NULL, attrs,
&res);
if (ret != LDB_SUCCESS) {
- talloc_free(mem_ctx);
- return ret;
+ goto done;
}
talloc_steal(mem_ctx, res);
if (res->count == 0) {
- talloc_free(mem_ctx);
- data->password_attrs = NULL;
- return LDB_SUCCESS;
+ goto done;
}
if (res->count > 1) {
password_attributes = ldb_msg_find_element(msg, "passwordAttribute");
if (!password_attributes) {
- talloc_free(mem_ctx);
- return LDB_SUCCESS;
+ goto done;
}
data->password_attrs = talloc_array(data, const char *, password_attributes->num_values + 1);
if (!data->password_attrs) {
talloc_steal(data->password_attrs, password_attributes->values[i].data);
}
data->password_attrs[i] = NULL;
+
+done:
talloc_free(mem_ctx);
- return LDB_SUCCESS;
+ return ldb_next_second_stage_init(module);
}
static const struct ldb_module_ops kludge_acl_ops = {
server_creds = talloc_get_type(ldb_get_opaque(module->ldb, "server_credentials"),
struct cli_credentials);
- if (do_attribute(s->attrs, "supportedSASLMechanisms")) {
+ if (server_creds && do_attribute(s->attrs, "supportedSASLMechanisms")) {
struct gensec_security_ops **backends = gensec_security_all();
enum credentials_use_kerberos use_kerberos
= cli_credentials_get_kerberos_state(server_creds);