/external/python/cpython2/Lib/idlelib/idle_test/ |
D | test_io.py | 52 shell = MockShell() 53 f = PseudoOutputFile(shell, 'stdout', 'utf-8') 66 shell = MockShell() 67 f = PseudoOutputFile(shell, 'stdout', 'utf-8') 75 shell = MockShell() 76 f = PseudoOutputFile(shell, 'stdout', 'utf-8') 78 self.assertEqual(shell.written, [('test', 'stdout')]) 79 shell.reset() 81 self.assertEqual(shell.written, [('t\xe8st', 'stdout')]) 82 shell.reset() [all …]
|
/external/python/mobly/tests/mobly/controllers/android_device_lib/ |
D | adb_test.py | 49 # Mock Shell Command 55 MOCK_ADB_SHELL_COMMAND_CHECK = 'adb shell command -v ls' 89 shell=False, 93 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=None) 115 shell=False, 119 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=None) 127 shell=False, 131 mock_run_command.assert_called_with(['fake_cmd'], shell=False, timeout=1) 161 shell=False, 172 shell=False, [all …]
|
/external/python/cpython3/Lib/idlelib/idle_test/ |
D | test_run.py | 116 shell = MockShell() 117 f = run.StdInputFile(shell, 'stdin') 130 shell = MockShell() 131 f = run.StdInputFile(shell, 'stdin') 139 shell = MockShell() 140 f = run.StdInputFile(shell, 'stdin') 141 shell.push(['one\n', 'two\n', '']) 143 shell.push(['one\n', 'two\n', '']) 145 shell.push(['one\n', 'two\n', '']) 147 shell.push(['one\n', 'two\n', 'three\n', '']) [all …]
|
/external/libtraceevent/scripts/ |
D | utilities.mak | 23 # GNU make's $(shell ...) function converts to a 43 # shell-escape-nl 45 # Usage: $(shell some-command | $(call shell-escape-nl[,escape])) 47 # Use this to escape newlines from within a shell call; 51 # in an `awk' program that is delimited by shell 55 define shell-escape-nl 59 # shell-unescape-nl 61 # Usage: $(shell some-command | $(call shell-unescape-nl[,escape])) 63 # Use this to unescape newlines from within a shell call; 68 # delimited by shell single-quotes, so be wary [all …]
|
/external/cpuinfo/scripts/ |
D | android-armv7-mock.sh | 80 adb shell "/data/local/tmp/alcatel-revvl-test --gtest_color=yes" 81 adb shell "/data/local/tmp/atm7029b-tablet-test --gtest_color=yes" 82 adb shell "/data/local/tmp/blu-r1-hd-test --gtest_color=yes" 83 adb shell "/data/local/tmp/galaxy-a3-2016-eu-test --gtest_color=yes" 84 adb shell "/data/local/tmp/galaxy-a8-2016-duos-test --gtest_color=yes" 85 adb shell "/data/local/tmp/galaxy-a8-2018-test --gtest_color=yes" 86 adb shell "/data/local/tmp/galaxy-c9-pro-test --gtest_color=yes" 87 adb shell "/data/local/tmp/galaxy-grand-prime-value-edition-test --gtest_color=yes" 88 adb shell "/data/local/tmp/galaxy-j1-2016-test --gtest_color=yes" 89 adb shell "/data/local/tmp/galaxy-j5-test --gtest_color=yes" [all …]
|
D | android-arm64-mock.sh | 44 adb shell "/data/local/tmp/alcatel-revvl-test --gtest_color=yes" 45 adb shell "/data/local/tmp/galaxy-a8-2018-test --gtest_color=yes" 46 adb shell "/data/local/tmp/galaxy-c9-pro-test --gtest_color=yes" 47 adb shell "/data/local/tmp/galaxy-s6-test --gtest_color=yes" 48 adb shell "/data/local/tmp/galaxy-s7-global-test --gtest_color=yes" 49 adb shell "/data/local/tmp/galaxy-s7-us-test --gtest_color=yes" 50 adb shell "/data/local/tmp/galaxy-s8-global-test --gtest_color=yes" 51 adb shell "/data/local/tmp/galaxy-s8-us-test --gtest_color=yes" 52 adb shell "/data/local/tmp/galaxy-s9-global-test --gtest_color=yes" 53 adb shell "/data/local/tmp/galaxy-s9-us-test --gtest_color=yes" [all …]
|
/external/bazel-skylib/tests/ |
D | shell_tests.bzl | 15 """Unit tests for shell.bzl.""" 17 load("//lib:shell.bzl", "shell") 21 """Unit tests for shell.array_literal.""" 24 asserts.equals(env, "()", shell.array_literal([])) 25 asserts.equals(env, "('1')", shell.array_literal([1])) 26 asserts.equals(env, "('1' '2' '3')", shell.array_literal([1, 2, 3])) 27 asserts.equals(env, "('$foo')", shell.array_literal(["$foo"])) 28 asserts.equals(env, "('qu\"o\"te')", shell.array_literal(['qu"o"te'])) 35 """Unit tests for shell.quote.""" 38 asserts.equals(env, "'foo'", shell.quote("foo")) [all …]
