/httpd/include/ |
H A D | mod_auth.h | 82 /* Given a username and password, expected to return AUTH_GRANTED 83 * if we can validate this user/password combination. 86 const char *password); 89 * can find a md5 hash of 'user:realm:password'
|
/httpd/modules/aaa/ |
H A D | mod_authn_dbm.c | 118 const char *password) 146 rv = ap_password_validate(r, user, password, dbm_password); 117 check_dbm_pw(request_rec *r, const char *user, const char *password) argument
|
H A D | mod_authn_file.c | 58 const char *password) 77 "Could not open password file: %s", conf->pwfile); 104 status = ap_password_validate(r, user, password, file_password); 132 "Could not open password file: %s", conf->pwfile); 149 /* Remember that this is a md5 hash of user:realm:password. */ 57 check_password(request_rec *r, const char *user, const char *password) argument
|
H A D | mod_auth_form.c | 60 const char *password; member in struct:__anon54 97 conf->password = "httpd_password"; 119 new->password = (add->password_set == 0) ? base->password : add->password; 222 static const char *set_cookie_form_password(cmd_parms * cmd, void *config, const char *password) argument 225 conf->password = password; 227 return check_string(cmd, password); 360 "The field of the login form carrying the password"), 590 get_form_auth(request_rec * r, const char *username, const char *password, const char *location, const char *method, const char *mimetype, const char *body, const char **sent_user, const char **sent_pw, const char **sent_loc, const char **sent_method, const char **sent_mimetype, apr_bucket_brigade **sent_body, auth_form_config_rec * conf) argument [all...] |
H A D | mod_authnz_fcgi.c | 139 static void setupenv(request_rec *r, const char *password, const char *apache_role) argument 147 if (password) { 148 apr_table_setn(r->subprocess_env, "REMOTE_PASSWD", password); 699 const char *password, const char *apache_role, 717 setupenv(r, password, apache_role); 801 const char *password = NULL; local 827 if ((res = ap_get_basic_auth_pw(r, &password))) { 830 "password", fn); 834 password = NULL; 850 req_rsp(r, conf, password, AP_FCGI_APACHE_ROLE_AUTHENTICATOR_ST 698 req_rsp(request_rec *r, const fcgi_provider_conf *conf, const char *password, const char *apache_role, char *rspbuf, apr_size_t *rspbuflen) argument 925 fcgi_check_password(request_rec *r, const char *user, const char *password) argument [all...] |
H A D | mod_auth_basic.c | 154 /* if password is unspecified, set it to the fixed string "password" to 158 pass = "password"; 174 "Could not parse fake password expression '%s': %s", pass, 209 "username and password, 'off' to disable. Password defaults " 210 "to 'password' if missing."), 361 char *password; local 370 /* We expect the password to be hash of user:realm:password */ 372 &password); [all...] |
H A D | mod_authn_core.c | 109 const char *password) 132 ret = prvdraliasrec->provider->check_password(r,user,password); 108 authn_alias_check_password(request_rec *r, const char *user, const char *password) argument
|
H A D | mod_authn_dbd.c | 93 "Query used to fetch password for user"), 96 "Query used to fetch password for user+realm"), 101 const char *password) 188 rv = ap_password_validate(r, user, password, dbd_password); 100 authn_dbd_password(request_rec *r, const char *user, const char *password) argument
|
H A D | mod_authnz_ldap.c | 90 char *password; /* if this module successfully authenticates, the basic auth password, else null */ member in struct:__anon66 179 /* Convert the password to UTF-8. */ 450 /* If the password isn't set in the per-request config, we didn't 452 if (req->password && 457 bindpw = req->password; 498 * the request (ie the username and password are checked). This is done 500 * DN and the supplied password. 504 const char *password) 539 bindpw = password; 503 authn_ldap_check_password(request_rec *r, const char *user, const char *password) argument [all...] |
