1 static const char *kerb_set_fail_slot(cmd_parms *cmd, char *struct_ptr,
4 int offset = (int) (long) cmd->info;
5 if (!strncasecmp(arg, "unauthorized", 12))
6 *(int *) (struct_ptr + offset) = HTTP_UNAUTHORIZED;
7 else if (!strncasecmp(arg, "forbidden", 9))
8 *(int *) (struct_ptr + offset) = HTTP_FORBIDDEN;
9 else if (!strncasecmp(arg, "declined", 8))
10 *(int *) (struct_ptr + offset) = DECLINED;
12 return "KrbFailStatus must be Forbidden, Unauthorized, or Declined.";
16 static const char *kerb_set_type_slot(cmd_parms *cmd, char *struct_ptr,
19 int offset = (int) (long) cmd->info;
22 (!strncasecmp(arg, "v5", 2))
23 *(char **) (struct_ptr + offset) = ap_pstrdup(cmd->pool, "KerberosV5");
27 (!strncasecmp(arg, "v4", 2))
28 *(char **) (struct_ptr + offset) = ap_pstrdup(cmd->pool, "KerberosV4");
31 (!strncasecmp(arg, "dualv5v4", 2))
32 *(char **) (struct_ptr + offset) = ap_pstrdup(cmd->pool, "KerberosDualV5V4");
34 (!strncasecmp(arg, "dualv4v5", 2))
35 *(char **) (struct_ptr + offset) = ap_pstrdup(cmd->pool, "KerberosDualV4V5");
36 #if defined(KRB4) && defined(KRB5)
37 #endif /* KRB4 && KRB5 */
39 return "AuthKerberos must be V5 or V4.";
43 command_rec kerb_auth_cmds[] = {
47 (void*)XtOffsetOf(kerb_auth_config, krb_auth_type),
50 "Permit Kerberos auth without AuthType requirement."
56 (void*)XtOffsetOf(kerb_auth_config, krb_fail_status),
59 "If auth fails, return status set here."
65 (void*)XtOffsetOf(kerb_auth_config, krb_authoritative),
68 "Refuse to pass request down to lower modules."