if (!out) return NULL;
normalised = password_process_sha2(ctx, request, out);
- talloc_list_free(&out);
+ TALLOC_FREE(out);
return normalised;
}
if (!out) return NULL;
normalised = password_process_sha3(ctx, request, out);
- talloc_list_free(&out);
+ TALLOC_FREE(out);
return normalised;
}
* operations.
*/
if (!from_recurse) {
- if (from_func != known_good) talloc_list_free(&from_func);
+ if (from_func != known_good) TALLOC_FREE(from_func);
return NULL;
}
- if ((from_func != known_good) && (from_recurse != from_func)) talloc_list_free(&from_func);
+ if ((from_func != known_good) && (from_recurse != from_func)) TALLOC_FREE(from_func);
return from_recurse;
}
out->da->name, MIN_LEN(info), out->vp_length);
}
invalid:
- if (out != known_good) talloc_list_free(&out); /* Free attribute we won't be returning */
+ if (out != known_good) TALLOC_FREE(out); /* Free attribute we won't be returning */
return NULL;
}
/*
* New attribute not in our allowed list
*/
- talloc_list_free(&new); /* da didn't match, treat as ephemeral */
+ TALLOC_FREE(new); /* da didn't match, treat as ephemeral */
return NULL; /* Process next input attribute */
}
* pair *MUST* be freed, or added to one of the pair lists appropriate to the
* ctx passed in.
*
- * @param[out] ephemeral If true, the caller must use talloc_list_free
+ * @param[out] ephemeral If true, the caller must use TALLOC_FREE
* to free the return value of this function.
* Alternatively 'ctx' can be freed, which is
* simpler and cleaner, but some people have
* password and chap response.
*/
ret = fr_digest_cmp(pass_str + 1, chap->vp_octets + 1, RADIUS_CHAP_CHALLENGE_LENGTH);
- if (ephemeral) talloc_list_free(&known_good);
+ if (ephemeral) TALLOC_FREE(known_good);
if (ret != 0) {
REDEBUG("Password comparison failed: password is incorrect");
*/
packet = eap_md5_extract(eap_session->this_round);
if (!packet) {
- if (ephemeral) talloc_list_free(&known_good);
+ if (ephemeral) TALLOC_FREE(known_good);
RETURN_MODULE_INVALID;
}
eap_md5_compose(eap_session->this_round, reply);
talloc_free(packet);
- if (ephemeral) talloc_list_free(&known_good);
+ if (ephemeral) TALLOC_FREE(known_good);
RETURN_MODULE_OK;
}
inst->server_id, strlen(inst->server_id),
session->peer_id, strlen(session->peer_id),
&session->token, inst->bnctx);
- if (ephemeral) talloc_list_free(&known_good);
+ if (ephemeral) TALLOC_FREE(known_good);
if (ret < 0) {
REDEBUG("Failed to obtain password element");
RETURN_MODULE_FAIL;
if (ret < 0) {
RERROR("Failed generating NT-Password");
talloc_free(nt_password);
- if (*ephemeral) talloc_list_free(&password);
+ if (*ephemeral) TALLOC_FREE(password);
return -1;
}
RDEBUG2("Hashed &control.%s to create %s", attr_nt_password->name, password->da->name);
}
- if (*ephemeral) talloc_list_free(&password);
+ if (*ephemeral) TALLOC_FREE(password);
*ephemeral = true; /* We generated a temporary password */
*out = nt_password;
} /* else we weren't asked to use MPPE */
finish:
- if (ephemeral) talloc_list_free(&nt_password);
+ if (ephemeral) TALLOC_FREE(nt_password);
RETURN_MODULE_RCODE(rcode);
}
* Authenticate, and return.
*/
auth_func(&rcode, inst, request, known_good, password);
- if (ephemeral) talloc_list_free(&known_good);
+ if (ephemeral) TALLOC_FREE(known_good);
switch (rcode) {
case RLM_MODULE_REJECT:
REDEBUG("Password incorrect");