代码搜索:Command

找到约 10,000 项符合「Command」的源代码

代码结果 10,000
www.eeworm.com/read/465477/6938948

txt rfc2062.txt

Network Working Group M. Crispin Request for Comments: 2062 University of Washington Category: Informational
www.eeworm.com/read/467622/7006011

htm doc102.htm

www.eeworm.com/read/467296/7009552

h acthandler.h

/* Copyright (c) 2000-2003, Jelle Kok, University of Amsterdam All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the fo
www.eeworm.com/read/467157/7019269

s bbu_mmc.s

;********************************************************************************* ; ; COPYRIGHT (C) 2006-2007 Marvell International Ltd. All Rights Reserved. ; ; The information in this fil
www.eeworm.com/read/467157/7019277

s bbu_help.s

;******************************************************************************* ; ; COPYRIGHT (C) 2006-2007 Marvell International Ltd. All Rights Reserved. ; ; The information in this file
www.eeworm.com/read/330667/7099844

txt readme.txt

# README.TXT This project is a generic base for a HC12 ANSI-C project debugged with a P&E Cable12 . Project layout: =============== Folders used: - Sources: Will contain your sources. Fo
www.eeworm.com/read/105767/7108944

news

Intercom NEWS - User visible changes. version 0.15 - Shane WegneR, 2003-02-13 * Added a user manual available in several formats. * Many miscellaneous bugfixes. * Rework ifreturn into a more general
www.eeworm.com/read/105767/7108970

sgml customize.sgml

Customizing Intercom for Your Needs It is often desirable to change the way a program
www.eeworm.com/read/145186/7115951

txt history.txt

version 1.0.156: October 14th, 2000 - no further code changes, just "beta" note removed from various places. version 1.0.156 beta 2: - changed variables for partial opening to unsigned (opening w
www.eeworm.com/read/464341/7164987

cmd tbdml_erase_unsecure_hcs12.cmd

// ver 1.1 (7/7/04) // HCS12X Core erasing + unsecuring command file: // These commands mass erase the chip then program the security byte to 0xFE (unsecured state). // Evaluate the clock divider