Searched refs:match (Results 1 - 25 of 25) sorted by relevance

/system/media/camera/docs/
H A Dmetadata_helpers.py447 match = re.search(r'<.*>', local_typedef)
448 return bool(match)
523 if re.match("\d", what):
558 return bool(re.match('0x[a-f0-9]+$', instr, re.IGNORECASE))
899 def filter_sub(match):
900 whole_match = match.group(0)
901 section1 = match.group(1)
902 section2 = match.group(2)
903 section3 = match.group(3)
904 end_slash = match
[all...]
H A Dmetadata_model.py66 Find all descendants that match the predicate.
117 Find all ancestors that match the predicate.
149 def _children_name_map_matching(self, match=lambda x: True):
152 if match(i):
179 print >> sys.stderr, ("ERROR: Node '%s' doesn't match the parent" + \
/system/core/toolbox/
H A Dmount.c269 int match; local
278 match = fscanf(f, "%255s %255s %255s %255s %d %d\n",
285 if (match == 6 &&
293 } while (match != EOF);
H A Dgenerate-input.h-labels.py41 m = r.match(line)
/system/core/fastboot/
H A Dengine.c201 static int match(char *str, const char **value, unsigned count) function
208 int match; local
212 match = !strncmp(val, str, len);
214 match = !strcmp(val, str);
217 if (match) return 1;
247 yes = match(resp, value, count);
H A Dusbtest.c129 ifc_match_func match; member in struct:__anon1315
193 usb = usb_open(tests[i].match);
/system/bt/btif/src/
H A Dbtif_gatt_util.c55 int match = 0; local
64 ++match;
71 if (match == 12)
73 if (match == 14)
/system/core/libcutils/
H A Dconfig_utils.c41 cnode *node, *match = NULL; local
46 match = node;
48 return match;
/system/core/liblog/tests/
H A Dbenchmark_main.cpp85 // see if any of our benchmarks match.
92 int match = regexec(&re, b->Name(), 0, NULL, 0); local
94 if (match != REG_NOMATCH) {
/system/core/fs_mgr/
H A Dfs_mgr_verity.c679 static int compare_last_signature(struct fstab_rec *fstab, int *match) argument
690 *match = 1;
730 *match = !memcmp(curr, prev, SHA256_DIGEST_SIZE);
732 if (!*match) {
771 int match = 0; local
802 if (!compare_last_signature(fstab, &match) && !match) {
/system/extras/tests/sdcard/
H A Dplot_sdcard.py58 self.summary = re.match('([a-z_]+)_total', self.name)
146 if re.match('[a-z_]', line):
/system/core/init/
H A Dinit_parser.cpp569 bool match; local
574 match = !name;
579 if (!match) {
585 match = true;
599 /* does the property exist, and match the trigger value? */
609 match = false;
612 if (match) {
H A Ddevices.cpp200 bool match = false; local
206 match = true;
212 match = true;
219 if (match) {
/system/core/adf/libadf/
H A Dadf.c262 bool (*filter)(struct adf_interface_data *data, __u32 match),
263 __u32 match)
283 if (!filter(&data, match))
260 adf_interfaces_filter(struct adf_device *dev, adf_id_t *in, size_t n_in, adf_id_t **out, bool (*filter)(struct adf_interface_data *data, __u32 match), __u32 match) argument
/system/core/libpixelflinger/include/private/pixelflinger/
H A Dggl_context.h239 inline int match(const needs_filter_t& filter);
263 int needs_t::match(const needs_filter_t& filter) { function in class:android::needs_t
/system/vold/bench/
H A Dbenchgen.py116 line = re_event.match(line)
/system/bt/stack/btm/
H A Dbtm_ble.c1196 ** Description Check BLE link security level match.
1695 BOOLEAN match = FALSE; local
1713 match = TRUE;
1728 LOG_INFO("%s unable to match and resolve random address", __func__);
1731 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match);
1829 BOOLEAN match = FALSE; local
1842 match = btm_identity_addr_to_random_pseudo (bda, &bda_type, TRUE);
1852 if (!match && role == HCI_ROLE_SLAVE && BTM_BLE_IS_RESOLVE_BDA(bda))
1864 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match);
H A Dbtm_ble_gap.c743 BTM_TRACE_DEBUG("Random match");
2307 ** Description check ADV flag to make sure device is discoverable and match
2332 /* does not match filter condition */
2702 BOOLEAN match = FALSE; local
2721 match = btm_identity_addr_to_random_pseudo(bda, &addr_type, FALSE);
2726 if (!match && BTM_BLE_IS_RESOLVE_BDA(bda))
/system/bt/stack/smp/
H A Dsmp_act.c1713 SMP_TRACE_WARNING ("dhkey chcks do no match");
1719 SMP_TRACE_EVENT ("dhkey chcks match");
1971 BOOLEAN match = FALSE; local
1975 match = TRUE;
1983 match = TRUE;
1987 if (match && smp_cb.state == SMP_STATE_ENCRYPTION_PENDING)
/system/core/adb/tests/
H A Dtest_adb.py240 if re.match(r"[\d+\.]*\d", item):
/system/extras/tests/net_test/
H A Dmultinetwork_base.py475 if re.match(e.message, os.strerror(errno.EAGAIN)):
582 # we'd output a diff to the packet that's the best match for what we
H A Dping6_test.py289 _, _, uid, _, _, refcnt, _, drops) = regexp.match(line).groups()
/system/security/keystore/
H A Dkeystore.cpp340 * that Base64 cannot be used here due to the need of prefix match on keys. */
1207 ALOGW("key found but type doesn't match: %d vs %d", keyBlob->getType(), type);
1284 char *match = (char*) malloc(extra + 1); local
1285 if (match != NULL) {
1286 decode_key(match, p, plen);
1287 matches->push(android::String16(match, extra));
1288 free(match);
1290 ALOGW("could not allocate match of size %zd", extra);
/system/bt/stack/include/
H A Dbtm_ble_api.h607 #define BTM_BLE_PF_STR_LEN_MAX 29 /* match for first 29 bytes */
723 set to all 0xff, match exact data */
732 set to all 0xff, match exact data */
872 typedef void (tBTM_BLE_VERIFY_CBACK)(void *p_ref_data, BOOLEAN match);
/system/core/libpixelflinger/
H A Dscanline.cpp345 if (c->state.needs.match(noblend1to1)) {
346 // this will match regardless of dithering state, since both
365 if (c->state.needs.match(fill16noblend)) {
376 if (c->state.needs.match(shortcuts[i].filter)) {

Completed in 1263 milliseconds