/httpd/os/bs2000/ |
H A D | os.c | 46 * set both the POSIX and BS2000 user id's to the unprivileged user. 60 /* If the user is unprivileged, use the normal fork() only. */ 73 * environment to be switched to the target user's user id. 90 "be started by an unprivileged user!"); 98 pid_t os_fork(const char *user) argument 110 apr_cpystrn(username, user, sizeof username); 112 /* Make user name all upper case - for some versions of ufork() */ 119 "for user [all...] |
/httpd/modules/aaa/ |
H A D | mod_authn_file.c | 35 #define AUTHN_CACHE_STORE(r,user,realm,data) \ 37 authn_cache_store((r), "file", (user), (realm), (data)) 51 OR_AUTHCFG, "text file containing user IDs and passwords"), 57 static authn_status check_password(request_rec *r, const char *user, argument 92 if (!strcmp(user, w)) { 102 AUTHN_CACHE_STORE(r, user, NULL, file_password); 104 status = ap_password_validate(r, user, password, file_password); 112 static authn_status get_realm_hash(request_rec *r, const char *user, argument 148 if (x && w && !strcmp(user, w) && !strcmp(realm, x)) { 149 /* Remember that this is a md5 hash of user [all...] |
H A D | mod_authn_anon.c | 19 * one gives the magic user name 'anonymous' and ones email address 31 * The magic user id is something like 'anonymous', it is NOT case sensitive. 38 * in broken GUIs like W95 is often given by the user. The Default is off. 60 char *user; member in struct:anon_auth_user 106 conf->users->user = apr_pstrdup(cmd->pool, arg); 117 "a space-separated list of user IDs"), 135 static authn_status check_anonymous(request_rec *r, const char *user, argument 149 if (!*user) { 161 if (!strcasecmp(user, p->user)) { [all...] |
H A D | mod_authn_dbm.c | 42 #define AUTHN_CACHE_STORE(r,user,realm,data) \ 44 authn_cache_store((r), "dbm", (user), (realm), (data)) 75 OR_AUTHCFG, "dbm database file containing user IDs and passwords"), 78 OR_AUTHCFG, "what type of DBM file the user file is"), 85 const char *user, char **value, 99 key.dptr = (char*)user; 117 static authn_status check_dbm_pw(request_rec *r, const char *user, argument 126 rv = fetch_dbm_value(conf->dbmtype, conf->pwfile, user, &dbm_password, 144 AUTHN_CACHE_STORE(r, user, NULL, dbm_password); 146 rv = ap_password_validate(r, user, passwor 84 fetch_dbm_value(const char *dbmtype, const char *dbmfile, const char *user, char **value, apr_pool_t *pool) argument 155 get_dbm_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument [all...] |
H A D | mod_auth_basic.c | 143 const char *user, const char *pass) 148 if (!strcasecmp(user, "off")) { 162 ap_expr_parse_cmd(cmd, user, AP_EXPR_FLAG_STRING_RESULT, 166 "Could not parse fake username expression '%s': %s", user, 214 "check for digest auth, using a hash of 'user:realm:pass'"), 248 static int get_basic_auth(request_rec *r, const char **user, argument 283 *user = ap_getword_nulls(r->pool, (const char**)&decoded_line, ':'); 286 /* set the user, even though the user is unauthenticated at this point */ 287 r->user 142 add_basic_fake(cmd_parms * cmd, void *config, const char *user, const char *pass) argument 445 const char *auth_line, *user, *pass, *err; local [all...] |
H A D | mod_authn_core.c | 108 static authn_status authn_alias_check_password(request_rec *r, const char *user, argument 132 ret = prvdraliasrec->provider->check_password(r,user,password); 140 static authn_status authn_alias_get_realm_hash(request_rec *r, const char *user, argument 164 ret = prvdraliasrec->provider->get_realm_hash(r,user,realm,rethash);
|
H A D | mod_authn_dbd.c | 33 const char *user; member in struct:__anon57 46 #define AUTHN_CACHE_STORE(r,user,realm,data) \ 48 authn_cache_store((r), "dbd", (user), (realm), (data)) 61 ret->user = (add->user == NULL) ? base->user : add->user; 92 (void *)APR_OFFSETOF(authn_dbd_conf, user), ACCESS_CONF, 93 "Query used to fetch password for user"), 96 "Query used to fetch password for user 100 authn_dbd_password(request_rec *r, const char *user, const char *password) argument 197 authn_dbd_realm(request_rec *r, const char *user, const char *realm, char **rethash) argument [all...] |
H A D | mod_authz_dbm.c | 75 OR_AUTHCFG, "database file containing group names and member user IDs"), 138 char *user = r->user; local 151 if (!user) { 165 status = get_dbm_grp(r, apr_pstrcat(r->pool, user, ":", realm, NULL), 166 user, conf->grpfile, conf->dbmtype, &groups); 178 "Authorization of user %s to access %s failed, reason: " 179 "user doesn't appear in DBM group file (%s).", 180 r->user, r->uri, conf->grpfile); 207 "Authorization of user 222 char *user = r->user; local [all...] |
