diff options
author | Glenn Strauss <gstrauss@gluelogic.com> | 2021-06-16 18:25:34 -0400 |
---|---|---|
committer | Glenn Strauss <gstrauss@gluelogic.com> | 2021-08-27 02:16:54 -0400 |
commit | f1e8a82f1a4370d71e2d12133545f03ec0ad104e (patch) | |
tree | fd1b002909ac2a1ad8e508c3c3d88f1d2fba4c82 /src/mod_auth.c | |
parent | e6f286ef5f4368b8ef360c0941a928ef26ea3713 (diff) | |
download | lighttpd-git-f1e8a82f1a4370d71e2d12133545f03ec0ad104e.tar.gz |
[multiple] inline struct in con->dst_addr_buf
(mod_extforward recently changed to use buffer_move() to save addr
instead of swapping pointers)
Diffstat (limited to 'src/mod_auth.c')
-rw-r--r-- | src/mod_auth.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/mod_auth.c b/src/mod_auth.c index 7b8124b5..4c97064c 100644 --- a/src/mod_auth.c +++ b/src/mod_auth.c @@ -839,7 +839,7 @@ mod_auth_check_basic(request_st * const r, void *p_d, const struct http_auth_req default: log_error(r->conf.errh, __FILE__, __LINE__, "password doesn't match for %s username: %s IP: %s", - r->uri.path.ptr, user, r->con->dst_addr_buf->ptr); + r->uri.path.ptr, user, r->con->dst_addr_buf.ptr); r->keep_alive = -1; /*(disable keep-alive if bad password)*/ rc = mod_auth_send_401_unauthorized_basic(r, require->realm); break; @@ -1305,7 +1305,7 @@ mod_auth_digest_validate_params (request_st * const r, const struct http_auth_re log_error(r->conf.errh, __FILE__, __LINE__, "digest: auth failed: uri mismatch (%s != %.*s), IP: %s", r->target_orig.ptr, (int)dp->len[e_uri], dp->ptr[e_uri], - r->con->dst_addr_buf->ptr); + r->con->dst_addr_buf.ptr); return mod_auth_send_400_bad_request(r); } @@ -1417,7 +1417,7 @@ mod_auth_check_digest (request_st * const r, void *p_d, const struct http_auth_r /* digest not ok */ log_error(r->conf.errh, __FILE__, __LINE__, "digest: auth failed for %.*s: wrong password, IP: %s", - (int)ai.ulen, ai.username, r->con->dst_addr_buf->ptr); + (int)ai.ulen, ai.username, r->con->dst_addr_buf.ptr); r->keep_alive = -1; /*(disable keep-alive if bad password)*/ return mod_auth_send_401_unauthorized_digest(r, require, 0); } |