Lines Matching +full:cmd +full:- +full:db
32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods()
39 user->methods[num_methods].method = in set_user_methods()
41 &user->methods[num_methods].vendor); in set_user_methods()
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods()
43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods()
44 if (os_strcmp(start, "TTLS-PAP") == 0) { in set_user_methods()
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods()
48 if (os_strcmp(start, "TTLS-CHAP") == 0) { in set_user_methods()
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods()
52 if (os_strcmp(start, "TTLS-MSCHAP") == 0) { in set_user_methods()
53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods()
56 if (os_strcmp(start, "TTLS-MSCHAPV2") == 0) { in set_user_methods()
57 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; in set_user_methods()
60 wpa_printf(MSG_INFO, "DB: Unsupported EAP type '%s'", in set_user_methods()
86 bin_clear_free(user->password, user->password_len); in get_user_cb()
87 user->password_len = os_strlen(argv[i]); in get_user_cb()
88 user->password = (u8 *) os_strdup(argv[i]); in get_user_cb()
89 user->next = (void *) 1; in get_user_cb()
93 user->remediation = strlen(argv[i]) > 0; in get_user_cb()
95 user->t_c_timestamp = strtol(argv[i], NULL, 10); in get_user_cb()
106 int i, id = -1, methods = -1; in get_wildcard_cb()
120 if (len <= user->identity_len && in get_wildcard_cb()
121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
122 (user->password == NULL || len > user->password_len)) { in get_wildcard_cb()
123 bin_clear_free(user->password, user->password_len); in get_wildcard_cb()
124 user->password_len = os_strlen(argv[id]); in get_wildcard_cb()
125 user->password = (u8 *) os_strdup(argv[id]); in get_wildcard_cb()
126 user->next = (void *) 1; in get_wildcard_cb()
138 sqlite3 *db; in eap_user_sqlite_get() local
140 char id_str[256], cmd[300]; in eap_user_sqlite_get() local
159 if (id_str[i] == '-' || id_str[i] == '_' || id_str[i] == '.' || in eap_user_sqlite_get()
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
170 bin_clear_free(hapd->tmp_eap_user.password, in eap_user_sqlite_get()
171 hapd->tmp_eap_user.password_len); in eap_user_sqlite_get()
172 os_memset(&hapd->tmp_eap_user, 0, sizeof(hapd->tmp_eap_user)); in eap_user_sqlite_get()
173 hapd->tmp_eap_user.phase2 = phase2; in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
180 if (sqlite3_open(hapd->conf->eap_user_sqlite, &db)) { in eap_user_sqlite_get()
181 wpa_printf(MSG_INFO, "DB: Failed to open database %s: %s", in eap_user_sqlite_get()
182 hapd->conf->eap_user_sqlite, sqlite3_errmsg(db)); in eap_user_sqlite_get()
183 sqlite3_close(db); in eap_user_sqlite_get()
187 res = os_snprintf(cmd, sizeof(cmd), in eap_user_sqlite_get()
190 if (os_snprintf_error(sizeof(cmd), res)) in eap_user_sqlite_get()
193 wpa_printf(MSG_DEBUG, "DB: %s", cmd); in eap_user_sqlite_get()
194 if (sqlite3_exec(db, cmd, get_user_cb, &hapd->tmp_eap_user, NULL) != in eap_user_sqlite_get()
197 "DB: Failed to complete SQL operation: %s db: %s", in eap_user_sqlite_get()
198 sqlite3_errmsg(db), hapd->conf->eap_user_sqlite); in eap_user_sqlite_get()
199 } else if (hapd->tmp_eap_user.next) in eap_user_sqlite_get()
200 user = &hapd->tmp_eap_user; in eap_user_sqlite_get()
203 os_snprintf(cmd, sizeof(cmd), in eap_user_sqlite_get()
205 wpa_printf(MSG_DEBUG, "DB: %s", cmd); in eap_user_sqlite_get()
206 if (sqlite3_exec(db, cmd, get_wildcard_cb, &hapd->tmp_eap_user, in eap_user_sqlite_get()
209 "DB: Failed to complete SQL operation: %s db: %s", in eap_user_sqlite_get()
210 sqlite3_errmsg(db), in eap_user_sqlite_get()
211 hapd->conf->eap_user_sqlite); in eap_user_sqlite_get()
212 } else if (hapd->tmp_eap_user.next) { in eap_user_sqlite_get()
213 user = &hapd->tmp_eap_user; in eap_user_sqlite_get()
214 os_free(user->identity); in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
216 user->identity_len = user->password_len; in eap_user_sqlite_get()
217 user->password = NULL; in eap_user_sqlite_get()
218 user->password_len = 0; in eap_user_sqlite_get()
223 sqlite3_close(db); in eap_user_sqlite_get()
235 const struct hostapd_bss_config *conf = hapd->conf; in hostapd_get_eap_user()
236 struct hostapd_eap_user *user = conf->eap_user; in hostapd_get_eap_user()
239 if (conf->wps_state && identity_len == WSC_ID_ENROLLEE_LEN && in hostapd_get_eap_user()
248 if (conf->wps_state && identity_len == WSC_ID_REGISTRAR_LEN && in hostapd_get_eap_user()
254 wsc_registrar.password = (u8 *) conf->ap_pin; in hostapd_get_eap_user()
255 wsc_registrar.password_len = conf->ap_pin ? in hostapd_get_eap_user()
256 os_strlen(conf->ap_pin) : 0; in hostapd_get_eap_user()
262 if (!phase2 && user->identity == NULL) { in hostapd_get_eap_user()
267 if (user->phase2 == !!phase2 && user->wildcard_prefix && in hostapd_get_eap_user()
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
269 os_memcmp(user->identity, identity, user->identity_len) == in hostapd_get_eap_user()
275 if (user->phase2 == !!phase2 && in hostapd_get_eap_user()
276 user->identity_len == identity_len && in hostapd_get_eap_user()
277 os_memcmp(user->identity, identity, identity_len) == 0) in hostapd_get_eap_user()
279 user = user->next; in hostapd_get_eap_user()
283 if (user == NULL && conf->eap_user_sqlite) { in hostapd_get_eap_user()