/external/libvncserver/x11vnc/ |
D | ChangeLog | 36 -unixpw (user conf file.) Document all exiting behavior. Let 83 X11VNC_HTTPS_DOWNLOAD_WAIT_TIME, -unixpw %xxx documented, and 120 AIX su. Ignore an initial newline at login: for -unixpw. 125 fflush(stderr) much in su_verify. Make the -unixpw env. vars 127 Make -loopbg actually imply -bg. Add tag=... to unixpw opts 129 for https. Add 'Login succeeded' output to unixpw panel. 179 font size. Fix bug with unixpw and vencrypt plain login. 198 to remote control. ping clients during in unixpw login. 200 Add clear_all, viewonly, nodisplay, to unixpw username:opts. 438 in -unixpw, initial Escape means no echo username (see ssvnc). [all …]
|
D | Makefile.am | 34 …unixpw.c user.c userinput.c util.c v4l.c win_utils.c x11vnc.c x11vnc_defs.c xdamage.c xevents.c xi…
|
D | util.c | 565 if (unixpw && unixpw_in_progress && !unixpw_in_rfbPE) { in rfbPE() 587 if (unixpw && unixpw_in_progress && !uip0) { in rfbPE() 623 if (unixpw && unixpw_in_progress && !unixpw_in_rfbPE) { in rfbCFD() 662 if (unixpw && unixpw_in_progress && !uip0) { in rfbCFD()
|
D | user.c | 1597 if (unixpw) { in loop_for_connect() 1615 if (unixpw) { in loop_for_connect() 1619 if (unixpw) { in loop_for_connect() 1624 if (unixpw && !unixpw_in_progress) { in loop_for_connect() 1655 if (unixpw) { in do_unixpw_loop() 1693 if (unixpw) { in vnc_redirect_loop() 1988 if (unixpw && keep_unixpw_opts && !getenv("X11VNC_NO_UNIXPW_OPTS")) { in build_create_cmd() 2168 if (usslpeer || (unixpw && keep_unixpw_user)) { in build_create_cmd() 2276 …if (unixpw && !getenv("X11VNC_NO_UNIXPW_OPTS") && keep_unixpw_opts && keep_unixpw_opts[0] != '\0')… in check_nodisplay() 2553 if (unixpw && !unixpw_nis) { in do_run_cmd() [all …]
|
D | Makefile.in | 87 x11vnc-unixpw.$(OBJEXT) x11vnc-user.$(OBJEXT) \ 363 …unixpw.c user.c userinput.c util.c v4l.c win_utils.c x11vnc.c x11vnc_defs.c xdamage.c xevents.c xi… 486 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/x11vnc-unixpw.Po@am__quote@ 915 x11vnc-unixpw.o: unixpw.c 916 …LAGS) -MT x11vnc-unixpw.o -MD -MP -MF $(DEPDIR)/x11vnc-unixpw.Tpo -c -o x11vnc-unixpw.o `test -f '… 917 @am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/x11vnc-unixpw.Tpo $(DEPDIR)/x11vnc-unixpw.Po 920 …PFLAGS) $(x11vnc_CFLAGS) $(CFLAGS) -c -o x11vnc-unixpw.o `test -f 'unixpw.c' || echo '$(srcdir)/'`… 922 x11vnc-unixpw.obj: unixpw.c 923 …S) $(x11vnc_CFLAGS) $(CFLAGS) -MT x11vnc-unixpw.obj -MD -MP -MF $(DEPDIR)/x11vnc-unixpw.Tpo -c -o … 924 @am__fastdepCC_TRUE@ $(AM_V_at)$(am__mv) $(DEPDIR)/x11vnc-unixpw.Tpo $(DEPDIR)/x11vnc-unixpw.Po [all …]
|
D | options.h | 54 extern int unixpw;
|
D | RELEASE-NOTES | 51 In -unixpw mode, one can now Tab from login: to Password. 118 In -create/-unixpw mode, the env. var. FD_USERPREFS may be set 189 The "%" unix password verification tricks for the -unixpw 279 unixpw and XDMCP FINDCREATEDISPLAY mode (e.g. -xdmsvc), 284 he uses the regular x11vnc unixpw "login:" prompt. Also, 285 the unixpw login panel now has a short help displayed 462 The -nounixpw option can disable unixpw mode if an earlier option 792 In -unixpw mode in the username and password dialog no text will 822 which, like "-users unixpw=" already does, will cause 864 also be specified via nd=... as a -unixpw login option. [all …]
|
D | x11vnc.c | 1488 fprintf(stderr, " unixpw: %d\n", unixpw); in print_settings() 1916 && !query_cmd && !remote_cmd && !unixpw && !got_gui_pw \ 2618 unixpw = 1; in main() 2626 unixpw = 1; in main() 2634 unixpw = 1; in main() 2642 unixpw = 1; in main() 2650 unixpw = 1; in main() 2670 unixpw = 1; in main() 2679 unixpw = 1; in main() 2703 unixpw = 0; in main() [all …]
|
D | options.c | 54 int unixpw = 0; /* -unixpw */ variable
