/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/ |
D | RealmCallbackTest.java | 34 private static final String[] prompts = { field in RealmCallbackTest 82 for (int i = 0; i < prompts.length; i++) { in test02() 83 for (int j = 0; j < prompts.length; j++) { in test02() 84 rCB = new RealmCallback(prompts[i], defInfo[j]); in test02() 87 assertEquals("Incorrect prompt", rCB.getPrompt(), prompts[i]); in test02() 89 sb.replace(0, sb.length(), prompts[i]); in test02() 126 for (int i = 0; i < prompts.length; i++) { in test04() 127 rCB = new RealmCallback(prompts[i]); in test04() 129 assertEquals("Incorrect prompt", rCB.getPrompt(), prompts[i]); in test04() 131 sb = new StringBuffer(prompts[i]); in test04() [all …]
|
D | RealmChoiceCallbackTest.java | 34 private static final String[] prompts = { field in RealmChoiceCallbackTest 114 for (int i = 0; i < prompts.length; i++) { in test02() 115 rCCB = new RealmChoiceCallback(prompts[i], choices, 0, false); in test02() 116 assertEquals("Incorrect prompt", rCCB.getPrompt(), prompts[i]); in test02() 154 for (int i = 0; i < prompts.length; i++) { in test03() 155 rCCB = new RealmChoiceCallback(prompts[i], choices, 0, true); in test03() 156 assertEquals("Incorrect prompt", rCCB.getPrompt(), prompts[i]); in test03()
|
/external/openssh/ |
D | auth-chall.c | 48 char *challenge, *name, *info, **prompts; in get_challenge() local 63 &numprompts, &prompts, &echo_on)) { in get_challenge() 70 challenge = xstrdup(prompts[0]); in get_challenge() 72 xfree(prompts[i]); in get_challenge() 73 xfree(prompts); in get_challenge() 83 char *resp[1], *name, *info, **prompts; in verify_response() local 98 &numprompts, &prompts, &echo_on)) != 0) in verify_response() 105 xfree(prompts[i]); in verify_response() 106 xfree(prompts); in verify_response()
|
D | auth-pam.c | 715 u_int *num, char ***prompts, u_int **echo_on) in sshpam_query() argument 728 *prompts = xmalloc(sizeof(char *)); in sshpam_query() 729 **prompts = NULL; in sshpam_query() 741 **prompts = xrealloc(**prompts, 1, len); in sshpam_query() 742 strlcpy(**prompts + plen, msg, len - plen); in sshpam_query() 751 **prompts = xrealloc(**prompts, 1, len); in sshpam_query() 752 strlcpy(**prompts + plen, msg, len - plen); in sshpam_query() 754 strlcat(**prompts + plen, "\n", len - plen); in sshpam_query() 763 if (**prompts != NULL && strlen(**prompts) != 0) { in sshpam_query() 764 *info = **prompts; in sshpam_query() [all …]
|
D | auth-skey.c | 53 u_int* numprompts, char ***prompts, u_int **echo_on) in skey_query() argument 66 *prompts = xcalloc(*numprompts, sizeof(char *)); in skey_query() 69 xasprintf(*prompts, "%s%s", challenge, SKEY_PROMPT); in skey_query()
|
D | auth-bsdauth.c | 52 u_int *numprompts, char ***prompts, u_int **echo_on) in bsdauth_query() argument 83 *prompts = xcalloc(*numprompts, sizeof(char *)); in bsdauth_query() 85 (*prompts)[0] = xstrdup(challenge); in bsdauth_query()
|
D | auth2-chall.c | 250 char *name, *instr, **prompts; in send_userauth_info_request() local 255 &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on)) in send_userauth_info_request() 264 packet_put_cstring(prompts[i]); in send_userauth_info_request() 271 xfree(prompts[i]); in send_userauth_info_request() 272 xfree(prompts); in send_userauth_info_request()
|
