Searched refs:backend_user (Results 1 – 5 of 5) sorted by relevance
104 static char *backend_user = NULL, *backend_pwd = NULL; variable171 backend_user = (item && item->value) ? g_strdup(item->value) : NULL; in janus_sampleevh_init()412 g_free(backend_user); in janus_sampleevh_handle_request()413 backend_user = g_strdup(req_backend_user); in janus_sampleevh_handle_request()731 if(backend_user != NULL && backend_pwd != NULL) { in janus_sampleevh_handler()732 curl_easy_setopt(curl, CURLOPT_USERNAME, backend_user); in janus_sampleevh_handler()
275 char *backend_user = NULL; in check_drop_priv() local284 if ((backend_user = clicon_backend_user(h)) == NULL){ in check_drop_priv()289 if (name2uid(backend_user, &newuid) < 0){ in check_drop_priv()290 clicon_err(OE_DAEMON, errno, "'%s' is not a valid user .\n", backend_user); in check_drop_priv()
53 `backend_user` and `backend_pass` are used to connect Cowrie to the backend.61 attacker and check if they are accepted by `userdb`. If they are, we send the `backend_user`
28 #backend_user = "myuser"
344 backend_user = root367 # that is trying to log in. We replace that username with the one in "backend_user" to allow the ch…