Home
last modified time | relevance | path

Searched full:shell (Results 1 – 25 of 4225) sorted by relevance

12345678910>>...169

/external/python/cpython2/Lib/idlelib/idle_test/
Dtest_io.py52 shell = MockShell()
53 f = PseudoOutputFile(shell, 'stdout', 'utf-8')
66 shell = MockShell()
67 f = PseudoOutputFile(shell, 'stdout', 'utf-8')
75 shell = MockShell()
76 f = PseudoOutputFile(shell, 'stdout', 'utf-8')
78 self.assertEqual(shell.written, [('test', 'stdout')])
79 shell.reset()
81 self.assertEqual(shell.written, [('t\xe8st', 'stdout')])
82 shell.reset()
[all …]
/external/python/mobly/tests/mobly/controllers/android_device_lib/
Dadb_test.py49 # Mock Shell Command
55 MOCK_ADB_SHELL_COMMAND_CHECK = 'adb shell command -v ls'
89 shell=False,
93 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=None)
115 shell=False,
119 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=None)
127 shell=False,
131 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=1)
161 shell=False,
172 shell=False,
[all …]
/external/python/cpython3/Lib/idlelib/idle_test/
Dtest_run.py116 shell = MockShell()
117 f = run.StdInputFile(shell, 'stdin')
130 shell = MockShell()
131 f = run.StdInputFile(shell, 'stdin')
139 shell = MockShell()
140 f = run.StdInputFile(shell, 'stdin')
141 shell.push(['one\n', 'two\n', ''])
143 shell.push(['one\n', 'two\n', ''])
145 shell.push(['one\n', 'two\n', ''])
147 shell.push(['one\n', 'two\n', 'three\n', ''])
[all …]
/external/libtraceevent/scripts/
Dutilities.mak23 # GNU make's $(shell ...) function converts to a
43 # shell-escape-nl
45 # Usage: $(shell some-command | $(call shell-escape-nl[,escape]))
47 # Use this to escape newlines from within a shell call;
51 # in an `awk' program that is delimited by shell
55 define shell-escape-nl
59 # shell-unescape-nl
61 # Usage: $(shell some-command | $(call shell-unescape-nl[,escape]))
63 # Use this to unescape newlines from within a shell call;
68 # delimited by shell single-quotes, so be wary
[all …]
/external/cpuinfo/scripts/
Dandroid-armv7-mock.sh80 adb shell "/data/local/tmp/alcatel-revvl-test --gtest_color=yes"
81 adb shell "/data/local/tmp/atm7029b-tablet-test --gtest_color=yes"
82 adb shell "/data/local/tmp/blu-r1-hd-test --gtest_color=yes"
83 adb shell "/data/local/tmp/galaxy-a3-2016-eu-test --gtest_color=yes"
84 adb shell "/data/local/tmp/galaxy-a8-2016-duos-test --gtest_color=yes"
85 adb shell "/data/local/tmp/galaxy-a8-2018-test --gtest_color=yes"
86 adb shell "/data/local/tmp/galaxy-c9-pro-test --gtest_color=yes"
87 adb shell "/data/local/tmp/galaxy-grand-prime-value-edition-test --gtest_color=yes"
88 adb shell "/data/local/tmp/galaxy-j1-2016-test --gtest_color=yes"
89 adb shell "/data/local/tmp/galaxy-j5-test --gtest_color=yes"
[all …]
Dandroid-arm64-mock.sh44 adb shell "/data/local/tmp/alcatel-revvl-test --gtest_color=yes"
45 adb shell "/data/local/tmp/galaxy-a8-2018-test --gtest_color=yes"
46 adb shell "/data/local/tmp/galaxy-c9-pro-test --gtest_color=yes"
47 adb shell "/data/local/tmp/galaxy-s6-test --gtest_color=yes"
48 adb shell "/data/local/tmp/galaxy-s7-global-test --gtest_color=yes"
49 adb shell "/data/local/tmp/galaxy-s7-us-test --gtest_color=yes"
50 adb shell "/data/local/tmp/galaxy-s8-global-test --gtest_color=yes"
51 adb shell "/data/local/tmp/galaxy-s8-us-test --gtest_color=yes"
52 adb shell "/data/local/tmp/galaxy-s9-global-test --gtest_color=yes"
53 adb shell "/data/local/tmp/galaxy-s9-us-test --gtest_color=yes"
[all …]
/external/bazel-skylib/tests/
Dshell_tests.bzl15 """Unit tests for shell.bzl."""
