/freebsd-10.2-release/crypto/heimdal/lib/krb5/ |
H A D | prompter_posix.c | 42 krb5_prompt prompts[]) 53 if (prompts[i].hidden) { 54 if(UI_UTIL_read_pw_string(prompts[i].reply->data, 55 prompts[i].reply->length, 56 prompts[i].prompt, 60 char *s = prompts[i].reply->data; 62 fputs (prompts[i].prompt, stdout); 64 if(fgets(prompts[i].reply->data, 65 prompts[i].reply->length, 37 krb5_prompter_posix(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
H A D | init_creds_pw.c | 486 krb5_prompt prompts[2]; local 530 prompts[0].hidden = 1; 531 prompts[0].prompt = "New password: "; 532 prompts[0].reply = &password_data[0]; 533 prompts[0].type = KRB5_PROMPT_TYPE_NEW_PASSWORD; 538 prompts[1].hidden = 1; 539 prompts[1].prompt = "Repeat new password: "; 540 prompts[1].reply = &password_data[1]; 541 prompts[1].type = KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN; 544 2, prompts); [all...] |
H A D | krb5-protos.h | 3342 krb5_prompt prompts[]);
|
/freebsd-10.2-release/crypto/openssh/ |
H A D | auth-chall.c | 48 char *challenge, *name, *info, **prompts; local 63 &numprompts, &prompts, &echo_on)) { 70 challenge = xstrdup(prompts[0]); 72 free(prompts[i]); 73 free(prompts); 83 char *resp[1], *name, *info, **prompts; local 98 &numprompts, &prompts, &echo_on)) != 0) 105 free(prompts[i]); 106 free(prompts);
|
H A D | auth-skey.c | 53 u_int* numprompts, char ***prompts, u_int **echo_on) 66 *prompts = xcalloc(*numprompts, sizeof(char *)); 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); 52 skey_query(void *ctx, char **name, char **infotxt, u_int* numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-bsdauth.c | 52 u_int *numprompts, char ***prompts, u_int **echo_on) 83 *prompts = xcalloc(*numprompts, sizeof(char *)); 85 (*prompts)[0] = xstrdup(challenge); 51 bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-pam.c | 715 u_int *num, char ***prompts, u_int **echo_on) 728 *prompts = xmalloc(sizeof(char *)); 729 **prompts = NULL; 741 **prompts = xrealloc(**prompts, 1, len); 742 strlcpy(**prompts + plen, msg, len - plen); 751 **prompts = xrealloc(**prompts, 1, len); 752 strlcpy(**prompts + plen, msg, len - plen); 754 strlcat(**prompts 714 sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth2-chall.c | 257 char *name, *instr, **prompts; local 262 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) 271 packet_put_cstring(prompts[i]); 278 free(prompts[i]); 279 free(prompts);
|
H A D | monitor_wrap.c | 838 u_int *num, char ***prompts, u_int **echo_on) 857 *prompts = xcalloc((*num + 1), sizeof(char *)); 860 (*prompts)[i] = buffer_get_string(&m, NULL); 936 char ***prompts, u_int **echo_on) 941 *prompts = xcalloc(*numprompts, sizeof(char *)); 948 u_int *numprompts, char ***prompts, u_int **echo_on) 972 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); 973 (*prompts)[0] = challenge; 1006 u_int *numprompts, char ***prompts, u_int **echo_on) 1032 mm_chall_setup(name, infotxt, numprompts, prompts, echo_o 837 mm_sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument 935 mm_chall_setup(char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 947 mm_bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 1005 mm_skey_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth.h | 104 u_int *numprompts, char ***prompts, u_int **echo_on);
|
H A D | monitor.c | 887 char **prompts; local 891 &prompts, &echo_on) < 0 ? 0 : 1; 896 buffer_put_cstring(m, prompts[0]); 904 free(prompts); 1047 char *name = NULL, *info = NULL, **prompts = NULL; local 1053 ret = (sshpam_device.query)(sshpam_ctxt, &name, &info, &num, &prompts, &echo_on); 1066 buffer_put_cstring(m, prompts[i]); 1067 free(prompts[i]); 1070 free(prompts);
|
/freebsd-10.2-release/contrib/gdb/gdb/ |
H A D | event-top.h | 29 /* Stack for prompts. Each prompt is composed as a prefix, a prompt 50 using annotation level equal 2, there will be 2 prompts on the 56 are dealt with (like the different prompts used for 'commands' or 61 struct prompts struct 116 extern struct prompts the_prompts;
|
H A D | event-top.c | 120 struct prompts the_prompts;
|
/freebsd-10.2-release/crypto/heimdal/kpasswd/ |
H A D | kpasswd-generator.c | 71 krb5_prompt prompts[]) 66 nop_prompter(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
/freebsd-10.2-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 678 - Merge multiple PAM text messages into subsequent prompts when possible when
|