/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | prompter_posix.c | 44 krb5_prompt prompts[]) 55 if (prompts[i].hidden) { 56 if(UI_UTIL_read_pw_string(prompts[i].reply->data, 57 prompts[i].reply->length, 58 prompts[i].prompt, 62 char *s = prompts[i].reply->data; 64 fputs (prompts[i].prompt, stdout); 66 if(fgets(prompts[i].reply->data, 67 prompts[i].reply->length, 39 krb5_prompter_posix(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
H A D | init_creds_pw.c | 488 krb5_prompt prompts[2]; local 532 prompts[0].hidden = 1; 533 prompts[0].prompt = "New password: "; 534 prompts[0].reply = &password_data[0]; 535 prompts[0].type = KRB5_PROMPT_TYPE_NEW_PASSWORD; 540 prompts[1].hidden = 1; 541 prompts[1].prompt = "Repeat new password: "; 542 prompts[1].reply = &password_data[1]; 543 prompts[1].type = KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN; 546 2, prompts); [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | auth-chall.c | 51 char *challenge, *name, *info, **prompts; local 66 &numprompts, &prompts, &echo_on)) { 73 challenge = xstrdup(prompts[0]); 75 xfree(prompts[i]); 76 xfree(prompts);
|
H A D | auth-skey.c | 58 u_int* numprompts, char ***prompts, u_int **echo_on) 70 *prompts = xcalloc(*numprompts, sizeof(char *)); 73 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); 57 skey_query(void *ctx, char **name, char **infotxt, u_int* numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-bsdauth.c | 51 u_int *numprompts, char ***prompts, u_int **echo_on) 82 *prompts = xcalloc(*numprompts, sizeof(char *)); 84 (*prompts)[0] = xstrdup(challenge); 50 bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
|
H A D | auth-pam.c | 731 u_int *num, char ***prompts, u_int **echo_on) 744 *prompts = xmalloc(sizeof(char *)); 745 **prompts = NULL; 757 **prompts = xrealloc(**prompts, 1, len); 758 strlcpy(**prompts + plen, msg, len - plen); 767 **prompts = xrealloc(**prompts, 1, len); 768 strlcpy(**prompts + plen, msg, len - plen); 770 strlcat(**prompts 730 sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth2-chall.c | 251 char *name, *instr, **prompts; local 256 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) 265 packet_put_cstring(prompts[i]); 272 xfree(prompts[i]); 273 xfree(prompts);
|
H A D | monitor_wrap.c | 834 u_int *num, char ***prompts, u_int **echo_on) 853 *prompts = xcalloc((*num + 1), sizeof(char *)); 856 (*prompts)[i] = buffer_get_string(&m, NULL); 933 char ***prompts, u_int **echo_on) 938 *prompts = xcalloc(*numprompts, sizeof(char *)); 947 u_int *numprompts, char ***prompts, u_int **echo_on) 971 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); 972 (*prompts)[0] = challenge; 1006 u_int *numprompts, char ***prompts, u_int **echo_on) 1032 mm_chall_setup(name, infotxt, numprompts, prompts, echo_o 833 mm_sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument 932 mm_chall_setup(char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 946 mm_bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument 1005 mm_skey_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument [all...] |
H A D | auth.h | 109 u_int *numprompts, char ***prompts, u_int **echo_on);
|
H A D | monitor.c | 859 char **prompts; local 863 &prompts, &echo_on) < 0 ? 0 : 1; 868 buffer_put_cstring(m, prompts[0]); 876 xfree(prompts); 1017 char *name, *info, **prompts; local 1023 ret = (sshpam_device.query)(sshpam_ctxt, &name, &info, &num, &prompts, &echo_on); 1036 buffer_put_cstring(m, prompts[i]); 1037 xfree(prompts[i]); 1040 if (prompts != NULL) 1041 xfree(prompts); [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/ |
H A D | event-top.h | 28 /* Stack for prompts. Each prompt is composed as a prefix, a prompt 49 using annotation level equal 2, there will be 2 prompts on the 55 are dealt with (like the different prompts used for 'commands' or 60 struct prompts struct 116 extern struct prompts the_prompts;
|
H A D | event-top.c | 129 struct prompts the_prompts;
|
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/ |
H A D | cmd-command-prompt.c | 41 "[-I inputs] [-p prompts] " CMD_TARGET_CLIENT_USAGE " [template]", 53 char *prompts; member in struct:cmd_command_prompt_cdata 90 const char *inputs, *prompts; local 108 cdata->prompts = NULL; 116 if ((prompts = args_get(args, 'p')) != NULL) 117 cdata->prompts = xstrdup(prompts); 120 xasprintf(&cdata->prompts, "(%.*s) ", (int) n, cdata->template); 122 cdata->prompts = xstrdup(":"); 125 cdata->next_prompt = cdata->prompts; [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kpasswd/ |
H A D | kpasswd-generator.c | 73 krb5_prompt prompts[]) 68 nop_prompter(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/libldap/ |
H A D | cyrus.c | 399 sasl_interact_t *prompts = NULL; local 516 &prompts, 534 res = (interact)( ld, flags, defaults, prompts ); 626 &prompts, 636 res = (interact)( ld, flags, defaults, prompts );
|
/netbsd-6-1-5-RELEASE/distrib/miniroot/ |
H A D | install.sub | 1304 at the prompts below.
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/ |
H A D | ntpq-opts.def | 338 This command prompts you to type in a password (which will not
|
/netbsd-6-1-5-RELEASE/distrib/syspkg/mk/ |
H A D | bsd.syspkg.mk | 198 # Used to print all the '===>' style prompts - override this to turn them off.
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/include/ |
H A D | krb5-protos.h | 3292 krb5_prompt prompts[]);
|