|
/external/chromium-trace/catapult/devil/devil/utils/ |
D | cmd_helper.py | 4 """A wrapper for subprocess to make calling shell commands easier.""" 39 """Return an shell-escaped version of the string using single quotes. 44 The returned value can be used in a shell command line as one token that gets 57 """Return an shell-escaped version of the string using double quotes. 60 or quote characters), while retaining some shell features such as variable 63 The returned value can be used in a shell command line as one token that gets 64 to be further interpreted by the shell. 67 shell implementation. This set usually includes: '$', '`', '\', '!', '*', 85 """Constructs a shell snippet for a command using a variable to shrink it. 95 A shell snippet that does not include setting the variable. [all …]
|
/external/python/mobly/mobly/controllers/android_device_lib/ |
D | adb.py | 38 # `adb shell getprop` can take surprisingly long, when the device is a 108 ret, out, err = utils.run_command('which adb', shell=True) 148 >> adb.shell(['echo', 'a', 'b']) 151 documentation to avoid shell injection vulnerabilities and avoid having to 152 deal with multiple layers of shell quoting and different shell environments 155 If you really want to run the command through the system shell, this is 156 possible by supplying shell=True, but try to avoid this if possible: 157 >> adb.shell('cat /foo > /tmp/file', shell=True) 163 def _exec_cmd(self, args, shell, timeout, stderr) -> bytes: argument 169 shell: bool, True to run this command through the system shell, [all …]
|
/external/bazel-skylib/docs/ |
D | shell_doc.md | 3 Skylib module containing shell utility functions. 5 <a id="#shell.array_literal"></a> 7 ## shell.array_literal 10 shell.array_literal(<a href="#shell.array_literal-iterable">iterable</a>) 13 Creates a string from a sequence that can be used as a shell array. 15 For example, `shell.array_literal(["a", "b", "c"])` would return the string 16 `("a" "b" "c")`, which can be used in a shell script wherever an array 19 Note that all elements in the array are quoted (using `shell.quote`) for 28 | <a id="shell.array_literal-iterable"></a>iterable | A sequence of elements. Elements that are no… 32 A string that represents the sequence as a shell array; that is, [all …]
|
/external/wayland-protocols/chromium.org/ |
D | README.chromium | 19 …wayland-scanner code < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > protocol/xdg-shell-v5-pr… 20 …land-scanner server-header < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > include/protocol/x… 21 …land-scanner client-header < src/unstable/xdg-shell/xdg-shell-unstable-v5.xml > include/protocol/x… 22 …wayland-scanner code < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > protocol/xdg-shell-v6-pr… 23 …land-scanner server-header < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > include/protocol/x… 24 …land-scanner client-header < src/unstable/xdg-shell/xdg-shell-unstable-v6.xml > include/protocol/x… 40 …wayland-scanner code < unstable/remote-shell/remote-shell-unstable-v1.xml > protocol/remote-shell-… 41 …nd-scanner server-header < unstable/remote-shell/remote-shell-unstable-v1.xml > include/protocol/r… 42 …nd-scanner client-header < unstable/remote-shell/remote-shell-unstable-v1.xml > include/protocol/r…
|
/external/toybox/toys/pending/ |
D | chsh.c | 1 /* chsh.c - Change login shell. 13 usage: chsh [-s SHELL] [USER] 15 Change user's login shell. 17 -s Use SHELL instead of prompting 19 Non-root users can only change their own shell to one listed in /etc/shells. 32 char *user, *line, *shell, *encrypted; local 56 // Get new shell (either -s or interactive) 58 if (toys.optflags) shell = TT.s; 60 xprintf("Changing the login shell for %s\n" 62 " Login shell [%s]: ", user, passwd_info->pw_shell); [all …]
|