17 load("//lib:shell.bzl", "shell")
21 """Unit tests for shell.array_literal."""
24 asserts.equals(env, "()", shell.array_literal([]))
25 asserts.equals(env, "('1')", shell.array_literal([1]))
26 asserts.equals(env, "('1' '2' '3')", shell.array_literal([1, 2, 3]))
27 asserts.equals(env, "('$foo')", shell.array_literal(["$foo"]))
28 asserts.equals(env, "('qu\"o\"te')", shell.array_literal(['qu"o"te']))
35 """Unit tests for shell.quote."""
38 asserts.equals(env, "'foo'", shell.quote("foo"))
[all …]
/external/chromium-trace/catapult/devil/devil/utils/
Dcmd_helper.py4 """A wrapper for subprocess to make calling shell commands easier."""
39 """Return an shell-escaped version of the string using single quotes.
44 The returned value can be used in a shell command line as one token that gets
57 """Return an shell-escaped version of the string using double quotes.
60 or quote characters), while retaining some shell features such as variable
63 The returned value can be used in a shell command line as one token that gets
64 to be further interpreted by the shell.
67 shell implementation. This set usually includes: '$', '`', '\', '!', '*',
85 """Constructs a shell snippet for a command using a variable to shrink it.
95 A shell snippet that does not include setting the variable.
[all …]
/external/python/mobly/mobly/controllers/android_device_lib/
Dadb.py38 # `adb shell getprop` can take surprisingly long, when the device is a
108 ret, out, err = utils.run_command('which adb', shell=True)
148 >> adb.shell(['echo', 'a', 'b'])
151 documentation to avoid shell injection vulnerabilities and avoid having to
152 deal with multiple layers of shell quoting and different shell environments
155 If you really want to run the command through the system shell, this is
156 possible by supplying shell=True, but try to avoid this if possible:
157 >> adb.shell('cat /foo > /tmp/file', shell=True)
163 def _exec_cmd(self, args, shell, timeout, stderr) -> bytes: argument
169 shell: bool, True to run this command through the system shell,
[all …]
/external/bazel-skylib/docs/
Dshell_doc.md3 Skylib module containing shell utility functions.
5 <a id="#shell.array_literal"></a>
7 ## shell.array_literal
10 shell.array_literal(<a href="#shell.array_literal-iterable">iterable</a>)
13 Creates a string from a sequence that can be used as a shell array.
15 For example, `shell.array_literal(["a", "b", "c"])` would return the string
16 `("a" "b" "c")`, which can be used in a shell script wherever an array
19 Note that all elements in the array are quoted (using `shell.quote`) for
28 | <a id="shell.array_literal-iterable"></a>iterable | A sequence of elements. Elements that are no…
32 A string that represents the sequence as a shell array; that is,
[all …]
/external/wayland-protocols/chromium.org/
DREADME.chromium19 …wayland-scanner code < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > protocol/xdg-shell-v5-pr…
20 …land-scanner server-header < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > include/protocol/x…
21 …land-scanner client-header < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > include/protocol/x…
22 …wayland-scanner code < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > protocol/xdg-shell-v6-pr…
23 …land-scanner server-header < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > include/protocol/x…
24 …land-scanner client-header < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > include/protocol/x…
40 …wayland-scanner code < unstable/remote-shell/remote-shell-unstable-v1.xml > protocol/remote-shell-…
41 …nd-scanner server-header < unstable/remote-shell/remote-shell-unstable-v1.xml > include/protocol/r…
42 …nd-scanner client-header < unstable/remote-shell/remote-shell-unstable-v1.xml > include/protocol/r…
/external/toybox/toys/pending/
Dchsh.c1 /* chsh.c - Change login shell.
