Searched refs:pw (Results 1 - 10 of 10) sorted by relevance

/httpd/modules/lua/
H A Dlua_passwd.c89 char *pw; local
97 pw = ctx->passwd;
101 apr_sha1_base64(pw, strlen(pw), ctx->out);
110 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
123 cbuf = crypt(pw, salt);
132 if (strlen(pw) > 8) {
133 char *truncpw = apr_pstrdup(ctx->pool, pw);
140 memset(truncpw, '\0', strlen(pw));
157 rv = apr_bcrypt_encode(pw, ct
[all...]
H A Dlua_request.c758 const char* pw = NULL; local
759 ap_get_basic_auth_pw(r, &pw);
760 return pw ? pw : "";
/httpd/support/
H A Dpasswd_common.c181 char *pw; local
198 pw = ctx->passwd;
203 apr_sha1_base64(pw, strlen(pw), ctx->out);
210 rv = apr_md5_encode(pw, salt, ctx->out, ctx->out_len);
220 apr_cpystrn(ctx->out, pw, ctx->out_len);
228 cbuf = crypt(pw, salt);
237 if (strlen(pw) > 8) {
238 char *truncpw = apr_pstrdup(ctx->pool, pw);
244 memset(truncpw, '\0', strlen(pw));
[all...]
H A Dsuexec.c298 struct passwd *pw; /* password entry holder */ local
313 if ((pw = getpwuid(uid)) == NULL) {
326 || (! strcasecmp(AP_HTTPD_USER, pw->pw_name)))
328 || (! strcmp(AP_HTTPD_USER, pw->pw_name)))
378 if (strcasecmp(AP_HTTPD_USER, pw->pw_name)) {
379 log_err("user mismatch (%s instead of %s)\n", pw->pw_name, AP_HTTPD_USER);
383 if (strcmp(AP_HTTPD_USER, pw->pw_name)) {
384 log_err("user mismatch (%s instead of %s)\n", pw->pw_name, AP_HTTPD_USER);
415 if ((pw = getpwnam(target_uname)) == NULL) {
421 if ((pw
[all...]
H A Ddbmmanage.in33 Usage: dbmmanage [enc] dbname command [username [pw [group[,group] [comment]]]]
42 pw of . for update command retains the old password
43 pw of - (or blank) for update command prompts for the password
192 my ($pw, $salt) = @_;
194 crypt $pw, $salt;
203 my($pw, $salt) = @_;
205 Crypt::PasswdMD5::apache_md5_crypt($pw, $salt);
209 my($pw, $salt) = @_;
210 '{SHA}' . Digest::SHA1::sha1_base64($pw) . "=";
H A Dhtdigest.c127 char *pw; local
146 pw = pwin;
150 apr_snprintf(string, sizeof(string), "%s:%s:%s", user, realm, pw);
/httpd/modules/aaa/
H A Dmod_auth_form.c435 const char *user, const char *pw,
451 /* have we isolated the user and pw before? */
456 if (pw) {
457 apr_table_setn(notes, apr_pstrcat(r->pool, authname, "-pw", NULL), pw);
473 const char **user, const char **pw,
488 /* have we isolated the user and pw before? */
493 if (pw) {
494 *pw = (char *) apr_table_get(m->notes, apr_pstrcat(m->pool, authname, "-pw", NUL
434 set_notes_auth(request_rec * r, const char *user, const char *pw, const char *method, const char *mimetype) argument
472 get_notes_auth(request_rec *r, const char **user, const char **pw, const char **method, const char **mimetype) argument
521 set_session_auth(request_rec * r, const char *user, const char *pw, const char *site) argument
546 get_session_auth(request_rec * r, const char **user, const char **pw, const char **hash) argument
860 fake_basic_authentication(request_rec *r, auth_form_config_rec *conf, const char *user, const char *pw) argument
[all...]
H A Dmod_auth_basic.c249 const char **pw)
284 *pw = decoded_line;
248 get_basic_auth(request_rec *r, const char **user, const char **pw) argument
/httpd/include/
H A Dhttp_protocol.h563 * @param pw The password as set in the headers
564 * @return 0 (OK) if it set the 'pw' argument (and assured
572 AP_DECLARE(int) ap_get_basic_auth_pw(request_rec *r, const char **pw);
/httpd/server/
H A Dprotocol.c1400 AP_DECLARE(int) ap_get_basic_auth_pw(request_rec *r, const char **pw) argument
1438 *pw = t;

Completed in 892 milliseconds