Searched refs:user (Results 1 - 25 of 51) sorted by relevance

123

/httpd/os/bs2000/
H A Dos.h37 extern pid_t os_fork(const char *user);
H A Dos.c46 * set both the POSIX and BS2000 user id's to the unprivileged user.
60 /* If the user is unprivileged, use the normal fork() only. */
73 * environment to be switched to the target user's user id.
90 "be started by an unprivileged user!");
98 pid_t os_fork(const char *user) argument
110 apr_cpystrn(username, user, sizeof username);
112 /* Make user name all upper case - for some versions of ufork() */
119 "for user
[all...]
/httpd/os/unix/
H A Dos.h48 pid_t os_fork(const char *user);
/httpd/modules/aaa/
H A Dmod_authz_owner.c50 "Authorization of user %s to access %s failed, reason: %s",
51 r->user, r->uri, reason ? reason : "unknown");
57 if (!r->user) {
64 "Authorization of user %s to access %s failed, reason: %s",
65 r->user, r->uri, reason ? reason : "unknown");
74 "Authorization of user %s to access %s failed, reason: %s",
75 r->user, r->uri, reason ? reason : "unknown");
82 "Authorization of user %s to access %s failed, reason: %s",
83 r->user, r->uri, reason ? reason : "unknown");
87 status = apr_uid_name_get(&owner, finfo.user,
[all...]
H A Dmod_authn_dbd.c33 const char *user; member in struct:__anon57
46 #define AUTHN_CACHE_STORE(r,user,realm,data) \
48 authn_cache_store((r), "dbd", (user), (realm), (data))
61 ret->user = (add->user == NULL) ? base->user : add->user;
92 (void *)APR_OFFSETOF(authn_dbd_conf, user), ACCESS_CONF,
93 "Query used to fetch password for user"),
96 "Query used to fetch password for user
100 authn_dbd_password(request_rec *r, const char *user, const char *password) argument
197 authn_dbd_realm(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_authn_dbm.c42 #define AUTHN_CACHE_STORE(r,user,realm,data) \
44 authn_cache_store((r), "dbm", (user), (realm), (data))
75 OR_AUTHCFG, "dbm database file containing user IDs and passwords"),
78 OR_AUTHCFG, "what type of DBM file the user file is"),
85 const char *user, char **value,
99 key.dptr = (char*)user;
117 static authn_status check_dbm_pw(request_rec *r, const char *user, argument
126 rv = fetch_dbm_value(conf->dbmtype, conf->pwfile, user, &dbm_password,
144 AUTHN_CACHE_STORE(r, user, NULL, dbm_password);
146 rv = ap_password_validate(r, user, passwor
84 fetch_dbm_value(const char *dbmtype, const char *dbmfile, const char *user, char **value, apr_pool_t *pool) argument
155 get_dbm_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_authn_file.c35 #define AUTHN_CACHE_STORE(r,user,realm,data) \
37 authn_cache_store((r), "file", (user), (realm), (data))
51 OR_AUTHCFG, "text file containing user IDs and passwords"),
57 static authn_status check_password(request_rec *r, const char *user, argument
92 if (!strcmp(user, w)) {
102 AUTHN_CACHE_STORE(r, user, NULL, file_password);
104 status = ap_password_validate(r, user, password, file_password);
112 static authn_status get_realm_hash(request_rec *r, const char *user, argument
148 if (x && w && !strcmp(user, w) && !strcmp(realm, x)) {
149 /* Remember that this is a md5 hash of user
[all...]
H A Dmod_authz_dbm.c75 OR_AUTHCFG, "database file containing group names and member user IDs"),
138 char *user = r->user; local
151 if (!user) {
165 status = get_dbm_grp(r, apr_pstrcat(r->pool, user, ":", realm, NULL),
166 user, conf->grpfile, conf->dbmtype, &groups);
178 "Authorization of user %s to access %s failed, reason: "
179 "user doesn't appear in DBM group file (%s).",
180 r->user, r->uri, conf->grpfile);
207 "Authorization of user
222 char *user = r->user; local
[all...]
H A Dmod_authz_groupfile.c77 "text file containing group names and member user IDs"),
85 static apr_status_t groups_for_user(apr_pool_t *p, char *user, char *grpfile, argument
119 if (!strcmp(w, user)) {
140 char *user = r->user; local
150 if (!user) {
163 status = groups_for_user(r->pool, user, conf->groupfile,
176 "Authorization of user %s to access %s failed, reason: "
177 "user doesn't appear in group file (%s).",
178 r->user,
213 char *user = r->user; local
[all...]
