- /* ugly check for database connect string */
- if( strstr(file, "://") ){
- if (debug & DEBUG_PASSWD_FLAG)
- report(LOG_DEBUG,"%s %s: DB access to %s for user %s",session.peer, session.port, file, name);
- if (!db_verify(name, passwd, file)) {
- data->status = TAC_PLUS_AUTHEN_STATUS_FAIL;
- return (0);
- } else {
- data->status = TAC_PLUS_AUTHEN_STATUS_PASS;
- }
- exp_date = NULL;
- set_expiration_status(exp_date, data);
- return (data->status == TAC_PLUS_AUTHEN_STATUS_PASS);
- }
+ /* ugly check for database connect string */
+ if( strstr(file, "://") ) {
+ if (debug & DEBUG_PASSWD_FLAG)
+ report(LOG_DEBUG,"%s %s: DB access to %s for user %s",session.peer, session.port, file, name);
+ if (!db_verify(name, passwd, file)) {
+ data->status = TAC_PLUS_AUTHEN_STATUS_FAIL;
+ return (0);
+ } else {
+ data->status = TAC_PLUS_AUTHEN_STATUS_PASS;
+ }
+ exp_date = NULL;
+ set_expiration_status(exp_date, data);
+ return (data->status == TAC_PLUS_AUTHEN_STATUS_PASS);
+ }