#include <stdlib.h>
#include <stdio.h>
#include <sys/param.h>
-#include <MacErrors.h>
+#include <Security/SecBase.h>
+
#include <CoreFoundation/CoreFoundation.h>
#include <Security/Security.h>
#include <Security/SecIdentityPriv.h>
*/
const char *sslGetSSLErrString(OSStatus err)
{
- static char noErrStr[20];
+ static char errSecSuccessStr[20];
switch(err) {
- case noErr: return "noErr";
- case memFullErr: return "memFullErr";
- case paramErr: return "paramErr";
- case unimpErr: return "unimpErr";
- case ioErr: return "ioErr";
- case badReqErr: return "badReqErr";
+ case errSecSuccess: return "errSecSuccess";
+ case errSecAllocate: return "errSecAllocate";
+ case errSecParam: return "errSecParam";
+ case errSecUnimplemented: return "errSecUnimplemented";
+ case errSecIO: return "errSecIO";
+ case errSecBadReq: return "errSecBadReq";
/* SSL errors */
case errSSLProtocol: return "errSSLProtocol";
case errSSLNegotiation: return "errSSLNegotiation";
case errSecNotAvailable: return "errSecNotAvailable";
case errSecDuplicateItem: return "errSecDuplicateItem";
case errSecItemNotFound: return "errSecItemNotFound";
-#if TARGET_OS_MAC
+#if !TARGET_OS_IPHONE
case errSecReadOnly: return "errSecReadOnly";
case errSecAuthFailed: return "errSecAuthFailed";
case errSecNoSuchKeychain: return "errSecNoSuchKeychain";
else
#endif
{
- sprintf(noErrStr, "Unknown (%d)", (unsigned)err);
- return noErrStr;
+ sprintf(errSecSuccessStr, "Unknown (%d)", (unsigned)err);
+ return errSecSuccessStr;
}
}
}
if(isRoot) {
*outArray = certArray;
CFRelease(certRef);
- return noErr;
+ return errSecSuccess;
}
/*
* Just go with the single subject cert we were given.
*/
printf("***Warning: could not construct completed cert chain\n");
- ortn = noErr;
+ ortn = errSecSuccess;
goto errOut;
}
*/
printf("***sslCompleteCertChain screwup: numResCerts %d\n",
(int)numResCerts);
- ortn = noErr;
+ ortn = errSecSuccess;
goto errOut;
}
if(!includeRoot) {
if(secCert == NULL) {
printf("***addTrustedSecCert screwup\n");
- return paramErr;
+ return errSecParam;
}
array = CFArrayCreateMutable(kCFAllocatorDefault,
(CFIndex)1, &kCFTypeArrayCallBacks);
if(array == NULL) {
- return memFullErr;
+ return errSecAllocate;
}
CFArrayAppendValue(array, secCert);
ortn = SSLSetTrustedRoots(ctx, array, replaceAnchors ? true : false);
free(certData);
if(!secCert) {
printf("***SecCertificateCreateWithData returned NULL\n");
- return paramErr;
+ return errSecParam;
}
if (certRef) {
*certRef = secCert;
}
- return noErr;
+ return errSecSuccess;
}
OSStatus sslAddTrustedRoot(
CFIndex numItems = CFArrayGetCount(identArray);
if(numItems == 0) {
printf("***addIdentityAsTrustedRoot: empty identArray\n");
- return paramErr;
+ return errSecParam;
}
/* Root should be the last item - could be identity, could be cert */
}
else {
printf("***Bogus item in identity array\n");
- return paramErr;
+ return errSecParam;
}
}
#else
SSLContextRef ctx,
CFArrayRef identArray)
{
- return noErr;
+ return errSecSuccess;
}
#endif
OSStatus ortn;
if(cipherRestrict == '\0') {
- return noErr; // actually should not have been called
+ return errSecSuccess; // actually should not have been called
}
switch(cipherRestrict) {
case 'e':
return ortn;
}
}
- return noErr;
+ return errSecSuccess;
}
void sslShowResult(
serverParams->certState);
ourRtn += sslVerifyClientCertState("client", clientParams->expectCertState,
clientParams->certState);
- if(serverParams->ortn == noErr) {
+ if(serverParams->ortn == errSecSuccess) {
ourRtn += sslVerifyCipher("server", serverParams->expectCipher,
serverParams->negCipher);
}
- if(clientParams->ortn == noErr) {
+ if(clientParams->ortn == errSecSuccess) {
ourRtn += sslVerifyCipher("client", clientParams->expectCipher,
clientParams->negCipher);
}
}
CFRelease(secCert);
*foundOne = true;
- } while(ortn == noErr);
+ } while(ortn == errSecSuccess);
CFRelease(srch);
- return noErr;
+ return errSecSuccess;
}
/*