H A Dmod_authn_anon.c19 * one gives the magic user name 'anonymous' and ones email address
31 * The magic user id is something like 'anonymous', it is NOT case sensitive.
38 * in broken GUIs like W95 is often given by the user. The Default is off.
60 char *user; member in struct:anon_auth_user
106 conf->users->user = apr_pstrdup(cmd->pool, arg);
117 "a space-separated list of user IDs"),
135 static authn_status check_anonymous(request_rec *r, const char *user, argument
149 if (!*user) {
161 if (!strcasecmp(user, p->user)) {
[all...]
H A Dmod_authz_user.c58 if (!r->user) {
65 "authz_user authorize: require user: Can't "
72 if (!strcmp(r->user, w)) {
78 "access to %s failed, reason: user '%s' does not meet "
79 "'require'ments for user to be allowed access",
80 r->uri, r->user);
89 if (!r->user) {
128 ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "user",
131 ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "valid-user",
H A Dmod_authz_dbd.c39 * this across all authz user providers in a lower level mod, such as
108 "SQL query to get per-user redirect URL after login"),
137 query, r->user, NULL);
141 "authz_dbd: %s of user %s updated %d rows",
142 action, r->user, nrows);
148 "authz_dbd: query for %s failed; user %s [%s]",
149 action, r->user, message?message:noerror);
166 &res, query, 0, r->user, NULL)) == 0) {
173 "authz_dbd in get_row; action=%s user=%s [%s]",
174 action, r->user, messag
[all...]
H A Dmod_authn_socache.c263 const char *user, const char *realm)
282 return apr_pstrcat(r->pool, context, ":", user, NULL);
285 return apr_pstrcat(r->pool, context, ":", user, ":", realm, NULL);
289 const char *user, const char *realm,
319 "authn credentials for %s not cached (mutex busy)", user);
331 key = construct_key(r, dcfg->context, user, realm);
341 user, dcfg->context);
358 static authn_status check_password(request_rec *r, const char *user, argument
381 key = construct_key(r, dcfg->context, user, NULL);
389 "Authn cache: no credentials found for %s", user);
262 construct_key(request_rec *r, const char *context, const char *user, const char *realm) argument
288 ap_authn_cache_store(request_rec *r, const char *module, const char *user, const char *realm, const char* data) argument
414 get_realm_hash(request_rec *r, const char *user, const char *realm, char **rethash) argument
[all...]
H A Dmod_auth_basic.c143 const char *user, const char *pass)
148 if (!strcasecmp(user, "off")) {
162 ap_expr_parse_cmd(cmd, user, AP_EXPR_FLAG_STRING_RESULT,
166 "Could not parse fake username expression '%s': %s", user,
214 "check for digest auth, using a hash of 'user:realm:pass'"),
248 static int get_basic_auth(request_rec *r, const char **user, argument
283 *user = ap_getword_nulls(r->pool, (const char**)&decoded_line, ':');
286 /* set the user, even though the user is unauthenticated at this point */
287 r->user
142 add_basic_fake(cmd_parms * cmd, void *config, const char *user, const char *pass) argument
445 const char *auth_line, *user, *pass, *err; local
[all...]
H A Dmod_authnz_ldap.c64 int user_is_dn; /* If true, r->user is replaced by DN during authn */
65 char *remote_user_attribute; /* If set, r->user is replaced by this attribute during authn */
70 apr_array_header_t *groupattr; /* List of Group attributes identifying user members. Default:"member uniqueMember" */
88 char *user; /* The username provided by the client */ member in struct:__anon66
207 const char *user,
228 inbytes = strlen(user);
232 /* Convert the user name to UTF-8. This is only valid for LDAP v3 */
233 if (apr_xlate_conv_buffer(convset, user, &inbytes, outbuf, &outbytes) == APR_SUCCESS) {
234 user = outbuf;
256 for (p = user,
205 authn_ldap_build_filter(char *filtbuf, request_rec *r, const char *user, const char *filter, authn_ldap_config_t *sec) argument
404 ldap_determine_binddn(request_rec *r, const char *user) argument
503 authn_ldap_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
H A Dmod_auth_form.c388 "If set, use this passphrase to determine whether the user should "
389 "be authenticated. Bypasses the user authentication check on "
435 const char *user, const char *pw,
451 /* have we isolated the user and pw before? */
453 if (user) {
454 apr_table_setn(notes, apr_pstrcat(r->pool, authname, "-user", NULL), user);
473 const char **user, const char **pw,
488 /* have we isolated the user and pw before? */
490 if (user) {
434 set_notes_auth(request_rec * r, const char *user, const char *pw, const char *method, const char *mimetype) argument
472 get_notes_auth(request_rec *r, const char **user, const char **pw, const char **method, const char **mimetype) argument
521 set_session_auth(request_rec * r, const char *user, const char *pw, const char *site) argument
546 get_session_auth(request_rec * r, const char **user, const char **pw, const char **hash) argument
860 fake_basic_authentication(request_rec *r, auth_form_config_rec *conf, const char *user, const char *pw) argument
[all...]
