Home
last modified time | relevance | path

Searched defs:Core (Results 76 – 100 of 4549) sorted by relevance

12345678910>>...182

/dports/math/suitesparse-cxsparse/SuiteSparse-5.10.1/CHOLMOD/Doc/
H A DCHOLMOD_UserGuide.tex908 \subsubsection{{\tt cholmod\_dense}: a dense matrix}
964 \subsubsection{Memory management routines}
1262 \subsection{Constant definitions}
1288 \subsection{{\tt cholmod\_finish}: finish CHOLMOD}
1326 \subsection{{\tt cholmod\_free\_work}: free workspace}
1361 \subsection{{\tt cholmod\_hypot}: {\tt sqrt(x*x+y*y)}}
1373 \subsection{{\tt cholmod\_divcomplex}: complex divide}
1607 \subsection{{\tt cholmod\_aat}: compute $\m{AA}\tr$}
1878 \subsection{{\tt cholmod\_copy\_factor}: copy factor}
1944 \subsection{{\tt cholmod\_eye}: dense identity matrix}
[all …]
/dports/math/suitesparse-graphblas/SuiteSparse-5.10.1/CHOLMOD/Doc/
H A DCHOLMOD_UserGuide.tex908 \subsubsection{{\tt cholmod\_dense}: a dense matrix}
964 \subsubsection{Memory management routines}
1262 \subsection{Constant definitions}
1288 \subsection{{\tt cholmod\_finish}: finish CHOLMOD}
1326 \subsection{{\tt cholmod\_free\_work}: free workspace}
1361 \subsection{{\tt cholmod\_hypot}: {\tt sqrt(x*x+y*y)}}
1373 \subsection{{\tt cholmod\_divcomplex}: complex divide}
1607 \subsection{{\tt cholmod\_aat}: compute $\m{AA}\tr$}
1878 \subsection{{\tt cholmod\_copy\_factor}: copy factor}
1944 \subsection{{\tt cholmod\_eye}: dense identity matrix}
[all …]
/dports/devel/py-ramlfications/ramlfications-0.1.9/docs/
H A Dapi.rst19 Core section in API Definition
27 parser
44 raml
303 Parameters
552 Loader
560 Validate
568 Tree
/dports/security/vault/vault-1.8.2/vault/
H A Drequest_handling_util.go13 func waitForReplicationState(context.Context, *Core, *logical.Request) (*sync.WaitGroup, error) {
17 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
25 func shouldForward(c *Core, resp *logical.Response, err error) bool {
29 func syncCounters(c *Core) error {
33 func syncBarrierEncryptionCounter(c *Core) error {
37 func couldForward(c *Core) bool {
41 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
45 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
49 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
53 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil }
44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/graphics/inkscape/inkscape-1.1_2021-05-24_c4e8f9ed74/src/inkgc/
H A Dgc-core.h62 struct Core { struct
65 static inline void *malloc(std::size_t size) { in malloc()
68 static inline void *malloc_atomic(std::size_t size) { in malloc_atomic()
71 static inline void *malloc_uncollectable(std::size_t size) { in malloc_uncollectable()
74 static inline void *malloc_atomic_uncollectable(std::size_t size) { in malloc_atomic_uncollectable()
77 static inline void *base(void *ptr) { in base()
80 static inline void register_finalizer_ignore_self(void *base, in register_finalizer_ignore_self()
89 static inline int general_register_disappearing_link(void **p_ptr, in general_register_disappearing_link()
94 static inline int unregister_disappearing_link(void **p_ptr) { in unregister_disappearing_link()
120 Core::init(); in init() argument
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil }
44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
/dports/misc/concourse/vault-bdd38fca2cff/vault/
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil }
44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil }
44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/
H A Drequest_handling_util.go12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil }
14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,…
22 func shouldForward(c *Core, resp *logical.Response, err error) bool {
26 func syncCounter(c *Core) {
29 func couldForward(c *Core) bool {
33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) {
37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str…
41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) {
45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
H A Dmount_util.go13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {}
14 func removePathCheckers(*Core, *MountEntry, string) {}
15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {}
16 func removeAuditPathChecker(*Core, *MountEntry) {}
17 func addFilterablePath(*Core, string) {}
18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil }
19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil }
20 func addLicenseCallback(*Core, logical.Backend) {}
43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/
H A Dcore_util.go18 func coreInit(c *Core, conf *CoreConfig) error {
41 func createSecondaries(*Core, *CoreConfig) {}
43 func addExtraLogicalBackends(*Core, map[string]logical.Factory) {}
45 func addExtraCredentialBackends(*Core, map[string]logical.Factory) {}
47 func preUnsealInternal(context.Context, *Core) error { return nil }
49 func postSealInternal(*Core) {}
51 func preSealPhysical(c *Core) {
64 func postUnsealPhysical(c *Core) error {
74 func loadMFAConfigs(context.Context, *Core) error { return nil }
76 func shouldStartClusterListener(*Core) bool { return true }
[all …]

12345678910>>...182