/src/games/warp/ |
sig.c | 82 char *shell = getenv("SHELL"); local in function:mytstp 85 if (!*shell) 86 shell = "/bin/sh"; 87 execl(shell,shell,0);
|
sig.c | 82 char *shell = getenv("SHELL"); local in function:mytstp 85 if (!*shell) 86 shell = "/bin/sh"; 87 execl(shell,shell,0);
|
/src/usr.bin/make/unit-tests/ |
var-op-sunsh.mk | 4 # side through the shell. It is a seldom-used alternative to the != 9 # This is the idiomatic form of the Sun shell assignment operator. 28 # 'VAR:shell', using the '=' assignment operator. 29 VAR:shell= echo colon-shell macro 33 .if ${${:UVAR\:shell}} != "echo colon-shell" 65 VAR.${:U echo\:shell}= ok-shell 66 .if ${VAR.${:U echo\:shell}} != "ok-shell [all...] |
var-op-sunsh.mk | 4 # side through the shell. It is a seldom-used alternative to the != 9 # This is the idiomatic form of the Sun shell assignment operator. 28 # 'VAR:shell', using the '=' assignment operator. 29 VAR:shell= echo colon-shell macro 33 .if ${${:UVAR\:shell}} != "echo colon-shell" 65 VAR.${:U echo\:shell}= ok-shell 66 .if ${VAR.${:U echo\:shell}} != "ok-shell [all...] |
posix-execution.mk | 10 # The second command thus does not see the shell variable from the first 31 # Deviation from POSIX: The shell "-e" option is not in effect. 32 # expect: shell-e-option: before 33 # expect: shell-e-option: after 34 all: shell-e-option 35 shell-e-option:
|
posix-execution.mk | 10 # The second command thus does not see the shell variable from the first 31 # Deviation from POSIX: The shell "-e" option is not in effect. 32 # expect: shell-e-option: before 33 # expect: shell-e-option: after 34 all: shell-e-option 35 shell-e-option:
|
varmod-assign.mk | 10 all: mod-assign-shell-error 114 mod-assign-shell-error:
|
/src/usr.bin/newgrp/ |
newgrp.c | 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main 139 shell = getenv("SHELL"); 140 if (shell != NULL) 141 pwd->pw_shell = shell; 147 shell = pwd->pw_shell; 184 (void)setenv("SHELL", pwd->pw_shell, 1); 189 shell = sbuf; 192 (void)execl(pwd->pw_shell, shell, NULL);
|
newgrp.c | 68 char *shell, sbuf[MAXPATHLEN + 2]; local in function:main 139 shell = getenv("SHELL"); 140 if (shell != NULL) 141 pwd->pw_shell = shell; 147 shell = pwd->pw_shell; 184 (void)setenv("SHELL", pwd->pw_shell, 1); 189 shell = sbuf; 192 (void)execl(pwd->pw_shell, shell, NULL);
|
/src/distrib/utils/more/ |
os.c | 74 * Pass the specified command to a shell to be executed. 83 char *shell; local in function:lsystem 123 * If we have a SHELL environment variable, use 124 * <$SHELL -c "command"> instead of just <command>. 125 * If the command is empty, just invoke a shell. 127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0') 130 cmd = shell; 134 shell, cmd) [all...] |
os.c | 74 * Pass the specified command to a shell to be executed. 83 char *shell; local in function:lsystem 123 * If we have a SHELL environment variable, use 124 * <$SHELL -c "command"> instead of just <command>. 125 * If the command is empty, just invoke a shell. 127 if ((shell = getenv("SHELL")) != NULL && *shell != '\0') 130 cmd = shell; 134 shell, cmd) [all...] |
/src/usr.sbin/chroot/ |
chroot.c | 118 const char *shell; local in function:main 191 if ((shell = getenv("SHELL")) == NULL) 192 shell = _PATH_BSHELL; 193 execlp(shell, shell, "-i", NULL); 194 err(1, "%s", shell);
|
chroot.c | 118 const char *shell; local in function:main 191 if ((shell = getenv("SHELL")) == NULL) 192 shell = _PATH_BSHELL; 193 execlp(shell, shell, "-i", NULL); 194 err(1, "%s", shell);
|
/src/usr.bin/apply/ |
apply.c | 202 * Private version of system(3). Use the user's SHELL environment 203 * variable as the shell to execute. 208 static const char *name, *shell; local in function:shell_system 214 if (shell == NULL) { 215 if ((shell = getenv("SHELL")) == NULL) 216 shell = _PATH_BSHELL; 217 if ((name = strrchr(shell, '/')) == NULL) 218 name = shell; 237 (void)execl(shell, name, "-c", command, (char *)NULL) [all...] |
