/system/connectivity/shill/ |
H A D | testing.h | 82 bool match = value.properties() == arg.properties(); local 83 if (!match) { 88 return match;
|
/system/core/fastboot/ |
H A D | usbtest.cpp | 129 ifc_match_func match; member in struct:__anon1519 193 usb = usb_open(tests[i].match);
|
H A D | engine.cpp | 173 static int match(const char* str, const char** value, unsigned count) { function 179 int match; local 183 match = !strncmp(val, str, len); 185 match = !strcmp(val, str); 188 if (match) return 1; 218 yes = match(resp, value, count);
|
/system/webservd/webservd/ |
H A D | log_manager_unittest.cc | 89 std::string match = base::StringPrintf( local 92 EXPECT_EQ(match, last_entry);
|
/system/bt/btif/src/ |
H A D | btif_gatt_util.c | 56 int match = 0; local 65 ++match; 72 if (match == 12) 74 if (match == 14)
|
/system/core/libcutils/ |
H A D | config_utils.c | 41 cnode *node, *match = NULL; local 46 match = node; 48 return match;
|
/system/keymaster/ |
H A D | keymaster_configuration.cpp | 53 uint32_t match_to_uint32(const char* expression, const regmatch_t& match) { argument 54 if (match.rm_so == -1) 57 size_t len = match.rm_eo - match.rm_so; 58 std::string s(expression + match.rm_so, len); 93 ALOGI("Platform version string does not match expected format. Using version 0."); 113 ALOGI("Platform patchlevel string does not match expected format. Using patchlevel 0");
|
/system/connectivity/shill/net/ |
H A D | nl80211_message.cc | 306 map<uint16_t, string>::const_iterator match; local 307 match = reason_code_string_->find(status); 308 if (match == reason_code_string_->end()) { 317 return match->second; 322 map<uint16_t, string>::const_iterator match; local 323 match = status_code_string_->find(status); 324 if (match == status_code_string_->end()) { 333 return match->second;
|
/system/core/liblog/tests/ |
H A D | benchmark_main.cpp | 85 // see if any of our benchmarks match. 92 int match = regexec(&re, b->Name(), 0, NULL, 0); local 94 if (match != REG_NOMATCH) {
|
/system/core/metricsd/ |
H A D | metrics_collector.h | 110 const char* match; // string to match in output of /proc/meminfo member in struct:MetricsCollector::MeminfoRecord
|
H A D | metrics_library.cc | 79 // 0..strlen(device_name)-1 -- this offset in device_name is next to match 82 bool match = false; local 83 while (!match) { 100 match = true; 115 *result = match;
|
/system/sepolicy/tools/ |
H A D | sepolicy-check.c | 70 int match; local 85 match = 1; 86 match &= check(s_op, source_type, cur->key.source_type); 87 match &= check(t_op, target_type, cur->key.target_type); 88 match &= check(c_op, target_class, cur->key.target_class); 89 match &= check_perm(cur, perm); 90 if (match) { 112 * - 0 indicates a successful return without a match 113 * - 1 indicates a successful return with a match 126 int match; local 240 int match = 1; local [all...] |
/system/extras/simpleperf/ |
H A D | dso.cpp | 245 bool match = (build_id == real_build_id); local 246 LOG(DEBUG) << "check kernel build id (" << (match ? "match" : "mismatch") << "): expected " 248 if (!match) {
|
/system/bt/stack/smp/ |
H A D | smp_act.c | 1779 SMP_TRACE_WARNING ("dhkey chcks do no match"); 1785 SMP_TRACE_EVENT ("dhkey chcks match"); 2037 BOOLEAN match = FALSE; local 2041 match = TRUE; 2049 match = TRUE; 2053 if (match && smp_cb.state == SMP_STATE_ENCRYPTION_PENDING)
|
/system/core/adf/libadf/ |
H A D | adf.c | 261 bool (*filter)(struct adf_interface_data *data, __u32 match), 262 __u32 match) 282 if (!filter(&data, match)) 259 adf_interfaces_filter(struct adf_device *dev, adf_id_t *in, size_t n_in, adf_id_t **out, bool (*filter)(struct adf_interface_data *data, __u32 match), __u32 match) argument
|
/system/core/fs_mgr/ |
H A D | fs_mgr_verity.cpp | 617 static int compare_last_signature(struct fstab_rec *fstab, int *match) argument 628 *match = 1; 671 *match = !memcmp(curr, prev, SHA256_DIGEST_SIZE); 673 if (!*match) { 707 int match = 0; local 734 if (!compare_last_signature(fstab, &match) && !match) {
|
/system/security/keystore/ |
H A D | keystore.cpp | 89 * that Base64 cannot be used here due to the need of prefix match on keys. */ 260 ALOGW("key found but type doesn't match: %d vs %d", keyBlob->getType(), type); 376 char* match = (char*)malloc(extra + 1); local 377 if (match != NULL) { 378 decode_key(match, p, plen); 379 matches->push(android::String16(match, extra)); 380 free(match); 382 ALOGW("could not allocate match of size %zd", extra);
|
/system/core/init/ |
H A D | devices.cpp | 201 bool match = false; local 207 match = true; 213 match = true; 220 if (match) {
|
/system/core/logcat/ |
H A D | logcat.cpp | 194 bool match = regexOk(entry); local 196 g_printCount += match; 197 if (match || g_printItAnyways) { 482 // If we are using realtime, check all files that match the
|
/system/bt/stack/btm/ |
H A D | btm_ble.c | 1337 ** Description Check BLE link security level match. 1781 BOOLEAN match = FALSE; local 1799 match = TRUE; 1814 LOG_INFO(LOG_TAG, "%s unable to match and resolve random address", __func__); 1817 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match); 1916 BOOLEAN match = FALSE; local 1929 match = btm_identity_addr_to_random_pseudo (bda, &bda_type, TRUE); 1939 if (!match && BTM_BLE_IS_RESOLVE_BDA(bda)) 1951 btm_ble_connected(bda, handle, HCI_ENCRYPT_MODE_DISABLED, role, bda_type, match);
|
H A D | btm_ble_gap.c | 755 BTM_TRACE_DEBUG("Random match"); 2328 ** Description check ADV flag to make sure device is discoverable and match 2353 /* does not match filter condition */ 2723 BOOLEAN match = FALSE; local 2742 match = btm_identity_addr_to_random_pseudo(bda, &addr_type, FALSE); 2747 if (!match && BTM_BLE_IS_RESOLVE_BDA(bda))
|
/system/core/libpixelflinger/include/private/pixelflinger/ |
H A D | ggl_context.h | 239 inline int match(const needs_filter_t& filter); 263 int needs_t::match(const needs_filter_t& filter) { function in class:android::needs_t
|