crypto/heimdal/appl/ftp/ftp/cmdtab.c
117
{ "!", shellhelp, 0, 0, 0, shell },
crypto/heimdal/appl/ftp/ftp/extern.h
145
void shell (int, char **);
crypto/heimdal/appl/ftp/ftpd/ftpd.c
490
char *cp, *shell;
crypto/heimdal/appl/ftp/ftpd/ftpd.c
541
if ((shell = pw->pw_shell) == NULL || *shell == 0)
crypto/heimdal/appl/ftp/ftpd/ftpd.c
542
shell = _PATH_BSHELL;
crypto/heimdal/appl/ftp/ftpd/ftpd.c
544
if (strcmp(cp, shell) == 0)
crypto/heimdal/appl/login/login.c
109
exec_shell(const char *shell, int fallback)
crypto/heimdal/appl/login/login.c
119
p = strrchr(shell, '/');
crypto/heimdal/appl/login/login.c
123
p = shell;
crypto/heimdal/appl/login/login.c
126
execle(shell, sh, NULL, env);
crypto/heimdal/appl/login/login.c
129
shell, _PATH_BSHELL);
crypto/heimdal/appl/login/login.c
133
err(1, "%s", shell);
crypto/heimdal/appl/su/su.c
337
char *shell;
crypto/heimdal/appl/su/su.c
384
shell = login_info->pw_shell;
crypto/heimdal/appl/su/su.c
386
shell = su_info->pw_shell;
crypto/heimdal/appl/su/su.c
387
if(shell == NULL || *shell == '\0')
crypto/heimdal/appl/su/su.c
388
shell = _PATH_BSHELL;
crypto/heimdal/appl/su/su.c
472
esetenv("SHELL", shell, 1);
crypto/heimdal/appl/su/su.c
480
p = strrchr(shell, '/');
crypto/heimdal/appl/su/su.c
484
p = shell;
crypto/heimdal/appl/su/su.c
522
execve(shell, args, environ);
crypto/heimdal/appl/telnet/telnet/commands.c
2314
{ "!", shellhelp, shell, 0 },
crypto/krb5/src/clients/ksu/main.c
112
char * shell;
crypto/krb5/src/clients/ksu/main.c
609
shell = xstrdup(target_pwd->pw_shell);
crypto/krb5/src/clients/ksu/main.c
611
shell = _DEF_CSH; /* default is cshell */
crypto/krb5/src/clients/ksu/main.c
638
if(set_env_var( "SHELL", shell)){
crypto/krb5/src/clients/ksu/main.c
733
params[0] = shell;
crypto/openssh/auth.c
123
char *shell = xstrdup((pw->pw_shell[0] == '\0') ?
crypto/openssh/auth.c
126
if (stat(shell, &st) == -1) {
crypto/openssh/auth.c
128
"does not exist", pw->pw_name, shell);
crypto/openssh/auth.c
129
free(shell);
crypto/openssh/auth.c
135
"is not executable", pw->pw_name, shell);
crypto/openssh/auth.c
136
free(shell);
crypto/openssh/auth.c
139
free(shell);
crypto/openssh/readconf.c
540
char *shell;
crypto/openssh/readconf.c
544
if ((shell = getenv("SHELL")) == NULL)
crypto/openssh/readconf.c
545
shell = _PATH_BSHELL;
crypto/openssh/readconf.c
547
if (access(shell, X_OK) == -1) {
crypto/openssh/readconf.c
549
shell, strerror(errno));
crypto/openssh/readconf.c
562
argv[0] = shell;
crypto/openssh/session.c
1068
child_set_env(&env, &envsize, "SHELL", shell);
crypto/openssh/session.c
1207
do_rc_files(struct ssh *ssh, Session *s, const char *shell)
crypto/openssh/session.c
1222
if (xasprintf(&cmd, "%s -c '%s %s'", shell, _PATH_BSHELL,
crypto/openssh/session.c
1525
const char *shell, *shell0;
crypto/openssh/session.c
1576
shell = (pw->pw_shell[0] == '\0') ? _PATH_BSHELL : pw->pw_shell;
crypto/openssh/session.c
1582
env = do_setup_env(ssh, s, shell);
crypto/openssh/session.c
1585
shell = login_getcapstr(lc, "shell", (char *)shell, (char *)shell);
