/system/keymaster/android_keymaster/ |
D | keymaster_configuration.cpp | 82 regmatch_t matches[kPatchlevelMatchCount]; in GetPatchlevel() local 83 int not_match = regexec(®ex, patchlevel_str, kPatchlevelMatchCount, matches, 0 /* flags */); in GetPatchlevel() 90 uint32_t year = match_to_uint32(patchlevel_str, matches[kYearMatch]); in GetPatchlevel() 91 uint32_t month = match_to_uint32(patchlevel_str, matches[kMonthMatch]); in GetPatchlevel() 100 uint32_t day = match_to_uint32(patchlevel_str, matches[kDayMatch]); in GetPatchlevel() 134 regmatch_t matches[kPlatformVersionMatchCount]; in GetOsVersion() local 136 regexec(®ex, version_str, kPlatformVersionMatchCount, matches, 0 /* flags */); in GetOsVersion() 144 uint32_t major = match_to_uint32(version_str, matches[kMajorVersionMatch]); in GetOsVersion() 145 uint32_t minor = match_to_uint32(version_str, matches[kMinorVersionMatch]); in GetOsVersion() 146 uint32_t subminor = match_to_uint32(version_str, matches[kSubminorVersionMatch]); in GetOsVersion()
|
/system/tools/hidl/build/ |
D | fqName.go | 37 matches := re_package.FindAllStringSubmatch(f, 3) 39 if matches == nil { 44 packageComponents: strings.Split(matches[0][1], "."), 45 major: matches[0][2], 46 minor: matches[0][3],
|
/system/tools/hidl/host_utils/ |
D | StringHelper.cpp | 113 std::vector<std::string> matches; in Tokenize() local 116 if (std::regex_search(copy, match, kStartLowercase)) matches.push_back(match.str(0)); in Tokenize() 117 if (std::regex_search(copy, match, kStartCapcase)) matches.push_back(match.str(0)); in Tokenize() 118 if (std::regex_search(copy, match, kStartUppercase)) matches.push_back(match.str(0)); in Tokenize() 119 if (std::regex_search(copy, match, kStartNumcase)) matches.push_back(match.str(0)); in Tokenize() 121 if (!matches.empty()) { in Tokenize() 122 std::string& maxmatch = matches[0]; in Tokenize() 123 for (std::string& match : matches) in Tokenize() 127 matches.clear(); in Tokenize()
|
/system/security/keystore2/src/km_compat/ |
D | lib.rs | 396 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 403 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 407 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 414 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 421 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 425 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 432 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 436 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 443 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() 447 assert!(sec_level_enforced.iter().any(|kp| matches!( in test_get_key_characteristics() [all …]
|
/system/core/init/ |
D | service_list.h | 61 std::vector<Service*> matches; in FindServicesByApexName() local 64 matches.emplace_back(svc.get()); in FindServicesByApexName() 67 return matches; in FindServicesByApexName()
|
/system/hardware/interfaces/net/netd/testutils/ |
D | VtsHalNetNetdTestUtils.cpp | 75 int matches = 0; in countMatchingIpRules() local 81 matches++; in countMatchingIpRules() 86 return matches; in countMatchingIpRules()
|
/system/security/keystore2/src/database/ |
D | perboot.rs | 101 let mut matches: Vec<_> = reader.iter().filter(|x| p(&x.0)).collect(); in find_auth_token_entry() localVariable 102 matches.sort_by_key(|x| x.0.time_received); in find_auth_token_entry() 103 matches.last().map(|x| x.0.clone()) in find_auth_token_entry()
|
/system/netd/server/ |
D | Controllers.cpp | 140 std::smatch matches; in findExistingChildChains() local 144 if (std::regex_search(rule, matches, CHILD_CHAIN_REGEX) && matches[1] == parentChain) { in findExistingChildChains() 145 existing.insert(matches[2]); in findExistingChildChains()
|
D | TetherController.cpp | 859 std::smatch matches; in addForwardChainStats() local 860 if (!std::regex_search(line, matches, IP_RE)) return -EREMOTEIO; in addForwardChainStats() 867 int64_t packets = strtoul(matches[PACKET_COUNTS].str().c_str(), nullptr, 10); in addForwardChainStats() 868 int64_t bytes = strtoul(matches[BYTE_COUNTS].str().c_str(), nullptr, 10); in addForwardChainStats() 869 std::string iface0 = matches[IFACE0_NAME].str(); in addForwardChainStats() 870 std::string iface1 = matches[IFACE1_NAME].str(); in addForwardChainStats() 871 std::string rest = matches[SOURCE].str(); in addForwardChainStats()
|
/system/chre/apps/nearby/location/lbs/contexthub/nanoapps/nearby/proto/ |
D | ble_filter.proto | 17 // The nanoapp keeps watching BLE events and notifies host once an event matches 26 // host when the event matches a Filter. The Field's id will be sent back to 29 // It is possible for the nanoapp to return multiple ids when an event matches 100 // FilterResult is returned to host when a BLE event matches a Filter.
