Searched refs:authoritative (Results 1 - 17 of 17) sorted by relevance

/macosx-10.9.5/apache-786.1/httpd/modules/aaa/
H A Dmod_authn_default.c30 int authoritative; member in struct:__anon5876
37 conf->authoritative = 1; /* keep the fortress secure by default */
45 authoritative),
76 if (conf->authoritative == 0) {
H A Dmod_authz_default.c29 int authoritative; member in struct:__anon5881
36 conf->authoritative = 1; /* keep the fortress secure by default */
43 (void *)APR_OFFSETOF(authz_default_config_rec, authoritative),
82 if (!(conf->authoritative)) {
86 /* if we aren't authoritative, any require directive could be
88 * authoritative, we can warn the user they did something wrong.
H A Dmod_authz_user.c28 int authoritative; member in struct:__anon5887
35 conf->authoritative = 1; /* keep the fortress secure by default */
42 (void *)APR_OFFSETOF(authz_user_config_rec, authoritative),
102 if (!conf->authoritative) {
H A Dmod_authz_owner.c32 int authoritative; member in struct:__anon5886
39 conf->authoritative = 1; /* keep the fortress secure by default */
46 (void *)APR_OFFSETOF(authz_owner_config_rec, authoritative),
75 /* if authoritative = On then break if a require already failed. */
76 if (reason && conf->authoritative) {
89 if ((required_owner & ~1) && conf->authoritative) {
100 if ((required_owner & ~1) && conf->authoritative) {
147 if ((required_owner & ~6) && conf->authoritative) {
158 if ((required_owner & ~6) && conf->authoritative) {
195 if (!required_owner || !conf->authoritative) {
[all...]
H A Dmod_authz_groupfile.c41 * unless we are non-authoritative; in which
61 int authoritative; member in struct:__anon5882
69 conf->authoritative = 1; /* keep the fortress secure by default */
91 authoritative),
198 * authoritative. We are just a helper module for testing
236 if (conf->authoritative) {
259 if (!required_group || !conf->authoritative) {
H A Dmod_auth_basic.c38 int authoritative; member in struct:__anon5871
47 conf->authoritative = 1;
101 (void *)APR_OFFSETOF(auth_basic_config_rec, authoritative),
250 /* If we're not authoritative, then any error is ignored. */
251 if (!(conf->authoritative) && auth_result != AUTH_DENIED) {
H A Dmod_authz_dbm.c35 int authoritative; member in struct:__anon5880
65 conf->authoritative = 1; /* fortress is secure by default */
79 (void *)APR_OFFSETOF(authz_dbm_config_rec, authoritative),
175 * authoritative. We are just a helper module for testing
226 if (conf->authoritative) {
253 if (!required_group || !conf->authoritative) {
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/
H A Drpz.h129 isc_boolean_t authoritative; member in struct:__anon6520::__anon6523
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/
H A DHeader.pm208 print "answer is ", $header->aa ? "" : "non-", "authoritative\n";
211 Gets or sets the authoritative answer flag.
253 cryptographically verified or the server is authoritative for the data
/macosx-10.9.5/CPANInternal-140/Apache-DBI/lib/Apache/
H A DAuthDBI.pm400 # if authoritative insist that user is in database
401 if ($Attr->{authoritative} eq 'on') {
675 if ($Attr->{authoritative} eq 'on') {
683 debug (2, "$prefix no requirements and not authoritative, return DECLINED");
912 if ($Attr->{authoritative} eq 'on' &&
1267 If the username does not exist and the authoritative directive is set to 'on',
1268 the request is rejected. If the authoritative directive is set to 'off', the
1320 If there is no match and the authoritative directive is set to 'on' the
/macosx-10.9.5/CPANInternal-140/Apache-DBI-1.11/lib/Apache/
H A DAuthDBI.pm401 # if authoritative insist that user is in database
402 if ($Attr->{authoritative} eq 'on') {
676 if ($Attr->{authoritative} eq 'on') {
684 debug (2, "$prefix no requirements and not authoritative, return DECLINED");
913 if ($Attr->{authoritative} eq 'on' &&
1268 If the username does not exist and the authoritative directive is set to 'on',
1269 the request is rejected. If the authoritative directive is set to 'off', the
1321 If there is no match and the authoritative directive is set to 'on' the
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/contrib/
H A Dldifdiff.pl47 where the source may not be a sole authoritative source. When modifying
293 # be a sole authoritative source, we issue separate delete and
/macosx-10.9.5/bind9-45.100/bind9/bin/named/
H A Dquery.c1202 * Look for a zone database that might contain authoritative
1213 * Since we are looking for authoritative data, we do not set
1238 * No authoritative data was found. The cache is our next best bet.
1718 * Look for a zone database that might contain authoritative
1736 * Since we are looking for authoritative data, we do not set
1757 * No authoritative data was found. The cache is our next best bet.
3919 * Try the cache if we're authoritative for an
5211 isc_boolean_t want_restart, authoritative, is_zone, need_wildcardproof; local
5274 authoritative = rpz_st->q.authoritative;
[all...]
/macosx-10.9.5/CPANInternal-140/Net-DNS/contrib/
H A Dcheck_soa35 Error reports are generated for nameservers which reply with non-authoritative,
304 my $aa = $packet->header->aa; # authoritative answer
314 report("non-authoritative answer\tTTL", clock($ttl)) unless $aa;
324 report('authoritative data expired') if @n or @a;
371 my $aa = $header->aa ? "aa $na" : $na; # authoritative answer
H A Dcheck_zone87 There isn't a mechanism to insure records are returned from an authoritative source.
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/Resolver/
H A DRecurse.pm25 # for who it thinks is authoritative for
119 # the suposedly authoritative name servers.
350 as the starting servers. These name servers should be authoritative for
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/dns/
H A Ddns.tcl906 array set flags {query 0 opcode 0 authoritative 0 errorcode 0
913 set flags(authoritative) [expr {($hdr & 0x0400) >> 10}]

Completed in 412 milliseconds