if ((a = (ssl_ds_array *)apr_palloc(p, sizeof(ssl_ds_array))) == NULL)
return NULL;
a->pPool = p;
- if ((a->pSubPool = apr_pool_sub_make(p, NULL)) == NULL)
+ apr_pool_sub_make(&a->pSubPool, p, NULL);
+ if (a->pSubPool == NULL)
return NULL;
a->aData = apr_array_make(a->pSubPool, 2, size);
return a;
if ((t = (ssl_ds_table *)apr_palloc(p, sizeof(ssl_ds_table))) == NULL)
return NULL;
t->pPool = p;
- if ((t->pSubPool = apr_pool_sub_make(p, NULL)) == NULL)
+ apr_pool_sub_make(&t->pSubPool, p, NULL);
+ if (t->pSubPool == NULL)
return NULL;
t->aKey = apr_array_make(t->pSubPool, 2, MAX_STRING_LEN);
t->aData = apr_array_make(t->pSubPool, 2, size);
* is remains in memory for the complete operation time of
* the server.
*/
- p = apr_pool_sub_make(pp, NULL);
+ apr_pool_sub_make(&p, pp, NULL);
/*
* Start with a empty stack/list where new
SSLModConfigRec *mc = myModConfig(s);
apr_pool_t *p;
- if ((p = apr_pool_sub_make(mc->pPool, NULL)) != NULL) {
+ apr_pool_sub_make(&p, mc->pPool, NULL)
+ if (p != NULL) {
/* the correct way */
unlink(apr_pstrcat(p, mc->szSessionCacheDataFile, SSL_DBM_FILE_SUFFIX_DIR, NULL));
unlink(apr_pstrcat(p, mc->szSessionCacheDataFile, SSL_DBM_FILE_SUFFIX_PAG, NULL));
ssl_mutex_on(s);
for (;;) {
/* allocate the key array in a memory sub pool */
- if ((p = apr_pool_sub_make(mc->pPool, NULL)) == NULL)
+ apr_pool_sub_make(&p, mc->pPool, NULL)
+ if (p == NULL)
break;
if ((keylist = apr_palloc(p, sizeof(dbmkey)*KEYMAX)) == NULL) {
apr_pool_destroy(p);
char *fullname;
BOOL ok;
- sp = apr_pool_sub_make(p, NULL);
+ apr_pool_sub_make(&sp, p, NULL);
if (apr_dir_open(&dir, pathname, sp)) != APR_SUCCESS) {
apr_pool_destroy(sp);
return FALSE;
}
*strp = 0;
- sub = apr_pool_sub_make(r->pool);
+ apr_pool_sub_make(&sub, r->pool, NULL);
status = apr_uri_parse_components(sub, input_uri, &result);
if (status == APR_SUCCESS) {
#define CHECK(f) \