/external/kmod/testsuite/rootfs-pristine/test-blacklist/etc/modprobe.d/ |
H A D | modprobe.conf | 0 blacklist floppy 2 blacklist pcspkr
|
/external/skia/infra/bots/recipe_modules/sktest/ |
H A D | api.py | 132 def blacklist(quad): function in function:dm_flags 138 blacklist('f16 _ _ dstreadshuffle') 139 blacklist('glsrgb image _ _') 140 blacklist('glessrgb image _ _') 146 blacklist('8888 image _ _') 149 blacklist('gbr-8888 image _ _') 150 blacklist('gbr-8888 colorImage _ _') 154 blacklist('pdf gm _ fontmgr_iter') 155 blacklist('pdf _ _ PANO_20121023_214540.jpg') 156 blacklist('pd [all...] |
/external/chromium-trace/catapult/devil/devil/android/ |
H A D | device_blacklist.py | 21 """Reads the blacklist from the blacklist file. 27 blacklist = dict() 29 return blacklist 33 blacklist = json.load(f) 35 logger.warning('Unable to read blacklist: %s', str(e)) 38 if not isinstance(blacklist, dict): 40 self._path, blacklist) 41 blacklist = dict() 43 return blacklist [all...] |
/external/libmojo/third_party/catapult/devil/devil/android/ |
H A D | device_blacklist.py | 19 """Reads the blacklist from the blacklist file. 29 blacklist = json.load(f) 30 if not isinstance(blacklist, dict): 32 self._path, blacklist) 33 blacklist = dict() 34 return blacklist 36 def Write(self, blacklist): 37 """Writes the provided blacklist to the blacklist fil [all...] |
/external/chromium-trace/catapult/telemetry/telemetry/internal/platform/ |
H A D | android_device.py | 36 def GetAllConnectedDevices(cls, blacklist): 37 device_serials = GetDeviceSerials(blacklist) 49 def _ListSerialsOfHealthyOnlineDevices(blacklist): 51 for d in device_utils.DeviceUtils.HealthyDevices(blacklist)] 54 def GetDeviceSerials(blacklist): 61 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 83 py_utils.WaitFor(_ListSerialsOfHealthyOnlineDevices(blacklist), 600) 84 device_serials = _ListSerialsOfHealthyOnlineDevices(blacklist) 107 blacklist = device_blacklist.Blacklist( 110 blacklist [all...] |
H A D | desktop_device.py | 14 def GetAllConnectedDevices(cls, blacklist):
|
H A D | device.py | 31 def GetAllConnectedDevices(cls, blacklist):
|
/external/skia/infra/bots/ |
H A D | zip_utils.py | 17 def filtered(names, blacklist): 20 for pattern in blacklist: 25 def zip(target_dir, zip_file, blacklist=None): # pylint: disable=W0622 29 blacklist = blacklist or [] 32 d[:] = filtered(d, blacklist) 33 for filename in filtered(f, blacklist):
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | blacklist.c | 2 * wpa_supplicant - Temporary BSSID blacklist 13 #include "blacklist.h" 16 * wpa_blacklist_get - Get the blacklist entry for a BSSID 19 * Returns: Matching blacklist entry for the BSSID or %NULL if not found 29 e = wpa_s->blacklist; 41 * wpa_blacklist_add - Add an BSSID to the blacklist 43 * @bssid: BSSID to be added to the blacklist 44 * Returns: Current blacklist count on success, -1 on failure 46 * This function adds the specified BSSID to the blacklist or increases the 47 * blacklist coun [all...] |
/external/chromium-trace/catapult/devil/devil/android/tools/ |
H A D | device_recovery.py | 57 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 59 blacklist): 88 if blacklist: 89 blacklist.Extend([device.adb.GetDeviceSerial()], 93 if blacklist: 94 blacklist.Extend([device.adb.GetDeviceSerial()], 102 if blacklist: 103 blacklist.Extend([device.adb.GetDeviceSerial()], 107 if blacklist: 108 blacklist [all...] |
H A D | device_status.py | 35 def IsBlacklisted(serial, blacklist): 36 return blacklist and serial in blacklist.Read() 39 def _BatteryStatus(device, blacklist): 51 if blacklist: 52 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 75 def DeviceStatus(devices, blacklist): 80 blacklist: The current device blacklist. 121 if not IsBlacklisted(serial, blacklist) [all...] |
