Lines Matching full:username

80   char	username[HTTP_MAX_VALUE],	/* Username string */  member
253 username[HTTP_MAX_VALUE], in cupsdAuthorize() local
254 /* Username string */ in cupsdAuthorize()
257 cupsd_cert_t *localuser; /* Certificate username */ in cupsdAuthorize()
286 username[0] = '\0'; in cupsdAuthorize()
343 username[0] = '\0'; in cupsdAuthorize()
351 strlcpy(username, authinfo->items[0].value, sizeof(username)); in cupsdAuthorize()
353 cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as \"%s\" using AuthRef.", username); in cupsdAuthorize()
359 if (!username[0]) in cupsdAuthorize()
362 * No username in AuthRef, grab username using peer credentials... in cupsdAuthorize()
383 strlcpy(username, pwd->pw_name, sizeof(username)); in cupsdAuthorize()
385 … cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as \"%s\" using AuthRef + PeerCred.", username); in cupsdAuthorize()
465 strlcpy(username, authorization + 9, sizeof(username)); in cupsdAuthorize()
471 cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as %s using PeerCred.", username); in cupsdAuthorize()
493 strlcpy(username, localuser->username, sizeof(username)); in cupsdAuthorize()
496 cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as %s using Local.", username); in cupsdAuthorize()
504 int userlen; /* Username:password length */ in cupsdAuthorize()
511 userlen = sizeof(username); in cupsdAuthorize()
512 httpDecode64_2(username, &userlen, authorization); in cupsdAuthorize()
515 * Pull the username and password out... in cupsdAuthorize()
518 if ((ptr = strchr(username, ':')) == NULL) in cupsdAuthorize()
526 if (!username[0]) in cupsdAuthorize()
529 * Username must not be empty... in cupsdAuthorize()
532 cupsdLogClient(con, CUPSD_LOG_ERROR, "Empty Basic username."); in cupsdAuthorize()
549 * Validate the username and password... in cupsdAuthorize()
569 strlcpy(data.username, username, sizeof(data.username)); in cupsdAuthorize()
581 pamerr = pam_start("cups", username, &pamdata, &pamh); in cupsdAuthorize()
638 pw = getpwnam(username); /* Get the current password */ in cupsdAuthorize()
647 cupsdLogClient(con, CUPSD_LOG_ERROR, "Unknown username \"%s\".", username); in cupsdAuthorize()
652 spw = getspnam(username); in cupsdAuthorize()
661 cupsdLogClient(con, CUPSD_LOG_ERROR, "Username \"%s\" has no shadow password.", username); in cupsdAuthorize()
674 cupsdLogClient(con, CUPSD_LOG_ERROR, "Username \"%s\" has no password.", username); in cupsdAuthorize()
694 cupsdLogClient(con, CUPSD_LOG_ERROR, "Authentication failed for user \"%s\".", username); in cupsdAuthorize()
701 cupsdLogClient(con, CUPSD_LOG_ERROR, "Authentication failed for user \"%s\".", username); in cupsdAuthorize()
708 cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as \"%s\" using Basic.", username); in cupsdAuthorize()
724 /* Output token for username */ in cupsdAuthorize()
798 * Get the username associated with the client's credentials... in cupsdAuthorize()
810 …e(CUPSD_LOG_DEBUG, major_status, minor_status, "[Client %d] Error getting username.", con->number); in cupsdAuthorize()
816 strlcpy(username, output_token.value, sizeof(username)); in cupsdAuthorize()
818 cupsdLogClient(con, CUPSD_LOG_DEBUG, "Authorized as \"%s\" using Negotiate.", username); in cupsdAuthorize()
872 * If we get here, then we were able to validate the username and in cupsdAuthorize()
873 * password - copy the validated username and password to the client in cupsdAuthorize()
877 strlcpy(con->username, username, sizeof(con->username)); in cupsdAuthorize()
1130 const char *username, /* I - User name */ in cupsdCheckGroup() argument
1138 uuid_t useruuid, /* UUID for username */ in cupsdCheckGroup()
1144 …psdLogMessage(CUPSD_LOG_DEBUG2, "cupsdCheckGroup(username=\"%s\", user=%p, groupname=\"%s\")", use… in cupsdCheckGroup()
1150 if (!username || !groupname) in cupsdCheckGroup()
1174 if (!_cups_strcasecmp(username, group->gr_mem[i])) in cupsdCheckGroup()
1196 getgrouplist(username, (int)user->pw_gid, groups, &ngroups); in cupsdCheckGroup()
1198 getgrouplist(username, user->pw_gid, groups, &ngroups); in cupsdCheckGroup()
1540 char *name, /* Current username */ in cupsdIsAuthorized()
1541 username[256], /* Username to authorize */ in cupsdIsAuthorized() local
1543 *ptr; /* Pointer into username */ in cupsdIsAuthorized()
1658 if (!con->username[0] && type == CUPSD_AUTH_NONE && in cupsdIsAuthorized()
1662 * Check for unauthenticated username... in cupsdIsAuthorized()
1674 strlcpy(username, attr->values[0].string.text, sizeof(username)); in cupsdIsAuthorized()
1683 cupsdLogMessage(CUPSD_LOG_DEBUG, "cupsdIsAuthorized: username=\"%s\"", in cupsdIsAuthorized()
1684 con->username); in cupsdIsAuthorized()
1687 if (!con->username[0] && !con->authref) in cupsdIsAuthorized()
1689 if (!con->username[0]) in cupsdIsAuthorized()
1711 strlcpy(username, con->username, sizeof(username)); in cupsdIsAuthorized()
1715 * OK, got a username. See if we need normal user access, or group in cupsdIsAuthorized()
1719 if (!strcmp(username, "root")) in cupsdIsAuthorized()
1723 * Strip any @domain or @KDC from the username and owner... in cupsdIsAuthorized()
1726 if ((ptr = strchr(username, '@')) != NULL) in cupsdIsAuthorized()
1743 if (username[0]) in cupsdIsAuthorized()
1745 pw = getpwnam(username); in cupsdIsAuthorized()
1795 !_cups_strcasecmp(username, ownername)) in cupsdIsAuthorized()
1800 if (cupsdCheckGroup(username, pw, SystemGroups[i])) in cupsdIsAuthorized()
1805 if (cupsdCheckGroup(username, pw, name + 1)) in cupsdIsAuthorized()
1808 else if (!_cups_strcasecmp(username, name)) in cupsdIsAuthorized()
1812 return (con->username[0] ? HTTP_FORBIDDEN : HTTP_UNAUTHORIZED); in cupsdIsAuthorized()
1834 if (cupsdCheckGroup(username, pw, SystemGroups[i])) in cupsdIsAuthorized()
1837 else if (cupsdCheckGroup(username, pw, name)) in cupsdIsAuthorized()
1847 return (con->username[0] ? HTTP_FORBIDDEN : HTTP_UNAUTHORIZED); in cupsdIsAuthorized()
2045 replies[i].resp = strdup(data->username); in pam_func()