/dports/net/scr_ipfm/scr_ipfm-0.64/ |
H A D | index.php | 32 if ($hosts_allow != "0.0.0.0") { 33 …$keywords = preg_split ("/([\s]+|[\s]*[\,][\s]*|[\s]*[;][\s]*)/", "$hosts_allow", -1, PREG_SPLIT_N… 36 $hosts_allow = $keywords[$counter]; variable 39 $hallow = split("\.", $hosts_allow);
|
H A D | conf.php | 33 $hosts_allow = "0.0.0.0"; variable
|
/dports/www/p5-Catalyst-Plugin-Scheduler/Catalyst-Plugin-Scheduler-0.10/lib/Catalyst/Plugin/ |
H A D | Scheduler.pm | 158 $c->config->{scheduler}->{hosts_allow} ||= '127.0.0.1'; 332 my $hosts_allow = $c->config->{scheduler}->{hosts_allow}; 333 $hosts_allow = [$hosts_allow] unless ref($hosts_allow) eq 'ARRAY'; 334 my $allowed = Set::Scalar->new( @{$hosts_allow} );
|
/dports/security/p5-Authen-Libwrap/Authen-Libwrap-0.23/t/ |
H A D | 02_maintainer.t | 7 # change $hosts_allow if necessary and re-run the test suite. 11 my $hosts_allow = '/etc/hosts.allow'; 18 die unless( -f $hosts_allow && -r _ ); 20 open(HOSTSALLOW, $hosts_allow);
|
/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/t/config/ |
H A D | plugins | 9 # hosts_allow does not work with the tcpserver deployment model! 10 # perldoc plugins/hosts_allow for an alternative. 12 # The hosts_allow module must be loaded if you want the -m / --max-from-ip / 16 hosts_allow
|
/dports/security/py-python-gvm/python-gvm-21.10.0/gvm/protocols/gmpv208/entities/ |
H A D | users.py | 78 hosts_allow: Optional[bool] = False, 114 attrs={"allow": to_bool(hosts_allow)}, 221 hosts_allow: Optional[bool] = False, 284 attrs={"allow": to_bool(hosts_allow)},
|
/dports/www/p5-Catalyst-Plugin-Scheduler/Catalyst-Plugin-Scheduler-0.10/t/ |
H A D | 06trigger.t | 22 TestApp->config->{scheduler}->{hosts_allow} = '1.2.3.4'; 33 TestApp->config->{scheduler}->{hosts_allow} = [ '1.2.3.4', '127.0.0.1' ];
|
H A D | 05auto_run.t | 27 TestApp->config->{scheduler}->{hosts_allow} = '1.2.3.4'; 43 TestApp->config->{scheduler}->{hosts_allow} = [ '1.2.3.4', '127.0.0.1' ];
|
/dports/mail/p5-qpsmtpd/qpsmtpd-0.93/config.sample/ |
H A D | plugins | 13 # hosts_allow does not work with the tcpserver deployment model! 14 # perldoc plugins/hosts_allow for an alternative. 16 # The hosts_allow module must be loaded if you want the -m / --max-from-ip / 20 hosts_allow
|
/dports/sysutils/monitorix/monitorix-3.10.1/lib/ |
H A D | HTTPServer.pm | 163 my $hosts_allow = $main::config{httpd_builtin}->{hosts_allow} || ""; 190 my $allowed = ip_validity($ENV{REMOTE_ADDR}, $hosts_allow);
|
/dports/security/py-python-gvm/python-gvm-21.10.0/tests/protocols/gmpv208/entities/users/ |
H A D | test_create_user.py | 48 self.gmp.create_user(name='foo', hosts=['h1', 'h2'], hosts_allow=True) 66 self.gmp.create_user(name='foo', hosts=['h1', 'h2'], hosts_allow=False)
|
H A D | test_modify_user.py | 158 user_id='u1', hosts=['foo', 'bar'], hosts_allow=False 168 user_id='u1', hosts=['foo', 'bar'], hosts_allow=True
|
/dports/security/py-python-gvm/python-gvm-21.10.0/gvm/protocols/gmpv214/entities/ |
H A D | users.py | 43 hosts_allow: Optional[bool] = False, 100 attrs={"allow": to_bool(hosts_allow)},
|
/dports/security/py-python-gvm/python-gvm-21.10.0/tests/protocols/gmpv214/entities/users/ |
H A D | test_modify_user.py | 140 user_id='u1', hosts=['foo', 'bar'], hosts_allow=False 150 user_id='u1', hosts=['foo', 'bar'], hosts_allow=True
|
/dports/security/openvas/openvas-scanner-21.4.3/src/ |
H A D | attack.c | 605 const gvm_hosts_t *hosts_allow, const gvm_hosts_t *hosts_deny) in host_authorized() argument 613 if (hosts_allow && !gvm_host_in_hosts (host, addr, hosts_allow)) in host_authorized() 693 gvm_hosts_t *hosts_allow, *hosts_deny; in check_host_authorization() local 697 hosts_allow = gvm_hosts_new (prefs_get ("hosts_allow")); in check_host_authorization() 699 if (!host_authorized (host, addr, hosts_allow, hosts_deny)) in check_host_authorization() 707 gvm_hosts_free (hosts_allow); in check_host_authorization()
|
/dports/sysutils/webmin/webmin-1.981/tcpwrappers/ |
H A D | config | 1 hosts_allow=/etc/hosts.allow
|
H A D | config.info.nl | 1 hosts_allow=File met toegestane TCP wrappers,0
|
H A D | config.info.de | 1 hosts_allow=TCP-Wrappers Erlaubtdatei,0
|
H A D | config.info.no | 1 hosts_allow=TCP wrappers allow fil.0
|
H A D | config.info | 1 hosts_allow=TCP wrappers allow file,0
|
H A D | config.info.ms | 1 hosts_allow=Fail kebenaran Pelindung TCP,0
|
H A D | config.info.pl | 1 hosts_allow=Plik dozwolonych hostów,0
|
H A D | config.info.ca | 1 hosts_allow=Fitxer d'embolcalls TCP permesos,0
|
H A D | config.info.fr | 1 hosts_allow=Les wrappers TCP autorisent le fichier,0
|
/dports/www/p5-Catalyst-Plugin-Scheduler/Catalyst-Plugin-Scheduler-0.10/ |
H A D | README | 58 hosts_allow 64 __PACKAGE__->config->{scheduler}->{hosts_allow} = '192.168.1.1'; 65 __PACKAGE__->config->{scheduler}->{hosts_allow} = [ 153 user whose IP address matches the list in the "hosts_allow" config 177 configuration option "hosts_allow".
|