&user_info_dc->sids,
&user_info_dc->num_sids);
if (!NT_STATUS_IS_OK(status)) {
+ talloc_free(filter);
return status;
}
}
+ talloc_free(filter);
return NT_STATUS_OK;
}
nt_status = dom_sid_split_rid(tmp_ctx, user_sid, &domain_sid, NULL);
if (!NT_STATUS_IS_OK(nt_status)) {
+ talloc_free(tmp_ctx);
return nt_status;
}
struct dom_sid_buf buf;
DEBUG(3, ("authsam_get_user_info_dc_principal: Failed to find domain with: SID %s\n",
dom_sid_str_buf(domain_sid, &buf)));
+ talloc_free(tmp_ctx);
return NT_STATUS_NO_SUCH_USER;
}
} else {
+ talloc_free(tmp_ctx);
return NT_STATUS_INVALID_PARAMETER;
}
status = authsam_check_bad_password_indicator(
sam_ctx, mem_ctx, &need_db_reread, msg);
if (!NT_STATUS_IS_OK(status)) {
+ TALLOC_FREE(mem_ctx);
return status;
}