/external/tensorflow/tensorflow/tools/dockerfiles/ |
D | spec.yml | 104 - shell 114 - shell 127 - shell 139 - shell 155 - shell 171 - shell 186 - shell 201 - shell 217 - shell 233 - shell [all …]
|
/external/libwebsockets/test-apps/android/app/src/main/jni/ |
D | NativeLibs.mk | 187 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-gcc \ 188 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ar \ 189 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86)/bin/$(TOOLCHAIN_X86_PREFIX)-ranlib \ 202 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-gcc \ 203 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ar \ 204 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_X86_64)/bin/$(TOOLCHAIN_X86_64_PREFIX)-ranlib \ 217 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-gcc \ 218 -DCMAKE_AR=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ar \ 219 -DCMAKE_RANLIB=$(shell pwd)/$(TOOLCHAIN_ARM)/bin/$(TOOLCHAIN_ARM_PREFIX)-ranlib \ 232 -DCMAKE_C_COMPILER=$(shell pwd)/$(TOOLCHAIN_ARM_V7A)/bin/$(TOOLCHAIN_ARM_V7A_PREFIX)-gcc \ [all …]
|
/external/python/cpython2/Doc/library/ |
D | subprocess.rst | 45 .. function:: call(args, *, stdin=None, stdout=None, stderr=None, shell=False) 61 >>> subprocess.call("exit 1", shell=True) 66 Using ``shell=True`` can be a security hazard. See the warning 77 .. function:: check_call(args, *, stdin=None, stdout=None, stderr=None, shell=False) 95 >>> subprocess.check_call("exit 1", shell=True) 104 Using ``shell=True`` can be a security hazard. See the warning 115 .. function:: check_output(args, *, stdin=None, stderr=None, shell=False, universal_newlines=False) 136 >>> subprocess.check_output("exit 1", shell=True) 147 ... shell=True) 154 Using ``shell=True`` can be a security hazard. See the warning [all …]
|
D | idle.rst | 21 * Python shell window (interactive interpreter) with colorizing 38 IDLE has two main window types, the Shell window and the Editor window. It is 47 File menu (Shell and Editor) 68 tree structure. In the shell, open a module first. 97 Edit menu (Shell and Editor) 197 Python Shell 198 Open or wake up the Python Shell window. 208 Do Check Module (above). If no error, restart the shell to clean the 209 environment, then execute the module. Output is displayed in the Shell 211 When execution is complete, the Shell retains focus and displays a prompt. [all …]
|
/external/python/cpython3/Doc/library/ |
D | idle.rst | 25 * Python shell window (interactive interpreter) with colorizing 42 IDLE has two main window types, the Shell window and the Editor window. It is 55 File menu (Shell and Editor) 76 tree structure. In the shell, open a module first. 101 Shell, ask to quit execution). Calling ``exit()`` or ``close()`` in the Shell 102 window also closes Shell. If this is the only window, also exit IDLE. 107 Edit menu (Shell and Editor) 206 including lines within multiline strings. Except for Shell windows, 218 Do :ref:`Check Module <check-module>`. If no error, restart the shell to clean the 219 environment, then execute the module. Output is displayed in the Shell [all …]
|
/external/cpu_features/ci/vagrant/freebsd/ |
D | Vagrantfile | 18 config.ssh.shell = "sh" 73 # Enable provisioning with a shell script. Additional provisioners such as 77 config.vm.provision "env", type: "shell", inline:<<-SHELL 81 SHELL 82 config.vm.provision "devel", type: "shell", inline:<<-SHELL 86 SHELL 87 config.vm.provision "configure", type: "shell", inline:<<-SHELL 91 SHELL 92 config.vm.provision "build", type: "shell", inline:<<-SHELL 96 SHELL [all …]
|
/external/llvm/utils/lit/tests/ |
D | shtest-shell.py | 1 # Check the internal shell handling component of the ShTest format. 3 # RUN: not %{lit} -j 1 -v %{inputs}/shtest-shell > %t.out 10 # CHECK: FAIL: shtest-shell :: error-0.txt 11 # CHECK: *** TEST 'shtest-shell :: error-0.txt' FAILED *** 20 # CHECK: FAIL: shtest-shell :: error-1.txt 21 # CHECK: *** TEST 'shtest-shell :: error-1.txt' FAILED *** 22 # CHECK: shell parser error on: 'echo "missing quote' 25 # CHECK: FAIL: shtest-shell :: error-2.txt 26 # CHECK: *** TEST 'shtest-shell :: error-2.txt' FAILED *** 30 # CHECK: PASS: shtest-shell :: redirects.txt [all …]
