api = name_to_ProcName(m.group(1))
# Event filtering is handled in daemon/remote.c
# instead of drivers
- if line.find("_EVENT_REGISTER") == -1:
+ if "_EVENT_REGISTER" not in line:
filteredmap[api] = True
incomment = False
for line in fh:
lineno = lineno + 1
if intable:
- if line.find("}") != -1:
+ if "}" in line:
intable = False
mainprefix = None
continue
with open(symfile, "r") as fh:
for line in fh:
line = line.strip()
- if line.find("{") != -1:
+ if "{" in line:
continue
- if line.find("}") != -1:
+ if "}" in line:
continue
if line in ["global:", "local:"]:
continue
continue
if line[0] == '#':
continue
- if line.find("*") != -1:
+ if "*" in line:
continue
line = line.strip(";")
line = line.strip()
if line == "":
continue
- if line.find("provider ") != -1 and line.find("{") != -1:
+ if "provider " in line and "{" in line:
continue
- if line.find("};") != -1:
+ if "};" in line:
continue
if line.startswith("#"):
for idx in range(len(argbits)):
arg = argbits[idx]
isstr = False
- if arg.find("char *") != -1:
+ if 'char *' in arg:
isstr = True
m = re.search(r'''^.*\s\*?(\S+)$''', arg)
with open(aclfile, "r") as fh:
for line in fh:
if in_opts:
- if line.find("*/") != -1:
+ if "*/" in line:
in_opts = False
else:
m = re.search(r'''\*\s*\@(\w+):\s*(.*?)\s*$''', line)
if m is not None:
opts[m.group(1)] = m.group(2)
- elif line.find("**") != -1:
+ elif "**" in line:
in_opts = True
else:
m = re.search(r'''VIR_ACCESS_PERM_(%s)_((?:\w|_)+),''' %
instatus = True
elif re.search(r'''enum remote_auth_type''', line):
inauth = True
- elif line.find("}") != -1:
+ elif "}" in line:
intype = False
instatus = False
inauth = False