Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode OS program
OS program list
Sort by :
« 1 2 ... .24 .25 .26 .27 .28 1829.30 .31 .32 .33 .34 ... 16274 »
Downloaded:0
Information passed to kthread() kthreadd.
Date : 2025-09-13 Size : 6kb User : zqmljao

Downloaded:0
balloc.c contains the blocks allocation and deallocation routines.
Date : 2025-09-13 Size : 16kb User : vnjkyin

Downloaded:0
board initialization code should put one of these into dev->platform_data and place the isp1362 onto platform_bus.
Date : 2025-09-13 Size : 1kb User : qwnqwl

Downloaded:0
File: key.c Purpose: Implement functions for 802.11i Key management.
Date : 2025-09-13 Size : 2kb User : hfxgkue

Downloaded:0
I have written dnw usb drive can run on Linux platform, for reference, assured operation, code has compiled ;
Date : 2025-09-13 Size : 1kb User : zhaomingmin

Downloaded:0
Key-driven programming, the development board to run successfully in 2440, and a series of key development for mobile phones
Date : 2025-09-13 Size : 2kb User : zhaomingmin

Downloaded:0
DMA channel design, implement fast data transmission, without going through the CPU, running at 2440 platform, successfully compile, code integrity
Date : 2025-09-13 Size : 24kb User : zhaomingmin

Downloaded:0
Touchscreen bare metal development, for resistive touch screen, code integrity, has been compiled for 2440 Development Platform
Date : 2025-09-13 Size : 41kb User : zhaomingmin

Downloaded:0
Must be called during the binary image hidden MD5 function can be achieved, so here is a function of providing effective MD5 hope to people interested in help.
Date : 2025-09-13 Size : 7kb User : zq

Downloaded:0
SPN encryption and decryption, with short block processing, using the same S-box, to complete the basic encryption and decryption functions, so it generally is
Date : 2025-09-13 Size : 323kb User :

Downloaded:0
SPN linear password encryption algorithm analysis, linear analysis of all the possible results will be guessed 8bit keys are listed out, where the counter maximum value that is the correct key
Date : 2025-09-13 Size : 1.81mb User :

Downloaded:0
SPN Differential cryptanalysis, ciphertext clear recommendations for selected number of 8000+, too small deviations may result
Date : 2025-09-13 Size : 254kb User :
« 1 2 ... .24 .25 .26 .27 .28 1829.30 .31 .32 .33 .34 ... 16274 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.