Searched defs:user (Results 1 - 25 of 25) sorted by relevance

/httpd/os/bs2000/
H A Dos.c46 * set both the POSIX and BS2000 user id's to the unprivileged user.
60 /* If the user is unprivileged, use the normal fork() only. */
73 * environment to be switched to the target user's user id.
90 "be started by an unprivileged user!");
98 pid_t os_fork(const char *user) argument
110 apr_cpystrn(username, user, sizeof username);
112 /* Make user name all upper case - for some versions of ufork() */
119 "for user
[all...]
/httpd/modules/aaa/
H A Dmod_authn_file.c35 #define AUTHN_CACHE_STORE(r,user,realm,data) \
37 authn_cache_store((r), "file", (user), (realm), (data))
51 OR_AUTHCFG, "text file containing user IDs and passwords"),
57 static authn_status check_password(request_rec *r, const char *user, argument
92 if (!strcmp(user, w)) {
102 AUTHN_CACHE_STORE(r, user, NULL, file_password);
104 status = ap_password_validate(r, user, password, file_password);
112 static authn_status get_realm_hash(request_rec *r, const char *user, argument
148 if (x && w && !strcmp(user, w) && !strcmp(realm, x)) {
149 /* Remember that this is a md5 hash of user
[all...]
H A Dmod_authn_anon.c19 * one gives the magic user name 'anonymous' and ones email address
31 * The magic user id is something like 'anonymous', it is NOT case sensitive.
38 * in broken GUIs like W95 is often given by the user. The Default is off.
60 char *user; member in struct:anon_auth_user
106 conf->users->user = apr_pstrdup(cmd->pool, arg);
117 "a space-separated list of user IDs"),
135 static authn_status check_anonymous(request_rec *r, const char *user, argument
149 if (!*user) {
161 if (!strcasecmp(user, p->user)) {
[all...]
H A Dmod_authn_dbm.c42 #define AUTHN_CACHE_STORE(r,user,realm,data) \
44 authn_cache_store((r), "dbm", (user), (realm), (data))
75 OR_AUTHCFG, "dbm database file containing user IDs and passwords"),
78 OR_AUTHCFG, "what type of DBM file the user file is"),
85 const char *user, char **value,
99 key.dptr = (char*)user;
117 static authn_status check_dbm_pw(request_rec *r, const char *user, argument
126 rv = fetch_dbm_value(conf->dbmtype, conf->pwfile, user, &dbm_password,
144 AUTHN_CACHE_STORE(r, user, NULL, dbm_password);
146 rv = ap_password_validate(r, user, passwor
84 fetch_dbm_value(const char *dbmtype, const char *dbmfile, const char *user, char **value, apr_pool_t *pool) argument
155 get_dbm_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_auth_basic.c143 const char *user, const char *pass)
148 if (!strcasecmp(user, "off")) {
162 ap_expr_parse_cmd(cmd, user, AP_EXPR_FLAG_STRING_RESULT,
166 "Could not parse fake username expression '%s': %s", user,
214 "check for digest auth, using a hash of 'user:realm:pass'"),
248 static int get_basic_auth(request_rec *r, const char **user, argument
283 *user = ap_getword_nulls(r->pool, (const char**)&decoded_line, ':');
286 /* set the user, even though the user is unauthenticated at this point */
287 r->user
142 add_basic_fake(cmd_parms * cmd, void *config, const char *user, const char *pass) argument
445 const char *auth_line, *user, *pass, *err; local
[all...]
H A Dmod_authn_core.c108 static authn_status authn_alias_check_password(request_rec *r, const char *user, argument
132 ret = prvdraliasrec->provider->check_password(r,user,password);
140 static authn_status authn_alias_get_realm_hash(request_rec *r, const char *user, argument
164 ret = prvdraliasrec->provider->get_realm_hash(r,user,realm,rethash);
H A Dmod_authn_dbd.c33 const char *user; member in struct:__anon57
46 #define AUTHN_CACHE_STORE(r,user,realm,data) \
48 authn_cache_store((r), "dbd", (user), (realm), (data))
61 ret->user = (add->user == NULL) ? base->user : add->user;
92 (void *)APR_OFFSETOF(authn_dbd_conf, user), ACCESS_CONF,
93 "Query used to fetch password for user"),
96 "Query used to fetch password for user
100 authn_dbd_password(request_rec *r, const char *user, const char *password) argument
197 authn_dbd_realm(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_authz_dbm.c75 OR_AUTHCFG, "database file containing group names and member user IDs"),
138 char *user = r->user; local
151 if (!user) {
165 status = get_dbm_grp(r, apr_pstrcat(r->pool, user, ":", realm, NULL),
166 user, conf->grpfile, conf->dbmtype, &groups);
178 "Authorization of user %s to access %s failed, reason: "
179 "user doesn't appear in DBM group file (%s).",
180 r->user, r->uri, conf->grpfile);
207 "Authorization of user
222 char *user = r->user; local
[all...]
