/src/games/warp/ |
sig.c | 82 char *shell = getenv("SHELL"); local in function:mytstp 85 if (!*shell) 86 shell = "/bin/sh"; 87 execl(shell,shell,0);
|
/src/usr.bin/make/unit-tests/ |
var-op-sunsh.mk | 4 # side through the shell. It is a seldom-used alternative to the != 9 # This is the idiomatic form of the Sun shell assignment operator. 28 # 'VAR:shell', using the '=' assignment operator. 29 VAR:shell= echo colon-shell macro 33 .if ${${:UVAR\:shell}} != "echo colon-shell" 65 VAR.${:U echo\:shell}= ok-shell 66 .if ${VAR.${:U echo\:shell}} != "ok-shell [all...] |
posix-execution.mk | 10 # The second command thus does not see the shell variable from the first 31 # Deviation from POSIX: The shell "-e" option is not in effect. 32 # expect: shell-e-option: before 33 # expect: shell-e-option: after 34 all: shell-e-option 35 shell-e-option:
|
varmod-assign.mk | 10 all: mod-assign-shell-error 114 mod-assign-shell-error:
|
var-scope-local.mk | 194 all: var-scope-local-shell.o 201 var-scope-local-shell.o: 256 # The variable assignment operator '!=' assigns the output of the shell 257 # command, as everywhere else. The shell command is run when the dependency 259 var-scope-local-shell.o: VAR != echo output
|
/src/usr.bin/newgrp/ |
newgrp.c | 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main 139 shell = getenv("SHELL"); 140 if (shell != NULL) 141 pwd->pw_shell = shell; 147 shell = pwd->pw_shell; 184 (void)setenv("SHELL", pwd->pw_shell, 1); 189 shell = sbuf; 192 (void)execl(pwd->pw_shell, shell, NULL);
|
/src/distrib/utils/more/ |
os.c | 74 * Pass the specified command to a shell to be executed. 83 char *shell; local in function:lsystem 123 * If we have a SHELL environment variable, use 124 * <$SHELL -c "command"> instead of just <command>. 125 * If the command is empty, just invoke a shell. 127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0') 130 cmd = shell; 134 shell, cmd) [all...] |
/src/usr.sbin/chroot/ |
chroot.c | 118 const char *shell; local in function:main 191 if ((shell = getenv("SHELL")) == NULL) 192 shell = _PATH_BSHELL; 193 execlp(shell, shell, "-i", NULL); 194 err(1, "%s", shell);
|
/src/usr.bin/apply/ |
apply.c | 202 * Private version of system(3). Use the user's SHELL environment 203 * variable as the shell to execute. 208 static const char *name, *shell; local in function:shell_system 214 if (shell == NULL) { 215 if ((shell = getenv("SHELL")) == NULL) 216 shell = _PATH_BSHELL; 217 if ((name = strrchr(shell, '/')) == NULL) 218 name = shell; 237 (void)execl(shell, name, "-c", command, (char *)NULL) [all...] |
/src/usr.bin/finger/ |
finger.h | 51 char *shell; /* user's shell */ member in struct:person
|
/src/bin/ksh/ |
main.c | 32 * shell initialization 48 "typeset", "-x", "SHELL", "PATH", "HOME", NULL, 143 /* define shell keywords */ 222 /* assign default shell variable values */ 389 if (is_restricted(argv[0]) || is_restricted(str_val(global("SHELL")))) 394 "ENV", "SHELL", 413 shell(s, true); /* doesn't return */ 457 * If user ^C's out, we don't want to kill the shell... 479 i = shell(s, false); 498 r = shell(s, false) 507 shell(s, toplevel) function [all...] |
/src/libexec/rexecd/ |
rexecd.c | 93 static char shell[PATH_MAX + 1] = "SHELL="; variable in typeref:typename:char[] 95 static char *envinit[] = { homedir, shell, path, username, logname, 0 }; 343 (void)pam_setenv(pamh, "SHELL", pwd->pw_shell, 1); 359 (void)strlcat(shell, pwd->pw_shell, sizeof(shell));
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_linux_test.cc | 263 const char *shell = "/system/bin/sh"; local in function:__sanitizer::TEST 265 const char *shell = "/bin/sh"; local in function:__sanitizer::TEST 267 const char *argv[] = {shell, "-c", "echo -n 'hello'", (char *)NULL}; 268 int pid = StartSubprocess(shell, argv,
|
/src/usr.bin/login/ |
login.c | 164 char *shell = NULL; local in function:main 605 if ((shell = login_getcapstr(lc, "shell", NULL, NULL)) != NULL) { 606 if ((shell = strdup(shell)) == NULL) { 610 pwd->pw_shell = shell; 615 (void)setenv("SHELL", pwd->pw_shell, 1);
|
