Search
j0ke.net Open Build Service
>
Projects
>
Apache
:
2.4
:
Modules
>
apache2-mod_auth_radius
> apache24.patch
Sign Up
|
Log In
Username
Password
Cancel
Overview
Repositories
Revisions
Requests
Users
Advanced
Attributes
Meta
File apache24.patch of Package apache2-mod_auth_radius
--- mod_auth_radius-1.5.8/mod_auth_radius-2.0.c.orig 2013-07-28 11:21:16.528208330 +0200 +++ mod_auth_radius-1.5.8/mod_auth_radius-2.0.c 2013-07-28 11:22:53.120008239 +0200 @@ -680,7 +680,7 @@ * benefit here. */ apr_snprintf(one, COOKIE_SIZE, "%s%s%s%s%s%08x", scr->secret, - r->user, passwd, c->remote_ip, hostname, expires); + r->user, passwd, c->client_ip, hostname, expires); /* if you're REALLY worried about what's going on */ @@ -688,7 +688,7 @@ ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," secret = %s\n", scr->secret); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," user = %s\n", r->user); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," passwd = %s\n", passwd); - ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->remote_ip); + ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," remote ip = %s\n", c->client_ip); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," hostname = %s\n", hostname); ap_log_error(APLOG_MARK, APLOG_NOERRNO | APLOG_DEBUG, 0, r->server," expiry = %08x\n", expires); #endif