Home
last modified time | relevance | path

Searched refs:op_offset (Results 1 – 9 of 9) sorted by relevance

/external/pdfium/third_party/libtiff/
D0004-CVE-2015-8784.patch22 + case 3: *op++ |= (v); op_offset++; break; \
30 + tmsize_t op_offset = 0;
39 + while (n-- > 0 && npixels < imagewidth && op_offset < scanline)
43 + if (op_offset >= scanline ) {
Dtif_next.c40 case 3: *op++ |= (v); op_offset++; break; \
109 tmsize_t op_offset = 0; in NeXTDecode() local
126 while (n-- > 0 && npixels < imagewidth && op_offset < scanline) in NeXTDecode()
130 if (op_offset >= scanline ) { in NeXTDecode()
/external/google-breakpad/src/third_party/libdisasm/
Dx86_format.c293 if ( op->type != op_offset && op->type != op_expression ){ in format_seg()
692 case op_offset: in format_operand_att()
764 case op_offset: in format_operand_native()
863 case op_offset: in format_operand_xml()
964 case op_offset: in format_operand_raw()
1012 op->type == op_offset)
1015 op->type == op_offset)
Dia32_operand.c164 op->type = op_offset; in decode_operand_value()
420 if ( op->type == op_expression || op->type == op_offset ) { in ia32_decode_operand()
Dlibdis.h166 op_offset = 7, /* Offset from start of segment (m32) */ enumerator
171 ( optype == op_absolute || optype == op_offset )
Dx86_insn.c26 if ( op_lst->op.type == op_offset ) { in x86_get_address()
Dia32_invariant.c222 inv->operands[x].type = op_offset;
/external/google-breakpad/src/third_party/libdisasm/swig/
Dlibdisasm_oop.i107 op_offset = 7, enumerator
221 self->type == op_offset ) { in is_address()
/external/v8/tools/
Dgrokdump.py2634 op_offset = 3 * num_bytes - 1
2649 opcodes = code[:op_offset]
2650 code = self.annotate_disasm_addresses(code[op_offset:])