/macosx-10.9.5/apache-786.1/httpd/modules/aaa/ |
H A D | mod_authn_default.c | 30 int authoritative; member in struct:__anon5876 37 conf->authoritative = 1; /* keep the fortress secure by default */ 45 authoritative), 76 if (conf->authoritative == 0) {
|
H A D | mod_authz_default.c | 29 int authoritative; member in struct:__anon5881 36 conf->authoritative = 1; /* keep the fortress secure by default */ 43 (void *)APR_OFFSETOF(authz_default_config_rec, authoritative), 82 if (!(conf->authoritative)) { 86 /* if we aren't authoritative, any require directive could be 88 * authoritative, we can warn the user they did something wrong.
|
H A D | mod_authz_user.c | 28 int authoritative; member in struct:__anon5887 35 conf->authoritative = 1; /* keep the fortress secure by default */ 42 (void *)APR_OFFSETOF(authz_user_config_rec, authoritative), 102 if (!conf->authoritative) {
|
H A D | mod_authz_owner.c | 32 int authoritative; member in struct:__anon5886 39 conf->authoritative = 1; /* keep the fortress secure by default */ 46 (void *)APR_OFFSETOF(authz_owner_config_rec, authoritative), 75 /* if authoritative = On then break if a require already failed. */ 76 if (reason && conf->authoritative) { 89 if ((required_owner & ~1) && conf->authoritative) { 100 if ((required_owner & ~1) && conf->authoritative) { 147 if ((required_owner & ~6) && conf->authoritative) { 158 if ((required_owner & ~6) && conf->authoritative) { 195 if (!required_owner || !conf->authoritative) { [all...] |
H A D | mod_authz_groupfile.c | 41 * unless we are non-authoritative; in which 61 int authoritative; member in struct:__anon5882 69 conf->authoritative = 1; /* keep the fortress secure by default */ 91 authoritative), 198 * authoritative. We are just a helper module for testing 236 if (conf->authoritative) { 259 if (!required_group || !conf->authoritative) {
|
H A D | mod_auth_basic.c | 38 int authoritative; member in struct:__anon5871 47 conf->authoritative = 1; 101 (void *)APR_OFFSETOF(auth_basic_config_rec, authoritative), 250 /* If we're not authoritative, then any error is ignored. */ 251 if (!(conf->authoritative) && auth_result != AUTH_DENIED) {
|
H A D | mod_authz_dbm.c | 35 int authoritative; member in struct:__anon5880 65 conf->authoritative = 1; /* fortress is secure by default */ 79 (void *)APR_OFFSETOF(authz_dbm_config_rec, authoritative), 175 * authoritative. We are just a helper module for testing 226 if (conf->authoritative) { 253 if (!required_group || !conf->authoritative) {
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/ |
H A D | rpz.h | 129 isc_boolean_t authoritative; member in struct:__anon6520::__anon6523
|
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/ |
H A D | Header.pm | 208 print "answer is ", $header->aa ? "" : "non-", "authoritative\n"; 211 Gets or sets the authoritative answer flag. 253 cryptographically verified or the server is authoritative for the data
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/ |
H A D | AuthDBI.pm | 400 # if authoritative insist that user is in database 401 if ($Attr->{authoritative} eq 'on') { 675 if ($Attr->{authoritative} eq 'on') { 683 debug (2, "$prefix no requirements and not authoritative, return DECLINED"); 912 if ($Attr->{authoritative} eq 'on' && 1267 If the username does not exist and the authoritative directive is set to 'on', 1268 the request is rejected. If the authoritative directive is set to 'off', the 1320 If there is no match and the authoritative directive is set to 'on' the
|
/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/ |
H A D | AuthDBI.pm | 401 # if authoritative insist that user is in database 402 if ($Attr->{authoritative} eq 'on') { 676 if ($Attr->{authoritative} eq 'on') { 684 debug (2, "$prefix no requirements and not authoritative, return DECLINED"); 913 if ($Attr->{authoritative} eq 'on' && 1268 If the username does not exist and the authoritative directive is set to 'on', 1269 the request is rejected. If the authoritative directive is set to 'off', the 1321 If there is no match and the authoritative directive is set to 'on' the
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/contrib/ |
H A D | ldifdiff.pl | 47 where the source may not be a sole authoritative source. When modifying 293 # be a sole authoritative source, we issue separate delete and
|
/macosx-10.9.5/bind9-45.100/bind9/bin/named/ |
H A D | query.c | 1202 * Look for a zone database that might contain authoritative 1213 * Since we are looking for authoritative data, we do not set 1238 * No authoritative data was found. The cache is our next best bet. 1718 * Look for a zone database that might contain authoritative 1736 * Since we are looking for authoritative data, we do not set 1757 * No authoritative data was found. The cache is our next best bet. 3919 * Try the cache if we're authoritative for an 5211 isc_boolean_t want_restart, authoritative, is_zone, need_wildcardproof; local 5274 authoritative = rpz_st->q.authoritative; [all...] |
/macosx-10.9.5/CPANInternal-140/Net-DNS/contrib/ |
H A D | check_soa | 35 Error reports are generated for nameservers which reply with non-authoritative, 304 my $aa = $packet->header->aa; # authoritative answer 314 report("non-authoritative answer\tTTL", clock($ttl)) unless $aa; 324 report('authoritative data expired') if @n or @a; 371 my $aa = $header->aa ? "aa $na" : $na; # authoritative answer
|
H A D | check_zone | 87 There isn't a mechanism to insure records are returned from an authoritative source.
|
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/Resolver/ |
H A D | Recurse.pm | 25 # for who it thinks is authoritative for 119 # the suposedly authoritative name servers. 350 as the starting servers. These name servers should be authoritative for
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/dns/ |
H A D | dns.tcl | 906 array set flags {query 0 opcode 0 authoritative 0 errorcode 0 913 set flags(authoritative) [expr {($hdr & 0x0400) >> 10}]
|