Searched defs:username (Results 1 - 8 of 8) sorted by relevance
/httpd/os/bs2000/ |
H A D | os.c | 101 char username[USER_LEN+1]; local 110 apr_cpystrn(username, user, sizeof username); 113 ap_str_toupper(username); 115 pid = ufork(username);
|
/httpd/modules/ldap/ |
H A D | util_ldap_cache.h | 108 * We cache every successful search and bind operation, using the username 113 const char *username; /* Cache key */ member in struct:util_search_node_t 138 * statement and the dn fetched based on the client-provided username.
|
/httpd/modules/mappers/ |
H A D | mod_userdir.c | 45 * UserDir disable[d] username ... 46 * UserDir enable[d] username ... 48 * If "disabled" has no other arguments, *all* ~<username> references are 138 char *username; local 184 username = ap_getword_conf(cmd->pool, &usernames); 185 apr_table_setn(usertable, username, kw); 193 "'disabled', or 'disabled username username...', or " 194 "'enabled username username 351 const char *username = apr_table_get(r->notes, "mod_userdir_user"); local [all...] |
/httpd/os/unix/ |
H A D | unixd.c | 509 char username[USER_LEN+1]; local 518 apr_cpystrn(username, user, sizeof username); 521 ap_str_toupper(username); 523 pid = ufork(username);
|
/httpd/support/ |
H A D | htdbm.c | 67 char *username; member in struct:htdbm_t 159 if (!htdbm->username) 162 key.dptr = htdbm->username; 163 key.dsize = strlen(htdbm->username); 182 key.dptr = htdbm->username; 183 key.dsize = strlen(htdbm->username); 196 key.dptr = htdbm->username; 197 key.dsize = strlen(htdbm->username); 265 if (!htdbm->username || (strlen(htdbm->username) > 6 [all...] |
/httpd/modules/aaa/ |
H A D | mod_auth_form.c | 58 const char *username; member in struct:__anon54 96 conf->username = "httpd_username"; 117 new->username = (add->username_set == 0) ? base->username : add->username; 214 static const char *set_cookie_form_username(cmd_parms * cmd, void *config, const char *username) argument 217 conf->username = username; 219 return check_string(cmd, username); 358 "The field of the login form carrying the username"), 590 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument [all...] |
H A D | mod_auth_digest.c | 139 const char *username; member in struct:digest_header_struct 951 if (!strcasecmp(key, "username")) 952 resp->username = apr_pstrdup(r->pool, value); 973 if (!resp->username || !resp->realm || !resp->nonce || !resp->uri 1593 r->user = (char *) resp->username;
|
/httpd/modules/ssl/ |
H A D | ssl_engine_kernel.c | 912 * we need to postpone setting the username until later. 993 const char *auth_line, *username, *password; local 1016 * ("/XX=YYY/XX=YYY/..") as the username and "password" as the 1026 username = ap_getword_nulls(r->pool, &auth_line, ':'); 1029 if ((username[0] == '/') && strEQ(password, "password")) { 1031 "Encountered FakeBasicAuth spoof: %s", username); 1064 APLOG_MARK, APLOG_WARNING, 0, r, APLOGNO(02434) "Failed to set FakeBasicAuth username to '%s', did not exist in certificate", dc->szUserName); 2406 char *username = SSL_get_srp_username(ssl); local 2409 if (username == NULL 2410 || (u = SRP_VBASE_get_by_user(mctx->srp_vbase, username)) [all...] |
Completed in 30 milliseconds