/dports/math/suitesparse-cxsparse/SuiteSparse-5.10.1/CHOLMOD/Doc/ |
H A D | CHOLMOD_UserGuide.tex | 908 \subsubsection{{\tt cholmod\_dense}: a dense matrix} 964 \subsubsection{Memory management routines} 1262 \subsection{Constant definitions} 1288 \subsection{{\tt cholmod\_finish}: finish CHOLMOD} 1326 \subsection{{\tt cholmod\_free\_work}: free workspace} 1361 \subsection{{\tt cholmod\_hypot}: {\tt sqrt(x*x+y*y)}} 1373 \subsection{{\tt cholmod\_divcomplex}: complex divide} 1607 \subsection{{\tt cholmod\_aat}: compute $\m{AA}\tr$} 1878 \subsection{{\tt cholmod\_copy\_factor}: copy factor} 1944 \subsection{{\tt cholmod\_eye}: dense identity matrix} [all …]
|
/dports/math/suitesparse-graphblas/SuiteSparse-5.10.1/CHOLMOD/Doc/ |
H A D | CHOLMOD_UserGuide.tex | 908 \subsubsection{{\tt cholmod\_dense}: a dense matrix} 964 \subsubsection{Memory management routines} 1262 \subsection{Constant definitions} 1288 \subsection{{\tt cholmod\_finish}: finish CHOLMOD} 1326 \subsection{{\tt cholmod\_free\_work}: free workspace} 1361 \subsection{{\tt cholmod\_hypot}: {\tt sqrt(x*x+y*y)}} 1373 \subsection{{\tt cholmod\_divcomplex}: complex divide} 1607 \subsection{{\tt cholmod\_aat}: compute $\m{AA}\tr$} 1878 \subsection{{\tt cholmod\_copy\_factor}: copy factor} 1944 \subsection{{\tt cholmod\_eye}: dense identity matrix} [all …]
|
/dports/devel/py-ramlfications/ramlfications-0.1.9/docs/ |
H A D | api.rst | 19 Core section in API Definition 27 parser 44 raml 303 Parameters 552 Loader 560 Validate 568 Tree
|
/dports/security/vault/vault-1.8.2/vault/ |
H A D | request_handling_util.go | 13 func waitForReplicationState(context.Context, *Core, *logical.Request) (*sync.WaitGroup, error) { 17 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 25 func shouldForward(c *Core, resp *logical.Response, err error) bool { 29 func syncCounters(c *Core) error { 33 func syncBarrierEncryptionCounter(c *Core) error { 37 func couldForward(c *Core) bool { 41 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 45 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 49 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 53 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil } 44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/graphics/inkscape/inkscape-1.1_2021-05-24_c4e8f9ed74/src/inkgc/ |
H A D | gc-core.h | 62 struct Core { struct 65 static inline void *malloc(std::size_t size) { in malloc() 68 static inline void *malloc_atomic(std::size_t size) { in malloc_atomic() 71 static inline void *malloc_uncollectable(std::size_t size) { in malloc_uncollectable() 74 static inline void *malloc_atomic_uncollectable(std::size_t size) { in malloc_atomic_uncollectable() 77 static inline void *base(void *ptr) { in base() 80 static inline void register_finalizer_ignore_self(void *base, in register_finalizer_ignore_self() 89 static inline int general_register_disappearing_link(void **p_ptr, in general_register_disappearing_link() 94 static inline int unregister_disappearing_link(void **p_ptr) { in unregister_disappearing_link() 120 Core::init(); in init() argument
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/ |
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil } 44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
/dports/misc/concourse/vault-bdd38fca2cff/vault/ |
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil } 44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 21 func runFilteredPathsEvaluation(context.Context, *Core) error { return nil } 44 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/ |
H A D | request_handling_util.go | 12 func waitForReplicationState(context.Context, *Core, *logical.Request) error { return nil } 14 func checkNeedsCG(context.Context, *Core, *logical.Request, *logical.Auth, error, []string) (error,… 22 func shouldForward(c *Core, resp *logical.Response, err error) bool { 26 func syncCounter(c *Core) { 29 func couldForward(c *Core) bool { 33 func forward(ctx context.Context, c *Core, req *logical.Request) (*logical.Response, error) { 37 func getLeaseRegisterFunc(c *Core) (func(context.Context, *logical.Request, *logical.Response) (str… 41 func getAuthRegisterFunc(c *Core) (RegisterAuthFunc, error) { 45 func possiblyForwardAliasCreation(ctx context.Context, c *Core, inErr error, auth *logical.Auth, en…
|
H A D | mount_util.go | 13 func addPathCheckers(*Core, *MountEntry, logical.Backend, string) {} 14 func removePathCheckers(*Core, *MountEntry, string) {} 15 func addAuditPathChecker(*Core, *MountEntry, *BarrierView, string) {} 16 func removeAuditPathChecker(*Core, *MountEntry) {} 17 func addFilterablePath(*Core, string) {} 18 func preprocessMount(*Core, *MountEntry, *BarrierView) (bool, error) { return false, nil } 19 func clearIgnoredPaths(context.Context, *Core, logical.Backend, string) error { return nil } 20 func addLicenseCallback(*Core, logical.Backend) {} 43 func verifyNamespace(*Core, *namespace.Namespace, *MountEntry) error { return nil }
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | core_util.go | 18 func coreInit(c *Core, conf *CoreConfig) error { 41 func createSecondaries(*Core, *CoreConfig) {} 43 func addExtraLogicalBackends(*Core, map[string]logical.Factory) {} 45 func addExtraCredentialBackends(*Core, map[string]logical.Factory) {} 47 func preUnsealInternal(context.Context, *Core) error { return nil } 49 func postSealInternal(*Core) {} 51 func preSealPhysical(c *Core) { 64 func postUnsealPhysical(c *Core) error { 74 func loadMFAConfigs(context.Context, *Core) error { return nil } 76 func shouldStartClusterListener(*Core) bool { return true } [all …]
|