diff options
author | Kozlov Dmitry <dima@server> | 2010-09-09 18:26:02 +0400 |
---|---|---|
committer | Kozlov Dmitry <dima@server> | 2010-09-09 18:29:47 +0400 |
commit | 35d38d2c3f3db22216d43604b8750ecb6089e525 (patch) | |
tree | f599fea448c4aacdd96cabf10fee88aa7bdb57aa /accel-pptpd/radius/radius.c | |
parent | eac0adf4b2b038690c761a126cb3e55a888060df (diff) | |
download | accel-ppp-xebd-35d38d2c3f3db22216d43604b8750ecb6089e525.tar.gz accel-ppp-xebd-35d38d2c3f3db22216d43604b8750ecb6089e525.zip |
iprange: implemneted modules iprange to validate ip addresses of controlling connection and tunnel
It will check that ip address of tunnel is not in range of clients ip addresses.
This will avoid kernel softlockups due to loopback occured.
Diffstat (limited to 'accel-pptpd/radius/radius.c')
-rw-r--r-- | accel-pptpd/radius/radius.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/accel-pptpd/radius/radius.c b/accel-pptpd/radius/radius.c index de64f6b..d709963 100644 --- a/accel-pptpd/radius/radius.c +++ b/accel-pptpd/radius/radius.c @@ -30,7 +30,7 @@ char *conf_auth_secret; char *conf_acct_server; int conf_acct_server_port = 1813; char *conf_acct_secret; -char *conf_pd_coa_secret; +char *conf_dm_coa_secret; static LIST_HEAD(sessions); static pthread_rwlock_t sessions_lock = PTHREAD_RWLOCK_INITIALIZER; @@ -137,8 +137,8 @@ static void ppp_finished(struct ppp_notified_t *n, struct ppp_t *ppp) pthread_mutex_unlock(&rpd->lock); pthread_rwlock_unlock(&sessions_lock); - if (rpd->pd_coa_req) - rad_packet_free(rpd->pd_coa_req); + if (rpd->dm_coa_req) + rad_packet_free(rpd->dm_coa_req); list_del(&rpd->pd.entry); free(rpd); @@ -308,9 +308,9 @@ static void __init radius_init(void) _exit(EXIT_FAILURE); } - opt = conf_get_opt("radius", "pd_coa_secret"); + opt = conf_get_opt("radius", "dm_coa_secret"); if (opt) - conf_pd_coa_secret = opt; + conf_dm_coa_secret = opt; opt = conf_get_opt("radius", "dictionary"); if (!opt) { |