/external/boringssl/src/util/bot/ |
vs_env.py | 32 # Using shell=True is somewhat ugly, but the alternative is to pull in a copy 37 shell=True)) variable
|
/external/skia/gn/ |
run_sksllex.py | 20 shell=True) variable 22 "/sksl/SkSLLexer.cpp\"", shell=True)
|
/external/skqp/gn/ |
run_sksllex.py | 20 shell=True) variable 22 "/sksl/SkSLLexer.cpp\"", shell=True) 28 "/sksl/SkSLLayoutLexer.h\"", shell=True) 30 "/sksl/SkSLLayoutLexer.cpp\"", shell=True)
|
/art/libartbase/base/ |
socket_peer_is_trusted.cc | 28 // Returns true if the user on the other end of the socket is root or shell. 38 passwd* shell = getpwnam("shell"); local 39 if (cr.uid != 0 && cr.uid != shell->pw_uid) {
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Demo/scripts/ |
script.py | 6 # -p Use Python as shell.
18 shell = 'sh'
variable 21 if os.environ.has_key('SHELL'):
22 shell = os.environ['SHELL']
variable 34 shell = 'python'
variable 40 pty.spawn(shell, read)
|
/external/python/cpython2/Demo/scripts/ |
script.py | 6 # -p Use Python as shell. 18 shell = 'sh' variable 21 if os.environ.has_key('SHELL'): 22 shell = os.environ['SHELL'] variable 34 shell = 'python' variable 40 pty.spawn(shell, read)
|
/build/kati/ |
fileutil_bench.cc | 22 std::string shell = "/bin/bash"; local 27 RunCommand(shell, shellflag, cmd, RedirectStderr::NONE, &result); 33 std::string shell = "/bin/bash "; local 38 RunCommand(shell, shellflag, cmd, RedirectStderr::NONE, &result);
|
func.h | 45 SHELL, 55 string shell; member in struct:CommandResult
|
regen.cc | 61 string shell; member in struct:__anon1591::StampChecker::ShellResult 243 LOAD_STRING(fp, &sr->shell); 396 printf("shell %s: clean (no rerun)\n", sr->cmd.c_str()); 403 printf("shell %s: ignored\n", sr->cmd.c_str()); 407 COLLECT_STATS_WITH_SLOW_REPORT("shell time (regen)", sr->cmd.c_str()); 409 RunCommand(sr->shell, sr->shellflag, sr->cmd, RedirectStderr::DEV_NULL, 414 printf("shell %s: dirty\n", sr->cmd.c_str()); 416 *err = StringPrintf("$(shell %s) was changed, regenerating...\n", 422 printf("shell %s: clean (rerun)\n", sr->cmd.c_str());
|
/external/skia/tools/skpbench/ |
_adb.py | 20 def shell(self, cmd): member in class:Adb 23 self.__invoke('shell', cmd) 28 result = subprocess.check_output(self.__invocation + ['shell', cmd]) 50 self.shell('reboot') 58 self.__invoke('shell', 'echo', '$(whoami)@$(getprop ro.serialno)$',
|
/external/skqp/tools/skpbench/ |
_adb.py | 20 def shell(self, cmd): member in class:Adb 23 self.__invoke('shell', cmd) 28 result = subprocess.check_output(self.__invocation + ['shell', cmd]) 50 self.shell('reboot') 58 self.__invoke('shell', 'echo', '$(whoami)@$(getprop ro.serialno)$',
|
/external/sl4a/Common/src/com/googlecode/android_scripting/interpreter/shell/ |
ShellInterpreter.java | 17 package com.googlecode.android_scripting.interpreter.shell; 25 * Represents the shell. 34 setNiceName("Shell");
|
/external/toybox/toys/pending/ |
sulogin.c | 70 static void run_shell(char *shell) 72 snprintf(toybuf,sizeof(toybuf), "-%s", shell); 73 execl(shell, toybuf, NULL); 74 error_exit("Failed to spawn shell"); 84 "LD_AOUT_PRELOAD", "LD_NOWARN", "LD_KEEPDIR", "SHELL", NULL 86 char *shell = NULL, *pass = NULL, **temp = forbid; local 115 if ((shell = getenv("SUSHELL")) || (shell = getenv("sushell")) 116 || (shell = pwd->pw_shell)) 117 run_shell((shell && *shell)? shell: "/bin/sh") [all...] |
/external/bcc/tools/ |
criticalstat.py | 53 shell=True, variable
|
/cts/hostsidetests/inputmethodservice/deviceside/devicetest/src/android/inputmethodservice/cts/devicetest/ |
TestHelper.java | 98 * Execute a shell {@code command} and return its standard out. 99 * @param command a shell command text to execute. 103 String shell(String command) throws IOException { method in class:TestHelper
|
/external/chromium-trace/catapult/common/py_vulcanize/third_party/rcssmin/_setup/py2/ |
