Home
last modified time | relevance | path

Searched refs:prompts (Results 1 – 25 of 25) sorted by relevance

/titanic_44/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dprompter.c36 krb5_prompt prompts[]) in krb5_prompter_posix() argument
72 if (prompts[i].reply->length > INT_MAX) in krb5_prompter_posix()
75 errcode = setup_tty(fp, prompts[i].hidden, &saveparm, &osigint); in krb5_prompter_posix()
80 (void)fputs(prompts[i].prompt, stdout); in krb5_prompter_posix()
83 (void)memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix()
86 retp = fgets(prompts[i].reply->data, (int)prompts[i].reply->length, in krb5_prompter_posix()
88 if (prompts[i].hidden) in krb5_prompter_posix()
100 retp = strchr(prompts[i].reply->data, '\n'); in krb5_prompter_posix()
113 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix()
217 krb5_prompt prompts[]) in krb5_prompter_posix() argument
[all …]
/titanic_44/usr/src/lib/libsasl/plugin/
H A Dplugin_common.c617 sasl_interact_t *prompts; local
631 prompts = utils->malloc(alloc_size);
632 if (!prompts) {
636 memset(prompts, 0, alloc_size);
638 *prompts_res = prompts;
641 (prompts)->id = SASL_CB_USER;
643 (prompts)->challenge = convert_prompt(utils, h,
646 (prompts)->challenge = "Authorization Name";
648 (prompts)->prompt = user_prompt;
649 (prompts)->defresult = user_def;
[all …]
/titanic_44/usr/src/cmd/ssh/sshd/
H A Dauth-chall.c42 char *challenge, *name, *info, **prompts; in get_challenge() local
52 &numprompts, &prompts, &echo_on)) { in get_challenge()
59 challenge = xstrdup(prompts[0]); in get_challenge()
61 xfree(prompts[i]); in get_challenge()
62 xfree(prompts); in get_challenge()
H A Dauth-skey.c44 u_int* numprompts, char ***prompts, u_int **echo_on) in skey_query() argument
57 *prompts = xmalloc(*numprompts * sizeof(char *)); in skey_query()
65 (*prompts)[0] = p; in skey_query()
H A Dauth2-pam.c236 conv_ctxt->prompts = xmalloc(sizeof(int) * num_msg); in do_pam_conv_kbd_int()
272 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int()
296 conv_ctxt->prompts[j++] = i; in do_pam_conv_kbd_int()
324 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int()
333 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int()
340 xfree(conv_ctxt->prompts); in do_pam_conv_kbd_int()
380 int j = conv_ctxt->prompts[i]; in input_userauth_info_response_pam()
H A Dauth-bsdauth.c42 u_int *numprompts, char ***prompts, u_int **echo_on) in bsdauth_query() argument
73 *prompts = xmalloc(*numprompts * sizeof(char *)); in bsdauth_query()
76 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
H A Dauth2-chall.c232 char *name, *instr, **prompts; in send_userauth_info_request() local
238 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) in send_userauth_info_request()
247 packet_put_utf8_cstring(prompts[i]); in send_userauth_info_request()
254 xfree(prompts[i]); in send_userauth_info_request()
255 xfree(prompts); in send_userauth_info_request()
H A Dsession.c2539 struct pam_message **prompts, in session_do_pam_conv() argument
2557 switch(PAM_MSG_MEMBER(prompts, count, msg_style)) { in session_do_pam_conv()
2560 prompt = PAM_MSG_MEMBER(prompts, count, msg); in session_do_pam_conv()
2572 prompt = PAM_MSG_MEMBER(prompts, count, msg); in session_do_pam_conv()
/titanic_44/usr/src/lib/pam_modules/krb5/
H A Dkrb5_authenticate.c381 krb5_prompt prompts[]) in pam_krb5_prompter() argument
392 if (prompts) { in pam_krb5_prompter()
