Searched refs:prompts (Results 1 - 19 of 19) sorted by relevance

/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dprompter_posix.c44 krb5_prompt prompts[])
55 if (prompts[i].hidden) {
56 if(UI_UTIL_read_pw_string(prompts[i].reply->data,
57 prompts[i].reply->length,
58 prompts[i].prompt,
62 char *s = prompts[i].reply->data;
64 fputs (prompts[i].prompt, stdout);
66 if(fgets(prompts[i].reply->data,
67 prompts[i].reply->length,
39 krb5_prompter_posix(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
H A Dinit_creds_pw.c488 krb5_prompt prompts[2]; local
532 prompts[0].hidden = 1;
533 prompts[0].prompt = "New password: ";
534 prompts[0].reply = &password_data[0];
535 prompts[0].type = KRB5_PROMPT_TYPE_NEW_PASSWORD;
540 prompts[1].hidden = 1;
541 prompts[1].prompt = "Repeat new password: ";
542 prompts[1].reply = &password_data[1];
543 prompts[1].type = KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN;
546 2, prompts);
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauth-chall.c51 char *challenge, *name, *info, **prompts; local
66 &numprompts, &prompts, &echo_on)) {
73 challenge = xstrdup(prompts[0]);
75 xfree(prompts[i]);
76 xfree(prompts);
H A Dauth-skey.c58 u_int* numprompts, char ***prompts, u_int **echo_on)
70 *prompts = xcalloc(*numprompts, sizeof(char *));
73 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT);
57 skey_query(void *ctx, char **name, char **infotxt, u_int* numprompts, char ***prompts, u_int **echo_on) argument
H A Dauth-bsdauth.c51 u_int *numprompts, char ***prompts, u_int **echo_on)
82 *prompts = xcalloc(*numprompts, sizeof(char *));
84 (*prompts)[0] = xstrdup(challenge);
50 bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
H A Dauth-pam.c731 u_int *num, char ***prompts, u_int **echo_on)
744 *prompts = xmalloc(sizeof(char *));
745 **prompts = NULL;
757 **prompts = xrealloc(**prompts, 1, len);
758 strlcpy(**prompts + plen, msg, len - plen);
767 **prompts = xrealloc(**prompts, 1, len);
768 strlcpy(**prompts + plen, msg, len - plen);
770 strlcat(**prompts
730 sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument
[all...]
H A Dauth2-chall.c251 char *name, *instr, **prompts; local
256 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
265 packet_put_cstring(prompts[i]);
272 xfree(prompts[i]);
273 xfree(prompts);
H A Dmonitor_wrap.c834 u_int *num, char ***prompts, u_int **echo_on)
853 *prompts = xcalloc((*num + 1), sizeof(char *));
856 (*prompts)[i] = buffer_get_string(&m, NULL);
933 char ***prompts, u_int **echo_on)
938 *prompts = xcalloc(*numprompts, sizeof(char *));
947 u_int *numprompts, char ***prompts, u_int **echo_on)
971 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on);
972 (*prompts)[0] = challenge;
1006 u_int *numprompts, char ***prompts, u_int **echo_on)
1032 mm_chall_setup(name, infotxt, numprompts, prompts, echo_o
833 mm_sshpam_query(void *ctx, char **name, char **info, u_int *num, char ***prompts, u_int **echo_on) argument
932 mm_chall_setup(char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
946 mm_bsdauth_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
1005 mm_skey_query(void *ctx, char **name, char **infotxt, u_int *numprompts, char ***prompts, u_int **echo_on) argument
[all...]
H A Dauth.h109 u_int *numprompts, char ***prompts, u_int **echo_on);
H A Dmonitor.c859 char **prompts; local
863 &prompts, &echo_on) < 0 ? 0 : 1;
868 buffer_put_cstring(m, prompts[0]);
876 xfree(prompts);
1017 char *name, *info, **prompts; local
1023 ret = (sshpam_device.query)(sshpam_ctxt, &name, &info, &num, &prompts, &echo_on);
1036 buffer_put_cstring(m, prompts[i]);
1037 xfree(prompts[i]);
1040 if (prompts != NULL)
1041 xfree(prompts);
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/gdb/
H A Devent-top.h28 /* Stack for prompts. Each prompt is composed as a prefix, a prompt
49 using annotation level equal 2, there will be 2 prompts on the
55 are dealt with (like the different prompts used for 'commands' or
60 struct prompts struct
116 extern struct prompts the_prompts;
H A Devent-top.c129 struct prompts the_prompts;
/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dcmd-command-prompt.c41 "[-I inputs] [-p prompts] " CMD_TARGET_CLIENT_USAGE " [template]",
53 char *prompts; member in struct:cmd_command_prompt_cdata
90 const char *inputs, *prompts; local
108 cdata->prompts = NULL;
116 if ((prompts = args_get(args, 'p')) != NULL)
117 cdata->prompts = xstrdup(prompts);
120 xasprintf(&cdata->prompts, "(%.*s) ", (int) n, cdata->template);
122 cdata->prompts = xstrdup(":");
125 cdata->next_prompt = cdata->prompts;
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kpasswd/
H A Dkpasswd-generator.c73 krb5_prompt prompts[])
68 nop_prompter(krb5_context context, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) argument
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/libldap/
H A Dcyrus.c399 sasl_interact_t *prompts = NULL; local
516 &prompts,
534 res = (interact)( ld, flags, defaults, prompts );
626 &prompts,
636 res = (interact)( ld, flags, defaults, prompts );
/netbsd-6-1-5-RELEASE/distrib/miniroot/
H A Dinstall.sub1304 at the prompts below.
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/
H A Dntpq-opts.def338 This command prompts you to type in a password (which will not
/netbsd-6-1-5-RELEASE/distrib/syspkg/mk/
H A Dbsd.syspkg.mk198 # Used to print all the '===>' style prompts - override this to turn them off.
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/include/
H A Dkrb5-protos.h3292 krb5_prompt prompts[]);

Completed in 214 milliseconds