H A D | mod_authz_groupfile.c | 77 "text file containing group names and member user IDs"), 85 static apr_status_t groups_for_user(apr_pool_t *p, char *user, char *grpfile, argument 119 if (!strcmp(w, user)) { 140 char *user = r->user; local 150 if (!user) { 163 status = groups_for_user(r->pool, user, conf->groupfile, 176 "Authorization of user %s to access %s failed, reason: " 177 "user doesn't appear in group file (%s).", 178 r->user, 213 char *user = r->user; local [all...] |
H A D | mod_authn_socache.c | 263 const char *user, const char *realm) 282 return apr_pstrcat(r->pool, context, ":", user, NULL); 285 return apr_pstrcat(r->pool, context, ":", user, ":", realm, NULL); 289 const char *user, const char *realm, 319 "authn credentials for %s not cached (mutex busy)", user); 331 key = construct_key(r, dcfg->context, user, realm); 341 user, dcfg->context); 358 static authn_status check_password(request_rec *r, const char *user, argument 381 key = construct_key(r, dcfg->context, user, NULL); 389 "Authn cache: no credentials found for %s", user); 262 construct_key(request_rec *r, const char *context, const char *user, const char *realm) argument 288 ap_authn_cache_store(request_rec *r, const char *module, const char *user, const char *realm, const char* data) argument 414 get_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument [all...] |
H A D | mod_auth_form.c | 388 "If set, use this passphrase to determine whether the user should " 389 "be authenticated. Bypasses the user authentication check on " 435 const char *user, const char *pw, 451 /* have we isolated the user and pw before? */ 453 if (user) { 454 apr_table_setn(notes, apr_pstrcat(r->pool, authname, "-user", NULL), user); 473 const char **user, const char **pw, 488 /* have we isolated the user and pw before? */ 490 if (user) { 434 set_notes_auth(request_rec * r, const char *user, const char *pw, const char *method, const char *mimetype) argument 472 get_notes_auth(request_rec *r, const char **user, const char **pw, const char **method, const char **mimetype) argument 521 set_session_auth(request_rec * r, const char *user, const char *pw, const char *site) argument 546 get_session_auth(request_rec * r, const char **user, const char **pw, const char **hash) argument 860 fake_basic_authentication(request_rec *r, auth_form_config_rec *conf, const char *user, const char *pw) argument [all...] |
H A D | mod_authnz_fcgi.c | 48 const char *default_user; /* this is user if authorizer returns 49 * success and a user expression yields 52 ap_expr_info_t *user_expr; /* expr to evaluate to set r->user */ 53 char authoritative; /* fail request if user is rejected? */ 819 "require-basic %s, user expr? %s type %s", 856 const char *user = ap_expr_str_exec(r, dconf->user_expr, local 858 if (user && strlen(user)) { 859 r->user = apr_pstrdup(r->pool, user); 925 fcgi_check_password(request_rec *r, const char *user, const char *password) argument [all...] |
H A D | mod_authnz_ldap.c | 64 int user_is_dn; /* If true, r->user is replaced by DN during authn */ 65 char *remote_user_attribute; /* If set, r->user is replaced by this attribute during authn */ 70 apr_array_header_t *groupattr; /* List of Group attributes identifying user members. Default:"member uniqueMember" */ 88 char *user; /* The username provided by the client */ member in struct:__anon66 207 const char *user, 228 inbytes = strlen(user); 232 /* Convert the user name to UTF-8. This is only valid for LDAP v3 */ 233 if (apr_xlate_conv_buffer(convset, user, &inbytes, outbuf, &outbytes) == APR_SUCCESS) { 234 user = outbuf; 256 for (p = user, 205 authn_ldap_build_filter(char *filtbuf, request_rec *r, const char *user, const char *filter, authn_ldap_config_t *sec) argument 404 ldap_determine_binddn(request_rec *r, const char *user) argument 503 authn_ldap_check_password(request_rec *r, const char *user, const char *password) argument [all...] |
H A D | mod_auth_digest.c | 1263 static authn_status get_hash(request_rec *r, const char *user, argument 1296 /* We expect the password to be md5 hash of user:realm:password */ 1297 auth_result = provider->get_realm_hash(r, user, conf->realm, 1408 "invalid nonce %s received - user attempted " 1417 "user %s: nonce expired (%.2f seconds old " 1419 r->user, (double)apr_time_sec(dt), 1428 "user %s: one-time-nonce mismatch - sending " 1429 "new nonce", r->user); 1528 /* Determine user ID, and check if the attributes are correct, if it 1529 * really is that user, i [all...] |
/httpd/modules/mappers/ |
H A D | mod_userdir.c | 39 * user directories (a la Directory Index). For example: 77 * The default directory in user's home dir 203 const char *user, *dname; local 222 user = ap_getword(r->pool, &dname, '/'); 226 * delimiting the "/~user" part from the rest of the URL, in case there 227 * was one (the case where there wasn't being just "GET /~user HTTP/1.0", 238 if (user[0] == '\0' || 239 (user[1] == '.' && (user[2] == '\0' || 240 (user[ [all...] |
