/dragonfly/crypto/openssh/ |
H A D | auth-pam.c | 849 **prompts = NULL; in sshpam_query() 861 **prompts = xreallocarray(**prompts, 1, len); in sshpam_query() 872 **prompts = xreallocarray(**prompts, 1, len); in sshpam_query() 888 if (**prompts != NULL && strlen(**prompts) != 0) { in sshpam_query() 890 *info = **prompts; in sshpam_query() 891 **prompts = NULL; in sshpam_query() 901 if (**prompts != NULL) { in sshpam_query() 903 debug("PAM: %s", **prompts); in sshpam_query() 905 strlen(**prompts))) != 0) in sshpam_query() 908 free(**prompts); in sshpam_query() [all …]
|
H A D | auth2-chall.c | 257 char *name, *instr, **prompts; in send_userauth_info_request() local 262 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) in send_userauth_info_request() 272 if ((r = sshpkt_put_cstring(ssh, prompts[i])) != 0 || in send_userauth_info_request() 281 free(prompts[i]); in send_userauth_info_request() 282 free(prompts); in send_userauth_info_request()
|
H A D | monitor_wrap.c | 718 u_int *num, char ***prompts, u_int **echo_on) in mm_sshpam_query() argument 741 *prompts = xcalloc((*num + 1), sizeof(char *)); in mm_sshpam_query() 744 if ((r = sshbuf_get_cstring(m, &((*prompts)[i]), NULL)) != 0 || in mm_sshpam_query() 811 char ***prompts, u_int **echo_on) in mm_chall_setup() argument 816 *prompts = xcalloc(*numprompts, sizeof(char *)); in mm_chall_setup() 823 u_int *numprompts, char ***prompts, u_int **echo_on) in mm_bsdauth_query() argument 851 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); in mm_bsdauth_query() 852 (*prompts)[0] = challenge; in mm_bsdauth_query()
|
H A D | monitor.c | 920 char **prompts; in mm_answer_bsdauthquery() local 926 &prompts, &echo_on) < 0 ? 0 : 1; in mm_answer_bsdauthquery() 932 if ((r = sshbuf_put_cstring(m, prompts[0])) != 0) in mm_answer_bsdauthquery() 942 free(prompts); in mm_answer_bsdauthquery() 1049 char *name = NULL, *info = NULL, **prompts = NULL; in mm_answer_pam_query() local 1058 &num, &prompts, &echo_on); in mm_answer_pam_query() 1074 if ((r = sshbuf_put_cstring(m, prompts[i])) != 0 || in mm_answer_pam_query() 1077 free(prompts[i]); in mm_answer_pam_query() 1079 free(prompts); in mm_answer_pam_query()
|
H A D | auth.h | 126 u_int *numprompts, char ***prompts, u_int **echo_on);
|
/dragonfly/contrib/gdb-7/gdb/ |
H A D | event-top.h | 59 extern struct prompts the_prompts;
|
/dragonfly/contrib/openpam/ |
H A D | HISTORY | 31 pam_get_user(3) from using application-provided custom prompts. 152 embedded in strings such as prompts. Apply it to the prompts used 156 oldauthtok_prompt module options, which override the prompts passed
|
/dragonfly/usr.sbin/ppp/ |
H A D | README.changes | 55 o Any number of diagnostic prompts are allowed, and they are allowed in 65 o The dial/call/open command works asynchronously. As a result, prompts
|
/dragonfly/bin/ed/ |
H A D | POSIX | 29 encryption. The `x' command prompts the user to enter a key used for
|
/dragonfly/games/larn/datfiles/ |
H A D | larn.help | 46 larn -c create new scoreboards -- prompts for a password
|
/dragonfly/contrib/pam_passwdqc/ |
H A D | README | 13 password changing module lacks the "use_authtok" option or its prompts
|
/dragonfly/contrib/lvm2/dist/ |
H A D | WHATS_NEW_DM | 30 Add y|--yes option to dmsetup for default 'yes' answer to prompts.
|
H A D | WHATS_NEW | 805 Allow keyboard interrupt during user prompts when appropriate. 1491 pvcreate wipes md superblocks. (With --uuid or --restorefile it prompts.)
|
/dragonfly/games/fortune/datfiles/ |
H A D | dragonfly-tips | 324 Time to change your password? Type "passwd" and follow the prompts.
|
H A D | fortunes | 25189 And prompts that were cute or risque'. 32928 more than usually autocratic operating system. Screen prompts carry an
|
/dragonfly/contrib/diffutils/doc/ |
H A D | diffutils.info | 2368 prompts with '%' and pauses, waiting for one of the following commands. 2943 proceed, 'patch' normally prompts you for more information from the 3246 newline. If not, 'patch' prompts you for confirmation before
|
/dragonfly/crypto/libressl/ |
H A D | ChangeLog | 2099 * Fixed password prompts from openssl(1) to properly handle ^C.
|
/dragonfly/contrib/binutils-2.27/binutils/doc/ |
H A D | binutils.texi | 566 directly from a terminal. During interactive use, @command{ar} prompts for 568 errors. If you redirect standard input to a script file, no prompts are
|
/dragonfly/contrib/dialog/ |
H A D | CHANGES | 2192 text in the prompts with extra spaces like the older versions of
|