|
|
|
@ -4418,6 +4418,13 @@ int LDAPManager::generatePKICRL(int expirydays, LDAPRealmConfig realmcfg, TQStri
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (fileExists(revoked_certfile.ascii())) {
|
|
|
|
|
if (unlink(revoked_certfile.ascii()) < 0) {
|
|
|
|
|
if (errstr) *errstr = TQString("Unable to unlink \"%1\"").arg(revoked_certfile);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
LDAPUserInfoList::Iterator it;
|
|
|
|
|
for (it = userList.begin(); it != userList.end(); ++it) {
|
|
|
|
|
LDAPUserInfo user = *it;
|
|
|
|
@ -4451,6 +4458,13 @@ int LDAPManager::generatePKICRL(int expirydays, LDAPRealmConfig realmcfg, TQStri
|
|
|
|
|
if (errstr) *errstr = TQString("Execution of \"%s\" failed").arg(command);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (fileExists(revoked_certfile.ascii())) {
|
|
|
|
|
if (unlink(revoked_certfile.ascii()) < 0) {
|
|
|
|
|
if (errstr) *errstr = TQString("Unable to unlink \"%1\"").arg(revoked_certfile);
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|