X7ROOT File Manager
Current Path:
/opt/cpanel/ea-apr16/include/apr-1
opt
/
cpanel
/
ea-apr16
/
include
/
apr-1
/
📁
..
📄
apr-x86_64.h
(17.91 KB)
📄
apr.h
(636 B)
📄
apr_allocator.h
(6.07 KB)
📄
apr_anylock.h
(4.93 KB)
📄
apr_atomic.h
(6.04 KB)
📄
apr_base64.h
(3.75 KB)
📄
apr_buckets.h
(63.15 KB)
📄
apr_crypto.h
(19.68 KB)
📄
apr_cstr.h
(11.13 KB)
📄
apr_date.h
(3.47 KB)
📄
apr_dbd.h
(23.35 KB)
📄
apr_dbm.h
(8.4 KB)
📄
apr_dso.h
(2.64 KB)
📄
apr_encode.h
(30.35 KB)
📄
apr_env.h
(2.06 KB)
📄
apr_errno.h
(53.77 KB)
📄
apr_escape.h
(17.23 KB)
📄
apr_file_info.h
(17.17 KB)
📄
apr_file_io.h
(42.88 KB)
📄
apr_fnmatch.h
(6.08 KB)
📄
apr_general.h
(7.34 KB)
📄
apr_getopt.h
(5.84 KB)
📄
apr_global_mutex.h
(7.19 KB)
📄
apr_hash.h
(10.08 KB)
📄
apr_hooks.h
(12.36 KB)
📄
apr_inherit.h
(2.09 KB)
📄
apr_ldap.h
(5.57 KB)
📄
apr_ldap_init.h
(5.64 KB)
📄
apr_ldap_option.h
(8.4 KB)
📄
apr_ldap_rebind.h
(3.09 KB)
📄
apr_ldap_url.h
(3.71 KB)
📄
apr_lib.h
(8.23 KB)
📄
apr_md4.h
(4.42 KB)
📄
apr_md5.h
(6.2 KB)
📄
apr_memcache.h
(16.82 KB)
📄
apr_mmap.h
(5.01 KB)
📄
apr_network_io.h
(36.02 KB)
📄
apr_optional.h
(2.71 KB)
📄
apr_optional_hooks.h
(3.78 KB)
📄
apr_perms_set.h
(1.86 KB)
📄
apr_poll.h
(20.6 KB)
📄
apr_pools.h
(30.94 KB)
📄
apr_portable.h
(20.02 KB)
📄
apr_proc_mutex.h
(6.85 KB)
📄
apr_queue.h
(3.98 KB)
📄
apr_random.h
(4.92 KB)
📄
apr_redis.h
(15.62 KB)
📄
apr_reslist.h
(7.01 KB)
📄
apr_ring.h
(18.78 KB)
📄
apr_rmm.h
(4.67 KB)
📄
apr_sdbm.h
(5.97 KB)
📄
apr_sha1.h
(3.79 KB)
📄
apr_shm.h
(9.26 KB)
📄
apr_signal.h
(2.7 KB)
📄
apr_siphash.h
(6.01 KB)
📄
apr_skiplist.h
(14.19 KB)
📄
apr_strings.h
(14.55 KB)
📄
apr_strmatch.h
(2.61 KB)
📄
apr_support.h
(1.6 KB)
📄
apr_tables.h
(18.9 KB)
📄
apr_thread_cond.h
(5.4 KB)
📄
apr_thread_mutex.h
(4.39 KB)
📄
apr_thread_pool.h
(10.84 KB)
📄
apr_thread_proc.h
(36.8 KB)
📄
apr_thread_rwlock.h
(4.65 KB)
📄
apr_time.h
(7.39 KB)
📄
apr_uri.h
(6.43 KB)
📄
apr_user.h
(5.19 KB)
📄
apr_uuid.h
(2.05 KB)
📄
apr_version.h
(5.22 KB)
📄
apr_want.h
(2.89 KB)
📄
apr_xlate.h
(6.26 KB)
📄
apr_xml.h
(12.19 KB)
📄
apu.h
(4.22 KB)
📄
apu_errno.h
(5.32 KB)
📄
apu_version.h
(4.2 KB)
📄
apu_want.h
(1.45 KB)
Editing: apr_ldap_init.h
/* Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /** * @file apr_ldap_init.h * @brief APR-UTIL LDAP ldap_init() functions */ #ifndef APR_LDAP_INIT_H #define APR_LDAP_INIT_H /** * @addtogroup APR_Util_LDAP * @{ */ #include "apr_ldap.h" #if APR_HAS_LDAP #ifdef __cplusplus extern "C" { #endif /* __cplusplus */ /** * Macro to detect security related return values. */ #if defined(LDAP_INSUFFICIENT_ACCESS) #define APU_LDAP_INSUFFICIENT_ACCESS LDAP_INSUFFICIENT_ACCESS #elif defined(LDAP_INSUFFICIENT_RIGHTS) #define APU_LDAP_INSUFFICIENT_ACCESS LDAP_INSUFFICIENT_RIGHTS #elif defined(APR_HAS_MICROSOFT_LDAPSDK) /* The macros above fail to contemplate that LDAP_RETCODE values * may be represented by an enum. autoconf tests would be much * more robust. */ #define APU_LDAP_INSUFFICIENT_ACCESS LDAP_INSUFFICIENT_RIGHTS #else #error The security return codes must be added to support this LDAP toolkit. #endif #if defined(LDAP_SECURITY_ERROR) #define APU_LDAP_SECURITY_ERROR LDAP_SECURITY_ERROR #else #define APU_LDAP_SECURITY_ERROR(n) \ (LDAP_INAPPROPRIATE_AUTH == n) ? 1 \ : (LDAP_INVALID_CREDENTIALS == n) ? 1 \ : (APU_LDAP_INSUFFICIENT_ACCESS == n) ? 