H A D | mod_authn_socache.c | 359 const char *password) 364 * if found, test password 406 rv = ap_password_validate(r, user, password, (char*) val); 358 check_password(request_rec *r, const char *user, const char *password) argument
|
H A D | mod_auth_digest.c | 1267 char *password; local 1296 /* We expect the password to be md5 hash of user:realm:password */ 1298 &password); 1316 conf->ha1 = password; 1729 /* we have a password, so continue */ 1754 "user %s: password mismatch: %s", r->user, 1789 "user %s: password mismatch: %s", r->user,
|
/httpd/modules/proxy/ |
H A D | mod_proxy_ftp.c | 291 char *user, *password, *host, *path, *parms, *strp, sport[7]; local 308 err = ap_proxy_canon_netloc(p, &url, &user, &password, &host, &port); 313 if (password != NULL && !ftp_check_string(password)) 366 (password != NULL) ? ":" : "", 367 (password != NULL) ? password : "", 487 /* Save "scheme://site" prefix without password */ 915 /* Common routine for failed authorization (i.e., missing or wrong password) 917 * with username and password (whic 989 const char *password = NULL; local [all...] |
H A D | proxy_util.c | 302 * user NULL if no user/password permitted 303 * password holder for password 314 char *user = NULL, *password = NULL; local 330 /* find _last_ '@' since it might occur in user/password part */ 338 /* find password */ 342 password = ap_proxy_canonenc(p, strp + 1, strlen(strp + 1), enc_user, 1, 0); 343 if (password == NULL) { 344 return "Bad %-escape in URL (password)"; 357 *passwordp = password; 404 char *url, *user = NULL, *password = NULL, *err, *host = NULL; local [all...] |
/httpd/support/ |
H A D | dbmmanage.in | 21 # usage: dbmmanage <DBMfile> <command> <user> <password> <groups> <comment> 42 pw of . for update command retains the old password 43 pw of - (or blank) for update command prompts for the password 85 # The new style crypt() allows up to 20 characters of the password to be 225 my $prompt = shift || "Enter password:"; 240 die "Can't use empty password!\n" unless length $pwd; 258 die "Can't use empty password!\n" unless $crypted_pwd; 268 print "User $key $action with password encrypted to $DB{$key} using $crypt_method\n"; 272 my $value = getpass "New password:"; 273 die "They don't match, sorry.\n" unless getpass("Re-type new password [all...] |
/httpd/modules/ldap/ |
H A D | util_ldap.c | 672 ((src[i].password == NULL) ^ (dest[i].password == NULL)) || 673 (src[i].password != NULL && dest[i].password != NULL && 674 strcmp(src[i].password, dest[i].password))) { 1677 * password doesn't match the storepassword, the entry will 1781 * A bind to the server with an empty password always succeeds, so 1782 * we check to ensure that the password is not empty. This implies 1789 ldc->reason = "Empty password no 2355 util_ldap_set_trusted_global_cert(cmd_parms *cmd, void *dummy, const char *type, const char *file, const char *password) argument 2433 util_ldap_set_trusted_client_cert(cmd_parms *cmd, void *config, const char *type, const char *file, const char *password) argument [all...] |
/httpd/server/ |
H A D | scoreboard.c | 424 if (r->parsed_uri.password == NULL) { 428 /* Don't reveal the password in the server-status view */
|
H A D | protocol.c | 707 else if (r->parsed_uri.user || r->parsed_uri.password) { 709 "URI must not contain a username/password");
|
/httpd/modules/ssl/ |
H A D | ssl_engine_kernel.c | 993 const char *auth_line, *username, *password; local 1016 * ("/XX=YYY/XX=YYY/..") as the username and "password" as the 1017 * password. 1027 password = auth_line; 1029 if ((username[0] == '/') && strEQ(password, "password")) { 1073 * Fake a password - which one would be immaterial, as, it seems, an empty 1074 * password in the users file would match ALL incoming passwords, if only 1079 * therefore, to provide a password. This password ca [all...] |
/httpd/modules/loggers/ |
H A D | mod_log_config.c | 383 /* NOTE: If the original request contained a password, we 389 (r->parsed_uri.password)
|