/titanic_41/usr/src/lib/libcryptoutil/common/ |
H A D | passutils.c | 67 char prompt[1024]; in pkcs11_get_pass() local 73 (void) snprintf(prompt, sizeof (prompt), DEFAULT_TOKEN_PROMPT, in pkcs11_get_pass() 76 (void) snprintf(prompt, sizeof (prompt), DEFAULT_USER_PROMPT); in pkcs11_get_pass() 79 tmpbuf = getpassphrase(prompt); in pkcs11_get_pass() 103 (void) snprintf(prompt, sizeof (prompt), in pkcs11_get_pass() 106 (void) snprintf(prompt, sizeof (prompt), in pkcs11_get_pass() 108 tmpbuf = getpassphrase(prompt); in pkcs11_get_pass()
|
/titanic_41/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | main.c | 97 prompt, in usage() 130 if (prompt = strrchr(argv[0], '/')) in main() 131 ++prompt; in main() 133 prompt = argv[0]; in main() 137 rlogin = (strncmp(prompt, "rlog", 4) == 0) ? '~' : _POSIX_VDISABLE; in main() 160 "and -F allowed.\n"), prompt); in main() 171 "and -F allowed.\n"), prompt); in main() 197 prompt); in main() 217 prompt); in main() 244 prompt); in main() [all …]
|
/titanic_41/usr/src/lib/libadm/common/ |
H A D | putprmpt.c | 40 putprmpt(FILE *fp, char *prompt, char *choices[], char *defstr) in putprmpt() argument 46 if (prompt == NULL) { in putprmpt() 49 } else if (n = (int)strlen(prompt)) { in putprmpt() 52 if (prompt[0] == '~') in putprmpt() 54 defstr, prompt + 1); in putprmpt() 55 else if (prompt[n-1] == '~') in putprmpt() 57 n - 1, prompt, defstr); in putprmpt() 59 (void) strlcpy(buffer, prompt, sizeof (buffer)); in putprmpt()
|
H A D | getvol.c | 94 getvol(char *device, char *label, int options, char *prompt) in getvol() argument 96 return (_getvol(device, label, options, prompt, NULL)); in getvol() 100 _getvol(char *device, char *label, int options, char *prompt, char *norewind) in _getvol() argument 138 n = insert(device, label, options, prompt); in _getvol() 287 insert(char *device, char *label, int options, char *prompt) in insert() argument 305 if (prompt) { in insert() 306 (void) strlcpy(prmpt, prompt, sizeof (prmpt)); in insert() 307 for (pt = prmpt; *prompt; ) { in insert() 308 if ((*prompt == '\\') && (prompt[1] == '%')) in insert() 309 prompt++; in insert() [all …]
|
H A D | ckyorn.c | 82 ckyorn(char *yorn, char *defstr, char *error, char *help, char *prompt) in ckyorn() argument 87 if (!prompt) in ckyorn() 88 prompt = "Yes or No"; in ckyorn() 90 putprmpt(stderr, prompt, choices, defstr); in ckyorn()
|
H A D | ckint.c | 90 char *prompt) in ckint() argument 98 if (!prompt) { in ckint() 100 prompt = temp; in ckint() 105 putprmpt(stderr, prompt, NULL, defstr); in ckint()
|
H A D | ckkeywd.c | 66 char *prompt) in ckkeywd() argument 82 if (!prompt) in ckkeywd() 83 prompt = "Enter appropriate value"; in ckkeywd() 86 putprmpt(stderr, prompt, keyword, defstr); in ckkeywd()
|
H A D | ckrange.c | 88 char *error, char *help, char *prompt) in ckrange() argument 107 if (!prompt) { in ckrange() 112 prompt = defpmpt; in ckrange() 120 putprmpt(stderr, prompt, choices, defstr); in ckrange()
|
/titanic_41/usr/src/lib/libpkg/common/ |
H A D | pkgmount.c | 47 extern int getvol(char *device, char *label, int options, char *prompt); 55 char *pt, prompt[64], cmd[CMDSIZ]; in pkgmount() local 65 (void) snprintf(prompt, sizeof (prompt), in pkgmount() 68 (void) snprintf(prompt, sizeof (prompt), in pkgmount() 72 (void) snprintf(prompt, sizeof (prompt), pkg_gt(LABEL2), pkg); in pkgmount() 74 (void) snprintf(prompt, sizeof (prompt), pkg_gt(LABEL3)); in pkgmount() 85 (devp->rdonly ? 0 : DM_FORMFS|DM_WLABEL), prompt))) { in pkgmount()
|