|
/external/perfetto/tools/ |
D | load_tool | 107 busy_threads_args = AdbArgs('shell', '/data/local/tmp/busy_threads', 111 perfetto_args = AdbArgs('shell', 'perfetto', '--txt', '-c', '-', '-o', '-') 175 AdbCall('shell', 'stop', 'traced') 176 AdbCall('shell', 'stop', 'traced_probes') 177 AdbCall('shell', 'start', 'traced') 178 AdbCall('shell', 'start', 'traced_probes') 179 AdbCall('shell', 'sleep', '5') 180 traced_pid = AdbCall('shell', 'pidof', 'traced') 181 probes_pid = AdbCall('shell', 'pidof', 'traced_probes') 200 AdbCall('shell', 'rm', '-rf', '/data/local/tmp/perfetto_load_test') [all …]
|
/external/cronet/third_party/icu/source/samples/ |
D | defs.mk | 11 CC=$(shell icu-config --cc) 12 CXX=$(shell icu-config --cxx) 13 CPPFLAGS=$(shell icu-config --cppflags) 14 CFLAGS=$(shell icu-config --cflags) 15 CXXFLAGS=$(shell icu-config --cxxflags) 16 LDFLAGS =$^ $(shell icu-config --ldflags) 17 LDFLAGS_USTDIO =$(shell icu-config --ldflags-icuio) 18 INVOKE=$(shell icu-config --invoke) 19 GENRB=$(shell icu-config --invoke=genrb) 21 PKGDATA=$(shell icu-config --invoke=pkgdata) [all …]
|
/external/icu/icu4c/source/samples/ |
D | defs.mk | 11 CC=$(shell icu-config --cc) 12 CXX=$(shell icu-config --cxx) 13 CPPFLAGS=$(shell icu-config --cppflags) 14 CFLAGS=$(shell icu-config --cflags) 15 CXXFLAGS=$(shell icu-config --cxxflags) 16 LDFLAGS =$^ $(shell icu-config --ldflags) 17 LDFLAGS_USTDIO =$(shell icu-config --ldflags-icuio) 18 INVOKE=$(shell icu-config --invoke) 19 GENRB=$(shell icu-config --invoke=genrb) 21 PKGDATA=$(shell icu-config --invoke=pkgdata) [all …]
|
/external/angle/src/tests/restricted_traces/ |
D | power_denoising.sh | 12 adb shell am broadcast -a com.google.gservices.intent.action.GSERVICES_OVERRIDE \ 19 if adb shell dumpsys activity provider GservicesProvider | grep "$wanted" &>/dev/null; 36 adb shell pm disable $val 40 adb shell setprop vendor.sys.modem.diag.mdlog false 41 adb shell settings put secure display_white_balance_enabled 0 42 adb shell settings put system screen_brightness_mode 0 45 adb shell setprop pm.dexopt.disable_bg_dexopt true 48 contaminant_detection_node=$(adb shell find /sys -name contaminant_detection) 49 adb shell "echo 0 > ${contaminant_detection_node}" 50 adb shell setprop vendor.usb.contaminantdisable true [all …]
|
/external/python/cpython2/Lib/ |
D | popen2.py | 3 The normal os.popen(cmd, mode) call spawns a shell command and provides a 41 """The parameter 'cmd' is the shell command to execute in a 43 will be passed directly to the program without shell intervention (as 44 with os.spawnv()). If 'cmd' is a string it will be passed to the shell 142 """Execute the shell command 'cmd' in a sub-process. On UNIX, 'cmd' may 144 program without shell intervention (as with os.spawnv()). If 'cmd' is a 145 string it will be passed to the shell (as with os.system()). If 152 """Execute the shell command 'cmd' in a sub-process. On UNIX, 'cmd' may 154 program without shell intervention (as with os.spawnv()). If 'cmd' is a 155 string it will be passed to the shell (as with os.system()). If [all …]
|
/external/mksh/src/ |
D | mksh.1 | 198 .Nd MirBSD Korn shell 220 is a command interpreter intended for both interactive and shell 224 shell language and largely compatible to the original Korn shell. 226 sometimes does take portable shell scripting or various standards 235 name to the shell; not all make sense, have been tested or work at all though. 244 Interactive shell. 245 A shell that reads commands from standard input is 251 An interactive shell has job control enabled, ignores the 272 Login shell. 273 If the name or basename the shell is called with (i.e. argv[0]) [all …]
|