Searched refs:lead (Results 1 – 25 of 29) sorted by relevance
12
/PHP-8.4/ext/dom/lexbor/lexbor/encoding/ |
H A D | decode.c | 271 ctx->u.lead = lead; in lxb_encoding_decode_big5() 567 ctx->u.lead = lead; in lxb_encoding_decode_euc_kr() 1144 ctx->u.lead = lead; in lxb_encoding_decode_shift_jis() 1230 lead = ctx->u.lead - 0x01; in lxb_encoding_decode_utf_16() 1989 ctx->u.lead = lead; in lxb_encoding_decode_big5_single() 2020 ctx->u.lead = lead; in lxb_encoding_decode_big5_single() 2025 ctx->u.lead = lead; in lxb_encoding_decode_big5_single() 2030 ctx->u.lead = lead; in lxb_encoding_decode_big5_single() 2035 ctx->u.lead = lead; in lxb_encoding_decode_big5_single() 2193 ctx->u.lead = lead; in lxb_encoding_decode_euc_kr_single() [all …]
|
H A D | base.h | 89 lxb_char_t lead; member 95 lxb_char_t lead; member 131 unsigned lead; member
|
H A D | encode.c | 677 uint32_t lead, trail; in lxb_encoding_encode_shift_jis() local 718 lead = (uint32_t) (uintptr_t) hash->value / 188; in lxb_encoding_encode_shift_jis() 721 ctx->buffer_out[ctx->buffer_used++ ] = lead + ((lead < 0x1F) ? 0x81 : 0xC1); in lxb_encoding_encode_shift_jis() 1602 uint32_t lead, trail; in lxb_encoding_encode_shift_jis_single() local 1640 lead = (uint32_t) (uintptr_t) hash->value / 188; in lxb_encoding_encode_shift_jis_single() 1643 *(*data)++ = lead + ((lead < 0x1F) ? 0x81 : 0xC1); in lxb_encoding_encode_shift_jis_single()
|
/PHP-8.4/ext/opcache/tests/jit/ |
H A D | bug81249.phpt | 28 private $lead; 37 $this->lead = 0x00; 44 if ($this->lead !== 0x00) { 45 $this->lead = 0x00; 56 $this->lead = 0x00; 63 $this->lead = $byte; 68 if ($this->lead !== 0x00) { 69 $lead = $this->lead; 70 $this->lead = 0x00; 73 if (($lead >= 0xA1 && $lead <= 0xFE) && ($byte >= 0xA1 && $byte <= 0xFE)) { [all …]
|
/PHP-8.4/ext/spl/tests/SplFileObject/ |
H A D | bug36258.phpt | 2 Bug #36258 (SplFileObject::getPath() may lead to segfault)
|
/PHP-8.4/Zend/tests/ |
H A D | gh11580.phpt | 2 GH-11580: assert() with ??= operator can lead to use-of-uninitialized-value
|
H A D | bug53748.phpt | 2 Bug #53748 (Using traits lead to a segmentation fault)
|
H A D | bug70121.phpt | 2 Bug #70121 (unserialize() could lead to unexpected methods execution / NULL pointer deref)
|
H A D | bug60536_005.phpt | 2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
|
H A D | bug60536_004.phpt | 2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
|
/PHP-8.4/ext/opcache/tests/opt/ |
H A D | assign_op_002.phpt | 2 ASSIGN_OP 002: Incorrect optimization of ASSIGN_OP may lead to incorrect result (sub assign -> pre …
|
H A D | assign_obj_001.phpt | 2 ASSIGN_OP 001: Incorrect optimization of ASSIGN_OBJ may lead to memory leak
|
H A D | assign_obj_op_001.phpt | 2 ASSIGN_OBJ_OP 001: Incorrect optimization of ASSIGN_OBJ_OP may lead to memory leak
|
H A D | assign_op_001.phpt | 2 ASSIGN_OP 001: Incorrect optimization of ASSIGN_OP may lead to memory leak
|
/PHP-8.4/ext/date/tests/ |
H A D | bug73091.phpt | 2 Bug #73091 (Unserializing DateInterval object may lead to __toString invocation)
|
/PHP-8.4/ext/exif/tests/ |
H A D | bug76423.phpt | 2 Bug #76423 (Int Overflow lead to Heap OverFlow in exif_thumbnail_extract of exif.c)
|
/PHP-8.4/ext/standard/tests/filters/ |
H A D | bug35916.phpt | 2 Bug #35916 (Duplicate calls to stream_bucket_append() lead to a crash)
|
/PHP-8.4/ext/pdo_mysql/tests/ |
H A D | bug_61755.phpt | 2 Bug #61755 (A parsing bug in the prepared statements can lead to access violations)
|
/PHP-8.4/Zend/tests/traits/ |
H A D | property007.phpt | 2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
|
H A D | property006.phpt | 2 Introducing new private variables of the same name in a subclass is ok, and does not lead to any ou…
|
/PHP-8.4/tests/basic/ |
H A D | bug55500.phpt | 2 Bug #55500 (Corrupted $_FILES indices lead to security concern)
|
/PHP-8.4/ext/standard/tests/strings/ |
H A D | htmlentities23.phpt | 6 "\x8F\xA1\xFF", //2 sub as 2nd is potentially valid as lead 7 "\x8F\xA1", //2 sub, as 2nd is potentially valid as lead
|
H A D | bug49785.phpt | 55 echo "Shift_JIS: non-lead byte >= 0x80\n"; 80 echo "EUC-JP: non-lead byte >= 0x80\n"; 86 // EUC-JP: control codes that are virtually lead bytes 121 echo "BIG5: non-lead byte >= 0x80\n"; 184 Shift_JIS: non-lead byte >= 0x80 856 EUC-JP: non-lead byte >= 0x80 2871 BIG5: non-lead byte >= 0x80
|
/PHP-8.4/ext/pdo_pgsql/tests/ |
H A D | large_objects.phpt | 31 * as bytea, and will most likely lead to an error.
|
/PHP-8.4/docs-old/ |
H A D | streams.md | 161 resource! It will close the origstream on success, and this can lead to a crash
|
Completed in 105 milliseconds
12