/titanic_41/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 388 sasl_interact_t *prompt; local 391 for (prompt = *promptlist; prompt->id != SASL_CB_LIST_END; ++prompt) { 392 if (prompt->id==lookingfor) 393 return prompt; 410 sasl_interact_t *prompt; local 415 prompt = _plug_find_prompt(prompt_need, id); 416 if (prompt != NULL) { 419 if (required && !prompt->result) { 424 *result = prompt->result; 457 sasl_interact_t *prompt; local [all …]
|
/titanic_41/usr/src/cmd/svr4pkg/hdrs/ |
H A D | libadm.h | 54 char *help, char *prompt)); 65 char *help, char *prompt)); 74 char *help, char *prompt)); 84 char *prompt)); 93 char *error, char *help, char *prompt)); 103 char *error, char *help, char *prompt)); 115 char *prompt)); 126 char *prompt)); 136 char *help, char *prompt)); 147 char *help, char *prompt)); [all …]
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | read_pwd.c | 44 krb5_read_password(krb5_context context, const char *prompt, const char *prompt2, char *return_pwd,… in krb5_read_password() argument 51 k5prompt.prompt = (char *)prompt; in krb5_read_password() 61 k5prompt.prompt = (char *)prompt2; in krb5_read_password() 120 const char * prompt, in read_console_password() argument 145 (void) fputs(prompt, stdout); in read_console_password() 243 krb5_read_password(context, prompt, prompt2, return_pwd, size_return) in krb5_read_password() argument 245 const char *prompt; 258 (context, prompt, prompt2, return_pwd, size_return)); 261 dps.pwd_prompt = prompt; 287 krb5_read_password(context, prompt, prompt2, return_pwd, size_return) in krb5_read_password() argument [all …]
|
H A D | promptusr.c | 21 char * prompt; member 70 if (p->prompt) { in krb5_os_get_tty_uio() 71 fputs(p->prompt, stdout); in krb5_os_get_tty_uio() 136 if (p->prompt && (p->flags & KRB5_UIO_FREE_PROMPT)) in krb5_free_uio() 137 free(p->prompt); in krb5_free_uio()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gic_pwd.c | 56 krb5_prompt prompt; in krb5_get_as_key_password() local 89 prompt.prompt = promptstr; in krb5_get_as_key_password() 90 prompt.hidden = 1; in krb5_get_as_key_password() 91 prompt.reply = password; in krb5_get_as_key_password() 97 1, &prompt))))) { in krb5_get_as_key_password() 171 krb5_prompt prompt[2]; in __krb5_get_init_creds_password() local 172 krb5_prompt_type prompt_types[sizeof(prompt)/sizeof(prompt[0])]; in __krb5_get_init_creds_password() 329 prompt[0].prompt = "Enter new password"; in __krb5_get_init_creds_password() 330 prompt[0].hidden = 1; in __krb5_get_init_creds_password() 331 prompt[0].reply = &pw0; in __krb5_get_init_creds_password() [all …]
|
H A D | preauth.c | 369 …rb5_const_pointer key_seed, krb5_kdc_req *request, krb5_keyblock **new_enc_key, const char *prompt) in sam_get_pass_from_user() argument 379 krb5_default_pwd_prompt1 = prompt; in sam_get_pass_from_user() 396 char *prompt = sc->sam_response_prompt.data; in handle_sam_labels() local 432 prompt = "Passcode"; in handle_sam_labels() 434 prompt_len = strlen(prompt); in handle_sam_labels() 452 strncpy(p, prompt, prompt_len); p += prompt_len; in handle_sam_labels() 473 char * prompt; in obtain_sam_padata() local 500 prompt = handle_sam_labels(sam_challenge); in obtain_sam_padata() 501 if (prompt == NULL) { in obtain_sam_padata() 505 retval = krb5_read_password(context, prompt, 0, passcode, &pcsize); in obtain_sam_padata() [all …]
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | readpass.c | 101 read_passphrase(const char *prompt, int flags) in read_passphrase() argument 124 return ssh_askpass(askpass, prompt); in read_passphrase() 127 if (readpassphrase(prompt, buf, sizeof buf, rppflags) == NULL) { in read_passphrase() 142 char *p, prompt[1024]; in ask_permission() local 147 vsnprintf(prompt, sizeof(prompt), fmt, args); in ask_permission() 150 p = read_passphrase(prompt, RP_USE_ASKPASS|RP_ALLOW_EOF); in ask_permission()
