Searched refs:password (Results 1 - 19 of 19) sorted by relevance

/httpd/include/
H A Dmod_auth.h82 /* Given a username and password, expected to return AUTH_GRANTED
83 * if we can validate this user/password combination.
86 const char *password);
89 * can find a md5 hash of 'user:realm:password'
/httpd/modules/aaa/
H A Dmod_authn_dbm.c118 const char *password)
146 rv = ap_password_validate(r, user, password, dbm_password);
117 check_dbm_pw(request_rec *r, const char *user, const char *password) argument
H A Dmod_authn_file.c58 const char *password)
77 "Could not open password file: %s", conf->pwfile);
104 status = ap_password_validate(r, user, password, file_password);
132 "Could not open password file: %s", conf->pwfile);
149 /* Remember that this is a md5 hash of user:realm:password. */
57 check_password(request_rec *r, const char *user, const char *password) argument
H A Dmod_auth_form.c60 const char *password; member in struct:__anon54
97 conf->password = "httpd_password";
119 new->password = (add->password_set == 0) ? base->password : add->password;
222 static const char *set_cookie_form_password(cmd_parms * cmd, void *config, const char *password) argument
225 conf->password = password;
227 return check_string(cmd, password);
360 "The field of the login form carrying the password"),
590 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument
[all...]
H A Dmod_authnz_fcgi.c139 static void setupenv(request_rec *r, const char *password, const char *apache_role) argument
147 if (password) {
148 apr_table_setn(r->subprocess_env, "REMOTE_PASSWD", password);
699 const char *password, const char *apache_role,
717 setupenv(r, password, apache_role);
801 const char *password = NULL; local
827 if ((res = ap_get_basic_auth_pw(r, &password))) {
830 "password", fn);
834 password = NULL;
850 req_rsp(r, conf, password, AP_FCGI_APACHE_ROLE_AUTHENTICATOR_ST
698 req_rsp(request_rec *r, const fcgi_provider_conf *conf, const char *password, const char *apache_role, char *rspbuf, apr_size_t *rspbuflen) argument
925 fcgi_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
H A Dmod_auth_basic.c154 /* if password is unspecified, set it to the fixed string "password" to
158 pass = "password";
174 "Could not parse fake password expression '%s': %s", pass,
209 "username and password, 'off' to disable. Password defaults "
210 "to 'password' if missing."),
361 char *password; local
370 /* We expect the password to be hash of user:realm:password */
372 &password);
[all...]
H A Dmod_authn_core.c109 const char *password)
132 ret = prvdraliasrec->provider->check_password(r,user,password);
108 authn_alias_check_password(request_rec *r, const char *user, const char *password) argument
H A Dmod_authn_dbd.c93 "Query used to fetch password for user"),
96 "Query used to fetch password for user+realm"),
101 const char *password)
188 rv = ap_password_validate(r, user, password, dbd_password);
100 authn_dbd_password(request_rec *r, const char *user, const char *password) argument
H A Dmod_authnz_ldap.c90 char *password; /* if this module successfully authenticates, the basic auth password, else null */ member in struct:__anon66
179 /* Convert the password to UTF-8. */
450 /* If the password isn't set in the per-request config, we didn't
452 if (req->password &&
457 bindpw = req->password;
498 * the request (ie the username and password are checked). This is done
500 * DN and the supplied password.
504 const char *password)
539 bindpw = password;
503 authn_ldap_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
H A Dmod_authn_socache.c359 const char *password)
364 * if found, test password
406 rv = ap_password_validate(r, user, password, (char*) val);
358 check_password(request_rec *r, const char *user, const char *password) argument
H A Dmod_auth_digest.c1267 char *password; local
1296 /* We expect the password to be md5 hash of user:realm:password */
1298 &password);
1316 conf->ha1 = password;
1729 /* we have a password, so continue */
1754 "user %s: password mismatch: %s", r->user,
1789 "user %s: password mismatch: %s", r->user,
/httpd/modules/proxy/
H A Dmod_proxy_ftp.c291 char *user, *password, *host, *path, *parms, *strp, sport[7]; local
308 err = ap_proxy_canon_netloc(p, &url, &user, &password, &host, &port);
313 if (password != NULL && !ftp_check_string(password))
366 (password != NULL) ? ":" : "",
367 (password != NULL) ? password : "",
487 /* Save "scheme://site" prefix without password */
915 /* Common routine for failed authorization (i.e., missing or wrong password)
917 * with username and password (whic
989 const char *password = NULL; local
[all...]
H A Dproxy_util.c302 * user NULL if no user/password permitted
303 * password holder for password
314 char *user = NULL, *password = NULL; local
330 /* find _last_ '@' since it might occur in user/password part */
338 /* find password */
342 password = ap_proxy_canonenc(p, strp + 1, strlen(strp + 1), enc_user, 1, 0);
343 if (password == NULL) {
344 return "Bad %-escape in URL (password)";
357 *passwordp = password;
404 char *url, *user = NULL, *password = NULL, *err, *host = NULL; local
[all...]
/httpd/support/
H A Ddbmmanage.in21 # usage: dbmmanage <DBMfile> <command> <user> <password> <groups> <comment>
42 pw of . for update command retains the old password
43 pw of - (or blank) for update command prompts for the password
85 # The new style crypt() allows up to 20 characters of the password to be
225 my $prompt = shift || "Enter password:";
240 die "Can't use empty password!\n" unless length $pwd;
258 die "Can't use empty password!\n" unless $crypted_pwd;
268 print "User $key $action with password encrypted to $DB{$key} using $crypt_method\n";
272 my $value = getpass "New password:";
273 die "They don't match, sorry.\n" unless getpass("Re-type new password
[all...]
/httpd/modules/ldap/
H A Dutil_ldap.c672 ((src[i].password == NULL) ^ (dest[i].password == NULL)) ||
673 (src[i].password != NULL && dest[i].password != NULL &&
674 strcmp(src[i].password, dest[i].password))) {
1677 * password doesn't match the storepassword, the entry will
1781 * A bind to the server with an empty password always succeeds, so
1782 * we check to ensure that the password is not empty. This implies
1789 ldc->reason = "Empty password no
2355 util_ldap_set_trusted_global_cert(cmd_parms *cmd, void *dummy, const char *type, const char *file, const char *password) argument
2433 util_ldap_set_trusted_client_cert(cmd_parms *cmd, void *config, const char *type, const char *file, const char *password) argument
[all...]
/httpd/server/
H A Dscoreboard.c424 if (r->parsed_uri.password == NULL) {
428 /* Don't reveal the password in the server-status view */
H A Dprotocol.c707 else if (r->parsed_uri.user || r->parsed_uri.password) {
709 "URI must not contain a username/password");
/httpd/modules/ssl/
H A Dssl_engine_kernel.c993 const char *auth_line, *username, *password; local
1016 * ("/XX=YYY/XX=YYY/..") as the username and "password" as the
1017 * password.
1027 password = auth_line;
1029 if ((username[0] == '/') && strEQ(password, "password")) {
1073 * Fake a password - which one would be immaterial, as, it seems, an empty
1074 * password in the users file would match ALL incoming passwords, if only
1079 * therefore, to provide a password. This password ca
[all...]
/httpd/modules/loggers/
H A Dmod_log_config.c383 /* NOTE: If the original request contained a password, we
389 (r->parsed_uri.password)

Completed in 843 milliseconds