/third_party/skia/third_party/externals/abseil-cpp/absl/synchronization/internal/ |
H A D | per_thread_sem.cc | 32 base_internal::ThreadIdentity *identity; in SetThreadBlockedCounter() local 33 identity = GetOrCreateCurrentThreadIdentity(); in SetThreadBlockedCounter() 34 identity->blocked_count_ptr = counter; in SetThreadBlockedCounter() 38 base_internal::ThreadIdentity *identity; in GetThreadBlockedCounter() local 39 identity = GetOrCreateCurrentThreadIdentity(); in GetThreadBlockedCounter() 40 return identity->blocked_count_ptr; in GetThreadBlockedCounter() 43 void PerThreadSem::Init(base_internal::ThreadIdentity *identity) { in Init() argument 44 new (Waiter::GetWaiter(identity)) Waiter(); in Init() 45 identity->ticker.store(0, std::memory_order_relaxed); in Init() 46 identity in Init() 50 Destroy(base_internal::ThreadIdentity *identity) Destroy() argument 54 Tick(base_internal::ThreadIdentity *identity) Tick() argument 71 AbslInternalPerThreadSemPost( absl::base_internal::ThreadIdentity *identity) AbslInternalPerThreadSemPost() argument 79 absl::base_internal::ThreadIdentity *identity; AbslInternalPerThreadSemWait() local [all...] |
H A D | create_thread_identity.cc | 42 base_internal::ThreadIdentity* identity = in ReclaimThreadIdentity() local 47 if (identity->per_thread_synch.all_locks != nullptr) { in ReclaimThreadIdentity() 48 base_internal::LowLevelAlloc::Free(identity->per_thread_synch.all_locks); in ReclaimThreadIdentity() 51 PerThreadSem::Destroy(identity); in ReclaimThreadIdentity() 53 // We must explicitly clear the current thread's identity: in ReclaimThreadIdentity() 54 // (a) Subsequent (unrelated) per-thread destructors may require an identity. in ReclaimThreadIdentity() 55 // We must guarantee a new identity is used in this case (this instructor in ReclaimThreadIdentity() 63 identity->next = thread_identity_freelist; in ReclaimThreadIdentity() 64 thread_identity_freelist = identity; in ReclaimThreadIdentity() 74 static void ResetThreadIdentity(base_internal::ThreadIdentity* identity) { in ResetThreadIdentity() argument 98 base_internal::ThreadIdentity* identity = nullptr; NewThreadIdentity() local 129 base_internal::ThreadIdentity* identity = NewThreadIdentity(); CreateThreadIdentity() local [all...] |
H A D | per_thread_sem.h | 23 // Each thread maintains an abstract "count" value associated with its identity. 49 static void Tick(base_internal::ThreadIdentity* identity); 65 // Create the PerThreadSem associated with "identity". Initializes count=0. 67 static void Init(base_internal::ThreadIdentity* identity); 69 // Destroy the PerThreadSem associated with "identity". 71 static void Destroy(base_internal::ThreadIdentity* identity); 73 // Increments "identity"'s count. 74 static inline void Post(base_internal::ThreadIdentity* identity); 100 absl::base_internal::ThreadIdentity* identity); 106 absl::base_internal::ThreadIdentity* identity) { in Post() 105 Post( absl::base_internal::ThreadIdentity* identity) Post() argument [all...] |
/third_party/typescript/tests/baselines/reference/ |
H A D | inferentialTypingWithFunctionTypeSyntacticScenarios.js | 3 declare function identity<V>(y: V): V; 7 var dottedIdentity = { x: identity }; 14 s = map("", (() => identity)()); 18 new (): typeof identity; 25 s = map("", t = identity); 28 s = map("", <typeof identity>identity); 31 s = map("", (identity)); 34 s = map("", ("", identity));
39 var dottedIdentity = { x: identity };
[all...] |
H A D | genericTypeArgumentInference1.js | 8 identity<T>(value: T): T; 13 var r = _.all([true, 1, null, 'yes'], _.identity); 14 var r2 = _.all([true], _.identity); 15 var r3 = _.all([], _.identity); 16 var r4 = _.all([<any>true], _.identity); 20 var r = _.all([true, 1, null, 'yes'], _.identity);
21 var r2 = _.all([true], _.identity);
22 var r3 = _.all([], _.identity);
23 var r4 = _.all([true], _.identity);
|