crypto/openssh/session.c
1646
do_rc_files(ssh, s, shell);
crypto/openssh/session.c
1679
if ((shell0 = strrchr(shell, '/')) != NULL)
crypto/openssh/session.c
1682
shell0 = shell;
crypto/openssh/session.c
1698
perror(shell);
crypto/openssh/session.c
1705
execve(shell, argv, env);
crypto/openssh/session.c
1708
perror(shell);
crypto/openssh/session.c
1719
execve(shell, argv, env);
crypto/openssh/session.c
1720
perror(shell);
crypto/openssh/session.c
722
char *shell = s->pw->pw_shell;
crypto/openssh/session.c
724
if (shell[0] == '\0') /* empty shell means /bin/sh */
crypto/openssh/session.c
725
shell =_PATH_BSHELL;
crypto/openssh/session.c
726
mm_audit_run_command(shell);
crypto/openssh/session.c
971
do_setup_env(struct ssh *ssh, Session *s, const char *shell)
crypto/openssh/sftp.c
327
char *shell;
crypto/openssh/sftp.c
333
if ((shell = getenv("SHELL")) == NULL || *shell == '\0')
crypto/openssh/sftp.c
334
shell = _PATH_BSHELL;
crypto/openssh/sftp.c
342
debug3("Executing %s -c \"%s\"", shell, args);
crypto/openssh/sftp.c
343
execl(shell, shell, "-c", args, (char *)NULL);
crypto/openssh/sftp.c
345
debug3("Executing %s", shell);
crypto/openssh/sftp.c
346
execl(shell, shell, (char *)NULL);
crypto/openssh/sftp.c
348
fprintf(stderr, "Couldn't execute \"%s\": %s\n", shell,
crypto/openssh/ssh-agent.c
2246
char *shell, *format, *fdstr, *pidstr, *agentsocket = NULL;
crypto/openssh/ssh-agent.c
2358
shell = getenv("SHELL");
crypto/openssh/ssh-agent.c
2359
if (shell != NULL && (len = strlen(shell)) > 2 &&
crypto/openssh/ssh-agent.c
2360
strncmp(shell + len - 3, "csh", 3) == 0)
crypto/openssh/sshconnect.c
120
char *shell;
crypto/openssh/sshconnect.c
122
if ((shell = getenv("SHELL")) == NULL)
crypto/openssh/sshconnect.c
123
shell = _PATH_BSHELL;
crypto/openssh/sshconnect.c
158
argv[0] = shell;
crypto/openssh/sshconnect.c
1706
char *shell;
crypto/openssh/sshconnect.c
1715
if ((shell = getenv("SHELL")) == NULL || *shell == '\0')
crypto/openssh/sshconnect.c
1716
shell = _PATH_BSHELL;
crypto/openssh/sshconnect.c
1722
debug3("Executing %s -c \"%s\"", shell, args);
crypto/openssh/sshconnect.c
1723
execl(shell, shell, "-c", args, (char *)NULL);
crypto/openssh/sshconnect.c
1725
shell, args, strerror(errno));
crypto/openssh/sshconnect.c
202
char *shell;
crypto/openssh/sshconnect.c
204
if ((shell = getenv("SHELL")) == NULL || *shell == '\0')
crypto/openssh/sshconnect.c
205
shell = _PATH_BSHELL;
crypto/openssh/sshconnect.c
241
argv[0] = shell;
sbin/init/init.c
1043
const char *shell, *script;
sbin/init/init.c
1074
shell = get_shell();
sbin/init/init.c
1075
sh_argv[0] = __DECONST(char*, shell);
sbin/init/init.c
1078
if (strcmp(shell, _PATH_BSHELL) == 0) {
sbin/init/init.c
1086
execv(shell, sh_argv);
sbin/init/init.c
1087
stall("can't exec %s for %s: %m", shell, script);
sbin/init/init.c
1117
const char *shell;
sbin/init/init.c
1119
shell = get_shell();
sbin/init/init.c
1135
emergency("can't fork for %s on %s: %m", shell, script);
sbin/init/init.c
1156
"single user mode", shell, script);
