代码搜索:execute
找到约 10,000 项符合「execute」的源代码
代码结果 10,000
www.eeworm.com/read/376060/2714853
svn-base timermess.cec.svn-base
/*
usage: Inject it into the process and call it from a codecave injection on the
timer decrease code
You could also just choose inject->inject into current process and execute,
but it's only a
www.eeworm.com/read/376006/2718318
slcsimple
`> .sqlf`;
# PgSQL specific to execute all queries in single xaction
`echo "BEGIN;" >> .sqlf` if ( $TestDBMS =~ /^pgsql/ && $XACTBLOCK ne '' );
`cat sqls/slcsimple.data >> .sqlf`;
`echo "END;" >
www.eeworm.com/read/367656/2840379
scr reset_go_main.scr
// Hitex/Lue/11.02.2008
// Executable Script file for HiTOP Debugger
// Reset application & Go main
// Reset
RESET TARGET
// execute program till main
Go UNTIL main
wait
www.eeworm.com/read/367656/2840460
scr reset_go_main.scr
// Hitex/Lue/11.02.2008
// Executable Script file for HiTOP Debugger
// Reset application & Go main
// Reset
RESET TARGET
// execute program till main
Go UNTIL main
wait
www.eeworm.com/read/367656/2840751
scr reset_go_main.scr
// Hitex/Lue/11.02.2008
// Executable Script file for HiTOP Debugger
// Reset application & Go main
// Reset
RESET TARGET
// execute program till main
Go UNTIL main
wait
www.eeworm.com/read/367316/2846542
a01074e33b410018187e8f4f0cfd5be6
package Biz;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
public class loginImp implements BizInterface {
public String execute(HttpServletR
www.eeworm.com/read/367316/2846555
50c9e55945410018187e8f4f0cfd5be6
package Biz;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
public class loginImp implements BizInterface {
public String execute(HttpServletR
www.eeworm.com/read/366702/2878318
x eeprof-1.x
if { [istarget "powerpc-ibm-aix*"] } {
set torture_execute_xfail "powerpc-ibm-aix*"
}
set additional_flags "-finstrument-functions"
return 0
www.eeworm.com/read/366702/2878555
x 941014-1.x
# This doesn't always work for Thumb.
if { [istarget arm*-*-*] || [istarget xscale*-*-*] \
|| [istarget strongarm*-*-*] } {
set torture_eval_before_execute {
global compiler_conditional_xf
www.eeworm.com/read/362150/2936922
10dc2737e046001c135f8b93c8f66dbb
package com.bjsxt.spring.web.actions;
import org.apache.struts.actions.DispatchAction;
public class LoginAction extends DispatchAction {
public ActionForward execute(
Action