--- mod_auth_radius-2.0.c +++ mod_auth_radius-2.0.c.patched @@ -630,7 +630,7 @@ { char one[COOKIE_SIZE], two[COOKIE_SIZE]; char *cookie = apr_pcalloc(r->pool, COOKIE_SIZE); - conn_rec *c = r->connection; + request_rec *c = r->connection; server_rec *s = r->server; radius_server_config_rec *scr = (radius_server_config_rec *) ap_get_module_config (s->module_config, &radius_auth_module); @@ -680,7 +680,7 @@ * benefit here. */ apr_snprintf(one, COOKIE_SIZE, "%s%s%s%s%s%08x", scr->secret, - r->user, passwd, c->remote_ip, hostname, expires); + r->user, passwd, c->useragent_ip, hostname, expires); /* if you're REALLY worried about what's going on */ @@ -688,7 +688,7 @@ ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," secret = %s\n", scr->secret); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," user = %s\n", r->user); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," passwd = %s\n", passwd); - ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->remote_ip); + ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->useragent_ip); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," hostname = %s\n", hostname); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," expiry = %08x\n", expires); #endif