} else if (strncasecmp(arg->vb_strvalue, "Domain-Name", 11) == 0) {
char *p;
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
user_name = mschap_identity_find(request);
if (!user_name) return XLAT_ACTION_FAIL;
} else if (strncasecmp(arg->vb_strvalue, "NT-Domain", 9) == 0) {
char *p, *q;
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
user_name = mschap_identity_find(request);
if (!user_name) return XLAT_ACTION_FAIL;
user_name = mschap_identity_find(request);
if (!user_name) return XLAT_ACTION_FAIL;
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
/*
* First check to see if this is a host/ style User-Name
return XLAT_ACTION_FAIL;
}
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
fr_value_box_memdup(ctx, vb, NULL, buffer, NT_DIGEST_LENGTH, false);
RDEBUG2("NT-Hash of \"known-good\" password: %pV", vb);
fr_dcursor_append(out, vb);
smbdes_lmpwdhash(arg->vb_strvalue, buffer);
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
fr_value_box_memdup(ctx, vb, NULL, buffer, LM_DIGEST_LENGTH, false);
RDEBUG2("LM-Hash of %s = %pV", arg->vb_strvalue, vb);
fr_dcursor_append(out, vb);
return XLAT_ACTION_FAIL;
}
- vb = fr_value_box_alloc_null(ctx);
+ MEM(vb = fr_value_box_alloc_null(ctx));
fr_value_box_memdup(ctx, vb, NULL, data, data_len, tainted);
fr_dcursor_append(out, vb);