H A D | mod_rewrite.c | 270 const char *user; /* run RewriteMap program as this user */ member in struct:__anon235 470 r->user ? (*r->user ? r->user : "\"\"") : "-", 1176 const char *user, const char *group, 1189 && (!user || APR_SUCCESS == (rc=apr_procattr_user_set(procattr, user, ""))) 1248 map->user, map->group, 1866 /* sigh, the user want 1174 rewritemap_program_child(apr_pool_t *p, const char *progname, char **argv, const char *user, const char *group, apr_file_t **fpout, apr_file_t **fpin) argument 2604 char *p, *user; local [all...] |
/httpd/modules/metadata/ |
H A D | mod_ident.c | 166 char user[RFC1413_USERLEN + 1]; /* XXX */ local 226 user) != 3 || sav_rmt_port != rmt_port 235 if ((cp = strchr(user, '\r'))) 238 conn->remote_logname = apr_pstrdup(conn->pool, user); 291 "Enable identd (RFC 1413) user lookups - SLOW"),
|
/httpd/os/unix/ |
H A D | unixd.c | 337 * hides any occurrence from being returned to user space. 454 * set both the POSIX and BS2000 user id's to the unprivileged user. 468 /* If the user is unprivileged, use the normal fork() only. */ 481 * environment to be switched to the target user's user id. 498 "be started by an unprivileged user!"); 506 pid_t os_fork(const char *user) argument 518 apr_cpystrn(username, user, sizeof username); 520 /* Make user nam [all...] |
/httpd/support/ |
H A D | htdigest.c | 125 static void add_password(const char *user, const char *realm, apr_file_t *f) argument 147 apr_file_printf(f, "%s:%s:", user, realm); 150 apr_snprintf(string, sizeof(string), "%s:%s:%s", user, realm, pw); 192 char user[MAX_STRING_LEN]; local 225 apr_cpystrn(user, argv[4], sizeof(user)); 228 user, realm); 229 add_password(user, realm, f); 254 apr_cpystrn(user, argv[3], sizeof(user)); [all...] |
H A D | htpasswd.c | 74 static int mkrecord(struct passwd_ctx *ctx, char *user) argument 85 ctx->out = apr_pstrcat(ctx->pool, user, ":", hash_str, NL, NULL); 113 " -D Delete the specified user." NL 114 " -v Verify password for the specified user." NL 160 struct passwd_ctx *ctx, unsigned *mask, char **user, 235 *user = apr_pstrdup(pool, argv[i++]); 236 if ((arg = strchr(*user, ':')) != NULL) { 279 char *user = NULL; local 320 check_args(argc, argv, &ctx, &mask, &user, &pwfilename); 366 i = mkrecord(&ctx, user); 159 check_args(int argc, const char *const argv[], struct passwd_ctx *ctx, unsigned *mask, char **user, char **pwfilename) argument [all...] |
/httpd/modules/generators/ |
H A D | mod_cgid.c | 224 * to the CGI script. When suexec is enabled, the suexec path, user, and 231 static char **create_argv(apr_pool_t *p, char *path, char *user, char *group, argument 260 if (user) { 261 av[idx++] = user; 666 /* if running as root, switch to configured user/group */ 1458 "AcceptPathInfo off disallows user's path");
|
/httpd/modules/proxy/ |
H A D | mod_proxy_ftp.c | 291 char *user, *password, *host, *path, *parms, *strp, sport[7]; local 308 err = ap_proxy_canon_netloc(p, &url, &user, &password, &host, &port); 311 if (user != NULL && !ftp_check_string(user)) 365 r->filename = apr_pstrcat(p, "proxy:ftp://", (user != NULL) ? user : "", 368 (user != NULL) ? "@" : "", host, sport, "/", path, 917 * with username and password (which was presumably queried from the user) 920 * ftp://user@host part of the reqest (sans password -if supplied but invalid-) 987 char *user local [all...] |
H A D | proxy_util.c | 302 * user NULL if no user/password permitted 314 char *user = NULL, *password = NULL; local 330 /* find _last_ '@' since it might occur in user/password part */ 335 user = host; 339 strp = strchr(user, ':'); 348 user = ap_proxy_canonenc(p, user, strlen(user), enc_user, 1, 0); 349 if (user 404 char *url, *user = NULL, *password = NULL, *err, *host = NULL; local [all...] |
/httpd/modules/ssl/ |
H A D | ssl_engine_kernel.c | 369 * We do not force any renegotiation if the user is already authenticated 407 * user actually wanted). 416 * new cipher suite. This approach is fine because the user explicitly 907 /* If we're trying to have the user name set from a client 909 * the user name probably isn't important from an auth checking point 918 r->user = val; 921 "Failed to set r->user to '%s'", dc->szUserName); 984 * authenticates a user. This means that the Module statement for this 992 char *user; local 1014 * Make sure the user i [all...] |
/httpd/include/ |
H A D | httpd.h | 948 /** If an authentication check was made, this gets set to the user name. */ 949 char *user; member in struct:request_rec 978 * user's preference upon HOOK_VERY_FIRST of the fixups. 2372 * @param username username of the user
|