apr_finfo_t finfo;
apr_status_t rv;
int cert_type = 0;
+ apr_ldap_opt_tls_cert_t *cert;
if (err != NULL) {
return err;
file, type);
/* add the certificate to the global array */
- apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_array_push(st->global_certs);
+ cert = (apr_ldap_opt_tls_cert_t *)apr_array_push(st->global_certs);
cert->type = cert_type;
cert->path = file;
cert->password = password;
apr_finfo_t finfo;
apr_status_t rv;
int cert_type = 0;
+ apr_ldap_opt_tls_cert_t *cert;
/* handle the certificate type */
if (type) {
file, type);
/* add the certificate to the global array */
- apr_ldap_opt_tls_cert_t *cert = (apr_ldap_opt_tls_cert_t *)apr_array_push(st->global_certs);
+ cert = (apr_ldap_opt_tls_cert_t *)apr_array_push(st->global_certs);
cert->type = cert_type;
cert->path = file;
cert->password = password;
void *data;
const char *userdata_key = "util_ldap_init";
+ apr_ldap_err_t *result_err = NULL;
+ int rc;
/* util_ldap_post_config() will be called twice. Don't bother
* going through all of the initialization on the first call
* If SSL is not supported it is not necessarily an error, as the
* application may not want to use it.
*/
- apr_ldap_err_t *result_err = NULL;
- int rc = apr_ldap_ssl_init(p,
- NULL,
- NULL,
- &(result_err));
+ rc = apr_ldap_ssl_init(p,
+ NULL,
+ 0,
+ &(result_err));
if (APR_SUCCESS == rc) {
rc = apr_ldap_set_option(p, NULL, APR_LDAP_OPT_TLS_CERT,
(void *)st->global_certs, &(result_err));