{
switch(rc) {
case LDAP_NO_MEMORY:
- result = CURLE_OUT_OF_MEMORY;
- break;
+ return CURLE_OUT_OF_MEMORY;
case LDAP_INVALID_CREDENTIALS:
- result = CURLE_LOGIN_DENIED;
- break;
+ return CURLE_LOGIN_DENIED;
case LDAP_PROTOCOL_ERROR:
- result = CURLE_UNSUPPORTED_PROTOCOL;
- break;
+ return CURLE_UNSUPPORTED_PROTOCOL;
case LDAP_INSUFFICIENT_ACCESS:
- result = CURLE_REMOTE_ACCESS_DENIED;
- break;
+ return CURLE_REMOTE_ACCESS_DENIED;
}
return result;
}
{
struct connectdata *conn = data->conn;
struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
struct berval cred;
struct berval *pcred = &cred;
int rc;
pcred = NULL;
rc = ldap_sasl_bind(li->ld, NULL, mech, pcred, NULL, NULL, &li->msgid);
if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
+ return oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
+ return CURLE_OK;
}
/*
{
struct connectdata *conn = data->conn;
struct ldapconninfo *li = conn->proto.ldapc;
- CURLcode result = CURLE_OK;
struct berval cred;
struct berval *pcred = &cred;
int rc;
pcred = NULL;
rc = ldap_sasl_bind(li->ld, NULL, mech, pcred, NULL, NULL, &li->msgid);
if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
+ return oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
+ return CURLE_OK;
}
/*
static CURLcode oldap_cancel_auth(struct Curl_easy *data, const char *mech)
{
struct ldapconninfo *li = data->conn->proto.ldapc;
- CURLcode result = CURLE_OK;
int rc = ldap_sasl_bind(li->ld, NULL, LDAP_SASL_NULL, NULL, NULL, NULL,
&li->msgid);
(void)mech;
if(rc != LDAP_SUCCESS)
- result = oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
- return result;
+ return oldap_map_error(rc, CURLE_LDAP_CANNOT_BIND);
+ return CURLE_OK;
}
/* Starts LDAP simple bind. */
static CURLcode oldap_perform_bind(struct Curl_easy *data, ldapstate newstate)
{
- CURLcode result = CURLE_OK;
struct connectdata *conn = data->conn;
struct ldapconninfo *li = conn->proto.ldapc;
char *binddn = NULL;
rc = ldap_sasl_bind(li->ld, binddn, LDAP_SASL_SIMPLE, &passwd,
NULL, NULL, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, newstate);
- else
- result = oldap_map_error(rc,
- data->state.aptr.user ?
- CURLE_LOGIN_DENIED : CURLE_LDAP_CANNOT_BIND);
- return result;
+ if(rc != LDAP_SUCCESS)
+ return oldap_map_error(rc,
+ data->state.aptr.user ?
+ CURLE_LOGIN_DENIED : CURLE_LDAP_CANNOT_BIND);
+ oldap_state(data, newstate);
+ return CURLE_OK;
}
/* Query the supported SASL authentication mechanisms. */
static CURLcode oldap_perform_mechs(struct Curl_easy *data)
{
- CURLcode result = CURLE_OK;
struct ldapconninfo *li = data->conn->proto.ldapc;
int rc;
static const char * const supportedSASLMechanisms[] = {
rc = ldap_search_ext(li->ld, "", LDAP_SCOPE_BASE, "(objectclass=*)",
(char **) supportedSASLMechanisms, 0,
NULL, NULL, NULL, 0, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, OLDAP_MECHS);
- else
- result = oldap_map_error(rc, CURLE_LOGIN_DENIED);
- return result;
+ if(rc != LDAP_SUCCESS)
+ return oldap_map_error(rc, CURLE_LOGIN_DENIED);
+ oldap_state(data, OLDAP_MECHS);
+ return CURLE_OK;
}
/* Starts SASL bind. */
static CURLcode oldap_ssl_connect(struct Curl_easy *data, ldapstate newstate)
{
- CURLcode result = CURLE_OK;
struct connectdata *conn = data->conn;
struct ldapconninfo *li = conn->proto.ldapc;
bool ssldone = 0;
-
- result = Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
+ CURLcode result =
+ Curl_conn_connect(data, FIRSTSOCKET, FALSE, &ssldone);
if(!result) {
oldap_state(data, newstate);
/* Send the STARTTLS request */
static CURLcode oldap_perform_starttls(struct Curl_easy *data)
{
- CURLcode result = CURLE_OK;
struct ldapconninfo *li = data->conn->proto.ldapc;
int rc = ldap_start_tls(li->ld, NULL, NULL, &li->msgid);
- if(rc == LDAP_SUCCESS)
- oldap_state(data, OLDAP_STARTTLS);
- else
- result = oldap_map_error(rc, CURLE_USE_SSL_FAILED);
- return result;
+ if(rc != LDAP_SUCCESS)
+ return oldap_map_error(rc, CURLE_USE_SSL_FAILED);
+ oldap_state(data, OLDAP_STARTTLS);
+ return CURLE_OK;
}
#endif
plen = strlen(argptr);
if(plen > CURL_MAX_INPUT_LENGTH) {
data->set.tls_ech = CURLECH_DISABLE;
- result = CURLE_BAD_FUNCTION_ARGUMENT;
- return result;
+ return CURLE_BAD_FUNCTION_ARGUMENT;
}
/* set tls_ech flag value, preserving CLA_CFG bit */
if(plen == 5 && !strcmp(argptr, "false"))
- data->set.tls_ech = CURLECH_DISABLE
- | (data->set.tls_ech & CURLECH_CLA_CFG);
+ data->set.tls_ech = CURLECH_DISABLE |
+ (data->set.tls_ech & CURLECH_CLA_CFG);
else if(plen == 6 && !strcmp(argptr, "grease"))
- data->set.tls_ech = CURLECH_GREASE
- | (data->set.tls_ech & CURLECH_CLA_CFG);
+ data->set.tls_ech = CURLECH_GREASE |
+ (data->set.tls_ech & CURLECH_CLA_CFG);
else if(plen == 4 && !strcmp(argptr, "true"))
- data->set.tls_ech = CURLECH_ENABLE
- | (data->set.tls_ech & CURLECH_CLA_CFG);
+ data->set.tls_ech = CURLECH_ENABLE |
+ (data->set.tls_ech & CURLECH_CLA_CFG);
else if(plen == 4 && !strcmp(argptr, "hard"))
- data->set.tls_ech = CURLECH_HARD
- | (data->set.tls_ech & CURLECH_CLA_CFG);
+ data->set.tls_ech = CURLECH_HARD |
+ (data->set.tls_ech & CURLECH_CLA_CFG);
else if(plen > 5 && !strncmp(argptr, "ecl:", 4)) {
result = Curl_setstropt(&data->set.str[STRING_ECH_CONFIG], argptr + 4);
if(result)