H A D | flash_device.py | 33 parser.add_argument('--blacklist-file', help='Device blacklist file.') 38 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read() 39 if blacklist: 40 logger.critical('Device(s) in blacklist, not flashing devices:') 41 for key in blacklist:
|
/external/libmojo/third_party/catapult/devil/devil/android/tools/ |
H A D | device_recovery.py | 54 def RecoverDevice(device, blacklist, should_reboot=lambda device: True): 56 blacklist): 80 if blacklist: 81 blacklist.Extend([device.adb.GetDeviceSerial()], 85 if blacklist: 86 blacklist.Extend([device.adb.GetDeviceSerial()], 93 if blacklist: 94 blacklist.Extend([device.adb.GetDeviceSerial()], 98 if blacklist: 99 blacklist [all...] |
H A D | script_common.py | 11 blacklist = (device_blacklist.Blacklist(blacklist_file) 15 devices = device_utils.DeviceUtils.HealthyDevices(blacklist)
|
H A D | device_status.py | 33 def IsBlacklisted(serial, blacklist): 34 return blacklist and serial in blacklist.Read() 37 def _BatteryStatus(device, blacklist): 49 if blacklist: 50 blacklist.Extend([device.adb.GetDeviceSerial()], reason='low_battery') 73 def DeviceStatus(devices, blacklist): 78 blacklist: The current device blacklist. 119 if not IsBlacklisted(serial, blacklist) [all...] |
H A D | flash_device.py | 31 parser.add_argument('--blacklist-file', help='Device blacklist file.') 36 blacklist = device_blacklist.Blacklist(args.blacklist_file).Read() 37 if blacklist: 38 logging.critical('Device(s) in blacklist, not flashing devices:') 39 for key in blacklist:
|
/external/libcxx/utils/ |
H A D | sym_match.py | 23 '--blacklist', dest='blacklist', 33 if not args.regexes and args.blacklist is None: 34 sys.stderr.write('Either a regex or a blacklist must be specified.\n') 36 if args.blacklist: 37 search_list = util.read_blacklist(args.blacklist)
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
H A D | security_OpenSSLBlacklist.py | 17 def verify(self, blacklist='/dev/null'): 19 (blacklist, VERIFY, self.ca, self.cert)) 22 def fetch(self, blacklist='/dev/null'): 24 'https://127.0.0.1:4433/' % (blacklist, self.ca)) 44 raise error.TestFail('Certificate does not verify with nonempty blacklist.') 54 error.TestFail('Fetch without blacklist fails.'))
|
/external/skia/gn/ |
H A D | find_headers.py | 12 # then write them to skia.h with a small blacklist. 20 blacklist = { variable 33 if f.endswith('.h') and f not in blacklist:
|
/external/autotest/client/site_tests/video_VideoEncodeAccelerator/ |
H A D | video_VideoEncodeAccelerator.py | 50 blacklist = { 59 if board in blacklist: 60 return ' --gtest_filter=-' + ':'.join(blacklist[board])
|
/external/autotest/server/cros/dynamic_suite/ |
H A D | frontend_wrappers.py | 72 # blacklist: Exceptions that we raise immediately if caught. 74 blacklist = (ImportError, error.RPCException, proxy.JSONRPCException, 92 is_blacklisted = isinstance(exc, blacklist) 100 blacklist=[ImportError, error.RPCException, 135 blacklist=[ImportError, error.RPCException,
|
/external/autotest/client/site_tests/video_ChromeRTCHWDecodeUsed/ |
H A D | video_ChromeRTCHWDecodeUsed.py | 29 blacklist = [ 40 for black_entry in blacklist:
|
/external/autotest/client/site_tests/video_VideoSanity/ |
H A D | video_VideoSanity.py | 31 blacklist = [ 41 for (blacklist_board, blacklist_arc_mode) in blacklist:
|
/external/autotest/tko/ |
H A D | status_lib.py | 24 def clean_raw_line(raw_line, blacklist=DEFAULT_BLACKLIST): 26 return re.sub('|'.join(blacklist), '', raw_line)
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
H A D | CheckHandshake.java | 31 Set<String> blacklist = Collections.singleton("sha1/DmxUShsZuNiqPQsX2Oi9uv2sCnw="); 36 if (blacklist.contains(pin)) {
|