HEX
Server: Apache
System: Windows NT MAGNETO-ARM 10.0 build 22000 (Windows 10) AMD64
User: Michel (0)
PHP: 7.4.7
Disabled: NONE
Upload Files
File: C:/Ruby27-x64/share/ri/2.7.0/system/String/shellescape-i.ri
U:RDoc::AnyMethod[iI"shellescape:ETI"String#shellescape;TF:publico:RDoc::Markup::Document:@parts[o:RDoc::Markup::Paragraph;	[I"CEscapes +str+ so that it can be safely used in a Bourne shell ;TI"command line.;To:RDoc::Markup::BlankLineo;
;	[I",See Shellwords.shellescape for details.;T:
@fileI"lib/shellwords.rb;T:0@omit_headings_from_table_of_contents_below0I"str.shellescape => string
;T0[I"();T@FI"String;TcRDoc::NormalClass00