/system/media/camera/docs/ |
H A D | metadata_helpers.py | 447 match = re.search(r'<.*>', local_typedef) 448 return bool(match) 523 if re.match("\d", what): 558 return bool(re.match('0x[a-f0-9]+$', instr, re.IGNORECASE)) 899 def filter_sub(match): 900 whole_match = match.group(0) 901 section1 = match.group(1) 902 section2 = match.group(2) 903 section3 = match.group(3) 904 end_slash = match [all...] |
H A D | metadata_model.py | 66 Find all descendants that match the predicate. 117 Find all ancestors that match the predicate. 149 def _children_name_map_matching(self, match=lambda x: True): 152 if match(i): 179 print >> sys.stderr, ("ERROR: Node '%s' doesn't match the parent" + \
|
/system/core/toolbox/ |
H A D | mount.c | 269 int match; local 278 match = fscanf(f, "%255s %255s %255s %255s %d %d\n", 285 if (match == 6 && 293 } while (match != EOF);
|
H A D | generate-input.h-labels.py | 41 m = r.match(line)
|
/system/core/fastboot/ |
H A D | engine.c | 201 static int match(char *str, const char **value, unsigned count) function 208 int match; local 212 match = !strncmp(val, str, len); 214 match = !strcmp(val, str); 217 if (match) return 1; 247 yes = match(resp, value, count);
|
H A D | usbtest.c | 129 ifc_match_func match; member in struct:__anon1315 193 usb = usb_open(tests[i].match);
|
/system/bt/btif/src/ |
H A D | btif_gatt_util.c | 55 int match = 0; local 64 ++match; 71 if (match == 12) 73 if (match == 14)
|
/system/core/libcutils/ |
H A D | config_utils.c | 41 cnode *node, *match = NULL; local 46 match = node; 48 return match;
|
/system/core/liblog/tests/ |
H A D | benchmark_main.cpp | 85 // see if any of our benchmarks match. 92 int match = regexec(&re, b->Name(), 0, NULL, 0); local 94 if (match != REG_NOMATCH) {
|
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.c | 679 static int compare_last_signature(struct fstab_rec *fstab, int *match) argument 690 *match = 1; 730 *match = !memcmp(curr, prev, SHA256_DIGEST_SIZE); 732 if (!*match) { 771 int match = 0; local 802 if (!compare_last_signature(fstab, &match) && !match) {
|
/system/extras/tests/sdcard/ |
H A D | plot_sdcard.py | 58 self.summary = re.match('([a-z_]+)_total', self.name) 146 if re.match('[a-z_]', line):
|
/system/core/init/ |
H A D | init_parser.cpp | 569 bool match; local 574 match = !name; 579 if (!match) { 585 match = true; 599 /* does the property exist, and match the trigger value? */ 609 match = false; 612 if (match) {
|
H A D | devices.cpp | 200 bool match = false; local 206 match = true; 212 match = true; 219 if (match) {
|
/system/core/adf/libadf/ |
H A D | adf.c | 262 bool (*filter)(struct adf_interface_data *data, __u32 match), 263 __u32 match) 283 if (!filter(&data, match)) 260 adf_interfaces_filter(struct adf_device *dev, adf_id_t *in, size_t n_in, adf_id_t **out, bool (*filter)(struct adf_interface_data *data, __u32 match), __u32 match) argument
|
/system/core/libpixelflinger/include/private/pixelflinger/ |
H A D | ggl_context.h | 239 inline int match(const needs_filter_t& filter); 263 int needs_t::match(const needs_filter_t& filter) { function in class:android::needs_t
|
/system/vold/bench/ |
H A D | benchgen.py | 116 line = re_event.match(line)
|
/system/bt/stack/btm/ |
H A D | btm_ble.c | 1196 ** Description Check BLE link security level match. 1695 BOOLEAN match = FALSE; local 1713 match = TRUE; 1728 LOG_INFO("%s unable to match and resolve random address", __func__); 1731 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match); 1829 BOOLEAN match = FALSE; local 1842 match = btm_identity_addr_to_random_pseudo (bda, &bda_type, TRUE); 1852 if (!match && role == HCI_ROLE_SLAVE && BTM_BLE_IS_RESOLVE_BDA(bda)) 1864 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match);
|
H A D | btm_ble_gap.c | 743 BTM_TRACE_DEBUG("Random match"); 2307 ** Description check ADV flag to make sure device is discoverable and match 2332 /* does not match filter condition */ 2702 BOOLEAN match = FALSE; local 2721 match = btm_identity_addr_to_random_pseudo(bda, &addr_type, FALSE); 2726 if (!match && BTM_BLE_IS_RESOLVE_BDA(bda))
|
/system/bt/stack/smp/ |
H A D | smp_act.c | 1713 SMP_TRACE_WARNING ("dhkey chcks do no match"); 1719 SMP_TRACE_EVENT ("dhkey chcks match"); 1971 BOOLEAN match = FALSE; local 1975 match = TRUE; 1983 match = TRUE; 1987 if (match && smp_cb.state == SMP_STATE_ENCRYPTION_PENDING)
|
/system/core/adb/tests/ |
H A D | test_adb.py | 240 if re.match(r"[\d+\.]*\d", item):
|
/system/extras/tests/net_test/ |
H A D | multinetwork_base.py | 475 if re.match(e.message, os.strerror(errno.EAGAIN)): 582 # we'd output a diff to the packet that's the best match for what we
|
H A D | ping6_test.py | 289 _, _, uid, _, _, refcnt, _, drops) = regexp.match(line).groups()
|
/system/security/keystore/ |
H A D | keystore.cpp | 340 * that Base64 cannot be used here due to the need of prefix match on keys. */ 1207 ALOGW("key found but type doesn't match: %d vs %d", keyBlob->getType(), type); 1284 char *match = (char*) malloc(extra + 1); local 1285 if (match != NULL) { 1286 decode_key(match, p, plen); 1287 matches->push(android::String16(match, extra)); 1288 free(match); 1290 ALOGW("could not allocate match of size %zd", extra);
|
/system/bt/stack/include/ |
H A D | btm_ble_api.h | 607 #define BTM_BLE_PF_STR_LEN_MAX 29 /* match for first 29 bytes */ 723 set to all 0xff, match exact data */ 732 set to all 0xff, match exact data */ 872 typedef void (tBTM_BLE_VERIFY_CBACK)(void *p_ref_data, BOOLEAN match);
|
/system/core/libpixelflinger/ |
H A D | scanline.cpp | 345 if (c->state.needs.match(noblend1to1)) { 346 // this will match regardless of dithering state, since both 365 if (c->state.needs.match(fill16noblend)) { 376 if (c->state.needs.match(shortcuts[i].filter)) {
|