summaryrefslogtreecommitdiff
path: root/src/mod_auth.c
diff options
context:
space:
mode:
authorGlenn Strauss <gstrauss@gluelogic.com>2021-06-16 18:25:34 -0400
committerGlenn Strauss <gstrauss@gluelogic.com>2021-08-27 02:16:54 -0400
commitf1e8a82f1a4370d71e2d12133545f03ec0ad104e (patch)
treefd1b002909ac2a1ad8e508c3c3d88f1d2fba4c82 /src/mod_auth.c
parente6f286ef5f4368b8ef360c0941a928ef26ea3713 (diff)
downloadlighttpd-git-f1e8a82f1a4370d71e2d12133545f03ec0ad104e.tar.gz
[multiple] inline struct in con->dst_addr_buf
(mod_extforward recently changed to use buffer_move() to save addr instead of swapping pointers)
Diffstat (limited to 'src/mod_auth.c')
-rw-r--r--src/mod_auth.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/mod_auth.c b/src/mod_auth.c
index 7b8124b5..4c97064c 100644
--- a/src/mod_auth.c
+++ b/src/mod_auth.c
@@ -839,7 +839,7 @@ mod_auth_check_basic(request_st * const r, void *p_d, const struct http_auth_req
default:
log_error(r->conf.errh, __FILE__, __LINE__,
"password doesn't match for %s username: %s IP: %s",
- r->uri.path.ptr, user, r->con->dst_addr_buf->ptr);
+ r->uri.path.ptr, user, r->con->dst_addr_buf.ptr);
r->keep_alive = -1; /*(disable keep-alive if bad password)*/
rc = mod_auth_send_401_unauthorized_basic(r, require->realm);
break;
@@ -1305,7 +1305,7 @@ mod_auth_digest_validate_params (request_st * const r, const struct http_auth_re
log_error(r->conf.errh, __FILE__, __LINE__,
"digest: auth failed: uri mismatch (%s != %.*s), IP: %s",
r->target_orig.ptr, (int)dp->len[e_uri], dp->ptr[e_uri],
- r->con->dst_addr_buf->ptr);
+ r->con->dst_addr_buf.ptr);
return mod_auth_send_400_bad_request(r);
}
@@ -1417,7 +1417,7 @@ mod_auth_check_digest (request_st * const r, void *p_d, const struct http_auth_r
/* digest not ok */
log_error(r->conf.errh, __FILE__, __LINE__,
"digest: auth failed for %.*s: wrong password, IP: %s",
- (int)ai.ulen, ai.username, r->con->dst_addr_buf->ptr);
+ (int)ai.ulen, ai.username, r->con->dst_addr_buf.ptr);
r->keep_alive = -1; /*(disable keep-alive if bad password)*/
return mod_auth_send_401_unauthorized_digest(r, require, 0);
}