1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
--- mod_auth_radius-2.0.c
+++ mod_auth_radius-2.0.c.patched
@@ -630,7 +630,7 @@
{
char one[COOKIE_SIZE], two[COOKIE_SIZE];
char *cookie = apr_pcalloc(r->pool, COOKIE_SIZE);
- conn_rec *c = r->connection;
+ request_rec *c = r->connection;
server_rec *s = r->server;
radius_server_config_rec *scr = (radius_server_config_rec *)
ap_get_module_config (s->module_config, &radius_auth_module);
@@ -680,7 +680,7 @@
* benefit here.
*/
apr_snprintf(one, COOKIE_SIZE, "%s%s%s%s%s%08x", scr->secret,
- r->user, passwd, c->remote_ip, hostname, expires);
+ r->user, passwd, c->useragent_ip, hostname, expires);
/* if you're REALLY worried about what's going on */
@@ -688,7 +688,7 @@
ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," secret = %s\n", scr->secret);
ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," user = %s\n", r->user);
ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," passwd = %s\n", passwd);
- ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->remote_ip);
+ ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->useragent_ip);
ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," hostname = %s\n", hostname);
ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," expiry = %08x\n", expires);
#endif
|