if (!z_import->digests[i].active)
continue;
int ret2 = dnssec_digest_finish(z_import->digests[i].ctx, &digs[i]);
- if (ret == DNSSEC_EOK)
+ if (ret == KNOT_EOK)
ret = ret2;
// we need to keep going to free all digests[*].ctx
}
- if (ret != DNSSEC_EOK) {
+ if (ret != KNOT_EOK) {
for (int i = 0; i < DIGEST_ALG_COUNT; ++i)
free(digs[i].data);
kr_log_error(PREFILL, "error when computing digest: %s\n",
.data = val.data + val.len,
};
int ret = dnssec_nsec3_hash(&dname, &nsec_p->libknot, &hash);
- if (ret != DNSSEC_EOK) return VAL_EMPTY;
+ if (ret != KNOT_EOK) return VAL_EMPTY;
if (kr_fails_assert(hash.size == NSEC3_HASH_LEN))
return VAL_EMPTY;
#else
dnssec_binary_t hash = { .size = 0, .data = NULL };
int ret = dnssec_nsec3_hash(&dname, &nsec_p->libknot, &hash);
- if (ret != DNSSEC_EOK) return VAL_EMPTY;
+ if (ret != KNOT_EOK) return VAL_EMPTY;
if (kr_fails_assert(hash.size == NSEC3_HASH_LEN && hash.data))
return VAL_EMPTY;
memcpy(knot_db_val_bound(val), hash.data, NSEC3_HASH_LEN);
.data = (uint8_t *)/*const-cast*/nsec_p->raw,
};
int ret = dnssec_nsec3_params_from_rdata(&nsec_p->libknot, &rdata);
- return ret == DNSSEC_EOK ? kr_ok() : kr_error(ret);
+ return ret == KNOT_EOK ? kr_ok() : kr_error(ret);
}
static void nsec_p_cleanup(struct nsec_p *nsec_p)
ret = kr_error(ENOENT);
dnssec_binary_t pk_a, pk_b;
if (dnssec_key_get_algorithm(key_a) == dnssec_key_get_algorithm(key_b) &&
- dnssec_key_get_pubkey(key_a, &pk_a) == DNSSEC_EOK &&
- dnssec_key_get_pubkey(key_b, &pk_b) == DNSSEC_EOK) {
+ dnssec_key_get_pubkey(key_a, &pk_a) == KNOT_EOK &&
+ dnssec_key_get_pubkey(key_b, &pk_b) == KNOT_EOK) {
if (pk_a.size == pk_b.size && memcmp(pk_a.data, pk_b.data, pk_a.size) == 0) {
ret = 0;
}
};
int ret = dnssec_key_new(&new_key);
- if (ret != DNSSEC_EOK) {
+ if (ret != KNOT_EOK) {
return kr_error(ENOMEM);
}
ret = dnssec_key_set_rdata(new_key, &binary_key);
- if (ret != DNSSEC_EOK) {
+ if (ret != KNOT_EOK) {
dnssec_key_free(new_key);
return kr_error(ret);
}
if (kown) {
ret = dnssec_key_set_dname(new_key, kown);
- if (ret != DNSSEC_EOK) {
+ if (ret != KNOT_EOK) {
dnssec_key_free(new_key);
return kr_error(ENOMEM);
}
#include <libknot/libknot.h>
// Now some compatibility
enum {
- // These should be OK to replace everywhere.
- DNSSEC_EOK = KNOT_EOK,
-
// These might not be OK to simply replace everywhere.
DNSSEC_INVALID_KEY_ALGORITHM = KNOT_INVALID_KEY_ALGORITHM,
DNSSEC_INVALID_DIGEST_ALGORITHM = KNOT_EALGORITHM,
return kr_error(EMSGSIZE);
int ret = dnssec_nsec3_params_from_rdata(params, &rdata);
- if (ret != DNSSEC_EOK)
+ if (ret != KNOT_EOK)
return kr_error(EINVAL);
return kr_ok();
};
int ret = dnssec_nsec3_hash(&dname, params, hash);
- if (ret != DNSSEC_EOK) {
+ if (ret != KNOT_EOK) {
return kr_error(EINVAL);
}
/* Compute DS RDATA from the DNSKEY. */
dnssec_binary_t computed_ds = { 0, };
int ret = dnssec_key_create_ds(key, digest_type, &computed_ds);
- if (ret != DNSSEC_EOK)
+ if (ret != KNOT_EOK)
goto fail;
/* DS records contain algorithm, key tag and the digest.
};
result = dnssec_sign_add(ctx, &header);
- if (result != DNSSEC_EOK)
+ if (result != KNOT_EOK)
return result;
// signer name
kru->loads_bits = loads_bits;
- if (dnssec_random_buffer((uint8_t *)&kru->hash_key, sizeof(kru->hash_key)) != DNSSEC_EOK) {
+ if (dnssec_random_buffer((uint8_t *)&kru->hash_key, sizeof(kru->hash_key)) != KNOT_EOK) {
return false;
}