/frameworks/base/config/ |
H A D | generate-preloaded-classes.sh | 17 echo "Usage $0 <input classes file> <blacklist file> [extra classes files]" 34 blacklist=$2 39 LC_ALL=C sort "$input" "${extra_classes_files[@]}" | uniq | grep -f "$blacklist" -v -F -x
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | CertBlacklisterTest.java | 53 // read the contents of the pubkey blacklist 54 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); 56 assertEquals("", blacklist); 60 // build a new thing to blacklist 65 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); 67 assertEquals(badPubkey, blacklist); 75 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); 76 assertEquals(badPubkey, blacklist); 82 String blacklist = IoUtils.readFileAsString(PUBKEY_PATH); 83 assertEquals(badPubkey, blacklist); [all...] |
/frameworks/base/tools/preload2/src/com/android/preload/actions/ |
H A D | ComputeThresholdXAction.java | 25 String blacklist) { 26 super(name, dataTableModel, 1, blacklist); 24 ComputeThresholdXAction(String name, DumpTableModel dataTableModel, String blacklist) argument
|
H A D | ComputeThresholdAction.java | 38 * appears in at least the number of threshold given packages. An optional blacklist can be 43 private Pattern blacklist; field in class:ComputeThresholdAction 47 * Create an action with the given parameters. The blacklist is a regular expression 51 String blacklist) { 55 if (blacklist != null) { 56 this.blacklist = Pattern.compile(blacklist); 88 Set<String> result = fromThreshold(uses, blacklist, threshold); 101 private Set<String> fromThreshold(Map<String, Set<String>> classUses, Pattern blacklist, argument 107 if (blacklist 50 ComputeThresholdAction(String name, DumpTableModel dataTableModel, int threshold, String blacklist) argument [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
H A D | WifiConnectivityHelperTest.java | 199 * Verify that correct size BSSID blacklist and SSID whitelist are accepted. 204 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); 206 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 208 blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE - 2); 210 assertTrue(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, whitelist)); 214 * Verify that null BSSID blacklist or SSID whitelist is rejected. 219 ArrayList<String> blacklist = buildBssidBlacklist(MAX_BSSID_BLACKLIST_SIZE); 222 assertFalse(mWifiConnectivityHelper.setFirmwareRoamingConfiguration(blacklist, null)); 226 * Verify that incorrect size BSSID blacklist is rejected. 231 ArrayList<String> blacklist [all...] |
H A D | WifiNetworkSelectorTest.java | 212 HashSet<String> blacklist = new HashSet<String>(); 214 blacklist, mWifiInfo, false, true, false); 242 HashSet<String> blacklist = new HashSet<String>(); 244 blacklist, mWifiInfo, false, true, false); 273 HashSet<String> blacklist = new HashSet<String>(); 275 blacklist, mWifiInfo, false, true, false); 282 blacklist, mWifiInfo, true, false, false); 313 HashSet<String> blacklist = new HashSet<String>(); 315 blacklist, mWifiInfo, false, true, false); 323 blacklist, mWifiInf [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | CertBlacklister.java | 80 String blacklist = getValue(); 81 if (blacklist != null) { 82 Slog.i(TAG, "Certificate blacklist changed, updating..."); 91 out.write(blacklist.getBytes()); 96 Slog.i(TAG, "Certificate blacklist updated"); 98 Slog.e(TAG, "Failed to write blacklist", e); 128 // set up the public key blacklist observer 135 // set up the serial number blacklist observer
|
H A D | NetworkManagementService.java | 657 if (DBG) Slog.d(TAG, "Pushing " + size + " UIDs to metered blacklist rules"); 1701 private void setUidOnMeteredNetworkList(int uid, boolean blacklist, boolean enable) { argument 1708 final String chain = blacklist ? "naughtyapps" : "niceapps"; 1715 quotaList = blacklist ? mUidRejectOnMetered : mUidAllowOnMetered; 2030 mConnector.execute("firewall", "enable", enabled ? "whitelist" : "blacklist"); 2157 // whitelist and blacklist chains allow RSTs through. 2423 dumpUidRuleOnQuotaLocked(pw, "blacklist", mUidRejectOnMetered); 2788 void setUidOnMeteredNetworkList(boolean blacklist, int uid, boolean enable) { argument 2790 if (blacklist) {
|
/frameworks/rs/tests/lldb/ |
H A D | config.py | 85 def blacklist(self): member in class:Config 86 '''Provide a test blacklist for skipping specific tests. 88 To specify the blacklist from the command line the following can be 89 used: --blacklist test1.py test2.py ...'''
|
H A D | run_tests.py | 176 # save the test blacklist 177 self.blacklist = _choice(args.blacklist, config.blacklist) 725 and not item in state.blacklist):
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/tuner/ |
H A D | StatusBarSwitch.java | 66 // If not enabled add to blacklist. 82 private void setList(Set<String> blacklist) { argument 85 TextUtils.join(",", blacklist), ActivityManager.getCurrentUser());
|
/frameworks/base/services/core/java/com/android/server/policy/ |
H A D | PolicyControl.java | 190 private Filter(ArraySet<String> whitelist, ArraySet<String> blacklist) { argument 192 mBlacklist = blacklist; 220 dump("blacklist", mBlacklist, pw); pw.print(']'); 245 ArraySet<String> blacklist = new ArraySet<String>(); 250 blacklist.add(token); 255 return new Filter(whitelist, blacklist);
|
/frameworks/wilhelm/src/android/ |
H A D | AudioRecorder_to_android.cpp | 517 // Check a blacklist of interfaces that are incompatible with fast tracks. 521 // In release builds, we only use the blacklist method. 525 static const unsigned blacklist[] = { local 530 // FIXME The problem with a blacklist is remembering to add new interfaces here 533 for (unsigned i = 0; i < sizeof(blacklist)/sizeof(blacklist[0]); ++i) { 534 if (IsInterfaceInitialized(&ar->mObject, blacklist[i])) { 541 if (blacklist[i] != MPH_ANDROIDEFFECT) { 542 switch (blacklist[i]) {
|
H A D | AudioPlayer_to_android.cpp | 1515 // Check a blacklist of interfaces that are incompatible with fast tracks. 1519 // In release builds, we only use the blacklist method. 1523 static const unsigned blacklist[] = { local 1533 // FIXME The problem with a blacklist is remembering to add new interfaces here 1535 for (unsigned i = 0; i < sizeof(blacklist)/sizeof(blacklist[0]); ++i) { 1536 if (IsInterfaceInitialized(&pAudioPlayer->mObject, blacklist[i])) {
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/phone/ |
H A D | StatusBarIconController.java | 55 String[] blacklist = blackListStr.split(","); 56 for (String slot : blacklist) {
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | GeofenceManager.java | 119 public GeofenceManager(Context context, LocationBlacklist blacklist) { argument 126 mBlacklist = blacklist;
|
/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | SettingsBackupTest.java | 538 Set<String> settings, Set<String> settingsToBackup, Set<String> blacklist) { 540 Set<String> settingsNotBackedUpOrBlacklisted = difference(settingsNotBackedUp, blacklist); 548 intersect(settingsToBackup, blacklist), 537 checkSettingsBackedUpOrBlacklisted( Set<String> settings, Set<String> settingsToBackup, Set<String> blacklist) argument
|