HomeSort by relevance Sort by last modified time
    Searched refs:BLACKLIST (Results 1 - 14 of 14) sorted by null

  /external/tensorflow/tensorflow/tools/pip_package/
pip_smoke_test.py 43 # Hard-coded blacklist of files if not included in pip package
44 # TODO(amitpatankar): Clean up blacklist.
45 BLACKLIST = [
108 blacklisted_files = len(BLACKLIST)
118 # Check if the dependency is in the pip package, the blacklist, or
121 dependency in BLACKLIST):
138 Please either blacklist the dependencies in
  /tools/test/connectivity/acts/framework/tests/
acts_import_unit_test.py 50 BLACKLIST = [
82 if any(full_path.endswith(e) for e in BLACKLIST):
  /system/netd/server/
FirewallController.cpp 74 // If no rules are set, it's in BLACKLIST mode
75 mFirewallType = BLACKLIST;
165 if (mFirewallType == BLACKLIST) {
166 // Unsupported in BLACKLIST mode
203 return BLACKLIST;
209 return BLACKLIST;
221 } else { // BLACKLIST mode
313 // Blacklist chains have UIDs at the end, and new UIDs are added with '-A'.
321 // blacklist chain, because all user-defined chains implicitly RETURN at the end.
FirewallController.h 31 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
33 enum FirewallType { WHITELIST, BLACKLIST };
FirewallControllerTest.cpp 107 createChain("fw_blacklist", BLACKLIST);
248 EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST));
251 EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST));
TrafficControllerTest.cpp 167 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, BLACKLIST));
184 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST));
190 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST));
438 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, DENY, BLACKLIST)));
453 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW, BLACKLIST)));
457 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW, BLACKLIST)));
TrafficController.cpp 438 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) {
441 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) {
513 type = BLACKLIST;
CommandListener.cpp     [all...]
  /external/v8/tools/
generate-builtins-tests.py 15 BLACKLIST = [
120 if obj_name in BLACKLIST: continue
  /external/autotest/utils/
run_pylint.py 35 BLACKLIST = ['/site-packages/*', '/contrib/*', '/frontend/afe/management.py']
232 for pattern in BLACKLIST)
  /prebuilts/tools/common/m2/repository/org/bitbucket/b_c/jose4j/0.5.0/
jose4j-0.5.0.jar 
  /prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_core/2.1.2/
error_prone_core-2.1.2.jar 
  /prebuilts/tools/common/m2/repository/com/google/errorprone/error_prone_core/2.2.0/
error_prone_core-2.2.0.jar 
  /external/error_prone/error_prone/
error_prone_core-2.2.0-with-dependencies.jar 

Completed in 158 milliseconds