HomeSort by: relevance | last modified time | path
    Searched defs:shell (Results 1 - 25 of 62) sorted by relevancy

1 2 3

  /src/games/warp/
sig.c 82 char *shell = getenv("SHELL"); local in function:mytstp
85 if (!*shell)
86 shell = "/bin/sh";
87 execl(shell,shell,0);
sig.c 82 char *shell = getenv("SHELL"); local in function:mytstp
85 if (!*shell)
86 shell = "/bin/sh";
87 execl(shell,shell,0);
  /src/usr.bin/make/unit-tests/
var-op-sunsh.mk 4 # side through the shell. It is a seldom-used alternative to the !=
9 # This is the idiomatic form of the Sun shell assignment operator.
28 # 'VAR:shell', using the '=' assignment operator.
29 VAR:shell= echo colon-shell macro
33 .if ${${:UVAR\:shell}} != "echo colon-shell"
65 VAR.${:U echo\:shell}= ok-shell
66 .if ${VAR.${:U echo\:shell}} != "ok-shell
    [all...]
var-op-sunsh.mk 4 # side through the shell. It is a seldom-used alternative to the !=
9 # This is the idiomatic form of the Sun shell assignment operator.
28 # 'VAR:shell', using the '=' assignment operator.
29 VAR:shell= echo colon-shell macro
33 .if ${${:UVAR\:shell}} != "echo colon-shell"
65 VAR.${:U echo\:shell}= ok-shell
66 .if ${VAR.${:U echo\:shell}} != "ok-shell
    [all...]
posix-execution.mk 10 # The second command thus does not see the shell variable from the first
31 # Deviation from POSIX: The shell "-e" option is not in effect.
32 # expect: shell-e-option: before
33 # expect: shell-e-option: after
34 all: shell-e-option
35 shell-e-option:
posix-execution.mk 10 # The second command thus does not see the shell variable from the first
31 # Deviation from POSIX: The shell "-e" option is not in effect.
32 # expect: shell-e-option: before
33 # expect: shell-e-option: after
34 all: shell-e-option
35 shell-e-option:
varmod-assign.mk 10 all: mod-assign-shell-error
114 mod-assign-shell-error:
  /src/usr.bin/newgrp/
newgrp.c 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main
139 shell = getenv("SHELL");
140 if (shell != NULL)
141 pwd->pw_shell = shell;
147 shell = pwd->pw_shell;
184 (void)setenv("SHELL", pwd->pw_shell, 1);
189 shell = sbuf;
192 (void)execl(pwd->pw_shell, shell, NULL);
newgrp.c 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main
139 shell = getenv("SHELL");
140 if (shell != NULL)
141 pwd->pw_shell = shell;
147 shell = pwd->pw_shell;
184 (void)setenv("SHELL", pwd->pw_shell, 1);
189 shell = sbuf;
192 (void)execl(pwd->pw_shell, shell, NULL);
  /src/distrib/utils/more/
os.c 74 * Pass the specified command to a shell to be executed.
83 char *shell; local in function:lsystem
123 * If we have a SHELL environment variable, use
124 * <$SHELL -c "command"> instead of just <command>.
125 * If the command is empty, just invoke a shell.
127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0')
130 cmd = shell;
134 shell, cmd)
    [all...]
os.c 74 * Pass the specified command to a shell to be executed.
83 char *shell; local in function:lsystem
123 * If we have a SHELL environment variable, use
124 * <$SHELL -c "command"> instead of just <command>.
125 * If the command is empty, just invoke a shell.
127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0')
130 cmd = shell;
134 shell, cmd)
    [all...]
  /src/usr.sbin/chroot/
chroot.c 118 const char *shell; local in function:main
191 if ((shell = getenv("SHELL")) == NULL)
192 shell = _PATH_BSHELL;
193 execlp(shell, shell, "-i", NULL);
194 err(1, "%s", shell);
chroot.c 118 const char *shell; local in function:main
191 if ((shell = getenv("SHELL")) == NULL)
192 shell = _PATH_BSHELL;
193 execlp(shell, shell, "-i", NULL);
194 err(1, "%s", shell);
  /src/usr.bin/apply/
apply.c 202 * Private version of system(3). Use the user's SHELL environment
203 * variable as the shell to execute.
208 static const char *name, *shell; local in function:shell_system
214 if (shell == NULL) {
215 if ((shell = getenv("SHELL")) == NULL)