|
/system/libvintf/include/vintf/ |
D | Regex.h | 40 bool matches(const std::string& s) const;
|
/system/libvintf/ |
D | Regex.cpp | 41 bool Regex::matches(const std::string& s) const { in matches() function in android::vintf::details::Regex
|
D | MatrixInstance.cpp | 87 return regex.matches(e); in matchInstance()
|
/system/apex/tests/src/com/android/tests/apex/ |
D | MediaSwCodecHostTest.java | 60 if (m.matches()) { in checkCodecs()
|
D | MediaHostTest.java | 71 if (m.matches()) { in checkMediaExtractor()
|
/system/keymint/ta/src/ |
D | tests.rs | 208 assert!(matches!(result, Err(Error::Hal(ErrorCode::InvalidArgument, _)))); in test_split_rsp_invalid_input() 212 assert!(matches!(result, Err(Error::Hal(ErrorCode::InvalidArgument, _)))); in test_split_rsp_invalid_input()
|
D | keys.rs | 426 matches!( in finish_keyblob_creation() 614 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key() 620 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key() 626 .retain(|key_param| !matches!(key_param, KeyParam::UserSecureId(_))); in import_wrapped_key()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 26 # isSystemServer=true only matches the system server. 34 # seinfo= matches aginst the seinfo tag for the app, determined from 37 # name= matches against the package name of the app. 38 # path= matches against the directory path when labeling app directories.
|
/system/extras/boottime_tools/bootanalyze/ |
D | README.md | 34 event1_name: <pattern that matches log message>
|
/system/security/keystore2/src/ |
D | remote_provisioning.rs | 73 matches!( in is_asymmetric_key()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 26 # isSystemServer=true only matches the system server. 34 # seinfo= matches aginst the seinfo tag for the app, determined from 37 # name= matches against the package name of the app. 38 # path= matches against the directory path when labeling app directories.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | seapp_contexts | 26 # isSystemServer=true only matches the system server. 34 # seinfo= matches aginst the seinfo tag for the app, determined from 37 # name= matches against the package name of the app. 38 # path= matches against the directory path when labeling app directories.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | seapp_contexts | 26 # isSystemServer=true only matches the system server. 34 # seinfo= matches aginst the seinfo tag for the app, determined from 37 # name= matches against the package name of the app. 38 # path= matches against the directory path when labeling app directories.
|
/system/keymint/common/src/keyblob/ |
D | legacy.rs | 32 matches!(self, Self::AesGcmWithSecureDeletion | Self::AesGcmWithSecureDeletionVersioned) in requires_secure_deletion() 35 matches!( in is_versioned()
|
/system/keymint/wire/src/ |
D | legacy.rs | 622 matches!( in is_trusty_bootloader_code() 631 matches!( in is_trusty_bootloader_req() 639 matches!( in is_trusty_provisioning_code() 651 matches!( in is_trusty_provisioning_req()
|