Lines Matching refs:idx
13261 const uint8_t idx =
13267 if (idx < 64) {
13270 uint16x8_t composed = convert_utf8_1_to_2_byte_to_utf16(in, idx);
13279 } else if (idx < 145) {
13282 uint8x16_t sh = vld1q_u8(reinterpret_cast<const uint8_t*>(simdutf::tables::utf8_to_utf16::shufutf8[idx]));
13324 } else if (idx < 209) {
13377 uint8x16_t sh = vld1q_u8(reinterpret_cast<const uint8_t*>(simdutf::tables::utf8_to_utf16::shufutf8[idx]));
13515 const uint8_t idx =
13521 if (idx < 64) {
13524 uint16x8_t composed_utf16 = convert_utf8_1_to_2_byte_to_utf16(in, idx);
13530 } else if (idx < 145) {
13533 uint8x16_t sh = vld1q_u8(reinterpret_cast<const uint8_t*>(simdutf::tables::utf8_to_utf16::shufutf8[idx]));
13559 } else if (idx < 209) {
13595 uint8x16_t sh = vld1q_u8(reinterpret_cast<const uint8_t*>(simdutf::tables::utf8_to_utf16::shufutf8[idx]));
13665 const uint8_t idx =
13671 if(idx >= 64) { return consumed; }
13672 // Here we should have (idx < 64), if not, there is a bug in the validation or elsewhere.
13681 uint8x16_t sh = vld1q_u8(reinterpret_cast<const uint8_t*>(simdutf::tables::utf8_to_utf16::shufutf8[idx]));
15145 size_t idx;
15179 simdutf_really_inline buf_block_reader<STEP_SIZE>::buf_block_reader(const uint8_t *_buf, size_t _len) : buf{_buf}, len{_len}, lenminusstep{len < STEP_SIZE ? 0 : len - STEP_SIZE}, idx{0} {}
15182 simdutf_really_inline size_t buf_block_reader<STEP_SIZE>::block_index() { return idx; }
15186 return idx < lenminusstep;
15191 return &buf[idx];
15196 if(len == idx) { return 0; } // memcpy(dst, null, 0) will trigger an error with some sanitizers
15198 std::memcpy(dst, buf + idx, len - idx);
15199 return len - idx;
15204 idx += STEP_SIZE;
18277 template <unsigned idx>
18279 return shuffle_epi128<idx, idx, idx, idx>(v);
22703 const uint8_t idx =
22707 if (idx < 64) {
22714 _mm_loadu_si128((const __m128i *)simdutf::tables::utf8_to_utf16::shufutf8[idx]);
22722 } else if (idx < 145) {
22725 _mm_loadu_si128((const __m128i *)simdutf::tables::utf8_to_utf16::shufutf8[idx]);
22741 } else if (idx < 209) {
22752 _mm_loadu_si128((const __m128i *)simdutf::tables::utf8_to_utf16::shufutf8[idx]);
22876 const uint8_t idx =
22880 if (idx < 64) {
22887 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
22895 } else if (idx < 145) {
22898 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
22912 } else if (idx < 209) {
22915 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
24497 const uint8_t idx =
24502 if(idx >= 64) { return consumed; }
24503 // Here we should have (idx < 64), if not, there is a bug in the validation or elsewhere.
24510 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
24556 size_t idx;
24590 simdutf_really_inline buf_block_reader<STEP_SIZE>::buf_block_reader(const uint8_t *_buf, size_t _len) : buf{_buf}, len{_len}, lenminusstep{len < STEP_SIZE ? 0 : len - STEP_SIZE}, idx{0} {}
24593 simdutf_really_inline size_t buf_block_reader<STEP_SIZE>::block_index() { return idx; }
24597 return idx < lenminusstep;
24602 return &buf[idx];
24607 if(len == idx) { return 0; } // memcpy(dst, null, 0) will trigger an error with some sanitizers
24609 std::memcpy(dst, buf + idx, len - idx);
24610 return len - idx;
24615 idx += STEP_SIZE;
26928 size_t idx;
26962 simdutf_really_inline buf_block_reader<STEP_SIZE>::buf_block_reader(const uint8_t *_buf, size_t _len) : buf{_buf}, len{_len}, lenminusstep{len < STEP_SIZE ? 0 : len - STEP_SIZE}, idx{0} {}
26965 simdutf_really_inline size_t buf_block_reader<STEP_SIZE>::block_index() { return idx; }
26969 return idx < lenminusstep;
26974 return &buf[idx];
26979 if(len == idx) { return 0; } // memcpy(dst, null, 0) will trigger an error with some sanitizers
26981 std::memcpy(dst, buf + idx, len - idx);
26982 return len - idx;
26987 idx += STEP_SIZE;
29180 const uint8_t idx =
29184 if (idx < 64) {
29191 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29199 } else if (idx < 145) {
29202 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29218 } else if (idx < 209) {
29229 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29356 const uint8_t idx =
29360 if (idx < 64) {
29367 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29375 } else if (idx < 145) {
29378 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29392 } else if (idx < 209) {
29395 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
29449 const uint8_t idx =
29454 if(idx >= 64) { return consumed; }
29455 // Here we should have (idx < 64), if not, there is a bug in the validation or elsewhere.
29462 _mm_loadu_si128((const __m128i *)tables::utf8_to_utf16::shufutf8[idx]);
30935 size_t idx;
30969 simdutf_really_inline buf_block_reader<STEP_SIZE>::buf_block_reader(const uint8_t *_buf, size_t _len) : buf{_buf}, len{_len}, lenminusstep{len < STEP_SIZE ? 0 : len - STEP_SIZE}, idx{0} {}
30972 simdutf_really_inline size_t buf_block_reader<STEP_SIZE>::block_index() { return idx; }
30976 return idx < lenminusstep;
30981 return &buf[idx];
30986 if(len == idx) { return 0; } // memcpy(dst, null, 0) will trigger an error with some sanitizers
30988 std::memcpy(dst, buf + idx, len - idx);
30989 return len - idx;
30994 idx += STEP_SIZE;