代码搜索:Operations
找到约 10,000 项符合「Operations」的源代码
代码结果 10,000
www.eeworm.com/read/385844/8786412
h syscall.h
/* syscalls.h
* Nachos system call interface. These are Nachos kernel operations
* that can be invoked from user programs, by trapping to the kernel
* via the "syscall" instruction.
*
* This
www.eeworm.com/read/428473/8865909
in 1024.in
#
# Generate a 1024-bit key pair.
#
g
1024
1024.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
2
5
1024-5.sig
v
file
2
5
1024-5.sig
#
# Seal and open
www.eeworm.com/read/428473/8865967
in 767.in
#
# Generate a 767-bit key pair.
#
g
767
767.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
2
5
767-5.sig
v
file
2
5
767-5.sig
#
# Seal and open with
www.eeworm.com/read/428473/8865972
in 508.in
#
# Generate a 508-bit key pair.
#
g
508
508.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
2
5
508-5.sig
v
file
2
5
508-5.sig
#
# Seal and open with
www.eeworm.com/read/284556/8918993
h nachos_syscall.h
/* syscalls.h
* Nachos system call interface. These are the enveloped Nachos kernel
* operations that can be invoked from user programs.
* Each NachOS system call is translated to an
www.eeworm.com/read/381363/9096140
hlp morphology.hlp
Binary Image Morphology
Computes several morphology analysis on the binary image.
The number of cicles determines how many time the
transformation is applyed.
Methods:
bothat The 'close'ing
www.eeworm.com/read/165417/10063338
in 1024.in
#
# Generate a 1024-bit key pair.
#
g
1024
1024.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
1024-5.sig
v
file
3
5
1024-5.sig
#
# Seal and open