sbin/init/init.c
1161
shell, script);
sbin/init/init.c
1179
"user mode", shell, script);
sbin/init/init.c
851
const char *shell;
sbin/init/init.c
880
shell = get_shell();
sbin/init/init.c
921
write_stderr(shell);
sbin/init/init.c
928
shell = altshell;
sbin/init/init.c
958
execv(shell, argv);
sbin/init/init.c
959
emergency("can't exec %s for single user: %m", shell);
sys/kern/imgact_shell.c
252
EXEC_SET(shell, shell_execsw);
usr.bin/apply/apply.c
115
shell = name = NULL;
usr.bin/apply/apply.c
117
shell = (tmpshell != NULL) ? strdup(tmpshell) : strdup(_PATH_BSHELL);
usr.bin/apply/apply.c
118
if (shell == NULL)
usr.bin/apply/apply.c
120
slashp = strrchr(shell, '/');
usr.bin/apply/apply.c
121
name = (slashp != NULL) ? slashp + 1 : shell;
usr.bin/apply/apply.c
193
if (exec_shell(sbuf_data(cmdbuf), shell, name))
usr.bin/apply/apply.c
202
free(shell);
usr.bin/apply/apply.c
63
char *cmd, *name, *p, *shell, *slashp, *tmpshell;
usr.bin/finger/finger.h
46
char *shell; /* user's shell */
usr.bin/finger/lprint.c
114
(void)printf("\tShell: %-s\n", *pn->shell ? pn->shell : _PATH_BSHELL);
usr.bin/finger/util.c
330
if ((pn->shell = strdup(pw->pw_shell)) == NULL)
usr.bin/id/id.c
218
shell(pw);
usr.bin/id/id.c
59
static void shell(struct passwd *);
usr.bin/limits/limits.c
685
getshellbyname(const char * shell)
usr.bin/limits/limits.c
689
const char * p = strrchr(shell, '/');
usr.bin/limits/limits.c
691
p = p ? p+1 : shell;
usr.bin/limits/limits.c
725
char * shell = getenv("SHELL");
usr.bin/limits/limits.c
733
if (shell != NULL && stat(shell, &st) != -1) {
usr.bin/limits/limits.c
741
return getshellbyname(shell);
usr.bin/login/login.c
168
const char *shell = NULL;
usr.bin/login/login.c
445
shell = login_getcapstr(lc, "shell", pwd->pw_shell, pwd->pw_shell);
usr.bin/login/login.c
452
if (*shell == '\0') /* Not overridden */
usr.bin/login/login.c
453
shell = pwd->pw_shell;
usr.bin/login/login.c
454
if ((shell = strdup(shell)) == NULL) {
usr.bin/login/login.c
661
execlp(shell, arg0, (char *)0);
usr.bin/login/login.c
662
err(1, "%s", shell);
usr.bin/mail/cmdtab.c
67
{ "!", shell, I|STRLIST, 0, 0 },
usr.bin/mail/collect.c
205
shell(&linebuf[2]);
usr.bin/mail/extern.h
217
int shell(void *);
usr.bin/mail/lex.c
295
shell(cp+1);
usr.bin/newgrp/newgrp.c
264
const char *shell;
usr.bin/newgrp/newgrp.c
267
shell = pwd->pw_shell;
usr.bin/newgrp/newgrp.c
268
if (*shell == '\0')
usr.bin/newgrp/newgrp.c
269
shell = _PATH_BSHELL;
usr.bin/newgrp/newgrp.c
288
setenv("SHELL", shell, 1);
usr.bin/newgrp/newgrp.c
295
if (asprintf(args, "-%s", shell) < 0)
usr.bin/newgrp/newgrp.c
299
execv(shell, args);
usr.bin/newgrp/newgrp.c
300
err(1, "%s", shell);
usr.bin/newgrp/newgrp.c
306
const char *shell;
usr.bin/newgrp/newgrp.c
308
shell = pwd->pw_shell;
usr.bin/newgrp/newgrp.c
309
if (*shell == '\0')
usr.bin/newgrp/newgrp.c
310
shell = _PATH_BSHELL;
usr.bin/newgrp/newgrp.c
311
execl(shell, shell, (char *)NULL);
usr.bin/newgrp/newgrp.c
312
err(1, "%s", shell);
usr.bin/script/script.c
427
