}
if (!key_still_used_in_keystore && !key_ptr->is_pub_only) {
- ret = DNSSEC_ENOENT;
- for (size_t i = 0; i < ctx->keystores[0].count && ret == DNSSEC_ENOENT; i++) {
+ ret = KNOT_ENOENT;
+ for (size_t i = 0; i < ctx->keystores[0].count && ret == KNOT_ENOENT; i++) {
ret = dnssec_keystore_remove(ctx->keystores[i].keystore, key_ptr->id);
}
if (ret != KNOT_EOK) {
int kdnssec_load_private(knot_kasp_keystore_t *keystores, const char *id,
dnssec_key_t *key, const char **name, unsigned *backend)
{
- int ret = DNSSEC_ENOENT;
- for (size_t i = 0; i < keystores[0].count && (ret == DNSSEC_ENOENT || ret == DNSSEC_NOT_FOUND); i++) {
+ int ret = KNOT_ENOENT;
+ for (size_t i = 0; i < keystores[0].count && (ret == KNOT_ENOENT || ret == DNSSEC_NOT_FOUND); i++) {
ret = dnssec_keystore_get_private(keystores[i].keystore, id, key);
if (ret == KNOT_EOK) {
if (name != NULL) {
restore ? "restore" : "backup", parm->id);
ret = KNOT_EOK;
}
- } else if (ret == DNSSEC_ENOENT) {
+ } else if (ret == KNOT_ENOENT) {
log_zone_notice(zname, "private key id %s not available, ignoring", parm->id);
ret = KNOT_EOK;
}
{ KNOT_ENOMEM, "not enough memory" },
{ KNOT_EINVAL, "invalid argument" },
- { DNSSEC_ENOENT, "no such file or directory" },
+ { KNOT_ENOENT, "no such file or directory" },
{ DNSSEC_ERROR, "unspecified error" },
{ DNSSEC_NOT_IMPLEMENTED_ERROR, "not implemented" },
KNOT_ENOMEM = -ENOMEM,
KNOT_EINVAL = -EINVAL,
- DNSSEC_ENOENT = -ENOENT,
+ KNOT_ENOENT = -ENOENT,
DNSSEC_ERROR_MIN = -1500,
if (r < 0) {
return DNSSEC_ERROR;
} else if (r == 0) {
- return DNSSEC_ENOENT;
+ return KNOT_ENOENT;
}
return KNOT_EOK;
dnssec_key_new(&key);
dnssec_key_set_algorithm(key, DNSSEC_KEY_ALGORITHM_RSA_SHA256);
r = dnssec_keystore_get_private(store, id_A, key);
- ok(r == DNSSEC_ENOENT, "read removed");
+ ok(r == KNOT_ENOENT, "read removed");
dnssec_key_free(key);
// cleanup