Lines Matching full:identity
110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb()
121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument
145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", in eap_user_sqlite_get()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
188 "SELECT * FROM users WHERE identity='%s' AND phase2=%d;", in eap_user_sqlite_get()
204 "SELECT identity,methods FROM wildcards;"); in eap_user_sqlite_get()
214 os_free(user->identity); in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, in hostapd_get_eap_user() argument
240 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) { in hostapd_get_eap_user()
249 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) { in hostapd_get_eap_user()
262 if (!phase2 && user->identity == NULL) { in hostapd_get_eap_user()
269 os_memcmp(user->identity, identity, user->identity_len) == in hostapd_get_eap_user()
277 os_memcmp(user->identity, identity, identity_len) == 0) in hostapd_get_eap_user()
284 return eap_user_sqlite_get(hapd, identity, identity_len, in hostapd_get_eap_user()