216 shell = _PATH_BSHELL;
217 if ((name = strrchr(shell, '/')) == NULL)
218 name = shell;
237 (void)execl(shell, name, "-c", command, (char *)NULL)
    [all...]
apply.c 202 * Private version of system(3). Use the user's SHELL environment
203 * variable as the shell to execute.
208 static const char *name, *shell; local in function:shell_system
214 if (shell == NULL) {
215 if ((shell = getenv("SHELL")) == NULL)
216 shell = _PATH_BSHELL;
217 if ((name = strrchr(shell, '/')) == NULL)
218 name = shell;
237 (void)execl(shell, name, "-c", command, (char *)NULL)
    [all...]
  /src/usr.bin/finger/
finger.h 51 char *shell; /* user's shell */ member in struct:person
finger.h 51 char *shell; /* user's shell */ member in struct:person
  /src/bin/ksh/
main.c 32 * shell initialization
48 "typeset", "-x", "SHELL", "PATH", "HOME", NULL,
143 /* define shell keywords */
222 /* assign default shell variable values */
389 if (is_restricted(argv[0]) || is_restricted(str_val(global("SHELL"))))
394 "ENV", "SHELL",
413 shell(s, true); /* doesn't return */
457 * If user ^C's out, we don't want to kill the shell...
479 i = shell(s, false);
498 r = shell(s, false)
507 shell(s, toplevel) function
    [all...]
  /src/libexec/rexecd/
rexecd.c 93 static char shell[PATH_MAX + 1] = "SHELL="; variable in typeref:typename:char[]
95 static char *envinit[] = { homedir, shell, path, username, logname, 0 };
343 (void)pam_setenv(pamh, "SHELL", pwd->pw_shell, 1);
359 (void)strlcat(shell, pwd->pw_shell, sizeof(shell));
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/
sanitizer_linux_test.cc 263 const char *shell = "/system/bin/sh"; local in function:__sanitizer::TEST
265 const char *shell = "/bin/sh"; local in function:__sanitizer::TEST
267 const char *argv[] = {shell, "-c", "echo -n 'hello'", (char *)NULL};
268 int pid = StartSubprocess(shell, argv,
  /src/usr.bin/login/
login.c 164 char *shell = NULL; local in function:main
605 if ((shell = login_getcapstr(lc, "shell", NULL, NULL)) != NULL) {
606 if ((shell = strdup(shell)) == NULL) {
610 pwd->pw_shell = shell;
615 (void)setenv("SHELL", pwd->pw_shell, 1);
login_pam.c 115 char *shell = NULL; local in function:main
574 shell = login_getcapstr(lc, "shell", pwd->pw_shell, pwd->pw_shell);
575 if (*shell == '\0')
576 shell = pwd->pw_shell;
578 if ((pwd->pw_shell = strdup(shell)) == NULL) {
584 (void)setenv("SHELL", pwd->pw_shell, 1);
  /src/usr.bin/resize/
resize.c 119 { "sh", SHELL_BOURNE }, /* vanilla Bourne shell */
121 { "bash", SHELL_BOURNE }, /* GNU Bourne again shell */
124 { "ksh", SHELL_BOURNE }, /* Korn shell (from AT&T toolchest) */
125 { "ksh-i", SHELL_BOURNE }, /* another name for Korn shell */
126 { "ksh93", SHELL_BOURNE }, /* Korn shell */
324 char *shell; local in function:main
360 case 'u': /* Bourne (Unix) shell */
363 case 'c': /* C shell */
375 /* Find out what kind of shell this user is running.
378 if ((ptr = x_getenv("SHELL")) == NULL)
    [all...]
  /src/usr.bin/su/
su.c 113 const char *user, *shell, *avshell; local in function:main
131 shell = class = NULL;
165 "usage: %s [%s] [login[:group] [shell arguments]]\n",
167 "usage: %s [%s] [login [shell arguments]]\n",
183 /* get current login name and shell */
199 shell = shellbuf;
201 shell = _PATH_BSHELL;
304 /* if asme and non-standard target shell, must be root */
306 errx(EXIT_FAILURE, "permission denied (shell).");
308 shell = pwd->pw_shell
    [all...]
su_pam.c 108 const char *user, *shell, *avshell; local in function:main
132 shell = class = NULL;
159 "Usage: %s [%s] [login[:group] [shell arguments]]\n",
161 "Usage: %s [%s] [login [shell arguments]]\n",
177 /* get current login name and shell */
193 shell = shellbuf;
195 shell = _PATH_BSHELL;
317 /* if asme and non-standard target shell, must be root */
320 "permission denied (shell)."));
322 shell = pwd->pw_shell
    [all...]

Completed in 30 milliseconds

1 2 3