X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/fa7225c82381bac4432a6edf16f53b5370238d85..07691282a056c4efea71e1e505527601e8cc166b:/OSX/libsecurity_keychain/regressions/kc-24-key-copy-keychains.c?ds=sidebyside diff --git a/OSX/libsecurity_keychain/regressions/kc-24-key-copy-keychains.c b/OSX/libsecurity_keychain/regressions/kc-24-key-copy-keychains.c index 2797dc6f..f0342a96 100644 --- a/OSX/libsecurity_keychain/regressions/kc-24-key-copy-keychains.c +++ b/OSX/libsecurity_keychain/regressions/kc-24-key-copy-keychains.c @@ -76,7 +76,7 @@ static OSStatus GenerateRSAKeyPair( CFDictionaryAddValue( params, kSecUseKeychain, keychain ); CFDictionaryAddValue( params, kSecAttrAccess, access ); CFDictionaryAddValue( params, kSecAttrKeyType, kSecAttrKeyTypeRSA ); - CFDictionaryAddValue( params, kSecAttrKeySizeInBits, keySize ); + CFDictionaryAddValue( params, kSecAttrKeySizeInBits, keySize ); CFReleaseNull(keySize); CFDictionaryAddValue( params, kSecAttrIsPermanent, kCFBooleanTrue ); if (extractable) @@ -208,7 +208,7 @@ static int testCopyKey(SecKeychainRef userKeychain, SecKeychainRef tempKeychain) ok_status(status, "%s: SecItemExport", testName); if (!exportedData || status != noErr) { - warnc(EXIT_FAILURE, "Unable to export key! (error %d)", (int)status); + errx(EXIT_FAILURE, "Unable to export key! (error %d)", (int)status); } // set up an explicit access control instance for the imported key @@ -258,7 +258,7 @@ static int testCopyKey(SecKeychainRef userKeychain, SecKeychainRef tempKeychain) } // ensure that key was copied, and its label changed - checkN(testName, makeQueryKeyDictionaryWithLabel(userKeychain, kSecAttrKeyClassPrivate, label), 1); + checkN(testName, createQueryKeyDictionaryWithLabel(userKeychain, kSecAttrKeyClassPrivate, label), 1); if (access) CFRelease(access);