shell.py | 19 Shell utilities 22 Shell utilities. 201 shell = True 205 shell = False 224 shell=shell, 299 shell = True variable 303 shell = False variable 310 argv, env=env, shell=shell, close_fds=close_fd [all...] |
/external/chromium-trace/catapult/common/py_vulcanize/third_party/rjsmin/_setup/py2/ |
shell.py | 19 Shell utilities 22 Shell utilities. 201 shell = True 205 shell = False 224 shell=shell, 299 shell = True variable 303 shell = False variable 310 argv, env=env, shell=shell, close_fds=close_fd [all...] |
/external/curl/src/ |
tool_vms.c | 44 /* VMS has a DCL shell and and also has Unix shells ported to it. 45 * When curl is running under a Unix shell, we want it to be as much 50 char *shell; local 52 /* Have we checked the shell yet? */ 56 shell = getenv("SHELL"); 58 /* No shell, means DCL */ 59 if(shell == NULL) { 64 /* Have to make sure some one did not set shell to DCL */ 65 if(strcmp(shell, "DCL") == 0) [all...] |
/bionic/libc/bionic/ |
grp_pwd_file.cpp | 110 const char* shell() const { function in struct:__anon198::PasswdLine 115 if (name() == nullptr || dir() == nullptr || shell() == nullptr) { 144 CopyFieldToString(passwd_state->sh_buffer_, shell(), sizeof(passwd_state->sh_buffer_));
|
/development/ide/emacs/ |
android-host.el | 36 ;; C-x a b android-adb-shell-reboot-bootloader 59 (define-key map (kbd "b") 'android-adb-shell-reboot-bootloader) 78 (defun android-adb-shell-reboot-bootloader () 79 "Execute 'adb shell reboot bootloader'." 81 (android-adb-shell-command "reboot bootloader")) 111 (start-process-shell-command 115 (start-process-shell-command
|
android-common.el | 70 Similarly to the shell functions in envsetup.sh, for the root both ./Makefile 139 the shell exec PATH setup." 168 (shell-command (concat (android-adb) " -p " (android-product-path) 171 (shell-command (concat (android-adb) " " command) 174 (defun android-adb-shell-command (command) 175 "Execute 'adb shell COMMAND'." 176 (android-adb-command (concat " shell " command)
|
/external/libxml2/ |
xmlcatalog.c | 33 static int shell = 0; variable 51 * Shell Interface * 300 printf("\texit: quit the shell\n"); 318 \t--shell : run a shell allowing interactive queries\n\ 356 } else if ((!strcmp(argv[i], "-shell")) || 357 (!strcmp(argv[i], "--shell"))) { 358 shell++; 558 } else if (shell) {
|
/external/swiftshader/third_party/llvm-7.0/llvm/utils/git-svn/ |
git-llvm | 92 """Lazily create a /dev/null fd for use in shell()""" 99 def shell(cmd, strip=True, cwd=None, stdin=None, die_on_failure=True, function 133 return shell(['git'] + list(cmd), kwargs.get('strip', True)) 138 return shell(['svn'] + list(cmd), cwd=cwd, stdin=kwargs.get('stdin', None), 245 shell(['dos2unix', '-q'] + crlf_files, cwd=svn_sr_path) 268 shell(['git', 'apply', '-p2', '-'], cwd=svn_sr_path, stdin=diff,
|
/cts/hostsidetests/atrace/src/android/atrace/cts/ |
AtraceHostTestBase.java | 92 shell("input keyevent KEYCODE_WAKEUP"); 93 shell("wm dismiss-keyguard"); 113 shell("atrace --async_stop"); 122 shell("atrace --async_stop"); 190 protected final String shell(String command, String... args) { method in class:AtraceHostTestBase 236 shell(withAppTracing ? START_TRACE_CMD : START_TRACE_NO_APP_CMD, categories); 238 String traceOutput = shell("atrace --async_stop", categories);
|
/development/python-packages/adb/ |
device.py | 249 # Follow any shell command with this string to get the exit 279 self.adb_cmd + ['shell', 'echo']).decode('utf-8') 295 command = self.adb_cmd + ['shell'] + user_cmd 301 """Finds the exit code string from shell output. 304 out: Shell output string. 321 raise RuntimeError('Could not find exit status in shell output.') 333 def shell(self, cmd): member in class:AndroidDevice 334 """Calls `adb shell` 352 """Calls `adb shell` 376 """Calls `adb shell` and returns a handle to the adb process [all...] |