uint8_t *new_data = calloc(1, size);
if (!new_data) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
data->data = new_data;
uint8_t *copy = malloc(from->size);
if (copy == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
memmove(copy, from->data, from->size);
uint8_t *new_data = realloc(data->data, new_size);
if (new_size > 0 && new_data == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
data->data = new_data;
dnssec_digest_ctx_t *res = malloc(sizeof(*res));
if (res == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
res->size = gnutls_hash_get_len(gtalg);
static const error_message_t ERROR_MESSAGES[] = {
{ KNOT_EOK, "no error" },
- { DNSSEC_ENOMEM, "not enough memory" },
+ { KNOT_ENOMEM, "not enough memory" },
{ DNSSEC_EINVAL, "invalid argument" },
{ DNSSEC_ENOENT, "no such file or directory" },
enum dnssec_error {
KNOT_EOK = 0,
- DNSSEC_ENOMEM = -ENOMEM,
+ KNOT_ENOMEM = -ENOMEM,
DNSSEC_EINVAL = -EINVAL,
DNSSEC_ENOENT = -ENOENT,
gnutls_pubkey_t key = NULL;
int result = gnutls_pubkey_init(&key);
if (result != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
result = convert_dnskey_to_pubkey(algorithm, &rdata_pubkey, key);
dnssec_key_t *key = calloc(1, sizeof(*key));
if (!key) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
int r = dnssec_binary_dup(&DNSKEY_RDATA_TEMPLATE, &key->rdata);
if (r != KNOT_EOK) {
free(key);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*key_ptr = key;
if (dname) {
copy = knot_dname_copy(dname, NULL);
if (!copy) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
knot_dname_to_lower(copy);
gnutls_pubkey_t new_key = NULL;
int result = gnutls_pubkey_init(&new_key);
if (result != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
result = gnutls_pubkey_import_privkey(new_key, privkey, 0, 0);
dnssec_keystore_t *store = calloc(1, sizeof(*store));
if (!store) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
store->functions = functions;
int result = functions->ctx_new(&store->ctx);
if (result != KNOT_EOK) {
free(store);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*store_ptr = store;
size_t len = token_len + 4 + (id_len / 2 * 3);
char *url = malloc(len + 1);
if (!url) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
size_t prefix = snprintf(url, len, "%s;id=", token_uri);
if (prefix != token_len + 4) {
free(url);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
assert(id_len % 2 == 0);
if (!url || !module) {
free(url);
free(module);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*uri_ptr = url;
pkcs11_ctx_t *ctx = calloc(1, sizeof(*ctx));
if (!ctx) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*ctx_ptr = ctx;
char *id = bin_to_hex(cka_id.data, cka_id.size, false);
if (id == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*id_ptr = id;
if (gnutls_privkey_init(&key) != GNUTLS_E_SUCCESS ||
gnutls_pubkey_init(&pubkey) != GNUTLS_E_SUCCESS
) {
- r = DNSSEC_ENOMEM;
+ r = KNOT_ENOMEM;
goto fail;
}
*id_ptr = bin_to_hex(id.data, id.size, false);
if (*id_ptr == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
return KNOT_EOK;
gnutls_privkey_t key = NULL;
r = gnutls_privkey_init(&key);
if (r != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
r = gnutls_privkey_import_pkcs11_url(key, url);
_cleanup_free_ char *filename = key_path(dir_name, id);
if (!filename) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
int fd = open(filename, flags, mode);
_cleanup_x509_privkey_ gnutls_x509_privkey_t key = NULL;
int r = gnutls_x509_privkey_init(&key);
if (r != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
r = gnutls_x509_privkey_generate(key, algorithm, bits, 0);
pkcs8_dir_handle_t *ctx = calloc(1, sizeof(*ctx));
if (!ctx) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*ctx_ptr = ctx;
_cleanup_free_ char *filename = key_path(handle->dir_name, id);
if (!filename) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
if (unlink(filename) == -1) {
new_params.salt.data = malloc(new_params.salt.size);
if (new_params.salt.data == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
binary_read(&wire, &new_params.salt);
char *copy = strdup(module);
if (!copy) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
int r = gnutls_pkcs11_add_provider(module, NULL);
gnutls_x509_privkey_t _key = NULL;
int r = gnutls_x509_privkey_init(&_key);
if (r != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
int format = GNUTLS_X509_FMT_PEM;
r = gnutls_privkey_init(&key_abs);
if (r != GNUTLS_E_SUCCESS) {
gnutls_x509_privkey_deinit(key_x509);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
int flags = GNUTLS_PRIVKEY_IMPORT_AUTO_RELEASE;
if (r != GNUTLS_E_SUCCESS) {
gnutls_x509_privkey_deinit(key_x509);
gnutls_privkey_deinit(key_abs);
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
*key = key_abs;
*id = bin_to_hex(bin.data, bin.size, false);
if (*id == NULL) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
return KNOT_EOK;
dnssec_binary_t _der = { 0 };
if (dnssec_binary_alloc(&_der, total_size)) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
wire_ctx_t wire = binary_init(&_der);
dnssec_tsig_ctx_t *ctx = calloc(1, sizeof(*ctx));
if (!ctx) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
ctx->algorithm = algorithm_to_gnutls(algorithm);
_cleanup_x509_privkey_ gnutls_x509_privkey_t key = NULL;
int result = gnutls_x509_privkey_init(&key);
if (result != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
gnutls_datum_t m = binary_to_datum(¶ms->modulus);
_cleanup_x509_privkey_ gnutls_x509_privkey_t key = NULL;
int result = gnutls_x509_privkey_init(&key);
if (result != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
gnutls_ecc_curve_t curve = 0;
_cleanup_x509_privkey_ gnutls_x509_privkey_t key = NULL;
int result = gnutls_x509_privkey_init(&key);
if (result != GNUTLS_E_SUCCESS) {
- return DNSSEC_ENOMEM;
+ return KNOT_ENOMEM;
}
gnutls_ecc_curve_t curve = 0;