代码搜索:execute
找到约 10,000 项符合「execute」的源代码
代码结果 10,000
www.eeworm.com/read/240529/4573090
java oncommand.java
package com.javapatterns.command.television;
public class OnCommand implements Command
{
private Tv myTv;
public OnCommand (Tv tv)
{
myTv = tv;
}
public void execute( )
{
www.eeworm.com/read/240529/4573094
java offcommand.java
package com.javapatterns.command.television;
public class OffCommand implements Command
{
private Tv myTv;
public OffCommand (Tv tv)
{
myTv = tv;
}
public void execute()
www.eeworm.com/read/240162/4587953
x 920501-7.x
# This doesn't work on sparc's with -mflat.
if { [istarget "sparc-*-*"] && [string match "*mflat*" $CFLAGS] } {
set torture_execute_xfail "sparc-*-*"
}
return 0
www.eeworm.com/read/240162/4588339
x 941014-1.x
# This doesn't always work for Thumb.
if { [istarget arm*-*-*] || [istarget xscale*-*-*] \
|| [istarget strongarm*-*-*] } {
set torture_eval_before_execute {
global compiler_conditional_xf
www.eeworm.com/read/240162/4588518
x 920428-2.x
# This doesn't work on sparc's with -mflat.
if { [istarget "sparc-*-*"] && [string match "*mflat*" $CFLAGS] } {
set torture_execute_xfail "sparc-*-*"
}
return 0
www.eeworm.com/read/239312/4602609
permx
#!/bin/sh
# Scriptname:permx
for file # Empty wordlist
do
if [ -f $file -a ! -x $file ]
then
chmod +x $file
echo $file now has execute permission
fi
done
www.eeworm.com/read/237597/4622274
cs reflect2.cs
// Reflect2.cs -- Uses reflection to execute a class method indirectly.
//
// Compile this program with the following command line:
// C:>csc Reflect2.cs
//
usin