H A Dmod_authn_core.c108 static authn_status authn_alias_check_password(request_rec *r, const char *user, argument
132 ret = prvdraliasrec->provider->check_password(r,user,password);
140 static authn_status authn_alias_get_realm_hash(request_rec *r, const char *user, argument
164 ret = prvdraliasrec->provider->get_realm_hash(r,user,realm,rethash);
H A Dmod_authnz_fcgi.c48 const char *default_user; /* this is user if authorizer returns
49 * success and a user expression yields
52 ap_expr_info_t *user_expr; /* expr to evaluate to set r->user */
53 char authoritative; /* fail request if user is rejected? */
819 "require-basic %s, user expr? %s type %s",
856 const char *user = ap_expr_str_exec(r, dconf->user_expr, local
858 if (user && strlen(user)) {
859 r->user = apr_pstrdup(r->pool, user);
925 fcgi_check_password(request_rec *r, const char *user, const char *password) argument
[all...]
/httpd/modules/mappers/
H A Dmod_userdir.c39 * user directories (a la Directory Index). For example:
77 * The default directory in user's home dir
203 const char *user, *dname; local
222 user = ap_getword(r->pool, &dname, '/');
226 * delimiting the "/~user" part from the rest of the URL, in case there
227 * was one (the case where there wasn't being just "GET /~user HTTP/1.0",
238 if (user[0] == '\0' ||
239 (user[1] == '.' && (user[2] == '\0' ||
240 (user[
[all...]
/httpd/support/
H A Dhtdigest.c125 static void add_password(const char *user, const char *realm, apr_file_t *f) argument
147 apr_file_printf(f, "%s:%s:", user, realm);
150 apr_snprintf(string, sizeof(string), "%s:%s:%s", user, realm, pw);
192 char user[MAX_STRING_LEN]; local
225 apr_cpystrn(user, argv[4], sizeof(user));
228 user, realm);
229 add_password(user, realm, f);
254 apr_cpystrn(user, argv[3], sizeof(user));
[all...]
H A Dhtpasswd.c74 static int mkrecord(struct passwd_ctx *ctx, char *user) argument
85 ctx->out = apr_pstrcat(ctx->pool, user, ":", hash_str, NL, NULL);
113 " -D Delete the specified user." NL
114 " -v Verify password for the specified user." NL
160 struct passwd_ctx *ctx, unsigned *mask, char **user,
235 *user = apr_pstrdup(pool, argv[i++]);
236 if ((arg = strchr(*user, ':')) != NULL) {
279 char *user = NULL; local
320 check_args(argc, argv, &ctx, &mask, &user, &pwfilename);
366 i = mkrecord(&ctx, user);
159 check_args(int argc, const char *const argv[], struct passwd_ctx *ctx, unsigned *mask, char **user, char **pwfilename) argument
[all...]
/httpd/include/
H A Dmod_auth.h78 AUTHZ_DENIED_NO_USER /* denied because r->user == NULL */
83 * if we can validate this user/password combination.
85 authn_status (*check_password)(request_rec *r, const char *user,
88 /* Given a user and realm, expected to return AUTH_USER_FOUND if we
89 * can find a md5 hash of 'user:realm:password'
91 authn_status (*get_realm_hash)(request_rec *r, const char *user,
106 * if we can authorize user access.
130 * @param user User name to authenticate
/httpd/modules/metadata/
H A Dmod_ident.c166 char user[RFC1413_USERLEN + 1]; /* XXX */ local
226 user) != 3 || sav_rmt_port != rmt_port
235 if ((cp = strchr(user, '\r')))
238 conn->remote_logname = apr_pstrdup(conn->pool, user);
291 "Enable identd (RFC 1413) user lookups - SLOW"),
/httpd/server/
H A Dutil_cookies.c59 "user '%s' set cookie: '%s'", r->user, rfc2109);
101 "user '%s' set cookie2: '%s'", r->user, rfc2965);
129 "user '%s' removed cookie: '%s'", r->user, rfc2109);
157 "user '%s' removed cookie2: '%s'", r->user, rfc2965);
/httpd/
H A Dap.d45 char *user;

Completed in 50 milliseconds

123