http_cleanup_stream(ctx);
ret = trie_del(ctx->stream_write_data, (char *)&stream_id, sizeof(stream_id), (trie_val_t*)&data);
- if (ret == kr_ok() && data)
+ if (ret == KNOT_EOK && data)
on_pkt_write(data, error_code == 0 ? 0 : kr_error(EIO));
return 0;
key_len = sizeof(char *);
}
int ret = trie_del(t, key, key_len, &val);
- if (ret == kr_ok()) {
+ if (ret == KNOT_EOK) {
kr_require(val == task);
worker_task_unref(val);
}
{
trie_val_t val = NULL;
int res = trie_del_first(session->tasks, NULL, NULL, &val);
- if (res != kr_ok()) {
+ if (res != KNOT_EOK) {
val = NULL;
} else if (deref) {
worker_task_unref(val);
size_t key_len = sizeof(msg_id);
trie_val_t val;
int res = trie_del(t, key, key_len, &val);
- if (res == kr_ok()) {
+ if (res == KNOT_EOK) {
if (worker_task_numrefs(val) > 1) {
ret = val;
}
return kr_error(EINVAL);
trie_val_t param_ptr;
int ret = trie_del(params, key, len, ¶m_ptr);
- if (ret)
+ if (ret != KNOT_EOK)
return kr_error(ret);
tls_client_param_unref(param_ptr);
return kr_ok();
char key_buf[len];
ptrdiff_t key_i_new;
int ret = trie_del_first(t, key_buf, &len, (trie_val_t *)&key_i_new);
- assert_int_equal(ret, kr_ok());
+ assert_int_equal(ret, KNOT_EOK);
assert_int_equal(KEY_LEN(key_buf), len);
assert_int_equal(key_i, key_i_new);
assert_string_equal(dict[key_i], key_buf);