OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:BLACKLIST
(Results
1 - 14
of
14
) sorted by null
/external/tensorflow/tensorflow/tools/pip_package/
pip_smoke_test.py
43
# Hard-coded
blacklist
of files if not included in pip package
44
# TODO(amitpatankar): Clean up
blacklist
.
45
BLACKLIST
= [
108
blacklisted_files = len(
BLACKLIST
)
118
# Check if the dependency is in the pip package, the
blacklist
, or
121
dependency in
BLACKLIST
):
138
Please either
blacklist
the dependencies in
/tools/test/connectivity/acts/framework/tests/
acts_import_unit_test.py
50
BLACKLIST
= [
82
if any(full_path.endswith(e) for e in
BLACKLIST
):
/system/netd/server/
FirewallController.cpp
74
// If no rules are set, it's in
BLACKLIST
mode
75
mFirewallType =
BLACKLIST
;
165
if (mFirewallType ==
BLACKLIST
) {
166
// Unsupported in
BLACKLIST
mode
203
return
BLACKLIST
;
209
return
BLACKLIST
;
221
} else { //
BLACKLIST
mode
313
//
Blacklist
chains have UIDs at the end, and new UIDs are added with '-A'.
321
//
blacklist
chain, because all user-defined chains implicitly RETURN at the end.
FirewallController.h
31
//
BLACKLIST
means the firewall allows all by default, uids must be explicitly DENYed
33
enum FirewallType { WHITELIST,
BLACKLIST
};
FirewallControllerTest.cpp
107
createChain("fw_blacklist",
BLACKLIST
);
248
EXPECT_EQ(0, mFw.enableFirewall(
BLACKLIST
));
251
EXPECT_EQ(0, mFw.enableFirewall(
BLACKLIST
));
TrafficControllerTest.cpp
167
EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY,
BLACKLIST
));
184
EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW,
BLACKLIST
));
190
EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW,
BLACKLIST
));
438
ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, DENY,
BLACKLIST
)));
453
ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW,
BLACKLIST
)));
457
ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW,
BLACKLIST
)));
TrafficController.cpp
438
if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type ==
BLACKLIST
)) {
441
} else if ((rule == ALLOW && type ==
BLACKLIST
) || (rule == DENY && type == WHITELIST)) {
513
type =
BLACKLIST
;
CommandListener.cpp
[
all
...]
/external/v8/tools/
generate-builtins-tests.py
15
BLACKLIST
= [
120
if obj_name in
BLACKLIST
: continue
/external/autotest/utils/
run_pylint.py
35
BLACKLIST
= ['/site-packages/*', '/contrib/*', '/frontend/afe/management.py']
232
for pattern in
BLACKLIST
)
/prebuilts/tools/common/m2/repository/org/bitbucket/b_c/jose4j/0.5.0/
jose4j-0.5.0.jar
/prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_core/2.1.2/
error_prone_core-2.1.2.jar
/prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_core/2.2.0/
error_prone_core-2.2.0.jar
/external/error_prone/error_prone/
error_prone_core-2.2.0-with-dependencies.jar
Completed in 158 milliseconds