* it to where our caller said.
*/
if (!result) {
- if (our_result) {
- ldap_msgfree(our_result);
- }
+ if (our_result) ldap_msgfree(our_result);
} else {
*result = our_result;
}
RWDEBUG("Modify failed: %s. Got new socket, retrying...", error);
talloc_free(extra); /* don't leak debug info */
-
continue;
}
/*
* RADIUS attribute to LDAP attribute maps
*/
- vp_map_t *user_map; //!< Attribute map applied to users and profiles.
+ vp_map_t *user_map; //!< Attribute map applied to users and profiles.
/*
* User object attributes and filters
{ "identity", FR_CONF_OFFSET(PW_TYPE_STRING, rlm_ldap_t, admin_identity), NULL },
{ "password", FR_CONF_OFFSET(PW_TYPE_STRING | PW_TYPE_SECRET, rlm_ldap_t, admin_password), NULL },
- /* Should be deprecated */
{ "sasl", FR_CONF_OFFSET(PW_TYPE_SUBSECTION, rlm_ldap_t, admin_sasl), (void const *) sasl_mech_static },
{ "valuepair_attribute", FR_CONF_OFFSET(PW_TYPE_STRING, rlm_ldap_t, valuepair_attr), NULL },
rlm_ldap_sasl_ctx_t sasl_ctx; /* SASL defaults */
/* rlm_ldap_result may not be called */
- *error = NULL;
- *extra = NULL;
+ if (error) *error = NULL;
+ if (extra) *extra = NULL;
sasl_ctx.inst = inst;
sasl_ctx.request = request;