D | monitor_wrap.c | 840 u_int *num, char ***prompts, u_int **echo_on) in mm_sshpam_query() argument 859 *prompts = xcalloc((*num + 1), sizeof(char *)); in mm_sshpam_query() 862 (*prompts)[i] = buffer_get_string(&m, NULL); in mm_sshpam_query() 938 char ***prompts, u_int **echo_on) in mm_chall_setup() argument 943 *prompts = xcalloc(*numprompts, sizeof(char *)); in mm_chall_setup() 950 u_int *numprompts, char ***prompts, u_int **echo_on) in mm_bsdauth_query() argument 974 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); in mm_bsdauth_query() 975 (*prompts)[0] = challenge; in mm_bsdauth_query() 1008 u_int *numprompts, char ***prompts, u_int **echo_on) in mm_skey_query() argument 1034 mm_chall_setup(name, infotxt, numprompts, prompts, echo_on); in mm_skey_query() [all …]
|
D | monitor.c | 884 char **prompts; in mm_answer_bsdauthquery() local 888 &prompts, &echo_on) < 0 ? 0 : 1; in mm_answer_bsdauthquery() 893 buffer_put_cstring(m, prompts[0]); in mm_answer_bsdauthquery() 901 xfree(prompts); in mm_answer_bsdauthquery() 1042 char *name = NULL, *info = NULL, **prompts = NULL; in mm_answer_pam_query() local 1048 ret = (sshpam_device.query)(sshpam_ctxt, &name, &info, &num, &prompts, &echo_on); in mm_answer_pam_query() 1061 buffer_put_cstring(m, prompts[i]); in mm_answer_pam_query() 1062 xfree(prompts[i]); in mm_answer_pam_query() 1065 if (prompts != NULL) in mm_answer_pam_query() 1066 xfree(prompts); in mm_answer_pam_query()
|
D | auth.h | 102 u_int *numprompts, char ***prompts, u_int **echo_on);
|
D | ssh.0 | 460 arbitrary "challenge" text, and prompts for a response. Protocol 2 466 Finally, if other authentication methods fail, ssh prompts the user for a
|
D | ChangeLog | 1502 automatically before presenting fake password/passphrase prompts; 1509 automatically before presenting fake password/passphrase prompts;
|
D | ssh_config.0 | 480 Specifies the number of password prompts before giving up. The
|
/external/clang/test/Analysis/ |
D | method-arg-decay.m | 92 - (BOOL)buffer:(char *)buf containsAnyPrompts:(char *[])prompts 94 prompts++;
|
/external/chromium/chrome/browser/ui/cocoa/applescript/examples/ |
D | advanced_tab_manipulation.applescript | 7 print -- Prints the tab, prompts the user for location.
|
/external/linux-tools-perf/Documentation/ |
D | perf-top.txt | 142 Pressing any unmapped key displays a menu, and prompts for input.
|
/external/libmtp/ |
D | README.windows.txt | 43 …vice should appear in the prompt, click it and click "Next>" (Ignore any prompts about Driver Sign…
|
/external/libppp/src/ |
D | README.changes | 54 o Any number of diagnostic prompts are allowed, and they are allowed in 64 o The dial/call/open command works asynchronously. As a result, prompts
|
/external/quake/quake/src/WinQuake/data/ |
D | HELP.TXT | 17 2 -- You can assign yourself a rechargeable PIN account. The system prompts
|
D | MANUAL.TXT | 847 prompts you for your credit card information, and assigns you a PIN account
|
/external/chromium/chrome/browser/ui/cocoa/extensions/ |
D | extension_install_dialog_controller_unittest.mm | 103 // Test that we can load the two kinds of prompts correctly, that the outlets
|
/external/openssh/contrib/redhat/ |
D | openssh.spec | 678 - Merge multiple PAM text messages into subsequent prompts when possible when
|
/external/grub/ |
D | NEWS | 57 * The utility ``grub-md5-crypt'' prompts to retype a password and checks
|
/external/webkit/Source/WebKit/wx/ |
D | ChangeLog | 2437 Add events to allow apps to override handling for JS prompts and
|
/external/dnsmasq/ |
D | CHANGELOG.archive | 1397 Kean and John Hampton for prompts and testing of these.
|