#ifdef LDAP_SECURITY_ERROR
: (LDAP_SECURITY_ERROR(result)) ? AUTH_DENIED
#else
- : (LDAP_INAPPROPRIATE_AUTH == result) ? AUTH_DENIED
- : (LDAP_INVALID_CREDENTIALS == result) ? AUTH_DENIED
+ : (LDAP_INAPPROPRIATE_AUTH == result) ? AUTH_DENIED
+ : (LDAP_INVALID_CREDENTIALS == result) ? AUTH_DENIED
#ifdef LDAP_INSUFFICIENT_ACCESS
: (LDAP_INSUFFICIENT_ACCESS == result) ? AUTH_DENIED
#endif
#ifdef LDAP_INSUFFICIENT_RIGHTS
- : (LDAP_INSUFFICIENT_RIGHTS == result) ? AUTH_DENIED
+ : (LDAP_INSUFFICIENT_RIGHTS == result) ? AUTH_DENIED
#endif
#endif
: AUTH_GENERAL_ERROR;
#include "mod_auth.h"
typedef struct {
- int dummy; /* just here to stop compiler warnings for now. */
+ int dummy; /* just here to stop compiler warnings for now. */
} authz_user_config_rec;
static void *create_authz_user_dir_config(apr_pool_t *p, char *d)
if (w[0] == '\0') {
int cond_status = OK;
- /* PR#38070: This fails because it gets confused when a
- * CGI Status header overrides ap_meets_conditions.
- *
- * We can fix that by dropping ap_meets_conditions when
- * Status has been set. Since this is the only place
- * cgi_status gets used, let's test it explicitly.
- *
- * The alternative would be to ignore CGI Status when
- * ap_meets_conditions returns anything interesting.
- * That would be safer wrt HTTP, but would break CGI.
- */
+ /* PR#38070: This fails because it gets confused when a
+ * CGI Status header overrides ap_meets_conditions.
+ *
+ * We can fix that by dropping ap_meets_conditions when
+ * Status has been set. Since this is the only place
+ * cgi_status gets used, let's test it explicitly.
+ *
+ * The alternative would be to ignore CGI Status when
+ * ap_meets_conditions returns anything interesting.
+ * That would be safer wrt HTTP, but would break CGI.
+ */
if ((cgi_status == HTTP_UNSET) && (r->method_number == M_GET)) {
cond_status = ap_meets_conditions(r);
}