dnssec_key_t *key, const char **name, unsigned *backend)
{
int ret = KNOT_ENOENT;
- for (size_t i = 0; i < keystores[0].count && (ret == KNOT_ENOENT || ret == DNSSEC_NOT_FOUND); i++) {
+ for (size_t i = 0; i < keystores[0].count && (ret == KNOT_ENOENT); i++) {
ret = dnssec_keystore_get_private(keystores[i].keystore, id, key);
if (ret == KNOT_EOK) {
if (name != NULL) {
{ DNSSEC_ERROR, "unspecified error" },
{ KNOT_ENOTSUP, "not implemented" },
{ KNOT_EMALF, "malformed data" },
- { DNSSEC_NOT_FOUND, "not found" },
+ { KNOT_ENOENT, "not found" },
{ DNSSEC_PKCS8_IMPORT_ERROR, "PKCS #8 import error" },
{ DNSSEC_KEY_EXPORT_ERROR, "key export error" },
DNSSEC_ERROR = DNSSEC_ERROR_MIN,
KNOT_ENOTSUP,
KNOT_EMALF,
- DNSSEC_NOT_FOUND,
+ KNOT_ENOENT,
DNSSEC_PKCS8_IMPORT_ERROR,
DNSSEC_KEY_EXPORT_ERROR,
r = gnutls_privkey_import_pkcs11_url(key, url);
if (r != GNUTLS_E_SUCCESS) {
gnutls_privkey_deinit(key);
- return DNSSEC_NOT_FOUND;
+ return KNOT_ENOENT;
}
*key_ptr = key;
char *path = realpath(config, NULL);
if (!path) {
- return DNSSEC_NOT_FOUND;
+ return KNOT_ENOENT;
}
handle->dir_name = path;
return KNOT_ERROR;
case KNOT_EMALF:
return KNOT_EMALF;
- case DNSSEC_NOT_FOUND:
+ case KNOT_ENOENT:
return KNOT_ENOENT;
case DNSSEC_NO_PUBLIC_KEY:
case DNSSEC_NO_PRIVATE_KEY:
{
_cleanup_fclose_ FILE *file = fopen(filename, "r");
if (!file) {
- return DNSSEC_NOT_FOUND;
+ return KNOT_ENOENT;
}
bind_privkey_t params = *params_ptr;