2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-30 22:15:20 +00:00

Use ISC_R_CRYPTOFAILURE instead DST_R_CRYPTOFAILURE in libisc

There was a circular libisc dependency on libdns headers for
DST_R_CRYPTOFAILURE return code.  Replace it with ISC_R_CRYPTOFAILURE to
break the loop.
This commit is contained in:
Ondřej Surý
2020-03-12 17:50:29 +01:00
parent bc10d88c25
commit e67ce7e966

View File

@@ -34,8 +34,6 @@
#include <pkcs11/eddsa.h>
#include <pkcs11/pkcs11.h>
#include <dst/result.h>
/* was 32 octets, Petr Spacek suggested 1024, SoftHSMv2 uses 256... */
#ifndef PINLEN
#define PINLEN 256
@@ -422,7 +420,7 @@ free_session_list(pk11_sessionlist_t *slist) {
if (sp->session != CK_INVALID_HANDLE) {
rv = pkcs_C_CloseSession(sp->session);
if (rv != CKR_OK) {
ret = DST_R_CRYPTOFAILURE;
ret = ISC_R_CRYPTOFAILURE;
}
}
LOCK(&sessionlock);
@@ -445,7 +443,7 @@ setup_session(pk11_session_t *sp, pk11_token_t *token, bool rw) {
rv = pkcs_C_OpenSession(token->slotid, flags, NULL_PTR, NULL_PTR,
&sp->session);
if (rv != CKR_OK) {
return (DST_R_CRYPTOFAILURE);
return (ISC_R_CRYPTOFAILURE);
}
return (ISC_R_SUCCESS);
}