1 \ : 0 #endif /** * APR LDAP SSL Initialise function * * This function initialises SSL on the underlying LDAP toolkit * if this is necessary. * * If a CA certificate is provided, this is set, however the setting * of certificates via this method has been deprecated and will be removed in * APR v2.0. * * The apr_ldap_set_option() function with the APR_LDAP_OPT_TLS_CERT option * should be used instead to set certificates. * * If SSL support is not available on this platform, or a problem * was encountered while trying to set the certificate, the function * will return APR_EGENERAL. Further LDAP specific error information * can be found in result_err. * @param pool The pool to use * @param cert_auth_file The name of the certificate to use, can be NULL * @param cert_file_type The type of certificate specified. See the * apr_ldap_set_option() APR_LDAP_OPT_TLS_CERT option for details. * @param result_err The returned result */ APU_DECLARE_LDAP(int) apr_ldap_ssl_init(apr_pool_t *pool, const char *cert_auth_file, int cert_file_type, apr_ldap_err_t **result_err); /** * APR LDAP SSL De-Initialise function * * This function tears down any SSL certificate setup previously * set using apr_ldap_ssl_init(). It should be called to clean * up if a graceful restart of a service is attempted. * @todo currently we do not check whether apr_ldap_ssl_init() * has been called first - we probably should. */ APU_DECLARE_LDAP(int) apr_ldap_ssl_deinit(void); /** * APR LDAP initialise function * * This function is responsible for initialising an LDAP * connection in a toolkit independant way. It does the * job of ldap_init() from the C api. * * It handles both the SSL and non-SSL case, and attempts * to hide the complexity setup from the user. This function * assumes that any certificate setup necessary has already * been done. * * If SSL or STARTTLS needs to be enabled, and the underlying * toolkit supports it, the following values are accepted for * secure: * * APR_LDAP_NONE: No encryption * APR_LDAP_SSL: SSL encryption (ldaps://) * APR_LDAP_STARTTLS: Force STARTTLS on ldap:// * @remark The Novell toolkit is only able to set the SSL mode via this * function. To work around this limitation, set the SSL mode here if no * per connection client certificates are present, otherwise set secure * APR_LDAP_NONE here, then set the per connection client certificates, * followed by setting the SSL mode via apr_ldap_set_option(). As Novell * does not support per connection client certificates, this problem is * worked around while still being compatible with other LDAP toolkits. * @param pool The pool to use * @param ldap The LDAP handle * @param hostname The name of the host to connect to. This can be either a * DNS name, or an IP address. * @param portno The port to connect to * @param secure The security mode to set * @param result_err The returned result */ APU_DECLARE_LDAP(int) apr_ldap_init(apr_pool_t *pool, LDAP **ldap, const char *hostname, int portno, int secure, apr_ldap_err_t **result_err); /** * APR LDAP info function * * This function returns a string describing the LDAP toolkit * currently in use. The string is placed inside result_err->reason. * @param pool The pool to use * @param result_err The returned result */ APU_DECLARE_LDAP(int) apr_ldap_info(apr_pool_t *pool, apr_ldap_err_t **result_err); #ifdef __cplusplus } #endif #endif /* APR_HAS_LDAP */ /** @} */ #endif /* APR_LDAP_URL_H */
Upload File
Create Folder