apply.c | 202 * Private version of system(3). Use the user's SHELL environment 203 * variable as the shell to execute. 208 static const char *name, *shell; local in function:shell_system 214 if (shell == NULL) { 215 if ((shell = getenv("SHELL")) == NULL) 216 shell = _PATH_BSHELL; 217 if ((name = strrchr(shell, '/')) == NULL) 218 name = shell; 237 (void)execl(shell, name, "-c", command, (char *)NULL) [all...] |
/src/usr.bin/finger/ |
finger.h | 51 char *shell; /* user's shell */ member in struct:person
|
finger.h | 51 char *shell; /* user's shell */ member in struct:person
|
/src/bin/ksh/ |
main.c | 32 * shell initialization 48 "typeset", "-x", "SHELL", "PATH", "HOME", NULL, 143 /* define shell keywords */ 222 /* assign default shell variable values */ 389 if (is_restricted(argv[0]) || is_restricted(str_val(global("SHELL")))) 394 "ENV", "SHELL", 413 shell(s, true); /* doesn't return */ 457 * If user ^C's out, we don't want to kill the shell... 479 i = shell(s, false); 498 r = shell(s, false) 507 shell(s, toplevel) function [all...] |
/src/libexec/rexecd/ |
rexecd.c | 93 static char shell[PATH_MAX + 1] = "SHELL="; variable in typeref:typename:char[] 95 static char *envinit[] = { homedir, shell, path, username, logname, 0 }; 343 (void)pam_setenv(pamh, "SHELL", pwd->pw_shell, 1); 359 (void)strlcat(shell, pwd->pw_shell, sizeof(shell));
|
/src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
sanitizer_linux_test.cc | 263 const char *shell = "/system/bin/sh"; local in function:__sanitizer::TEST 265 const char *shell = "/bin/sh"; local in function:__sanitizer::TEST 267 const char *argv[] = {shell, "-c", "echo -n 'hello'", (char *)NULL}; 268 int pid = StartSubprocess(shell, argv,
|
/src/usr.bin/login/ |
login.c | 164 char *shell = NULL; local in function:main 605 if ((shell = login_getcapstr(lc, "shell", NULL, NULL)) != NULL) { 606 if ((shell = strdup(shell)) == NULL) { 610 pwd->pw_shell = shell; 615 (void)setenv("SHELL", pwd->pw_shell, 1);
|
login_pam.c | 115 char *shell = NULL; local in function:main 574 shell = login_getcapstr(lc, "shell", pwd->pw_shell, pwd->pw_shell); 575 if (*shell == '\0') 576 shell = pwd->pw_shell; 578 if ((pwd->pw_shell = strdup(shell)) == NULL) { 584 (void)setenv("SHELL", pwd->pw_shell, 1);
|
/src/usr.bin/resize/ |
resize.c | 119 { "sh", SHELL_BOURNE }, /* vanilla Bourne shell */ 121 { "bash", SHELL_BOURNE }, /* GNU Bourne again shell */ 124 { "ksh", SHELL_BOURNE }, /* Korn shell (from AT&T toolchest) */ 125 { "ksh-i", SHELL_BOURNE }, /* another name for Korn shell */ 126 { "ksh93", SHELL_BOURNE }, /* Korn shell */ 324 char *shell; local in function:main 360 case 'u': /* Bourne (Unix) shell */ 363 case 'c': /* C shell */ 375 /* Find out what kind of shell this user is running. 378 if ((ptr = x_getenv("SHELL")) == NULL) [all...] |
/src/usr.bin/su/ |
su.c | 113 const char *user, *shell, *avshell; local in function:main 131 shell = class = NULL; 165 "usage: %s [%s] [login[:group] [shell arguments]]\n", 167 "usage: %s [%s] [login [shell arguments]]\n", 183 /* get current login name and shell */ 199 shell = shellbuf; 201 shell = _PATH_BSHELL; 304 /* if asme and non-standard target shell, must be root */ 306 errx(EXIT_FAILURE, "permission denied (shell)."); 308 shell = pwd->pw_shell [all...] |
su_pam.c | 108 const char *user, *shell, *avshell; local in function:main 132 shell = class = NULL; 159 "Usage: %s [%s] [login[:group] [shell arguments]]\n", 161 "Usage: %s [%s] [login [shell arguments]]\n", 177 /* get current login name and shell */ 193 shell = shellbuf; 195 shell = _PATH_BSHELL; 317 /* if asme and non-standard target shell, must be root */ 320 "permission denied (shell).")); 322 shell = pwd->pw_shell [all...] |