Lines Matching refs:username
148 static int http_auth_get_password(server *srv, mod_auth_plugin_data *p, buffer *username, buffer *r… in http_auth_get_password() argument
151 if (!username->used|| !realm->used) return -1; in http_auth_get_password()
211 if (username->used - 1 == u_len && in http_auth_get_password()
213 (0 == strncmp(username->ptr, f_user, u_len)) && in http_auth_get_password()
281 if (username->used - 1 == u_len && in http_auth_get_password()
282 (0 == strncmp(username->ptr, f_user, u_len))) { in http_auth_get_password()
307 …ules(server *srv, mod_auth_plugin_data *p, const char *url, const char *username, const char *grou… in http_auth_match_rules() argument
347 username_len = username ? strlen(username) : 0; in http_auth_match_rules()
399 if (username && in http_auth_match_rules()
401 0 == strncmp(username, v, v_len)) { in http_auth_match_rules()
610 …sword_compare(server *srv, mod_auth_plugin_data *p, array *req, buffer *username, buffer *realm, b… in http_auth_basic_password_compare() argument
626 li_MD5_Update(&Md5Ctx, (unsigned char *)username->ptr, username->used - 1); in http_auth_basic_password_compare()
728 for (i = 0; i < username->used - 1; i++) { in http_auth_basic_password_compare()
729 char c = username->ptr[i]; in http_auth_basic_password_compare()
740 "ldap: invalid character (- _.@a-zA-Z0-9 allowed) in username:", username, i); in http_auth_basic_password_compare()
751 buffer_append_string_buffer(p->ldap_filter, username); in http_auth_basic_password_compare()
840 buffer *username, *password; in http_auth_basic_check() local
847 username = buffer_init(); in http_auth_basic_check()
849 if (!base64_decode(username, realm_str)) { in http_auth_basic_check()
850 log_error_write(srv, __FILE__, __LINE__, "sb", "decodeing base64-string failed", username); in http_auth_basic_check()
852 buffer_free(username); in http_auth_basic_check()
857 if (NULL == (pw = strchr(username->ptr, ':'))) { in http_auth_basic_check()
858 log_error_write(srv, __FILE__, __LINE__, "sb", ": is missing in", username); in http_auth_basic_check()
860 buffer_free(username); in http_auth_basic_check()
866 username->used = pw - username->ptr; in http_auth_basic_check()
870 if (http_auth_get_password(srv, p, username, realm->value, password)) { in http_auth_basic_check()
871 buffer_free(username); in http_auth_basic_check()
884 if (http_auth_basic_password_compare(srv, p, req, username, realm->value, password, pw)) { in http_auth_basic_check()
885 …__, "sbsBss", "password doesn't match for", con->uri.path, "username:", username, ", IP:", inet_nt… in http_auth_basic_check()
887 buffer_free(username); in http_auth_basic_check()
894 if (http_auth_match_rules(srv, p, url->ptr, username->ptr, NULL, NULL)) { in http_auth_basic_check()
895 buffer_free(username); in http_auth_basic_check()
904 buffer_copy_string_buffer(p->auth_user, username); in http_auth_basic_check()
906 buffer_free(username); in http_auth_basic_check()
922 char *username = NULL; in http_auth_digest_check() local
962 dkv[0].ptr = &username; in http_auth_digest_check()
1015 log_error_write(srv, __FILE__, __LINE__, "ss", "username", username); in http_auth_digest_check()
1027 if (!username || in http_auth_digest_check()
1059 username_buf = buffer_init_string(username); in http_auth_digest_check()
1075 li_MD5_Update(&Md5Ctx, (unsigned char *)username, strlen(username)); in http_auth_digest_check()
1149 …"digest: auth failed for ", username, ": wrong password, IP:", inet_ntop_cache_get_ip(srv, &(con->… in http_auth_digest_check()
1156 if (http_auth_match_rules(srv, p, url->ptr, username, NULL, NULL)) { in http_auth_digest_check()
1166 buffer_copy_string(p->auth_user, username); in http_auth_digest_check()