Home
last modified time | relevance | path

Searched refs:lead (Results 1 – 25 of 29) sorted by relevance

12

/php-src/ext/dom/lexbor/lexbor/encoding/
H A Ddecode.c271 ctx->u.lead = lead; in lxb_encoding_decode_big5()
567 ctx->u.lead = lead; in lxb_encoding_decode_euc_kr()
1144 ctx->u.lead = lead; in lxb_encoding_decode_shift_jis()
1230 lead = ctx->u.lead - 0x01; in lxb_encoding_decode_utf_16()
1989 ctx->u.lead = lead; in lxb_encoding_decode_big5_single()
2020 ctx->u.lead = lead; in lxb_encoding_decode_big5_single()
2025 ctx->u.lead = lead; in lxb_encoding_decode_big5_single()
2030 ctx->u.lead = lead; in lxb_encoding_decode_big5_single()
2035 ctx->u.lead = lead; in lxb_encoding_decode_big5_single()
2193 ctx->u.lead = lead; in lxb_encoding_decode_euc_kr_single()
[all …]
H A Dbase.h89 lxb_char_t lead; member
95 lxb_char_t lead; member
131 unsigned lead; member
H A Dencode.c677 uint32_t lead, trail; in lxb_encoding_encode_shift_jis() local
718 lead = (uint32_t) (uintptr_t) hash->value / 188; in lxb_encoding_encode_shift_jis()
721 ctx->buffer_out[ctx->buffer_used++ ] = lead + ((lead < 0x1F) ? 0x81 : 0xC1); in lxb_encoding_encode_shift_jis()
1602 uint32_t lead, trail; in lxb_encoding_encode_shift_jis_single() local
1640 lead = (uint32_t) (uintptr_t) hash->value / 188; in lxb_encoding_encode_shift_jis_single()
1643 *(*data)++ = lead + ((lead < 0x1F) ? 0x81 : 0xC1); in lxb_encoding_encode_shift_jis_single()
/php-src/ext/opcache/tests/jit/
H A Dbug81249.phpt28 private $lead;
37 $this->lead = 0x00;
44 if ($this->lead !== 0x00) {
45 $this->lead = 0x00;
56 $this->lead = 0x00;
63 $this->lead = $byte;
68 if ($this->lead !== 0x00) {
69 $lead = $this->lead;
70 $this->lead = 0x00;
73 if (($lead >= 0xA1 && $lead <= 0xFE) && ($byte >= 0xA1 && $byte <= 0xFE)) {
[all …]
/php-src/ext/spl/tests/SplFileObject/
H A Dbug36258.phpt2 Bug #36258 (SplFileObject::getPath() may lead to segfault)
/php-src/Zend/tests/
H A Dgh11580.phpt2 GH-11580: assert() with ??= operator can lead to use-of-uninitialized-value
H A Dbug53748.phpt2 Bug #53748 (Using traits lead to a segmentation fault)
H A Dbug70121.phpt2 Bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)
H A Dbug60536_005.phpt2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
H A Dbug60536_004.phpt2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
/php-src/ext/opcache/tests/opt/
H A Dassign_op_002.phpt2 ASSIGN_OP 002: Incorrect optimization of ASSIGN_OP may lead to incorrect result (sub assign -> pre …
H A Dassign_obj_001.phpt2 ASSIGN_OP 001: Incorrect optimization of ASSIGN_OBJ may lead to memory leak
H A Dassign_obj_op_001.phpt2 ASSIGN_OBJ_OP 001: Incorrect optimization of ASSIGN_OBJ_OP may lead to memory leak
H A Dassign_op_001.phpt2 ASSIGN_OP 001: Incorrect optimization of ASSIGN_OP may lead to memory leak
/php-src/ext/date/tests/
H A Dbug73091.phpt2 Bug #73091 (Unserializing DateInterval object may lead to __toString invocation)
/php-src/ext/exif/tests/
H A Dbug76423.phpt2 Bug #76423 (Int Overflow lead to Heap OverFlow in exif_thumbnail_extract of exif.c)
/php-src/ext/standard/tests/filters/
H A Dbug35916.phpt2 Bug #35916 (Duplicate calls to stream_bucket_append() lead to a crash)
/php-src/Zend/tests/traits/
H A Dproperty007.phpt2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
H A Dproperty006.phpt2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
/php-src/ext/pdo_mysql/tests/
H A Dbug_61755.phpt2 Bug #61755 (A parsing bug in the prepared statements can lead to access violations)
/php-src/tests/basic/
H A Dbug55500.phpt2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
/php-src/ext/standard/tests/strings/
H A Dhtmlentities23.phpt6 "\x8F\xA1\xFF", //2 sub as 2nd is potentially valid as lead
7 "\x8F\xA1", //2 sub, as 2nd is potentially valid as lead
H A Dbug49785.phpt55 echo "Shift_JIS: non-lead byte >= 0x80\n";
80 echo "EUC-JP: non-lead byte >= 0x80\n";
86 // EUC-JP: control codes that are virtually lead bytes
121 echo "BIG5: non-lead byte >= 0x80\n";
184 Shift_JIS: non-lead byte >= 0x80
856 EUC-JP: non-lead byte >= 0x80
2871 BIG5: non-lead byte >= 0x80
/php-src/ext/pdo_pgsql/tests/
H A Dlarge_objects.phpt31 * as bytea, and will most likely lead to an error.
/php-src/docs-old/
H A Dstreams.md161 resource! It will close the origstream on success, and this can lead to a crash

Completed in 81 milliseconds

12