Searched refs:reconstruct (Results 1 – 25 of 65) sorted by relevance
123
740 glyfTable.reconstruct(self.transformedGlyfData, self.font)748 glyfTable.reconstruct(self.transformedGlyfData, self.font)756 glyfTable.reconstruct(self.transformedGlyfData, self.font)765 glyfTable.reconstruct(self.transformedGlyfData, self.font)772 glyfTable.reconstruct(self.transformedGlyfData, self.font)780 glyfTable.reconstruct(self.transformedGlyfData, self.font)790 glyfTable.reconstruct(self.transformedGlyfData, self.font)800 glyfTable.reconstruct(self.transformedGlyfData, self.font)807 WOFF2GlyfTable().reconstruct(b"", self.font)812 WOFF2GlyfTable().reconstruct(self.transformedGlyfData + b"\x00", self.font)[all …]
3 ; to YAML. Then it tries to reconstruct as much of the original PDB as
41 // reconstruct the terms carefully.110 // reconstruct the terms carefully.
41 // reconstruct the terms carefully.107 // reconstruct the terms carefully.
42 // reconstruct the terms carefully.110 // reconstruct the terms carefully.
25 # safely reconstruct the exact state of the data tables at
35 can be used to reconstruct the object when called with the tuple of arguments
39 can be used to reconstruct the object when called with the tuple of arguments
114 used to reconstruct the value using :func:`eval`. This always returns ``False``169 used to reconstruct the value using :func:`eval`. Note that this returns
49 * reconstruct the public key explicitly using the parameters of the private
15 a consumer to read a list of values and reconstruct the hash table on the fly.
11 ; be able to reconstruct the full getelementptr, despite it having a few
17 ; be able to reconstruct the full getelementptr, despite it having a few
116 glyfTable.reconstruct(data, self.ttFont)150 hmtxTable.reconstruct(data, self.ttFont)679 def reconstruct(self, data, ttFont): member in WOFF2GlyfTable981 def reconstruct(self, data, ttFont): member in WOFF2HmtxTable
9 @ then libunwind will reconstruct the stack pointer from the frame pointer.
5 ; reconstruct the said v3i1 from the first element of the vector by filling all
106 # Undo DER serialisation, reconstruct SSH key structure
52 The above is sufficient to reconstruct line numbers for tracebacks, but not for