H A Dmod_authz_groupfile.c77 "text file containing group names and member user IDs"),
85 static apr_status_t groups_for_user(apr_pool_t *p, char *user, char *grpfile, argument
119 if (!strcmp(w, user)) {
140 char *user = r->user; local
150 if (!user) {
163 status = groups_for_user(r->pool, user, conf->groupfile,
176 "Authorization of user %s to access %s failed, reason: "
177 "user doesn't appear in group file (%s).",
178 r->user,
213 char *user = r->user; local
[all...]
H A Dmod_authn_socache.c263 const char *user, const char *realm)
282 return apr_pstrcat(r->pool, context, ":", user, NULL);
285 return apr_pstrcat(r->pool, context, ":", user, ":", realm, NULL);
289 const char *user, const char *realm,
319 "authn credentials for %s not cached (mutex busy)", user);
331 key = construct_key(r, dcfg->context, user, realm);
341 user, dcfg->context);
358 static authn_status check_password(request_rec *r, const char *user, argument
381 key = construct_key(r, dcfg->context, user, NULL);
389 "Authn cache: no credentials found for %s", user);
262 construct_key(request_rec *r, const char *context, const char *user, const char *realm) argument
288 ap_authn_cache_store(request_rec *r, const char *module, const char *user, const char *realm, const char* data) argument
414 get_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_auth_form.c388 "If set, use this passphrase to determine whether the user should "
389 "be authenticated. Bypasses the user authentication check on "
435 const char *user, const char *pw,
451 /* have we isolated the user and pw before? */
453 if (user) {
454 apr_table_setn(notes, apr_pstrcat(r->pool, authname, "-user", NULL), user);
473 const char **user, const char **pw,
488 /* have we isolated the user and pw before? */
490 if (user) {
434 set_notes_auth(request_rec * r, const char *user, const char *pw, const char *method, const char *mimetype) argument
472 get_notes_auth(request_rec *r, const char **user, const char **pw, const char **method, const char **mimetype) argument
521 set_session_auth(request_rec * r, const char *user, const char *pw, const char *site) argument
546 get_session_auth(request_rec * r, const char **user, const char **pw, const char **hash) argument
860 fake_basic_authentication(request_rec *r, auth_form_config_rec *conf, const char *user, const char *pw) argument
[all...]
H A Dmod_authnz_fcgi.c48 const char *default_user; /* this is user if authorizer returns
49 * success and a user expression yields
52 ap_expr_info_t *user_expr; /* expr to evaluate to set r->user */
53 char authoritative; /* fail request if user is rejected? */
819 "require-basic %s, user expr? %s type %s",
856 const char *user = ap_expr_str_exec(r, dconf->user_expr, local
858 if (user && strlen(user)) {
859 r->user = apr_pstrdup(r->pool, user);
925 fcgi_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
H A Dmod_authnz_ldap.c64 int user_is_dn; /* If true, r->user is replaced by DN during authn */
65 char *remote_user_attribute; /* If set, r->user is replaced by this attribute during authn */
70 apr_array_header_t *groupattr; /* List of Group attributes identifying user members. Default:"member uniqueMember" */
88 char *user; /* The username provided by the client */ member in struct:__anon66
207 const char *user,
228 inbytes = strlen(user);
232 /* Convert the user name to UTF-8. This is only valid for LDAP v3 */
233 if (apr_xlate_conv_buffer(convset, user, &inbytes, outbuf, &outbytes) == APR_SUCCESS) {
234 user = outbuf;
256 for (p = user,
205 authn_ldap_build_filter(char *filtbuf, request_rec *r, const char *user, const char *filter, authn_ldap_config_t *sec) argument
404 ldap_determine_binddn(request_rec *r, const char *user) argument
503 authn_ldap_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
H A Dmod_auth_digest.c1263 static authn_status get_hash(request_rec *r, const char *user, argument
1296 /* We expect the password to be md5 hash of user:realm:password */
1297 auth_result = provider->get_realm_hash(r, user, conf->realm,
1408 "invalid nonce %s received - user attempted "
1417 "user %s: nonce expired (%.2f seconds old "
1419 r->user, (double)apr_time_sec(dt),
1428 "user %s: one-time-nonce mismatch - sending "
1429 "new nonce", r->user);
1528 /* Determine user ID, and check if the attributes are correct, if it
1529 * really is that user, i
[all...]
/httpd/modules/mappers/
H A Dmod_userdir.c39 * user directories (a la Directory Index). For example:
77 * The default directory in user's home dir
203 const char *user, *dname; local
222 user = ap_getword(r->pool, &dname, '/');
226 * delimiting the "/~user" part from the rest of the URL, in case there
227 * was one (the case where there wasn't being just "GET /~user HTTP/1.0",
238 if (user[0] == '\0' ||
239 (user[1] == '.' && (user[2] == '\0' ||
240 (user[
[all...]
