t = reqs[x].requirement;
w = ap_getword_white(r->pool, &t);
- if (!strcmp(w, "file-group")) {
+ if (!cmpstri(w, "file-group")) {
filegroup = apr_table_get(r->notes, AUTHZ_GROUP_NOTE);
if (!filegroup) {
}
}
- if (!strcmp(w, "group") || filegroup) {
+ if (!cmpstri(w, "group") || filegroup) {
const char *realm = ap_auth_name(r);
const char *groups;
char *v;
w = ap_getword_white(r->pool, &t);
/* needs mod_authz_owner to be present */
- if (!strcmp(w, "file-group")) {
+ if (!cmpstri(w, "file-group")) {
filegroup = apr_table_get(r->notes, AUTHZ_GROUP_NOTE);
if (!filegroup) {
}
}
- if (!strcmp(w, "group") || filegroup) {
+ if (!cmpstri(w, "group") || filegroup) {
required_group = 1; /* remember the requirement */
/* create group table only if actually needed. */
t = reqs[x].requirement;
w = ap_getword_white(r->pool, &t);
- if (!strcmp(w, "valid-user")) {
+ if (!cmpstri(w, "valid-user")) {
return OK;
}
- if (!strcmp(w, "user")) {
+ if (!cmpstri(w, "user")) {
/* And note that there are applicable requirements
* which we consider ourselves the owner of.
*/