mirror of
https://github.com/curl/curl.git
synced 2026-04-14 21:41:41 +03:00
openldap: fix limit max incoming size test logic
Use LDAP_OPT_SUCCESS for ldap_get_option, as done in the other calls.
ber_sockbuf_ctrl returns 1 on success so reverse the logic.
Follow-up to f91be14bfb
Closes #19138
This commit is contained in:
parent
6550dd0f3d
commit
f03e7c1d64
1 changed files with 2 additions and 2 deletions
|
|
@ -662,11 +662,11 @@ static CURLcode oldap_connect(struct Curl_easy *data, bool *done)
|
|||
{
|
||||
ber_len_t max = 256*1024;
|
||||
Sockbuf *sb;
|
||||
if(ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, (void **)&sb) ||
|
||||
if((ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb) != LDAP_OPT_SUCCESS) ||
|
||||
/* Set the maximum allowed size of an incoming message, which to
|
||||
OpenLDAP means that it will malloc() memory up to this size. If not
|
||||
set, there is no limit and we instead risk a malloc() failure. */
|
||||
ber_sockbuf_ctrl(sb, LBER_SB_OPT_SET_MAX_INCOMING, &max)) {
|
||||
!ber_sockbuf_ctrl(sb, LBER_SB_OPT_SET_MAX_INCOMING, &max)) {
|
||||
result = CURLE_FAILED_INIT;
|
||||
goto out;
|
||||
}
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue