| OLD | NEW |
| 1 // Copyright 2011 the V8 project authors. All rights reserved. | 1 // Copyright 2011 the V8 project authors. All rights reserved. |
| 2 // Redistribution and use in source and binary forms, with or without | 2 // Redistribution and use in source and binary forms, with or without |
| 3 // modification, are permitted provided that the following conditions are | 3 // modification, are permitted provided that the following conditions are |
| 4 // met: | 4 // met: |
| 5 // | 5 // |
| 6 // * Redistributions of source code must retain the above copyright | 6 // * Redistributions of source code must retain the above copyright |
| 7 // notice, this list of conditions and the following disclaimer. | 7 // notice, this list of conditions and the following disclaimer. |
| 8 // * Redistributions in binary form must reproduce the above | 8 // * Redistributions in binary form must reproduce the above |
| 9 // copyright notice, this list of conditions and the following | 9 // copyright notice, this list of conditions and the following |
| 10 // disclaimer in the documentation and/or other materials provided | 10 // disclaimer in the documentation and/or other materials provided |
| (...skipping 10 matching lines...) Expand all Loading... |
| 21 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | 21 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 22 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | 22 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 23 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | 23 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 24 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 24 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 25 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 25 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 26 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 26 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 27 | 27 |
| 28 #ifndef V8_SCANNER_H_ | 28 #ifndef V8_SCANNER_H_ |
| 29 #define V8_SCANNER_H_ | 29 #define V8_SCANNER_H_ |
| 30 | 30 |
| 31 #include "token.h" |
| 32 #include "char-predicates-inl.h" |
| 31 #include "scanner-base.h" | 33 #include "scanner-base.h" |
| 32 | 34 |
| 33 namespace v8 { | 35 namespace v8 { |
| 34 namespace internal { | 36 namespace internal { |
| 35 | 37 |
| 36 // A buffered character stream based on a random access character | 38 // A buffered character stream based on a random access character |
| 37 // source (ReadBlock can be called with pos_ pointing to any position, | 39 // source (ReadBlock can be called with pos_ pointing to any position, |
| 38 // even positions before the current). | 40 // even positions before the current). |
| 39 class BufferedUC16CharacterStream: public UC16CharacterStream { | 41 class BufferedUC16CharacterStream: public UC16CharacterStream { |
| 40 public: | 42 public: |
| (...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 120 // Entire string is read at start. | 122 // Entire string is read at start. |
| 121 return false; | 123 return false; |
| 122 } | 124 } |
| 123 Handle<ExternalTwoByteString> source_; | 125 Handle<ExternalTwoByteString> source_; |
| 124 const uc16* raw_data_; // Pointer to the actual array of characters. | 126 const uc16* raw_data_; // Pointer to the actual array of characters. |
| 125 }; | 127 }; |
| 126 | 128 |
| 127 } } // namespace v8::internal | 129 } } // namespace v8::internal |
| 128 | 130 |
| 129 #endif // V8_SCANNER_H_ | 131 #endif // V8_SCANNER_H_ |
| OLD | NEW |