Lines Matching defs:user
388 "If set, use this passphrase to determine whether the user should "
389 "be authenticated. Bypasses the user authentication check on "
435 const char *user, const char *pw,
451 /* have we isolated the user and pw before? */
453 if (user) {
454 apr_table_setn(notes, apr_pstrcat(r->pool, authname, "-user", NULL), user);
473 const char **user, const char **pw,
488 /* have we isolated the user and pw before? */
490 if (user) {
491 *user = (char *) apr_table_get(m->notes, apr_pstrcat(m->pool, authname, "-user", NULL));
503 /* set the user, even though the user is unauthenticated at this point */
504 if (user && *user) {
505 r->user = (char *) *user;
509 "from notes: user: %s, pw: %s, method: %s, mimetype: %s",
510 user ? *user : "<null>", pw ? *pw : "<null>",
522 const char *user, const char *pw, const char *site)
530 (unsigned char *) apr_pstrcat(r->pool, user, ":", site, NULL));
534 ap_session_set_fn(r, z, apr_pstrcat(r->pool, authname, "-" MOD_SESSION_USER, NULL), user);
547 const char **user, const char **pw, const char **hash)
554 if (user) {
555 ap_session_get_fn(r, z, apr_pstrcat(r->pool, authname, "-" MOD_SESSION_USER, NULL), user);
564 /* set the user, even though the user is unauthenticated at this point */
565 if (user && *user) {
566 r->user = (char *) *user;
572 user ? *user : "<null>", pw ? *pw : "<null>",
614 /* have we isolated the user and pw before? */
672 "from form: user: %s, pw: %s, method: %s, mimetype: %s, location: %s",
678 /* set the user, even though the user is unauthenticated at this point */
680 r->user = (char *) *sent_user;
825 "user '%s': authentication failure for \"%s\": "
832 "user '%s' not found: %s", sent_user, r->uri);
850 /* TODO: Flag the user somehow as to the reason for the failure */
861 const char *user, const char *pw)
864 char *basic = apr_pstrcat(r->pool, user, ":", pw, NULL);
880 * form to give the user the opportunity to log in.
955 * If the request is a POST, and the posted form contains user defined fields
959 * If an additional user defined location field is present in the form,
963 * As a further option, if the user defined fields for the type of request,
998 /* make sure any user detected within the subrequest is saved back to
1001 r->user = apr_pstrdup(r->pool, rr->user);
1075 /* did the user ask to be redirected on login success? */
1087 * if the user has full control over the backend, the
1108 * handler, which will redirect the user to the correct page on success.
1204 /* remove the username and password, effectively logging the user out */