/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | prompter.c | 36 krb5_prompt prompts[]) in krb5_prompter_posix() argument 72 if (prompts[i].reply->length > INT_MAX) in krb5_prompter_posix() 75 errcode = setup_tty(fp, prompts[i].hidden, &saveparm, &osigint); in krb5_prompter_posix() 80 (void)fputs(prompts[i].prompt, stdout); in krb5_prompter_posix() 83 (void)memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix() 86 retp = fgets(prompts[i].reply->data, (int)prompts[i].reply->length, in krb5_prompter_posix() 88 if (prompts[i].hidden) in krb5_prompter_posix() 100 retp = strchr(prompts[i].reply->data, '\n'); in krb5_prompter_posix() 113 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix() 217 krb5_prompt prompts[]) in krb5_prompter_posix() argument [all …]
|
/titanic_44/usr/src/lib/libsasl/plugin/ |
H A D | plugin_common.c | 617 sasl_interact_t *prompts; local 631 prompts = utils->malloc(alloc_size); 632 if (!prompts) { 636 memset(prompts, 0, alloc_size); 638 *prompts_res = prompts; 641 (prompts)->id = SASL_CB_USER; 643 (prompts)->challenge = convert_prompt(utils, h, 646 (prompts)->challenge = "Authorization Name"; 648 (prompts)->prompt = user_prompt; 649 (prompts)->defresult = user_def; [all …]
|
/titanic_44/usr/src/cmd/ssh/sshd/ |
H A D | auth-chall.c | 42 char *challenge, *name, *info, **prompts; in get_challenge() local 52 &numprompts, &prompts, &echo_on)) { in get_challenge() 59 challenge = xstrdup(prompts[0]); in get_challenge() 61 xfree(prompts[i]); in get_challenge() 62 xfree(prompts); in get_challenge()
|
H A D | auth-skey.c | 44 u_int* numprompts, char ***prompts, u_int **echo_on) in skey_query() argument 57 *prompts = xmalloc(*numprompts * sizeof(char *)); in skey_query() 65 (*prompts)[0] = p; in skey_query()
|
H A D | auth2-pam.c | 236 conv_ctxt->prompts = xmalloc(sizeof(int) * num_msg); in do_pam_conv_kbd_int() 272 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int() 296 conv_ctxt->prompts[j++] = i; in do_pam_conv_kbd_int() 324 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int() 333 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int() 340 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int() 380 int j = conv_ctxt->prompts[i]; in input_userauth_info_response_pam()
|
H A D | auth-bsdauth.c | 42 u_int *numprompts, char ***prompts, u_int **echo_on) in bsdauth_query() argument 73 *prompts = xmalloc(*numprompts * sizeof(char *)); in bsdauth_query() 76 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
H A D | auth2-chall.c | 232 char *name, *instr, **prompts; in send_userauth_info_request() local 238 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) in send_userauth_info_request() 247 packet_put_utf8_cstring(prompts[i]); in send_userauth_info_request() 254 xfree(prompts[i]); in send_userauth_info_request() 255 xfree(prompts); in send_userauth_info_request()
|
H A D | session.c | 2539 struct pam_message **prompts, in session_do_pam_conv() argument 2557 switch(PAM_MSG_MEMBER(prompts, count, msg_style)) { in session_do_pam_conv() 2560 prompt = PAM_MSG_MEMBER(prompts, count, msg); in session_do_pam_conv() 2572 prompt = PAM_MSG_MEMBER(prompts, count, msg); in session_do_pam_conv()
|
/titanic_44/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 381 krb5_prompt prompts[]) in pam_krb5_prompter() argument 392 if (prompts) { in pam_krb5_prompter() 424 if (prompts[i].hidden) { in pam_krb5_prompter() 434 prompts[i].prompt) < 0) { in pam_krb5_prompter() 451 assert(prompts[i].reply->data != NULL); in pam_krb5_prompter() 454 if (strlcpy(prompts[i].reply->data, in pam_krb5_prompter() 455 ret_respp[i].resp, prompts[i].reply->length) >= in pam_krb5_prompter() 456 prompts[i].reply->length) { in pam_krb5_prompter() 471 retp = strchr(prompts[i].reply->data, '\n'); in pam_krb5_prompter() 475 prompts[i].reply->length = in pam_krb5_prompter() [all …]
|
/titanic_44/usr/src/cmd/ldap/common/ |
H A D | ldaptool-sasl.c | 75 ldaptool_sasl_interact( LDAP *ld, unsigned flags, void *defaults, void *prompts ) { in ldaptool_sasl_interact() argument 80 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in ldaptool_sasl_interact() 83 for (interact = prompts; interact->id != SASL_CB_LIST_END; interact++) { in ldaptool_sasl_interact()
|
/titanic_44/usr/src/cmd/ssh/include/ |
H A D | auth2-pam.h | 23 int *prompts; member
|
H A D | auth.h | 209 u_int *numprompts, char ***prompts, u_int **echo_on);
|
/titanic_44/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | sasl.c | 653 sasl_interact_t *prompts = NULL; in nsldapi_sasl_do_bind() local 707 &prompts, in nsldapi_sasl_do_bind() 717 (callback)(ld, flags, defaults, prompts) != LDAP_SUCCESS ) { in nsldapi_sasl_do_bind() 785 &prompts, in nsldapi_sasl_do_bind() 790 (callback)(ld, flags, defaults, prompts) in nsldapi_sasl_do_bind()
|
/titanic_44/usr/src/lib/libadutils/common/ |
H A D | adutils_impl.h | 160 int saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts);
|
H A D | adutils.c | 449 saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in saslcallback() argument 453 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in saslcallback() 457 for (interact = prompts; interact->id != SASL_CB_LIST_END; in saslcallback()
|
/titanic_44/usr/src/cmd/format/ |
H A D | Makefile | 34 prompts.o startup.o menu_scsi.o auto_sense.o disk_generic.o \
|
/titanic_44/usr/src/cmd/idmap/idmap/ |
H A D | namemaps.c | 170 idmap_saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in idmap_saslcallback() argument 174 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in idmap_saslcallback() 178 for (interact = prompts; interact->id != SASL_CB_LIST_END; in idmap_saslcallback()
|
/titanic_44/usr/src/lib/libsasl/ |
H A D | README | 42 and third are the prompts returned to the client in sasl_interact_t or
|
/titanic_44/usr/src/cmd/krb5/kinit/ |
H A D | kinit.c | 832 krb5_prompt prompts[] in kinit_prompter() argument 838 krb5_prompter_posix(ctx, data, name, banner, num_prompts, prompts); in kinit_prompter() 845 strncpy(stash_password, prompts[i].reply->data, in kinit_prompter()
|
/titanic_44/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_ads.c | 1077 smb_ads_saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in smb_ads_saslcallback() argument 1082 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in smb_ads_saslcallback() 1086 for (interact = prompts; interact->id != SASL_CB_LIST_END; in smb_ads_saslcallback()
|
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/include/ |
H A D | krb5.h | 2630 krb5_prompt prompts[]); 2639 krb5_prompt prompts[]);
|
/titanic_44/usr/src/grub/grub-0.97/ |
H A D | NEWS | 64 * The utility ``grub-md5-crypt'' prompts to retype a password and checks
|
H A D | ChangeLog | 8907 * shared_src/stage2.c (run_menu): Change prompts to "grub edit> ".
|
/titanic_44/usr/src/lib/libshell/common/ |
H A D | sh.memo | 896 The shell uses two prompts.
|
H A D | RELEASE | 509 08-05-01 A bug in computing prompt widths for the edit modes for prompts
|