H A Dmod_rewrite.c270 const char *user; /* run RewriteMap program as this user */ member in struct:__anon235
470 r->user ? (*r->user ? r->user : "\"\"") : "-",
1176 const char *user, const char *group,
1189 && (!user || APR_SUCCESS == (rc=apr_procattr_user_set(procattr, user, "")))
1248 map->user, map->group,
1866 /* sigh, the user want
1174 rewritemap_program_child(apr_pool_t *p, const char *progname, char **argv, const char *user, const char *group, apr_file_t **fpout, apr_file_t **fpin) argument
2604 char *p, *user; local
[all...]
/httpd/modules/metadata/
H A Dmod_ident.c166 char user[RFC1413_USERLEN + 1]; /* XXX */ local
226 user) != 3 || sav_rmt_port != rmt_port
235 if ((cp = strchr(user, '\r')))
238 conn->remote_logname = apr_pstrdup(conn->pool, user);
291 "Enable identd (RFC 1413) user lookups - SLOW"),
/httpd/os/unix/
H A Dunixd.c337 * hides any occurrence from being returned to user space.
454 * set both the POSIX and BS2000 user id's to the unprivileged user.
468 /* If the user is unprivileged, use the normal fork() only. */
481 * environment to be switched to the target user's user id.
498 "be started by an unprivileged user!");
506 pid_t os_fork(const char *user) argument
518 apr_cpystrn(username, user, sizeof username);
520 /* Make user nam
[all...]
/httpd/support/
H A Dhtdigest.c125 static void add_password(const char *user, const char *realm, apr_file_t *f) argument
147 apr_file_printf(f, "%s:%s:", user, realm);
150 apr_snprintf(string, sizeof(string), "%s:%s:%s", user, realm, pw);
192 char user[MAX_STRING_LEN]; local
225 apr_cpystrn(user, argv[4], sizeof(user));
228 user, realm);
229 add_password(user, realm, f);
254 apr_cpystrn(user, argv[3], sizeof(user));
[all...]
H A Dhtpasswd.c74 static int mkrecord(struct passwd_ctx *ctx, char *user) argument
85 ctx->out = apr_pstrcat(ctx->pool, user, ":", hash_str, NL, NULL);
113 " -D Delete the specified user." NL
114 " -v Verify password for the specified user." NL
160 struct passwd_ctx *ctx, unsigned *mask, char **user,
235 *user = apr_pstrdup(pool, argv[i++]);
236 if ((arg = strchr(*user, ':')) != NULL) {
279 char *user = NULL; local
320 check_args(argc, argv, &ctx, &mask, &user, &pwfilename);
366 i = mkrecord(&ctx, user);
159 check_args(int argc, const char *const argv[], struct passwd_ctx *ctx, unsigned *mask, char **user, char **pwfilename) argument
[all...]
/httpd/modules/generators/
H A Dmod_cgid.c224 * to the CGI script. When suexec is enabled, the suexec path, user, and
231 static char **create_argv(apr_pool_t *p, char *path, char *user, char *group, argument
260 if (user) {
261 av[idx++] = user;
666 /* if running as root, switch to configured user/group */
1458 "AcceptPathInfo off disallows user's path");
/httpd/modules/proxy/
H A Dmod_proxy_ftp.c291 char *user, *password, *host, *path, *parms, *strp, sport[7]; local
308 err = ap_proxy_canon_netloc(p, &url, &user, &password, &host, &port);
311 if (user != NULL && !ftp_check_string(user))
365 r->filename = apr_pstrcat(p, "proxy:ftp://", (user != NULL) ? user : "",
368 (user != NULL) ? "@" : "", host, sport, "/", path,
917 * with username and password (which was presumably queried from the user)
920 * ftp://user@host part of the reqest (sans password -if supplied but invalid-)
987 char *user local
[all...]
H A Dproxy_util.c302 * user NULL if no user/password permitted
314 char *user = NULL, *password = NULL; local
330 /* find _last_ '@' since it might occur in user/password part */
335 user = host;
339 strp = strchr(user, ':');
348 user = ap_proxy_canonenc(p, user, strlen(user), enc_user, 1, 0);
349 if (user
404 char *url, *user = NULL, *password = NULL, *err, *host = NULL; local
[all...]
/httpd/modules/ssl/
H A Dssl_engine_kernel.c369 * We do not force any renegotiation if the user is already authenticated
407 * user actually wanted).
416 * new cipher suite. This approach is fine because the user explicitly
907 /* If we're trying to have the user name set from a client
909 * the user name probably isn't important from an auth checking point
918 r->user = val;
921 "Failed to set r->user to '%s'", dc->szUserName);
984 * authenticates a user. This means that the Module statement for this
992 char *user; local
1014 * Make sure the user i
[all...]
/httpd/include/
H A Dhttpd.h948 /** If an authentication check was made, this gets set to the user name. */
949 char *user; member in struct:request_rec
978 * user's preference upon HOOK_VERY_FIRST of the fixups.
2372 * @param username username of the user

Completed in 5792 milliseconds