13 usage: chsh [-s SHELL] [USER]
15 Change user's login shell.
17 -s Use SHELL instead of prompting
19 Non-root users can only change their own shell to one listed in /etc/shells.
32 char *user, *line, *shell, *encrypted; local
56 // Get new shell (either -s or interactive)
58 if (toys.optflags) shell = TT.s;
60 xprintf("Changing the login shell for %s\n"
62 " Login shell [%s]: ", user, passwd_info->pw_shell);
[all …]
/external/tensorflow/tensorflow/tools/dockerfiles/
Dspec.yml104 - shell
114 - shell
127 - shell
139 - shell
155 - shell
171 - shell
186 - shell
201 - shell
217 - shell
233 - shell
[all …]
/external/libwebsockets/test-apps/android/app/src/main/jni/
DNativeLibs.mk187 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-gcc \
188 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ar \
189 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ranlib \
202 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-gcc \
203 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ar \
204 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ranlib \
217 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-gcc \
218 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ar \
219 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ranlib \
232 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM_V7A)/bin/$(TOOLCHAIN_ARM_V7A_PREFIX)-gcc \
[all …]
/external/python/cpython2/Doc/library/
Dsubprocess.rst45 .. function:: call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
61 >>> subprocess.call("exit 1", shell=True)
66 Using ``shell=True`` can be a security hazard. See the warning
77 .. function:: check_call(args, *, stdin=None, stdout=None, stderr=None, shell=False)
95 >>> subprocess.check_call("exit 1", shell=True)
104 Using ``shell=True`` can be a security hazard. See the warning
115 .. function:: check_output(args, *, stdin=None, stderr=None, shell=False, universal_newlines=False)
136 >>> subprocess.check_output("exit 1", shell=True)
147 ... shell=True)
154 Using ``shell=True`` can be a security hazard. See the warning
[all …]
Didle.rst21 * Python shell window (interactive interpreter) with colorizing
38 IDLE has two main window types, the Shell window and the Editor window. It is
47 File menu (Shell and Editor)
68 tree structure. In the shell, open a module first.
97 Edit menu (Shell and Editor)
197 Python Shell
198 Open or wake up the Python Shell window.
208 Do Check Module (above). If no error, restart the shell to clean the
209 environment, then execute the module. Output is displayed in the Shell
211 When execution is complete, the Shell retains focus and displays a prompt.
[all …]
/external/python/cpython3/Doc/library/
Didle.rst25 * Python shell window (interactive interpreter) with colorizing
42 IDLE has two main window types, the Shell window and the Editor window. It is
55 File menu (Shell and Editor)
76 tree structure. In the shell, open a module first.
101 Shell, ask to quit execution). Calling ``exit()`` or ``close()`` in the Shell
102 window also closes Shell. If this is the only window, also exit IDLE.
107 Edit menu (Shell and Editor)
206 including lines within multiline strings. Except for Shell windows,
218 Do :ref:`Check Module <check-module>`. If no error, restart the shell to clean the
219 environment, then execute the module. Output is displayed in the Shell
[all …]
/external/cpu_features/ci/vagrant/freebsd/
DVagrantfile18 config.ssh.shell = "sh"
73 # Enable provisioning with a shell script. Additional provisioners such as
77 config.vm.provision "env", type: "shell", inline:<<-SHELL
81 SHELL
82 config.vm.provision "devel", type: "shell", inline:<<-SHELL
86 SHELL
87 config.vm.provision "configure", type: "shell", inline:<<-SHELL
91 SHELL
92 config.vm.provision "build", type: "shell", inline:<<-SHELL
96 SHELL
[all …]
/external/llvm/utils/lit/tests/
Dshtest-shell.py1 # Check the internal shell handling component of the ShTest format.
