|
@@ -39,2062 +39,2062 @@ class ErrorTypeTests: XCTestCase {
|
|
func testErrorType() {
|
|
func testErrorType() {
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSuccess)
|
|
let status = Status(rawValue: errSecSuccess)
|
|
- XCTAssertEqual(status, .Success)
|
|
|
|
|
|
+ XCTAssertEqual(status, .success)
|
|
XCTAssertEqual(status?.description, "No error.")
|
|
XCTAssertEqual(status?.description, "No error.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnimplemented)
|
|
let status = Status(rawValue: errSecUnimplemented)
|
|
- XCTAssertEqual(status, .Unimplemented)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unimplemented)
|
|
XCTAssertEqual(status?.description, "Function or operation not implemented.")
|
|
XCTAssertEqual(status?.description, "Function or operation not implemented.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDskFull)
|
|
let status = Status(rawValue: errSecDskFull)
|
|
- XCTAssertEqual(status, .DiskFull)
|
|
|
|
|
|
+ XCTAssertEqual(status, .diskFull)
|
|
XCTAssertEqual(status?.description, "The disk is full.")
|
|
XCTAssertEqual(status?.description, "The disk is full.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIO)
|
|
let status = Status(rawValue: errSecIO)
|
|
- XCTAssertEqual(status, .IO)
|
|
|
|
|
|
+ XCTAssertEqual(status, .io)
|
|
XCTAssertEqual(status?.description, "I/O error (bummers)")
|
|
XCTAssertEqual(status?.description, "I/O error (bummers)")
|
|
}
|
|
}
|
|
#if os(iOS)
|
|
#if os(iOS)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOpWr)
|
|
let status = Status(rawValue: errSecOpWr)
|
|
- XCTAssertEqual(status, .OpWr)
|
|
|
|
|
|
+ XCTAssertEqual(status, .opWr)
|
|
XCTAssertEqual(status?.description, "file already open with with write permission")
|
|
XCTAssertEqual(status?.description, "file already open with with write permission")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecParam)
|
|
let status = Status(rawValue: errSecParam)
|
|
- XCTAssertEqual(status, .Param)
|
|
|
|
|
|
+ XCTAssertEqual(status, .param)
|
|
XCTAssertEqual(status?.description, "One or more parameters passed to a function were not valid.")
|
|
XCTAssertEqual(status?.description, "One or more parameters passed to a function were not valid.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecWrPerm)
|
|
let status = Status(rawValue: errSecWrPerm)
|
|
- XCTAssertEqual(status, .WrPerm)
|
|
|
|
|
|
+ XCTAssertEqual(status, .wrPerm)
|
|
XCTAssertEqual(status?.description, "write permissions error")
|
|
XCTAssertEqual(status?.description, "write permissions error")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAllocate)
|
|
let status = Status(rawValue: errSecAllocate)
|
|
- XCTAssertEqual(status, .Allocate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .allocate)
|
|
XCTAssertEqual(status?.description, "Failed to allocate memory.")
|
|
XCTAssertEqual(status?.description, "Failed to allocate memory.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUserCanceled)
|
|
let status = Status(rawValue: errSecUserCanceled)
|
|
- XCTAssertEqual(status, .UserCanceled)
|
|
|
|
|
|
+ XCTAssertEqual(status, .userCanceled)
|
|
XCTAssertEqual(status?.description, "User canceled the operation.")
|
|
XCTAssertEqual(status?.description, "User canceled the operation.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecBadReq)
|
|
let status = Status(rawValue: errSecBadReq)
|
|
- XCTAssertEqual(status, .BadReq)
|
|
|
|
|
|
+ XCTAssertEqual(status, .badReq)
|
|
XCTAssertEqual(status?.description, "Bad parameter or invalid state for operation.")
|
|
XCTAssertEqual(status?.description, "Bad parameter or invalid state for operation.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInternalComponent)
|
|
let status = Status(rawValue: errSecInternalComponent)
|
|
- XCTAssertEqual(status, .InternalComponent)
|
|
|
|
|
|
+ XCTAssertEqual(status, .internalComponent)
|
|
XCTAssertEqual(status?.description, "")
|
|
XCTAssertEqual(status?.description, "")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNotAvailable)
|
|
let status = Status(rawValue: errSecNotAvailable)
|
|
- XCTAssertEqual(status, .NotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .notAvailable)
|
|
XCTAssertEqual(status?.description, "No keychain is available. You may need to restart your computer.")
|
|
XCTAssertEqual(status?.description, "No keychain is available. You may need to restart your computer.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecReadOnly)
|
|
let status = Status(rawValue: errSecReadOnly)
|
|
- XCTAssertEqual(status, .ReadOnly)
|
|
|
|
|
|
+ XCTAssertEqual(status, .readOnly)
|
|
XCTAssertEqual(status?.description, "This keychain cannot be modified.")
|
|
XCTAssertEqual(status?.description, "This keychain cannot be modified.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAuthFailed)
|
|
let status = Status(rawValue: errSecAuthFailed)
|
|
- XCTAssertEqual(status, .AuthFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .authFailed)
|
|
XCTAssertEqual(status?.description, "The user name or passphrase you entered is not correct.")
|
|
XCTAssertEqual(status?.description, "The user name or passphrase you entered is not correct.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoSuchKeychain)
|
|
let status = Status(rawValue: errSecNoSuchKeychain)
|
|
- XCTAssertEqual(status, .NoSuchKeychain)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noSuchKeychain)
|
|
XCTAssertEqual(status?.description, "The specified keychain could not be found.")
|
|
XCTAssertEqual(status?.description, "The specified keychain could not be found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeychain)
|
|
let status = Status(rawValue: errSecInvalidKeychain)
|
|
- XCTAssertEqual(status, .InvalidKeychain)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeychain)
|
|
XCTAssertEqual(status?.description, "The specified keychain is not a valid keychain file.")
