multicast disaster mitigation
[l2tpns.git] / autosnoop.c
index 8116d2e..9ed5b1f 100644 (file)
@@ -4,14 +4,14 @@
 
 /* set up intercept based on RADIUS reply */
 
 
 /* set up intercept based on RADIUS reply */
 
-char const *cvs_id = "$Id: autosnoop.c,v 1.5 2004/11/05 04:55:25 bodea Exp $";
+char const *cvs_id = "$Id: autosnoop.c,v 1.10 2004/11/30 05:49:47 bodea Exp $";
 
 
-int __plugin_api_version = 1;
+int plugin_api_version = PLUGIN_API_VERSION;
 struct pluginfuncs *p;
 
 int plugin_radius_response(struct param_radius_response *data)
 {
 struct pluginfuncs *p;
 
 int plugin_radius_response(struct param_radius_response *data)
 {
-       if (strcmp(data->key, "intercept") == 0)
+       if (!strcmp(data->key, "intercept"))
        {
                char *x;
                data->s->snoop_ip = 0;
        {
                char *x;
                data->s->snoop_ip = 0;
@@ -22,14 +22,17 @@ int plugin_radius_response(struct param_radius_response *data)
                        if (*data->value) data->s->snoop_ip = inet_addr(data->value);
                        if (data->s->snoop_ip == INADDR_NONE) data->s->snoop_ip = 0;
                        if (*x) data->s->snoop_port = atoi(x);
                        if (*data->value) data->s->snoop_ip = inet_addr(data->value);
                        if (data->s->snoop_ip == INADDR_NONE) data->s->snoop_ip = 0;
                        if (*x) data->s->snoop_port = atoi(x);
-                       p->log(3, 0, 0, 0, "         Intercepting user to %s:%d\n",
-                               p->inet_toa(data->s->snoop_ip), data->s->snoop_port);
+                       p->log(3, p->get_id_by_session(data->s), data->s->tunnel,
+                               "         Intercepting user to %s:%d\n",
+                               p->fmtaddr(data->s->snoop_ip, 0), data->s->snoop_port);
                }
                else
                {
                }
                else
                {
-                       p->log(3, 0, 0, 0, "         Not Intercepting user (reply string should be snoop=ip:port)\n");
+                       p->log(3, p->get_id_by_session(data->s), data->s->tunnel,
+                               "         Not Intercepting user (reply string should be intercept=ip:port)\n");
                }
        }
                }
        }
+
        return PLUGIN_RET_OK;
 }
 
        return PLUGIN_RET_OK;
 }