whitelist file, if present, for os/arch to w. 110 func (w whitelist) load(goos string, goarch string) { 148 path := filepath.Join("whitelist", filename) 198 // Load whitelist(s). 199 w := make(whitelist) 265 // Vet error with no match in the whitelist. Print it. 294 fmt.Fprintln(&buf, "unmatched whitelist entries:")
|
/external/perfetto/tools/ftrace_proto_gen/ |
ftrace_proto_gen.cc | 176 std::set<std::string> whitelist; local 180 fprintf(stderr, "Failed to open whitelist %s\n", whitelist_path.c_str()); 181 return whitelist; 185 whitelist.insert(line); 188 return whitelist;
|
/external/webrtc/webrtc/base/ |
natserver.h | 98 AddressSet* whitelist; member in struct:rtc::NATServer::TransEntry
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
PrivappPermissionsTest.java | 41 * Tests enforcement of signature|privileged permission whitelist: 105 Set<String> whitelist = getPrivAppPermissions(packageName); local 111 + " Whitelisted: " + whitelist + "." 115 grantedNotInWhitelist.removeAll(whitelist);
|
/external/icu/tools/srcgen/src/main/java/com/android/icu4j/srcgen/ |
TranslateJcite.java | 109 * if the declaration it is associated with appears in a whitelist. 115 private final List<BodyDeclarationLocator> whitelist; field in class:TranslateJcite.InclusionHandler 117 public InclusionHandler(String sampleSrcDir, List<BodyDeclarationLocator> whitelist) { 119 this.whitelist = whitelist; 134 boolean matchesWhitelist = matchesAny(whitelist, declarationNode); 199 "whitelist=" + whitelist +
|
Icu4jTransform.java | 720 List<BodyDeclarationLocator> whitelist = local [all...] |
/cts/tests/signature/intent-check/src/android/signature/cts/intent/ |
IntentTest.java | 105 // Log the whitelist line to make it easy to update. 107 Log.d(TAG, String.format("whitelist.add(\"%s\");", intent)); 180 Set<String> whitelist = new HashSet<>(); local 185 // Log the whitelist Intent 187 Log.d(TAG, String.format("whitelist add: %s", intent)); 188 whitelist.add(intent); 191 return whitelist;
|
/frameworks/base/core/jni/ |
fd_utils.cpp | 34 // Static whitelist of open paths that the zygote is allowed to keep open. 58 // Check the static whitelist path. 64 // Check any paths added to the dynamic whitelist. 77 // Whitelist files needed for Runtime Resource Overlay, like these: 179 const FileDescriptorWhitelist* whitelist = FileDescriptorWhitelist::Get(); local 188 if (!whitelist->IsAllowed(socket_name)) { 222 if (!whitelist->IsAllowed(file_path)) { 594 // A newly opened file is not on the whitelist. Flag an error and
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
WifiConnectivityHelperTest.java | 182 * is supported but returned invalid max SSID whitelist size. Firmware roaming capabilty values 203 * Verify that correct size BSSID blacklist and SSID whitelist are accepted. 209 ArrayList<String> whitelist = buildSsidWhitelist(MAX_SSID_WHITELIST_SIZE); local 210 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 213 whitelist = buildSsidWhitelist(MAX_SSID_WHITELIST_SIZE - 3); 214 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 218 * Verify that null BSSID blacklist or SSID whitelist is rejected. 224 ArrayList<String> whitelist = buildSsidWhitelist(MAX_SSID_WHITELIST_SIZE); local 225 assertFalse(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(null, whitelist)); 236 ArrayList<String> whitelist = buildSsidWhitelist(MAX_SSID_WHITELIST_SIZE) local 247 ArrayList<String> whitelist = buildSsidWhitelist(MAX_SSID_WHITELIST_SIZE + 1); local 259 ArrayList<String> whitelist = buildSsidWhitelist(0); local [all...] |
/frameworks/support/webkit/src/androidTest/java/androidx/webkit/ |
WebViewCompatTest.java | 163 List whitelist = new ArrayList<String>(); local 164 // Protocols are not supported in the whitelist 165 whitelist.add("http://google.com"); 167 WebViewCompat.setSafeBrowsingWhitelist(whitelist, new ValueCallback<Boolean>() { 183 List whitelist = new ArrayList<String>(); local 184 whitelist.add("safe-browsing"); 186 WebViewCompat.setSafeBrowsingWhitelist(whitelist, new ValueCallback<Boolean>() {
|
/frameworks/wilhelm/src/android/ |
AudioRecorder_to_android.cpp | 518 // The alternative, to check a whitelist of compatible interfaces, is 573 static const unsigned whitelist[] = { local 582 for (unsigned i = 0; i < sizeof(whitelist)/sizeof(whitelist[0]); ++i) { 583 if (mph == whitelist[i]) { [all...] |
/tools/tradefederation/core/prod-tests/src/com/android/monkey/ |
MonkeyBase.java | 194 @Option(name = "use-pkg-whitelist-file", description = "Whether to use the monkey " + 195 "--pkg-whitelist-file option to work around cmdline length limits") 315 String whitelist = ArrayUtil.join("\r\n", setSubtract(mPackages, mExcludePackages)); local 316 device.pushString(whitelist.toString(), DEVICE_WHITELIST_PATH); 561 cmdList.add("--pkg-whitelist-file");
|
/external/ImageMagick/MagickCore/ |
string.c | 1669 whitelist[] = local [all...] |
/frameworks/base/services/robotests/src/com/android/server/backup/ |
TransportManagerTest.java | 616 Set<ComponentName> whitelist = local 624 whitelist,
|
/frameworks/base/services/tests/servicestests/src/com/android/server/am/ |
LockTaskControllerTest.java | 418 // Apply whitelist 421 // Assert the whitelist is applied to the correct user 429 // Update whitelist 432 // Assert the new whitelist is applied 444 String[] whitelist = {TEST_PACKAGE_NAME, TEST_PACKAGE_NAME_2}; local 445 mLockTaskController.updateLockTaskPackages(TEST_USER_ID, whitelist); 455 // WHEN removing one package from whitelist 456 whitelist = new String[] {TEST_PACKAGE_NAME}; 457 mLockTaskController.updateLockTaskPackages(TEST_USER_ID, whitelist); 467 // WHEN removing the last package from whitelist [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/uicc/ |
UiccProfileTest.java | 183 String whitelist = ""; local 184 Map<String, String> parsedMap = UiccProfile.parseToCertificateToPackageMap(whitelist); 187 whitelist = "nokey;value;separation"; 188 parsedMap = UiccProfile.parseToCertificateToPackageMap(whitelist); 191 whitelist = "KEY1:value1"; 192 parsedMap = UiccProfile.parseToCertificateToPackageMap(whitelist); 195 whitelist = "KEY1:value1; KEY2:value2 ;KEY3:value3"; 196 parsedMap = UiccProfile.parseToCertificateToPackageMap(whitelist);
|
/system/core/logd/ |
LogBuffer.cpp | 691 // (again, remember for the specified log buffer id) but does some whitelist 692 // preservation. Thus whitelist is a Hail Mary low priority, blacklists and 698 // The third thread is optional, and only gets hit if there was a whitelist 969 bool whitelist = false; local [all...] |