HomeSort by: relevance | last modified time | path
    Searched defs:shell (Results 1 - 25 of 31) sorted by relevancy

1 2

  /src/games/warp/
sig.c 82 char *shell = getenv("SHELL"); local in function:mytstp
85 if (!*shell)
86 shell = "/bin/sh";
87 execl(shell,shell,0);
  /src/usr.bin/make/unit-tests/
var-op-sunsh.mk 4 # side through the shell. It is a seldom-used alternative to the !=
9 # This is the idiomatic form of the Sun shell assignment operator.
28 # 'VAR:shell', using the '=' assignment operator.
29 VAR:shell= echo colon-shell macro
33 .if ${${:UVAR\:shell}} != "echo colon-shell"
65 VAR.${:U echo\:shell}= ok-shell
66 .if ${VAR.${:U echo\:shell}} != "ok-shell
    [all...]
posix-execution.mk 10 # The second command thus does not see the shell variable from the first
31 # Deviation from POSIX: The shell "-e" option is not in effect.
32 # expect: shell-e-option: before
33 # expect: shell-e-option: after
34 all: shell-e-option
35 shell-e-option:
varmod-assign.mk 10 all: mod-assign-shell-error
114 mod-assign-shell-error:
var-scope-local.mk 194 all: var-scope-local-shell.o
201 var-scope-local-shell.o:
256 # The variable assignment operator '!=' assigns the output of the shell
257 # command, as everywhere else. The shell command is run when the dependency
259 var-scope-local-shell.o: VAR != echo output
  /src/usr.bin/newgrp/
newgrp.c 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main
139 shell = getenv("SHELL");
140 if (shell != NULL)
141 pwd->pw_shell = shell;
147 shell = pwd->pw_shell;
184 (void)setenv("SHELL", pwd->pw_shell, 1);
189 shell = sbuf;
192 (void)execl(pwd->pw_shell, shell, NULL);
  /src/distrib/utils/more/
os.c 74 * Pass the specified command to a shell to be executed.
83 char *shell; local in function:lsystem
123 * If we have a SHELL environment variable, use
124 * <$SHELL -c "command"> instead of just <command>.
125 * If the command is empty, just invoke a shell.
127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0')
130 cmd = shell;
134 shell, cmd)
    [all...]
  /src/usr.sbin/chroot/
chroot.c 118 const char *shell; local in function:main
191 if ((shell = getenv("SHELL")) == NULL)
192 shell = _PATH_BSHELL;
193 execlp(shell, shell, "-i", NULL);
194 err(1, "%s", shell);
  /src/usr.bin/apply/
apply.c 202 * Private version of system(3). Use the user's SHELL environment
203 * variable as the shell to execute.
208 static const char *name, *shell; local in function:shell_system
214 if (shell == NULL) {
215 if ((shell = getenv("SHELL")) == NULL)
216 shell = _PATH_BSHELL;
217 if ((name = strrchr(shell, '/')) == NULL)
218 name = shell;
237 (void)execl(shell, name, "-c", command, (char *)NULL)
    [all...]
  /src/usr.bin/finger/
finger.h 51 char *shell; /* user's shell */ member in struct:person
  /src/bin/ksh/
main.c 32 * shell initialization
48 "typeset", "-x", "SHELL", "PATH", "HOME", NULL,
143 /* define shell keywords */
222 /* assign default shell variable values */
389 if (is_restricted(argv[0]) || is_restricted(str_val(global("SHELL"))))
394 "ENV", "SHELL",
413 shell(s, true); /* doesn't return */
457 * If user ^C's out, we don't want to kill the shell...
479 i = shell(s, false);
498 r = shell(s, false)
507 shell(s, toplevel) function
    [all...]
  /src/libexec/rexecd/
rexecd.c 93 static char shell[PATH_MAX + 1] = "SHELL="; variable in typeref:typename:char[]
95 static char *envinit[] = { homedir, shell, path, username, logname, 0 };
343 (void)pam_setenv(pamh, "SHELL", pwd->pw_shell, 1);
359 (void)strlcat(shell, pwd->pw_shell, sizeof(shell));
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/
sanitizer_linux_test.cc 263 const char *shell = "/system/bin/sh"; local in function:__sanitizer::TEST
265 const char *shell = "/bin/sh"; local in function:__sanitizer::TEST
267 const char *argv[] = {shell, "-c", "echo -n 'hello'", (char *)NULL};
268 int pid = StartSubprocess(shell, argv,
  /src/usr.bin/login/
login.c 164 char *shell = NULL; local in function:main
605 if ((shell = login_getcapstr(lc, "shell", NULL, NULL)) != NULL) {
606 if ((shell = strdup(shell)) == NULL) {
610 pwd->pw_shell = shell;
