代码搜索:Operations
找到约 10,000 项符合「Operations」的源代码
代码结果 10,000
www.eeworm.com/read/100036/15460624
in 1024.in
#
# Generate a 1024-bit key pair.
#
g
1024
1024.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
1024-5.sig
v
file
3
5
1024-5.sig
www.eeworm.com/read/100036/15460660
in 767.in
#
# Generate a 767-bit key pair.
#
g
767
767.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
767-5.sig
v
file
3
5
767-5.sig
#
www.eeworm.com/read/100036/15460662
in 508.in
#
# Generate a 508-bit key pair.
#
g
508
508.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
508-5.sig
v
file
3
5
508-5.sig
#
www.eeworm.com/read/110505/15532418
h synch.h
// synch.h
// Data structures for synchronizing threads.
//
// Three kinds of synchronization are defined here: semaphores,
// locks, and condition variables. The implementation for
// semaphores is
www.eeworm.com/read/108859/15573766
m ctsighlp.m
function ctsighlp
% CTSIGHLP Help file for CTSIGGUI
% ADSP Toolbox: Version 2.0
% For use with "Analog and Digital Signal Processing", 2nd Ed.
% Published by PWS Publishing Co.
%
% Ashok Am
www.eeworm.com/read/108859/15573817
m dtsighlp.m
function dtsighlp
% DTSIGHLP Help file for DTSIGGUI
% ADSP Toolbox: Version 2.0
% For use with "Analog and Digital Signal Processing", 2nd Ed.
% Published by PWS Publishing Co.
%
% Ashok Am
www.eeworm.com/read/108135/15593740
html syscalls_79.html
Syscall specifications of Linux - semop
Go to the
www.eeworm.com/read/107336/15608819
asm init_54x.asm
*****************************************************************************
* FILENAME: INIT_54x.ASM
* After reset, ST0, ST1, PMST and other memory mapped registers
* reconfigured at a known st
www.eeworm.com/read/105985/15649510
in 1024.in
#
# Generate a 1024-bit key pair.
#
g
1024
1024.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
1024-5.sig
v
file
3
5
1024-5.sig
#
# Seal and open
www.eeworm.com/read/105985/15649546
in 767.in
#
# Generate a 767-bit key pair.
#
g
767
767.key
#
# Sign and verify with MD5.
# All operations in this script use the new key pair.
#
s
file
3
5
767-5.sig
v
file
3
5
767-5.sig
#
# Seal and open with