/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | prompter_posix.c | 42 krb5_prompt prompts[]) 53 if (prompts[i].hidden) { 54 if(UI_UTIL_read_pw_string(prompts[i].reply->data, 55 prompts[i].reply->length, 56 prompts[i].prompt, 60 char *s = prompts[i].reply->data; 62 fputs (prompts[i].prompt, stdout); 64 if(fgets(prompts[i].reply->data, 65 prompts[i].reply->length, 37 krb5_prompter_posix(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
H A D | init_creds_pw.c | 486 krb5_prompt prompts[2]; local 530 prompts[0].hidden = 1; 531 prompts[0].prompt = "New password: "; 532 prompts[0].reply = &password_data[0]; 533 prompts[0].type = KRB5_PROMPT_TYPE_NEW_PASSWORD; 538 prompts[1].hidden = 1; 539 prompts[1].prompt = "Repeat new password: "; 540 prompts[1].reply = &password_data[1]; 541 prompts[1].type = KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN; 544 2, prompts); [all...] |
H A D | krb5-protos.h | 3342 krb5_prompt prompts[]);
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-chall.c | 48 char *challenge, *name, *info, **prompts; local 63 &numprompts, &prompts, &echo_on)) { 70 challenge = xstrdup(prompts[0]); 72 free(prompts[i]); 73 free(prompts); 83 char *resp[1], *name, *info, **prompts; local 98 &numprompts, &prompts, &echo_on)) != 0) 105 free(prompts[i]); 106 free(prompts);
|
H A D | auth-skey.c | 53 u_int* numprompts, char ***prompts, u_int **echo_on) 66 *prompts = xcalloc(*numprompts, sizeof(char *)); 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); 52 skey_query(void *ctx, char **name, char **infotxt, u_int* numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-bsdauth.c | 52 u_int *numprompts, char ***prompts, u_int **echo_on) 83 *prompts = xcalloc(*numprompts, sizeof(char *)); 85 (*prompts)[0] = xstrdup(challenge); 51 bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-pam.c | 713 u_int *num, char ***prompts, u_int **echo_on) 726 *prompts = xmalloc(sizeof(char *)); 727 **prompts = NULL; 739 **prompts = xrealloc(**prompts, 1, len); 740 strlcpy(**prompts + plen, msg, len - plen); 749 **prompts = xrealloc(**prompts, 1, len); 750 strlcpy(**prompts + plen, msg, len - plen); 752 strlcat(**prompts 712 sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth2-chall.c | 252 char *name, *instr, **prompts; local 257 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) 266 packet_put_cstring(prompts[i]); 273 free(prompts[i]); 274 free(prompts);
|
H A D | monitor_wrap.c | 841 u_int *num, char ***prompts, u_int **echo_on) 860 *prompts = xcalloc((*num + 1), sizeof(char *)); 863 (*prompts)[i] = buffer_get_string(&m, NULL); 939 char ***prompts, u_int **echo_on) 944 *prompts = xcalloc(*numprompts, sizeof(char *)); 951 u_int *numprompts, char ***prompts, u_int **echo_on) 975 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); 976 (*prompts)[0] = challenge; 1009 u_int *numprompts, char ***prompts, u_int **echo_on) 1035 mm_chall_setup(name, infotxt, numprompts, prompts, echo_o 840 mm_sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument 938 mm_chall_setup(char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 950 mm_bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 1008 mm_skey_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth.h | 105 u_int *numprompts, char ***prompts, u_int **echo_on);
|
H A D | monitor.c | 909 char **prompts; local 913 &prompts, &echo_on) < 0 ? 0 : 1; 918 buffer_put_cstring(m, prompts[0]); 926 free(prompts); 1071 char *name = NULL, *info = NULL, **prompts = NULL; local 1077 ret = (sshpam_device.query)(sshpam_ctxt, &name, &info, &num, &prompts, &echo_on); 1090 buffer_put_cstring(m, prompts[i]); 1091 free(prompts[i]); 1094 free(prompts);
|
/freebsd-10.0-release/contrib/gdb/gdb/ |
H A D | event-top.h | 29 /* Stack for prompts. Each prompt is composed as a prefix, a prompt 50 using annotation level equal 2, there will be 2 prompts on the 56 are dealt with (like the different prompts used for 'commands' or 61 struct prompts struct 116 extern struct prompts the_prompts;
|
H A D | event-top.c | 120 struct prompts the_prompts;
|
/freebsd-10.0-release/crypto/heimdal/kpasswd/ |
H A D | kpasswd-generator.c | 71 krb5_prompt prompts[]) 66 nop_prompter(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
/freebsd-10.0-release/contrib/ntp/ntpq/ |
H A D | ntpq-opts.def | 323 This command prompts you to type in a password (which will not
|
/freebsd-10.0-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 678 - Merge multiple PAM text messages into subsequent prompts when possible when
|