代码搜索:Sources
找到约 10,000 项符合「Sources」的源代码
代码结果 10,000
www.eeworm.com/read/372434/2772835
sources
!IF 0
NOTE: Commented description of this file is in \nt\bak\bin\sources.tpl
!ENDIF
WINCEOEM=1
RELEASETYPE=PLATFORM
TARGETNAME=usbcnect
TARGETTYPE=PROGRAM
COPYRES=1
!IF
www.eeworm.com/read/372242/2775596
sources
!IF 0
Copyright (c) 1995-2000 Microsoft Corporation. All rights reserved.
Module Name:
sources.
Abstract:
This file specifies the target component being built and the list of
www.eeworm.com/read/372242/2775599
sources
!IF 0
Copyright (c) 1995-2000 Microsoft Corporation. All rights reserved.
Module Name:
sources.
Abstract:
This file specifies the target component being built and the list of
www.eeworm.com/read/372242/2775611
sources
!IF ("$(_TGTOS)" == "CE")
PREPROCESSDEFFILE=1
DEFFILE=cs8900.def
TARGETDEFNAME=cs8900
TARGETNAME=cs8900
TARGETTYPE=LIBRARY
!ENDIF
CDEFINES=$(CDEFINES) -DNDIS_MINIPORT_DRIVER -DCS8900
INCLU
www.eeworm.com/read/372242/2775623
sources
!IF ("$(_TGTOS)" == "CE")
PREPROCESSDEFFILE=1
DEFFILE=cs8900.def
TARGETDEFNAME=cs8900
TARGETNAME=cs8900
TARGETTYPE=LIBRARY
!ENDIF
CDEFINES=$(CDEFINES) -DNDIS_MINIPORT_DRIVER -DCS8900
INCLU
www.eeworm.com/read/371877/2778573
sources
# SOURCES for use with BUILD command
TARGETNAME=USBSoftLock
TARGETPATH=obj
TARGETTYPE=DRIVER
DRIVERTYPE=WDM
!IF ("$(DDKBUILDENV)"=="chk") || ("$(DDKBUILDENV)"=="checked")
BUILDTYPE = CHECKED
www.eeworm.com/read/371877/2778580
sources
# SOURCES - for Test_USBSoftLock application
TARGETNAME=Test_USBSoftLock
TARGETPATH=obj
TARGETTYPE=PROGRAM
UMTYPE=console
UMBASE=0x01000000
# Put Win2K DDK specific defines in this section.
www.eeworm.com/read/368283/2823536
sources
!if 0
Copyright (c) Microsoft Corporation. All rights reserved.
!endif
!if 0
Use of this source code is subject to the terms of the Microsoft end-user
license agreement (EULA) under which you li
www.eeworm.com/read/368283/2823543
sources
TARGETNAME=__eboot
TARGETTYPE=PROGRAM
TARGETLIBS= \
$(_COMMONSDKROOT)\lib\$(_CPUINDPATH)\coredll.lib \
# $(_COMMONOAKROOT)\lib\$(_CPUINDPATH)\bootpart.lib \
$(_TARGETPLATROOT)\li
www.eeworm.com/read/368084/2827097
sources
TARGETNAME=usbview
TARGETTYPE=PROGRAM
TARGETPATH=obj
UMTYPE=windows
UMENTRY=winmain
UMBASE=0x1000000
TARGETLIBS=\
$(SDK_LIB_PATH)\kernel32.lib \
$(SDK_LIB_PATH)\user32.l