aboutsummaryrefslogtreecommitdiffstats
path: root/main/apache-mod-auth-radius/remote-ip.patch
blob: 0c461091e9e5ea4d7b171fe87dc1b11660e940c1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
--- mod_auth_radius-2.0.c
+++ mod_auth_radius-2.0.c.patched
@@ -630,7 +630,7 @@
 {
   char one[COOKIE_SIZE], two[COOKIE_SIZE];
   char *cookie = apr_pcalloc(r->pool, COOKIE_SIZE);
-  conn_rec *c = r->connection;
+  request_rec *c = r->connection;
   server_rec *s = r->server;
   radius_server_config_rec *scr = (radius_server_config_rec *)
     ap_get_module_config (s->module_config, &radius_auth_module);
@@ -680,7 +680,7 @@
    * benefit here.
    */  
   apr_snprintf(one, COOKIE_SIZE, "%s%s%s%s%s%08x", scr->secret,
-	      r->user, passwd, c->remote_ip, hostname, expires);
+	      r->user, passwd, c->useragent_ip, hostname, expires);
 
   /* if you're REALLY worried about what's going on */
 
@@ -688,7 +688,7 @@
   ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," secret     = %s\n", scr->secret);
   ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," user       = %s\n", r->user);
   ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," passwd     = %s\n", passwd);
-  ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip  = %s\n", c->remote_ip);
+  ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip  = %s\n", c->useragent_ip);
   ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," hostname   = %s\n", hostname);
   ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," expiry     = %08x\n", expires);
 #endif