H A D | commentsAfterSpread.js | 2 const identity = (a) => a; 5 .../*#__PURE__*/identity({ 12 /*#__PURE__*/identity({ 20 identity({ 27 identity({ 82 const identity = (a) => a;
84 ... /*#__PURE__*/identity({
90 /*#__PURE__*/ identity({
97 identity({
102 ... /*#__PURE__*/identity({
[all...] |
H A D | contextualSignatureInstantiation3.js | 6 function identity<T>(x: T) { 18 var v1 = xs.map(identity); // Error if not number[] 19 var v1 = map(xs, identity); // Error if not number[] 30 function identity(x) {
function 39 var v1 = xs.map(identity); // Error if not number[]
40 var v1 = map(xs, identity); // Error if not number[]
|
H A D | inferentialTypingWithFunctionType2.js | 2 function identity<A>(a: A): A { 5 var x = [1, 2, 3].map(identity)[0];
8 function identity(a) {
function 11 var x = [1, 2, 3].map(identity)[0];
|
/third_party/curl/lib/ |
H A D | curl_sspi.c | 132 * This is used to populate a SSPI identity structure based on the supplied 139 * identity [in/out] - The identity structure. 144 SEC_WINNT_AUTH_IDENTITY *identity) in Curl_create_sspi_identity() 154 /* Initialize the identity */ in Curl_create_sspi_identity() 155 memset(identity, 0, sizeof(*identity)); in Curl_create_sspi_identity() 176 /* Setup the identity's user and length */ in Curl_create_sspi_identity() 182 identity->User = dup_user.tbyte_ptr; in Curl_create_sspi_identity() 183 identity in Curl_create_sspi_identity() 143 Curl_create_sspi_identity(const char *userp, const char *passwdp, SEC_WINNT_AUTH_IDENTITY *identity) Curl_create_sspi_identity() argument 230 Curl_sspi_free_identity(SEC_WINNT_AUTH_IDENTITY *identity) Curl_sspi_free_identity() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | eap_user_db.c | 110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb() 121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb() 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument 145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", in eap_user_sqlite_get() 150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get() 164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get() 168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get() 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get() 175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get() 177 os_memcpy(hapd->tmp_eap_user.identity, identit in eap_user_sqlite_get() 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) hostapd_get_eap_user() argument [all...] |
H A D | pmksa_cache_auth.c | 42 os_free(entry->identity); in _pmksa_cache_free_entry() 149 if (eapol->identity) { in pmksa_cache_from_eapol_data() 150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 151 if (entry->identity) { in pmksa_cache_from_eapol_data() 153 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 187 if (entry->identity) { in pmksa_cache_to_eapol_data() 188 os_free(eapol->identity); in pmksa_cache_to_eapol_data() 189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 190 if (eapol->identity) { in pmksa_cache_to_eapol_data() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | eap_user_db.c | 110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb() 121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb() 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument 145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", in eap_user_sqlite_get() 150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get() 164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get() 168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get() 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get() 175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get() 177 os_memcpy(hapd->tmp_eap_user.identity, identit in eap_user_sqlite_get() 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) hostapd_get_eap_user() argument [all...] |
