Did I find the right examples for you? yes no      Crawl my project      Python Jobs

All Samples(22)  |  Call(0)  |  Derive(0)  |  Import(22)
bool(x) -> bool

Returns True when the argument x is true, False otherwise.
The builtins True and False are the only two instances of the class bool.
The class bool is a subclass of the class int, and cannot be subclassed.

src/s/e/segvault-HEAD/fusil/ptrace/ptrace/binding/func.py   segvault(Download)
from ptrace.ctypes_errno import get_errno
from ptrace.ctypes_tools import formatAddress
from ptrace.os_tools import RUNNING_LINUX, RUNNING_BSD, RUNNING_OPENBSD
from ptrace.cpu_info import CPU_64BITS, CPU_WORD_SIZE, CPU_POWERPC
 
        reg as ptrace_registers_t)
 
elif RUNNING_LINUX:
    from ptrace.binding.linux_struct import (
        user_regs_struct as ptrace_registers_t,
    PTRACE_DETACH = 17
    PTRACE_SYSCALL = 24
if RUNNING_LINUX:
    PTRACE_GETFPREGS = 14
    PTRACE_SETFPREGS = 15
        return new_pid.value
 
if RUNNING_LINUX:
    def ptrace_syscall(pid, signum=0):
        ptrace(PTRACE_SYSCALL, pid, 0, signum)

src/p/y/python-ptrace-0.7/ptrace/binding/func.py   python-ptrace(Download)
from ptrace.ctypes_errno import get_errno
from ptrace.ctypes_tools import formatAddress
from ptrace.os_tools import RUNNING_LINUX, RUNNING_BSD, RUNNING_OPENBSD
from ptrace.cpu_info import CPU_64BITS, CPU_WORD_SIZE, CPU_POWERPC
 
        reg as ptrace_registers_t)
 
elif RUNNING_LINUX:
    from ptrace.binding.linux_struct import (
        user_regs_struct as ptrace_registers_t,
    PTRACE_DETACH = 17
    PTRACE_SYSCALL = 24
if RUNNING_LINUX:
    PTRACE_GETFPREGS = 14
    PTRACE_SETFPREGS = 15
        return new_pid.value
 
if RUNNING_LINUX:
    def ptrace_syscall(pid, signum=0):
        ptrace(PTRACE_SYSCALL, pid, 0, signum)

src/s/e/segvault-HEAD/fusil/ptrace/ptrace/syscall/syscall_argument.py   segvault(Download)
from ptrace.syscall.socketcall_constants import SOCKETCALL
import re
from ptrace.os_tools import RUNNING_LINUX, RUNNING_FREEBSD
from ptrace.syscall import FILENAME_ARGUMENTS
if RUNNING_LINUX:
 
KNOWN_STRUCTS = []
if RUNNING_LINUX:
    KNOWN_STRUCTS.extend((timeval, timespec, pollfd, rlimit, new_utsname, user_desc))
KNOWN_STRUCTS = dict( (struct.__name__, struct) for struct in KNOWN_STRUCTS )
            struct = KNOWN_STRUCTS[argtype]
            return self.readStruct(address, struct)
        if RUNNING_LINUX and argtype == "fd_set":
            fd_set = self.readBits(address, FD_SETSIZE)
            return self.formatPointer("<fdset=(%s)>" % fd_set, address)

src/s/e/segvault-HEAD/fusil/ptrace/ptrace/process_tools.py   segvault(Download)
from ptrace.os_tools import RUNNING_LINUX, RUNNING_WINDOWS
if RUNNING_LINUX:
    from ptrace.linux_proc import (ProcError, openProc,
        readProcessProcList, readProcessLink, readProcessStat)
from ptrace.signames import signalName
     - max_length (default: None): maximum number of environment variables
    """
    if not RUNNING_LINUX:
        log("Process ID: %s" % pid)
        return

src/p/y/python-ptrace-0.7/ptrace/syscall/syscall_argument.py   python-ptrace(Download)
from ptrace.syscall.socketcall_constants import SOCKETCALL
import re
from ptrace.os_tools import RUNNING_LINUX, RUNNING_FREEBSD
from ptrace.syscall import FILENAME_ARGUMENTS
if RUNNING_LINUX:
 
KNOWN_STRUCTS = []
if RUNNING_LINUX:
    KNOWN_STRUCTS.extend((timeval, timespec, pollfd, rlimit, new_utsname, user_desc))
KNOWN_STRUCTS = dict( (struct.__name__, struct) for struct in KNOWN_STRUCTS )
            struct = KNOWN_STRUCTS[argtype]
            return self.readStruct(address, struct)
        if RUNNING_LINUX and argtype == "fd_set":
            fd_set = self.readBits(address, FD_SETSIZE)
            return self.formatPointer("<fdset=(%s)>" % fd_set, address)

src/s/e/segvault-HEAD/fusil/fusil/project.py   segvault(Download)
from time import time
from fusil.aggressivity import AggressivityAgent
from ptrace.os_tools import RUNNING_LINUX, RUNNING_PYPY
from fusil.process.debugger import Debugger
from shutil import copyfile
if RUNNING_PYPY:
    from gc import collect as gc_collect
if RUNNING_LINUX:
        options = application.options
        self.agents = AgentList()
        if RUNNING_LINUX:
            if options.fast:
                self.system_calm = None

src/p/y/python-ptrace-0.7/ptrace/process_tools.py   python-ptrace(Download)
from ptrace.os_tools import RUNNING_LINUX, RUNNING_WINDOWS
if RUNNING_LINUX:
    from ptrace.linux_proc import (ProcError, openProc,
        readProcessProcList, readProcessLink, readProcessStat)
from ptrace.signames import signalName
     - max_length (default: None): maximum number of environment variables
    """
    if not RUNNING_LINUX:
        log("Process ID: %s" % pid)
        return

src/s/e/segvault-HEAD/fusil/ptrace/ptrace/syscall/names.py   segvault(Download)
from ptrace.cpu_info import CPU_64BITS
from ptrace.os_tools import RUNNING_LINUX, RUNNING_FREEBSD
if RUNNING_LINUX:
    if CPU_64BITS:
        from ptrace.syscall.linux_syscall64 import SYSCALL_NAMES

src/f/u/fusil-1.5/fusil/project.py   fusil(Download)
from time import time
from fusil.aggressivity import AggressivityAgent
from ptrace.os_tools import RUNNING_LINUX, RUNNING_PYPY
from fusil.process.debugger import Debugger
from shutil import copyfile
if RUNNING_PYPY:
    from gc import collect as gc_collect
if RUNNING_LINUX:
        options = application.options
        self.agents = AgentList()
        if RUNNING_LINUX:
            if options.fast:
                self.system_calm = None

src/s/e/segvault-HEAD/fusil/ptrace/ptrace/syscall/socketcall_struct.py   segvault(Download)
from ctypes import Structure, c_char, c_ushort, c_ubyte
from ptrace.ctypes_stdint import uint16_t, uint32_t
from ptrace.os_tools import RUNNING_BSD, RUNNING_LINUX
 
if RUNNING_BSD:
 
# Netlink socket
if RUNNING_LINUX:
    class sockaddr_nl(Structure):
        _fields_ = (

  1 | 2 | 3  Next