Initial pass at denylist filtering.
As part of an upcoming feature, we're anticipating the need to match arbitrary byte sequences, such as Bluetooth UUIDs or MAC addresses, and this change begins staging a "denylist" that can be updated via DeviceConfig. This change is a no-op due to being guarded by a feature flag; future changes will add nuance that inspects the actual state of the destination app to decide if filtering should be applied. Bug: 181812624 Test: atest BluetoothTests:android.bluetooth.le Test: atest FrameworksCoreTests:android.os.BytesMatcherTest Change-Id: I4b60892775c7333086d42a7db28acb8ec09da245
Loading
Please register or sign in to comment