H A D | ieee802_11_auth.c | 39 char *identity; member 57 os_free(e->identity); in hostapd_acl_cache_free_entry() 94 char **identity, char **radius_cui) in hostapd_acl_cache_get() 117 if (identity) { in hostapd_acl_cache_get() 118 if (entry->identity) in hostapd_acl_cache_get() 119 *identity = os_strdup(entry->identity); in hostapd_acl_cache_get() 121 *identity = NULL; in hostapd_acl_cache_get() 245 * @identity: Buffer for returning identity (fro 89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) hostapd_acl_cache_get() argument 253 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui, int is_probe_req) hostapd_allowed_address() argument [all...] |
H A D | pmksa_cache_auth.c | 42 os_free(entry->identity); in _pmksa_cache_free_entry() 149 if (eapol->identity) { in pmksa_cache_from_eapol_data() 150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 151 if (entry->identity) { in pmksa_cache_from_eapol_data() 153 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 187 if (entry->identity) { in pmksa_cache_to_eapol_data() 188 os_free(eapol->identity); in pmksa_cache_to_eapol_data() 189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 190 if (eapol->identity) { in pmksa_cache_to_eapol_data() [all...] |
/third_party/skia/third_party/externals/abseil-cpp/absl/base/internal/ |
H A D | thread_identity_test.cc | 40 ThreadIdentity* identity; in TestThreadIdentityCurrent() local 44 // identity. in TestThreadIdentityCurrent() 46 identity = CurrentThreadIdentityIfPresent(); in TestThreadIdentityCurrent() 47 EXPECT_TRUE(identity == nullptr); in TestThreadIdentityCurrent() 50 identity = synchronization_internal::GetOrCreateCurrentThreadIdentity(); in TestThreadIdentityCurrent() 51 EXPECT_TRUE(identity != nullptr); in TestThreadIdentityCurrent() 54 EXPECT_TRUE(identity == identity_no_init); in TestThreadIdentityCurrent() 57 EXPECT_EQ(0, reinterpret_cast<intptr_t>(&identity->per_thread_synch) % in TestThreadIdentityCurrent() 59 EXPECT_EQ(identity, identity in TestThreadIdentityCurrent() [all...] |
H A D | thread_identity.cc | 71 ThreadIdentity* identity, ThreadIdentityReclaimerFunction reclaimer) { in SetCurrentThreadIdentity() 86 reinterpret_cast<void*>(identity)); in SetCurrentThreadIdentity() 99 reinterpret_cast<void*>(identity)); in SetCurrentThreadIdentity() 108 reinterpret_cast<void*>(identity)); in SetCurrentThreadIdentity() 109 thread_identity_ptr = identity; in SetCurrentThreadIdentity() 112 holder(identity, reclaimer); in SetCurrentThreadIdentity() 113 thread_identity_ptr = identity; in SetCurrentThreadIdentity() 70 SetCurrentThreadIdentity( ThreadIdentity* identity, ThreadIdentityReclaimerFunction reclaimer) SetCurrentThreadIdentity() argument
|
/third_party/node/test/parallel/ |
H A D | test-tls-psk-circuit.js | 59 test({ psk: USERS.UserA, identity: 'UserA' }); 60 test({ psk: USERS.UserA, identity: 'UserA' }, { maxVersion: 'TLSv1.2' }); 61 test({ psk: USERS.UserA, identity: 'UserA' }, { minVersion: 'TLSv1.3' }); 62 test({ psk: USERS.UserB, identity: 'UserB' }); 63 test({ psk: USERS.UserB, identity: 'UserB' }, { minVersion: 'TLSv1.3' }); 65 test({ psk: USERS.UserB, identity: 'UserC' }, {}, 68 test({ psk: USERS.UserA, identity: 'UserB' }, {}, 70 test({ psk: USERS.UserB, identity: 'UserB' });
|
/third_party/mesa3d/src/gallium/drivers/svga/ |
H A D | svga_swtnl_state.c | 202 elements[i].format = translate_vertex_format(vdecl[i].identity.type); in svga_vdecl_to_input_element() 243 vdecl[0].identity.method = SVGA3D_DECLMETHOD_DEFAULT; in svga_swtnl_update_vdecl() 244 vdecl[0].identity.type = SVGA3D_DECLTYPE_FLOAT4; in svga_swtnl_update_vdecl() 245 vdecl[0].identity.usage = SVGA3D_DECLUSAGE_POSITIONT; in svga_swtnl_update_vdecl() 246 vdecl[0].identity.usageIndex = 0; in svga_swtnl_update_vdecl() 257 vdecl[nr_decls].identity.usageIndex = sem_index; in svga_swtnl_update_vdecl() 262 vdecl[nr_decls].identity.usage = SVGA3D_DECLUSAGE_COLOR; in svga_swtnl_update_vdecl() 263 vdecl[nr_decls].identity.type = SVGA3D_DECLTYPE_FLOAT4; in svga_swtnl_update_vdecl() 269 vdecl[nr_decls].identity.usage = SVGA3D_DECLUSAGE_TEXCOORD; in svga_swtnl_update_vdecl() 270 vdecl[nr_decls].identity in svga_swtnl_update_vdecl() [all...] |
