代码搜索:execute

找到约 10,000 项符合「execute」的源代码

代码结果 10,000
www.eeworm.com/read/376060/2714853

svn-base timermess.cec.svn-base

/* usage: Inject it into the process and call it from a codecave injection on the timer decrease code You could also just choose inject->inject into current process and execute, but it's only a
www.eeworm.com/read/376006/2718318

slcsimple

`> .sqlf`; # PgSQL specific to execute all queries in single xaction `echo "BEGIN;" >> .sqlf` if ( $TestDBMS =~ /^pgsql/ && $XACTBLOCK ne '' ); `cat sqls/slcsimple.data >> .sqlf`; `echo "END;" >
www.eeworm.com/read/367656/2840379

scr reset_go_main.scr

// Hitex/Lue/11.02.2008 // Executable Script file for HiTOP Debugger // Reset application & Go main // Reset RESET TARGET // execute program till main Go UNTIL main wait
www.eeworm.com/read/367656/2840460

scr reset_go_main.scr

// Hitex/Lue/11.02.2008 // Executable Script file for HiTOP Debugger // Reset application & Go main // Reset RESET TARGET // execute program till main Go UNTIL main wait
www.eeworm.com/read/367656/2840751

scr reset_go_main.scr

// Hitex/Lue/11.02.2008 // Executable Script file for HiTOP Debugger // Reset application & Go main // Reset RESET TARGET // execute program till main Go UNTIL main wait
www.eeworm.com/read/367316/2846542

a01074e33b410018187e8f4f0cfd5be6

package Biz; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; public class loginImp implements BizInterface { public String execute(HttpServletR
www.eeworm.com/read/367316/2846555

50c9e55945410018187e8f4f0cfd5be6

package Biz; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; public class loginImp implements BizInterface { public String execute(HttpServletR
www.eeworm.com/read/366702/2878318

x eeprof-1.x

if { [istarget "powerpc-ibm-aix*"] } { set torture_execute_xfail "powerpc-ibm-aix*" } set additional_flags "-finstrument-functions" return 0
www.eeworm.com/read/366702/2878555

x 941014-1.x

# This doesn't always work for Thumb. if { [istarget arm*-*-*] || [istarget xscale*-*-*] \ || [istarget strongarm*-*-*] } { set torture_eval_before_execute { global compiler_conditional_xf
www.eeworm.com/read/362150/2936922

10dc2737e046001c135f8b93c8f66dbb

package com.bjsxt.spring.web.actions; import org.apache.struts.actions.DispatchAction; public class LoginAction extends DispatchAction { public ActionForward execute( Action