const char *shell;
usr.bin/script/script.c
429
shell = getenv("SHELL");
usr.bin/script/script.c
430
if (shell == NULL)
usr.bin/script/script.c
431
shell = _PATH_BSHELL;
usr.bin/script/script.c
442
execl(shell, shell, "-i", (char *)NULL);
usr.bin/script/script.c
443
warn("%s", shell);
usr.bin/su/su.c
153
const char *p, *user, *shell, *mytty, **nargv;
usr.bin/su/su.c
162
p = shell = class = cleanenv = NULL;
usr.bin/su/su.c
267
shell = shellbuf;
usr.bin/su/su.c
270
shell = _PATH_BSHELL;
usr.bin/su/su.c
374
shell = pwd->pw_shell;
usr.bin/su/su.c
378
shell = _PATH_BSHELL;
usr.bin/su/su.c
384
p = strrchr(shell, '/');
usr.bin/su/su.c
388
p = shell;
usr.bin/su/su.c
505
setenv("SHELL", shell, 1);
usr.bin/su/su.c
543
execv(shell, np.b);
usr.bin/su/su.c
544
err(1, "%s", shell);
usr.bin/tip/tip/cmdtab.c
38
{ '!', NORM, "shell", shell },
usr.bin/tip/tip/tip.h
336
void shell(int);
usr.sbin/chroot/chroot.c
194
if (!(shell = getenv("SHELL")))
usr.sbin/chroot/chroot.c
195
shell = _PATH_BSHELL;
usr.sbin/chroot/chroot.c
196
execlp(shell, shell, "-i", (char *)NULL);
usr.sbin/chroot/chroot.c
197
err(1, "%s", shell);
usr.sbin/chroot/chroot.c
96
const char *group, *p, *shell, *user;
usr.sbin/cron/cron/do_command.c
446
char *shell = env_get("SHELL", e->envp);
usr.sbin/cron/cron/do_command.c
507
"\tcmd='%s' shell='%s'\n", e->cmd, shell);
usr.sbin/cron/cron/do_command.c
511
execl(shell, shell, "-c", e->cmd, (char *)NULL);
usr.sbin/cron/cron/do_command.c
512
warn("execl: couldn't exec `%s'", shell);
usr.sbin/jexec/jexec.c
169
if (!(shell = getenv("SHELL")))
usr.sbin/jexec/jexec.c
170
shell = _PATH_BSHELL;
usr.sbin/jexec/jexec.c
171
if (execlp(shell, shell, "-i", NULL) < 0)
usr.sbin/jexec/jexec.c
172
err(1, "execlp: %s", shell);
usr.sbin/jexec/jexec.c
66
const char *username, *shell, *term;
usr.sbin/ppp/command.c
623
const char *shell;
usr.sbin/ppp/command.c
654
if ((shell = getenv("SHELL")) == NULL)
usr.sbin/ppp/command.c
655
shell = _PATH_BSHELL;
usr.sbin/ppp/command.c
698
printf("ppp: Pausing until %s finishes\n", shell);
usr.sbin/ppp/command.c
700
execl(shell, shell, (char *)NULL);
usr.sbin/ppp/command.c
704
arg->argc > arg->argn ? arg->argv[arg->argn] : shell,
usr.sbin/pw/pw_user.c
1537
char *gecos, *homedir, *grname, *name, *newname, *walk, *skel, *shell;
usr.sbin/pw/pw_user.c
1550
gecos = homedir = grname = name = newname = skel = shell =NULL;
usr.sbin/pw/pw_user.c
1618
shell = optarg;
usr.sbin/pw/pw_user.c
1739
if (shell) {
usr.sbin/pw/pw_user.c
1740
shell = shell_path(cnf->shelldir, cnf->shells, shell);
usr.sbin/pw/pw_user.c
1741
if (shell == NULL)
usr.sbin/pw/pw_user.c
1742
shell = "";
usr.sbin/pw/pw_user.c
1743
if (strcmp(shell, pwd->pw_shell) != 0) {
usr.sbin/pw/pw_user.c
1744
pwd->pw_shell = shell;
usr.sbin/setpmac/setpmac.c
60
const char *shell;
usr.sbin/setpmac/setpmac.c
86
if (!(shell = getenv("SHELL")))
usr.sbin/setpmac/setpmac.c
87
shell = _PATH_BSHELL;
usr.sbin/setpmac/setpmac.c
88
execlp(shell, shell, "-i", (char *)NULL);
usr.sbin/setpmac/setpmac.c
89
err(1, "%s", shell);