Searched +refs:read +refs:envvar +refs:name (Results 1 - 2 of 2) sorted by relevance
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | monitor_wrap.c | 157 if (atomicio(read, sock, buf, sizeof(buf)) != sizeof(buf)) { 160 fatal("%s: read: %s", __func__, strerror(errno)); 164 fatal("%s: read: bad msg_len %d", __func__, msg_len); 167 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len) 168 fatal("%s: read: %s", __func__, strerror(errno)); 181 fatal("%s: read: rtype %d != type %d", __func__, 495 enc->name = buffer_get_string(&b, NULL); 502 if (enc->name == NULL || cipher_by_name(enc->name) != enc->cipher) 503 fatal("%s: bad cipher name 844 mm_sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument 942 mm_chall_setup(char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 954 mm_bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 1012 mm_skey_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument [all...] |
H A D | monitor.c | 461 fatal("%s: authentication method name unknown", __func__); 544 if (atomicio(read, pmonitor->m_log_recvfd, 553 fatal("%s: log fd read: %s", __func__, strerror(errno)); 562 if (atomicio(read, pmonitor->m_log_recvfd, 564 fatal("%s: log fd read: %s", __func__, strerror(errno)); 922 char *name, *infotxt; local 928 success = bsdauth_query(authctxt, &name, &infotxt, &numprompts, 940 xfree(name); 1086 char *name = NULL, *info = NULL, **prompts = NULL; local 1092 ret = (sshpam_device.query)(sshpam_ctxt, &name, [all...] |
Completed in 185 milliseconds