3 # RUN: not %{lit} -j 1 -v %{inputs}/shtest-shell > %t.out
10 # CHECK: FAIL: shtest-shell :: error-0.txt
11 # CHECK: *** TEST 'shtest-shell :: error-0.txt' FAILED ***
20 # CHECK: FAIL: shtest-shell :: error-1.txt
21 # CHECK: *** TEST 'shtest-shell :: error-1.txt' FAILED ***
22 # CHECK: shell parser error on: 'echo "missing quote'
25 # CHECK: FAIL: shtest-shell :: error-2.txt
26 # CHECK: *** TEST 'shtest-shell :: error-2.txt' FAILED ***
30 # CHECK: PASS: shtest-shell :: redirects.txt
[all …]
/external/perfetto/tools/
Dload_tool107 busy_threads_args = AdbArgs('shell', '/data/local/tmp/busy_threads',
111 perfetto_args = AdbArgs('shell', 'perfetto', '--txt', '-c', '-', '-o', '-')
175 AdbCall('shell', 'stop', 'traced')
176 AdbCall('shell', 'stop', 'traced_probes')
177 AdbCall('shell', 'start', 'traced')
178 AdbCall('shell', 'start', 'traced_probes')
179 AdbCall('shell', 'sleep', '5')
180 traced_pid = AdbCall('shell', 'pidof', 'traced')
181 probes_pid = AdbCall('shell', 'pidof', 'traced_probes')
200 AdbCall('shell', 'rm', '-rf', '/data/local/tmp/perfetto_load_test')
[all …]
/external/cronet/third_party/icu/source/samples/
Ddefs.mk11 CC=$(shell icu-config --cc)
12 CXX=$(shell icu-config --cxx)
13 CPPFLAGS=$(shell icu-config --cppflags)
14 CFLAGS=$(shell icu-config --cflags)
15 CXXFLAGS=$(shell icu-config --cxxflags)
16 LDFLAGS =$^ $(shell icu-config --ldflags)
17 LDFLAGS_USTDIO =$(shell icu-config --ldflags-icuio)
18 INVOKE=$(shell icu-config --invoke)
19 GENRB=$(shell icu-config --invoke=genrb)
21 PKGDATA=$(shell icu-config --invoke=pkgdata)
[all …]
/external/icu/icu4c/source/samples/
Ddefs.mk11 CC=$(shell icu-config --cc)
12 CXX=$(shell icu-config --cxx)
13 CPPFLAGS=$(shell icu-config --cppflags)
14 CFLAGS=$(shell icu-config --cflags)
15 CXXFLAGS=$(shell icu-config --cxxflags)
16 LDFLAGS =$^ $(shell icu-config --ldflags)
17 LDFLAGS_USTDIO =$(shell icu-config --ldflags-icuio)
18 INVOKE=$(shell icu-config --invoke)
19 GENRB=$(shell icu-config --invoke=genrb)
21 PKGDATA=$(shell icu-config --invoke=pkgdata)
[all …]
/external/angle/src/tests/restricted_traces/
Dpower_denoising.sh12 adb shell am broadcast -a com.google.gservices.intent.action.GSERVICES_OVERRIDE \
19 if adb shell dumpsys activity provider GservicesProvider | grep "$wanted" &>/dev/null;
36 adb shell pm disable $val
40 adb shell setprop vendor.sys.modem.diag.mdlog false
41 adb shell settings put secure display_white_balance_enabled 0
42 adb shell settings put system screen_brightness_mode 0
45 adb shell setprop pm.dexopt.disable_bg_dexopt true
48 contaminant_detection_node=$(adb shell find /sys -name contaminant_detection)
49 adb shell "echo 0 > ${contaminant_detection_node}"
50 adb shell setprop vendor.usb.contaminantdisable true
[all …]
/external/python/cpython2/Lib/
Dpopen2.py3 The normal os.popen(cmd, mode) call spawns a shell command and provides a
41 """The parameter 'cmd' is the shell command to execute in a
43 will be passed directly to the program without shell intervention (as
44 with os.spawnv()). If 'cmd' is a string it will be passed to the shell
142 """Execute the shell command 'cmd' in a sub-process. On UNIX, 'cmd' may
144 program without shell intervention (as with os.spawnv()). If 'cmd' is a
145 string it will be passed to the shell (as with os.system()). If
152 """Execute the shell command 'cmd' in a sub-process. On UNIX, 'cmd' may
154 program without shell intervention (as with os.spawnv()). If 'cmd' is a
155 string it will be passed to the shell (as with os.system()). If
[all …]
/external/mksh/src/
Dmksh.1198 .Nd MirBSD Korn shell
220 is a command interpreter intended for both interactive and shell
224 shell language and largely compatible to the original Korn shell.
226 sometimes does take portable shell scripting or various standards
235 name to the shell; not all make sense, have been tested or work at all though.
244 Interactive shell.
245 A shell that reads commands from standard input is
251 An interactive shell has job control enabled, ignores the
272 Login shell.
273 If the name or basename the shell is called with (i.e. argv[0])
[all …]

12345678910>>...169