login_pam.c | 115 char *shell = NULL; local in function:main 574 shell = login_getcapstr(lc, "shell", pwd->pw_shell, pwd->pw_shell); 575 if (*shell == '\0') 576 shell = pwd->pw_shell; 578 if ((pwd->pw_shell = strdup(shell)) == NULL) { 584 (void)setenv("SHELL", pwd->pw_shell, 1);
|
/src/usr.bin/resize/ |
resize.c | 119 { "sh", SHELL_BOURNE }, /* vanilla Bourne shell */ 121 { "bash", SHELL_BOURNE }, /* GNU Bourne again shell */ 124 { "ksh", SHELL_BOURNE }, /* Korn shell (from AT&T toolchest) */ 125 { "ksh-i", SHELL_BOURNE }, /* another name for Korn shell */ 126 { "ksh93", SHELL_BOURNE }, /* Korn shell */ 324 char *shell; local in function:main 360 case 'u': /* Bourne (Unix) shell */ 363 case 'c': /* C shell */ 375 /* Find out what kind of shell this user is running. 378 if ((ptr = x_getenv("SHELL")) == NULL) [all...] |
/src/usr.bin/su/ |
su.c | 113 const char *user, *shell, *avshell; local in function:main 131 shell = class = NULL; 165 "usage: %s [%s] [login[:group] [shell arguments]]\n", 167 "usage: %s [%s] [login [shell arguments]]\n", 183 /* get current login name and shell */ 199 shell = shellbuf; 201 shell = _PATH_BSHELL; 304 /* if asme and non-standard target shell, must be root */ 306 errx(EXIT_FAILURE, "permission denied (shell)."); 308 shell = pwd->pw_shell [all...] |
su_pam.c | 108 const char *user, *shell, *avshell; local in function:main 132 shell = class = NULL; 159 "Usage: %s [%s] [login[:group] [shell arguments]]\n", 161 "Usage: %s [%s] [login [shell arguments]]\n", 177 /* get current login name and shell */ 193 shell = shellbuf; 195 shell = _PATH_BSHELL; 317 /* if asme and non-standard target shell, must be root */ 320 "permission denied (shell).")); 322 shell = pwd->pw_shell [all...] |
/src/dist/pf/usr.sbin/authpf/ |
authpf.c | 71 * User shell for authenticating gateways. Sole purpose is to allow 86 char *shell; local in function:main 136 shell = login_getcapstr(lc, "shell", pw->pw_shell, 139 shell = pw->pw_shell; 143 if (strcmp(shell, PATH_AUTHPF_SHELL)) { 144 syslog(LOG_ERR, "wrong shell for user %s, uid %u", 146 if (shell != pw->pw_shell) 147 free(shell); 151 if (shell != pw->pw_shell [all...] |
/src/usr.bin/tip/ |
cmds.c | 559 * Escape to local shell 563 shell(char dummy __unused) function in typeref:typename:void 583 if ((cp = strrchr(value(SHELL), '/')) == NULL) 584 cp = value(SHELL); 587 (void)execl(value(SHELL), cp, NULL); 684 if ((cp = strrchr(value(SHELL), '/')) == NULL) 685 cp = value(SHELL); 688 (void)execl(value(SHELL), cp, "-c", s, NULL); 847 * expand a file name if it includes shell meta characters 858 const char *Shell; [all...] |
/src/usr.bin/script/ |
script.c | 311 const char *shell; local in function:doshell 317 shell = getenv("SHELL"); 318 if (shell == NULL) 319 shell = _PATH_BSHELL; 320 execl(shell, shell, "-i", NULL); 321 warn("execl `%s'", shell);
|
/src/games/atc/ |
input.c | 358 char *shell, *base; local in function:gettoken 362 /* run user's favorite shell */ 363 if ((shell = getenv("SHELL")) != NULL) 365 base = strrchr(shell, '/'); 367 base = shell; 370 (void)execl(shell, base, (char *) 0);
|
/src/usr.bin/mail/ |
cmd3.c | 84 * Expand the shell escape by expanding unescaped !'s into the 136 * Process a shell escape by saving signals, ignoring signals, 140 shell(void *v) function in typeref:typename:PUBLIC int 164 * Fork an interactive shell.
|
/src/bin/rcp/ |
rcp.c | 104 const char *shell; local in function:main 145 sp = getservbyname(shell = "shell", "tcp"); 147 errx(1, "%s/tcp: unknown service", shell); 578 * by the shell before the rcp command on the remote is
|
/src/sbin/init/ |
init.c | 651 const char *shell = INIT_BSHELL; local in function:single_user 718 "Enter pathname of shell or RETURN for %s: ", shell); 730 shell = altshell; 742 * Fire off a shell. 743 * If the default one doesn't work, try the Bourne shell. 751 (void)execv(shell, __UNCONST(argv)); 752 emergency("can't exec `%s' for single user: %m", shell); 765 emergency("can't fork single-user shell: %m, trying again"); 780 warning("wait for single-user shell failed: %m; [all...] |