424 if (prompts[i].hidden) { in pam_krb5_prompter()
434 prompts[i].prompt) < 0) { in pam_krb5_prompter()
451 assert(prompts[i].reply->data != NULL); in pam_krb5_prompter()
454 if (strlcpy(prompts[i].reply->data, in pam_krb5_prompter()
455 ret_respp[i].resp, prompts[i].reply->length) >= in pam_krb5_prompter()
456 prompts[i].reply->length) { in pam_krb5_prompter()
471 retp = strchr(prompts[i].reply->data, '\n'); in pam_krb5_prompter()
475 prompts[i].reply->length = in pam_krb5_prompter()
[all …]
/titanic_44/usr/src/cmd/ldap/common/
H A Dldaptool-sasl.c75 ldaptool_sasl_interact( LDAP *ld, unsigned flags, void *defaults, void *prompts ) { in ldaptool_sasl_interact() argument
80 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in ldaptool_sasl_interact()
83 for (interact = prompts; interact->id != SASL_CB_LIST_END; interact++) { in ldaptool_sasl_interact()
/titanic_44/usr/src/cmd/ssh/include/
H A Dauth2-pam.h23 int *prompts; member
H A Dauth.h209 u_int *numprompts, char ***prompts, u_int **echo_on);
/titanic_44/usr/src/lib/libldap5/sources/ldap/common/
H A Dsasl.c653 sasl_interact_t *prompts = NULL; in nsldapi_sasl_do_bind() local
707 &prompts, in nsldapi_sasl_do_bind()
717 (callback)(ld, flags, defaults, prompts) != LDAP_SUCCESS ) { in nsldapi_sasl_do_bind()
785 &prompts, in nsldapi_sasl_do_bind()
790 (callback)(ld, flags, defaults, prompts) in nsldapi_sasl_do_bind()
/titanic_44/usr/src/lib/libadutils/common/
H A Dadutils_impl.h160 int saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts);
H A Dadutils.c449 saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in saslcallback() argument
453 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in saslcallback()
457 for (interact = prompts; interact->id != SASL_CB_LIST_END; in saslcallback()
/titanic_44/usr/src/cmd/format/
H A DMakefile34 prompts.o startup.o menu_scsi.o auto_sense.o disk_generic.o \
/titanic_44/usr/src/cmd/idmap/idmap/
H A Dnamemaps.c170 idmap_saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in idmap_saslcallback() argument
174 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in idmap_saslcallback()
178 for (interact = prompts; interact->id != SASL_CB_LIST_END; in idmap_saslcallback()
/titanic_44/usr/src/lib/libsasl/
H A DREADME42 and third are the prompts returned to the client in sasl_interact_t or
/titanic_44/usr/src/cmd/krb5/kinit/
H A Dkinit.c832 krb5_prompt prompts[] in kinit_prompter() argument
838 krb5_prompter_posix(ctx, data, name, banner, num_prompts, prompts); in kinit_prompter()
845 strncpy(stash_password, prompts[i].reply->data, in kinit_prompter()
/titanic_44/usr/src/lib/smbsrv/libsmbns/common/
H A Dsmbns_ads.c1077 smb_ads_saslcallback(LDAP *ld, unsigned flags, void *defaults, void *prompts) in smb_ads_saslcallback() argument
1082 if (prompts == NULL || flags != LDAP_SASL_INTERACTIVE) in smb_ads_saslcallback()
1086 for (interact = prompts; interact->id != SASL_CB_LIST_END; in smb_ads_saslcallback()
/titanic_44/usr/src/uts/common/gssapi/mechs/krb5/include/
H A Dkrb5.h2630 krb5_prompt prompts[]);
2639 krb5_prompt prompts[]);
/titanic_44/usr/src/grub/grub-0.97/
H A DNEWS64 * The utility ``grub-md5-crypt'' prompts to retype a password and checks
H A DChangeLog8907 * shared_src/stage2.c (run_menu): Change prompts to "grub edit> ".
/titanic_44/usr/src/lib/libshell/common/
H A Dsh.memo896 The shell uses two prompts.
H A DRELEASE509 08-05-01 A bug in computing prompt widths for the edit modes for prompts