615 (void)setenv("SHELL", pwd->pw_shell, 1);
login_pam.c 115 char *shell = NULL; local in function:main
574 shell = login_getcapstr(lc, "shell", pwd->pw_shell, pwd->pw_shell);
575 if (*shell == '\0')
576 shell = pwd->pw_shell;
578 if ((pwd->pw_shell = strdup(shell)) == NULL) {
584 (void)setenv("SHELL", pwd->pw_shell, 1);
  /src/usr.bin/resize/
resize.c 119 { "sh", SHELL_BOURNE }, /* vanilla Bourne shell */
121 { "bash", SHELL_BOURNE }, /* GNU Bourne again shell */
124 { "ksh", SHELL_BOURNE }, /* Korn shell (from AT&T toolchest) */
125 { "ksh-i", SHELL_BOURNE }, /* another name for Korn shell */
126 { "ksh93", SHELL_BOURNE }, /* Korn shell */
324 char *shell; local in function:main
360 case 'u': /* Bourne (Unix) shell */
363 case 'c': /* C shell */
375 /* Find out what kind of shell this user is running.
378 if ((ptr = x_getenv("SHELL")) == NULL)
    [all...]
  /src/usr.bin/su/
su.c 113 const char *user, *shell, *avshell; local in function:main
131 shell = class = NULL;
165 "usage: %s [%s] [login[:group] [shell arguments]]\n",
167 "usage: %s [%s] [login [shell arguments]]\n",
183 /* get current login name and shell */
199 shell = shellbuf;
201 shell = _PATH_BSHELL;
304 /* if asme and non-standard target shell, must be root */
306 errx(EXIT_FAILURE, "permission denied (shell).");
308 shell = pwd->pw_shell
    [all...]
su_pam.c 108 const char *user, *shell, *avshell; local in function:main
132 shell = class = NULL;
159 "Usage: %s [%s] [login[:group] [shell arguments]]\n",
161 "Usage: %s [%s] [login [shell arguments]]\n",
177 /* get current login name and shell */
193 shell = shellbuf;
195 shell = _PATH_BSHELL;
317 /* if asme and non-standard target shell, must be root */
320 "permission denied (shell)."));
322 shell = pwd->pw_shell
    [all...]
  /src/dist/pf/usr.sbin/authpf/
authpf.c 71 * User shell for authenticating gateways. Sole purpose is to allow
86 char *shell; local in function:main
136 shell = login_getcapstr(lc, "shell", pw->pw_shell,
139 shell = pw->pw_shell;
143 if (strcmp(shell, PATH_AUTHPF_SHELL)) {
144 syslog(LOG_ERR, "wrong shell for user %s, uid %u",
146 if (shell != pw->pw_shell)
147 free(shell);
151 if (shell != pw->pw_shell
    [all...]
  /src/usr.bin/tip/
cmds.c 559 * Escape to local shell
563 shell(char dummy __unused) function in typeref:typename:void
583 if ((cp = strrchr(value(SHELL), '/')) == NULL)
584 cp = value(SHELL);
587 (void)execl(value(SHELL), cp, NULL);
684 if ((cp = strrchr(value(SHELL), '/')) == NULL)
685 cp = value(SHELL);
688 (void)execl(value(SHELL), cp, "-c", s, NULL);
847 * expand a file name if it includes shell meta characters
858 const char *Shell;
    [all...]
  /src/usr.bin/script/
script.c 311 const char *shell; local in function:doshell
317 shell = getenv("SHELL");
318 if (shell == NULL)
319 shell = _PATH_BSHELL;
320 execl(shell, shell, "-i", NULL);
321 warn("execl `%s'", shell);
  /src/games/atc/
input.c 358 char *shell, *base; local in function:gettoken
362 /* run user's favorite shell */
363 if ((shell = getenv("SHELL")) != NULL)
365 base = strrchr(shell, '/');
367 base = shell;
370 (void)execl(shell, base, (char *) 0);
  /src/usr.bin/mail/
cmd3.c 84 * Expand the shell escape by expanding unescaped !'s into the
136 * Process a shell escape by saving signals, ignoring signals,
140 shell(void *v) function in typeref:typename:PUBLIC int
164 * Fork an interactive shell.
  /src/bin/rcp/
rcp.c 104 const char *shell; local in function:main
145 sp = getservbyname(shell = "shell", "tcp");
147 errx(1, "%s/tcp: unknown service", shell);
578 * by the shell before the rcp command on the remote is
  /src/sbin/init/
init.c 651 const char *shell = INIT_BSHELL; local in function:single_user
718 "Enter pathname of shell or RETURN for %s: ", shell);
730 shell = altshell;
742 * Fire off a shell.
743 * If the default one doesn't work, try the Bourne shell.
751 (void)execv(shell, __UNCONST(argv));
752 emergency("can't exec `%s' for single user: %m", shell);
765 emergency("can't fork single-user shell: %m, trying again");
780 warning("wait for single-user shell failed: %m;
    [all...]

Completed in 24 milliseconds

1 2