|
D | README | 948 * In -unixpw mode, one can now Tab from login: to Password. 979 * In -create/-unixpw mode, the env. var. FD_USERPREFS may be set to 1016 * The "%" unix password verification tricks for the -unixpw option 1039 * The -unixpw_system_greeter option, when used in combined unixpw 1043 password twice at X session creation time. Also, the unixpw login 1159 support this encryption mode. It can also be used with the -unixpw 1309 * In -unixpw mode in the username and password dialog no text will 1367 * A new login mode: "-display WAIT:cmd=FINDCREATEDISPLAY -unixpw 1419 * The -unixpw option supports Unix username and password 1426 * Coupling -unixpw with "-display WAIT:cmd=FINDDISPLAY" or "-display [all …]
|
D | inet.c | 403 if (unixpw && openssl_last_ip && strstr("UNIX:", user) != user) { in ident_username()
|
D | sslhelper.c | 1315 if (!unixpw) { in finish_auth() 1634 if (vencrypt_enable_plain_login && unixpw) { in vencrypt_dialog() 1645 if (vencrypt_enable_plain_login && unixpw) { in vencrypt_dialog()
|
D | remote.c | 1843 if (unixpw) { in process_remote_cmd() 2001 if (unixpw) { in process_remote_cmd() 2045 if (unixpw) { in process_remote_cmd() 5974 snprintf(buf, bufn, "aro=%s:%d", p, unixpw); in process_remote_cmd()
|
D | connections.c | 1280 if (unixpw && strstr(userhost, "UNIX:") != userhost) { in ugly_window() 2737 if (unixpw) { in do_reverse_connect() 4106 if (unixpw) { in new_client()
|
/external/libvncserver/ |
D | ChangeLog | 1338 x11vnc/unixpw.c, x11vnc/user.c, x11vnc/util.h, x11vnc/v4l.c, 1481 x11vnc/tkx11vnc.h, x11vnc/unixpw.c, x11vnc/user.c, 1531 x11vnc/connections.c, x11vnc/screen.c, x11vnc/unixpw.c, 1666 inet6to4, panner.pl. X11VNC_HTTPS_DOWNLOAD_WAIT_TIME, -unixpw %xxx 1773 x11vnc/uinput.c, x11vnc/uinput.h, x11vnc/unixpw.c, x11vnc/unixpw.h, 1820 x11vnc/tkx11vnc.h, x11vnc/unixpw.c, x11vnc/x11vnc.1, 1830 x11vnc/unixpw.c, x11vnc/user.c, x11vnc/x11vnc.1, x11vnc/x11vnc.c, 1847 x11vnc/ssltools.h, x11vnc/unixpw.c, x11vnc/x11vnc.1, 1849 …and in find_display. Try to handle AIX su. Ignore an initial newline at login: for -unixpw. 1858 x11vnc/sslhelper.c, x11vnc/ssltools.h, x11vnc/unixpw.c, [all …]
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/ |
D | README | 112 - Unix Username and Password entry for use with "x11vnc -unixpw" 142 - Option "-unixpw ..." for use with "x11vnc -unixpw" login dialogs.
|
/external/libvncserver/x11vnc/misc/ |
D | Xdummy | 150 If so, one could run x11vnc as root with -unixpw (it switches
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/src/patches/ |
D | tight-vncviewer-full.patch | 1534 + {"-unixpw", "*unixPW", XrmoptionSepArg, 0}, 1906 + " -unixpw str Useful for logging into x11vnc in -unixpw mode. \"str\" is a\n" 1911 + " used for the -unixpw login. Other VNC servers could do\n" 11702 + unixpw(appData.unixPW, 1); 11704 + unixpw(getenv("SSVNC_UNIXPW"), 1); 11706 + unixpw(".", 1); 18189 +\fB\-unixpw\fR \fIstr\fR 18190 +Useful for logging into x11vnc in \fB\-unixpw\fR mode. "str" is a 18195 +used for the \fB\-unixpw\fR login. Other VNC servers could do 18716 +void unixpw(char *instr, int vencrypt_plain) { [all …]
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
D | ssvnc.tcl | 317 - Use unixpw (optional x11vnc login mode) 2157 more common practice of using a VNC password or x11vnc's -unixpw mode. 2427 This enables the x11vnc unixpw mode. A Login: and Password: dialog 2436 sufficient, in which case the unixpw option should NOT be selected. 2639 Note that the x11vnc -unixpw login mode is external to the 12244 This enables the x11vnc unixpw mode. A Login: and Password: dialog 14741 SSVNC_UNIXPW (-unixpw) 14742 SSVNC_UNIXPW_NOESC (do not send escape in -unixpw mode)
|