|
/titanic_41/usr/src/lib/libc/port/stdio/ |
H A D | getpass.c | 56 getpass(const char *prompt) in getpass() argument 58 return ((char *)__getpass(prompt, SMLPASSWD)); in getpass() 62 getpassphrase(const char *prompt) in getpassphrase() argument 64 return ((char *)__getpass(prompt, MAXPASSWD)); in getpassphrase() 70 __getpass(const char *prompt, int size) in __getpass() argument 97 (void) fputs(prompt, fi); in __getpass()
|
/titanic_41/usr/src/lib/libast/common/disc/ |
H A D | sfdcmore.c | 50 char prompt[1]; /* prompt string */ member 213 r = ttyquery(sfstdin, f, more->prompt, dp); 303 int sfdcmore(Sfio_t* f, const char* prompt, int rows, int cols) in sfdcmore() argument 305 int sfdcmore(f, prompt, rows, cols) in sfdcmore() 307 char* prompt; 321 if (!prompt) 322 prompt = "\033[7m More\033[m"; 323 n = strlen(prompt) + 1; 331 memcpy(more->prompt, prompt, n);
|
/titanic_41/usr/src/cmd/keyserv/ |
H A D | newkey.c | 334 char prompt[MAXPASSWD+MAXHOSTNAMELEN+64]; local 369 (void) sprintf(prompt, "Enter local root login password:"); 371 (void) sprintf(prompt, "Enter %s's login password:", 374 pass = getpassphrase(prompt); 421 (void) sprintf(prompt, 424 pass = getpassphrase(prompt); 443 (void) sprintf(prompt, 446 pass = getpassphrase(prompt);
|
/titanic_41/usr/src/cmd/ssh/ssh-add/ |
H A D | ssh-add.c | 236 char prompt[100], *p1, *p2; in lock_agent() local 239 strlcpy(prompt, "Enter lock password: ", sizeof(prompt)); in lock_agent() 240 p1 = read_passphrase(prompt, RP_ALLOW_STDIN); in lock_agent() 242 strlcpy(prompt, "Again: ", sizeof prompt); in lock_agent() 243 p2 = read_passphrase(prompt, RP_ALLOW_STDIN); in lock_agent()
|
/titanic_41/usr/src/lib/krb5/ss/ |
H A D | invocation.c | 53 new_table->prompt = malloc((unsigned)strlen(subsystem_name)+3); 54 strcpy(new_table->prompt, subsystem_name); 55 strcat(new_table->prompt, ": "); 79 free(t->prompt);
|
/titanic_41/usr/src/cmd/ssh/libopenbsd-compat/common/ |
H A D | readpassphrase.c | 57 readpassphrase(const char *prompt, char *buf, size_t bufsiz, int flags) in readpassphrase() argument 124 (void)write(output, prompt, strlen(prompt)); in readpassphrase() 178 getpass(const char *prompt) 182 return(readpassphrase(prompt, buf, sizeof(buf), RPP_ECHO_OFF));
|
/titanic_41/usr/src/cmd/svc/milestone/ |
H A D | console-login | 78 val=`svcprop -p ttymon/prompt $SMF_FMRI` 80 prompt=`eval echo $val` 81 exec /usr/lib/saf/ttymon $args -p "`eval echo $prompt` "
|
/titanic_41/usr/src/cmd/cmd-crypto/pktool/ |
H A D | common.c | 285 yesno(char *prompt, char *invalid, boolean_t dflt) in yesno() argument 290 if (prompt == NULL) in yesno() 291 prompt = gettext("Enter (y)es or (n)o? "); in yesno() 295 (void) printf("%s", prompt); in yesno() 794 char prompt[1024]; in get_pk12_password() local 799 (void) strlcpy(prompt, in get_pk12_password() 801 "accessing the PKCS12 file: "), sizeof (prompt)); in get_pk12_password() 803 if (get_pin(prompt, NULL, (uchar_t **)&cred->cred, in get_pk12_password() 845 get_input_string(char *prompt, char *default_str, int min_len, int max_len) in get_input_string() argument 853 (void) printf("\t%s", prompt); in get_input_string() [all …]
|
/titanic_41/usr/src/lib/pam_modules/passwd_auth/ |
H A D | passwd_auth.c | 75 char prompt[PAM_MAX_MSG_SIZE]; in pam_sm_authenticate() local 182 (void) snprintf(prompt, sizeof (prompt), in pam_sm_authenticate() 190 (void) snprintf(prompt, sizeof (prompt), in pam_sm_authenticate() 194 retval = __pam_get_authtok(pamh, PAM_PROMPT, PAM_AUTHTOK, prompt, in pam_sm_authenticate()
|