openldap: fix limit max incoming size test logic

Use LDAP_OPT_SUCCESS for ldap_get_option, as done in the other calls.
ber_sockbuf_ctrl returns 1 on success so reverse the logic.

Follow-up to f91be14bfb
Closes #19138
This commit is contained in:
Jochen Sprickerhof 2025-10-19 09:40:35 +02:00 committed by Daniel Stenberg
parent 6550dd0f3d
commit f03e7c1d64
No known key found for this signature in database
GPG Key ID: 5CC908FDB71E12C2

View File

@ -662,11 +662,11 @@ static CURLcode oldap_connect(struct Curl_easy *data, bool *done)
{
ber_len_t max = 256*1024;
Sockbuf *sb;
if(ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, (void **)&sb) ||
if((ldap_get_option(li->ld, LDAP_OPT_SOCKBUF, &sb) != LDAP_OPT_SUCCESS) ||
/* Set the maximum allowed size of an incoming message, which to
OpenLDAP means that it will malloc() memory up to this size. If not
set, there is no limit and we instead risk a malloc() failure. */
ber_sockbuf_ctrl(sb, LBER_SB_OPT_SET_MAX_INCOMING, &max)) {
!ber_sockbuf_ctrl(sb, LBER_SB_OPT_SET_MAX_INCOMING, &max)) {
result = CURLE_FAILED_INIT;
goto out;
}