/third_party/libwebsockets/test-apps/ |
H A D | test.js | 51 this.versionSearchString = data[i].versionSearch || data[i].identity; 54 return data[i].identity; 57 return data[i].identity; 70 identity: "Chrome" 75 identity: "OmniWeb" 80 identity: "Safari", 85 identity: "Opera", 91 identity: "iCab" 96 identity: "Konqueror" 101 identity [all...] |
/third_party/libwebsockets/minimal-examples/http-server/minimal-http-server-eventlib-demos/mount-origin/ |
H A D | test.js | 51 this.versionSearchString = data[i].versionSearch || data[i].identity; 54 return data[i].identity; 57 return data[i].identity; 70 identity: "Chrome" 75 identity: "OmniWeb" 80 identity: "Safari", 85 identity: "Opera", 91 identity: "iCab" 96 identity: "Konqueror" 101 identity [all...] |
/third_party/skia/src/ports/ |
H A D | SkRemotableFontMgr_win_dw.cpp | 31 IUnknown* fLoader; // In COM only IUnknown pointers may be safely used for identity. 147 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable 152 identity); 159 identity); 161 HR_GENERAL(FontToIdentity(font.get(), &identity), nullptr, identity); variable 163 return identity; 209 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable 213 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), nullptr, identity); variable 215 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), nullptr, identity); variable 360 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; global() variable 373 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), nullptr, identity); global() variable 375 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), nullptr, identity); global() variable 384 HR_GENERAL(sk_cstring_to_wchar(bcp47[bcp47Count-1], &dwBcp47Local), nullptr, identity); global() variable [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 137 "identity", in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 142 os_free(sm->identity); in eap_gtc_process() 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process() 145 if (sm->identity == NULL) { in eap_gtc_process() 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 155 sm->identity, sm->identity_len); in eap_gtc_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 137 "identity", in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 142 os_free(sm->identity); in eap_gtc_process() 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process() 145 if (sm->identity == NULL) { in eap_gtc_process() 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 155 sm->identity, sm->identity_len); in eap_gtc_process()
|
/third_party/skia/third_party/externals/angle2/src/libANGLE/renderer/d3d/d3d9/ |
H A D | vertexconversion.h | 21 // static const bool identity: true if this is an identity transform, false otherwise 28 static const bool identity = true; member 38 static const bool identity = false; member 48 static const bool identity = true; member 58 static const bool identity = false; member 85 static const bool identity = false; member 140 // static const bool identity: true if this is an identity transform (with no widening) 154 static const bool identity member [all...] |
/third_party/node/deps/v8/src/heap/ |
H A D | paged-spaces.cc | 119 if (identity() != OLD_SPACE && identity() != CODE_SPACE && in RefillFreeList() 120 identity() != MAP_SPACE) { in RefillFreeList() 163 DCHECK(identity() == other->identity()); in MergeCompactionSpace() 201 heap()->NotifyOldGenerationExpansion(identity(), p); in MergeCompactionSpace() 363 if (identity() == CODE_SPACE || identity() == CODE_LO_SPACE) { in ExpandBackground() 398 if (identity() == CODE_SPACE) { in DecreaseLimit() 439 if (identity() in MakeLinearAllocationAreaIterable() [all...] |