|
|
XCTAssertEqual(status?.description, "The specified keychain is not a valid keychain file.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDuplicateKeychain)
|
|
let status = Status(rawValue: errSecDuplicateKeychain)
|
|
- XCTAssertEqual(status, .DuplicateKeychain)
|
|
|
|
|
|
+ XCTAssertEqual(status, .duplicateKeychain)
|
|
XCTAssertEqual(status?.description, "A keychain with the same name already exists.")
|
|
XCTAssertEqual(status?.description, "A keychain with the same name already exists.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDuplicateCallback)
|
|
let status = Status(rawValue: errSecDuplicateCallback)
|
|
- XCTAssertEqual(status, .DuplicateCallback)
|
|
|
|
|
|
+ XCTAssertEqual(status, .duplicateCallback)
|
|
XCTAssertEqual(status?.description, "The specified callback function is already installed.")
|
|
XCTAssertEqual(status?.description, "The specified callback function is already installed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCallback)
|
|
let status = Status(rawValue: errSecInvalidCallback)
|
|
- XCTAssertEqual(status, .InvalidCallback)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCallback)
|
|
XCTAssertEqual(status?.description, "The specified callback function is not valid.")
|
|
XCTAssertEqual(status?.description, "The specified callback function is not valid.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDuplicateItem)
|
|
let status = Status(rawValue: errSecDuplicateItem)
|
|
- XCTAssertEqual(status, .DuplicateItem)
|
|
|
|
|
|
+ XCTAssertEqual(status, .duplicateItem)
|
|
XCTAssertEqual(status?.description, "The specified item already exists in the keychain.")
|
|
XCTAssertEqual(status?.description, "The specified item already exists in the keychain.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecItemNotFound)
|
|
let status = Status(rawValue: errSecItemNotFound)
|
|
- XCTAssertEqual(status, .ItemNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemNotFound)
|
|
XCTAssertEqual(status?.description, "The specified item could not be found in the keychain.")
|
|
XCTAssertEqual(status?.description, "The specified item could not be found in the keychain.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecBufferTooSmall)
|
|
let status = Status(rawValue: errSecBufferTooSmall)
|
|
- XCTAssertEqual(status, .BufferTooSmall)
|
|
|
|
|
|
+ XCTAssertEqual(status, .bufferTooSmall)
|
|
XCTAssertEqual(status?.description, "There is not enough memory available to use the specified item.")
|
|
XCTAssertEqual(status?.description, "There is not enough memory available to use the specified item.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDataTooLarge)
|
|
let status = Status(rawValue: errSecDataTooLarge)
|
|
- XCTAssertEqual(status, .DataTooLarge)
|
|
|
|
|
|
+ XCTAssertEqual(status, .dataTooLarge)
|
|
XCTAssertEqual(status?.description, "This item contains information which is too large or in a format that cannot be displayed.")
|
|
XCTAssertEqual(status?.description, "This item contains information which is too large or in a format that cannot be displayed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoSuchAttr)
|
|
let status = Status(rawValue: errSecNoSuchAttr)
|
|
- XCTAssertEqual(status, .NoSuchAttr)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noSuchAttr)
|
|
XCTAssertEqual(status?.description, "The specified attribute does not exist.")
|
|
XCTAssertEqual(status?.description, "The specified attribute does not exist.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidItemRef)
|
|
let status = Status(rawValue: errSecInvalidItemRef)
|
|
- XCTAssertEqual(status, .InvalidItemRef)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidItemRef)
|
|
XCTAssertEqual(status?.description, "The specified item is no longer valid. It may have been deleted from the keychain.")
|
|
XCTAssertEqual(status?.description, "The specified item is no longer valid. It may have been deleted from the keychain.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSearchRef)
|
|
let status = Status(rawValue: errSecInvalidSearchRef)
|
|
- XCTAssertEqual(status, .InvalidSearchRef)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSearchRef)
|
|
XCTAssertEqual(status?.description, "Unable to search the current keychain.")
|
|
XCTAssertEqual(status?.description, "Unable to search the current keychain.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoSuchClass)
|
|
let status = Status(rawValue: errSecNoSuchClass)
|
|
- XCTAssertEqual(status, .NoSuchClass)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noSuchClass)
|
|
XCTAssertEqual(status?.description, "The specified item does not appear to be a valid keychain item.")
|
|
XCTAssertEqual(status?.description, "The specified item does not appear to be a valid keychain item.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoDefaultKeychain)
|
|
let status = Status(rawValue: errSecNoDefaultKeychain)
|
|
- XCTAssertEqual(status, .NoDefaultKeychain)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noDefaultKeychain)
|
|
XCTAssertEqual(status?.description, "A default keychain could not be found.")
|
|
XCTAssertEqual(status?.description, "A default keychain could not be found.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInteractionNotAllowed)
|
|
let status = Status(rawValue: errSecInteractionNotAllowed)
|
|
- XCTAssertEqual(status, .InteractionNotAllowed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .interactionNotAllowed)
|
|
XCTAssertEqual(status?.description, "User interaction is not allowed.")
|
|
XCTAssertEqual(status?.description, "User interaction is not allowed.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecReadOnlyAttr)
|
|
let status = Status(rawValue: errSecReadOnlyAttr)
|
|
- XCTAssertEqual(status, .ReadOnlyAttr)
|
|
|
|
|
|
+ XCTAssertEqual(status, .readOnlyAttr)
|
|
XCTAssertEqual(status?.description, "The specified attribute could not be modified.")
|
|
XCTAssertEqual(status?.description, "The specified attribute could not be modified.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecWrongSecVersion)
|
|
let status = Status(rawValue: errSecWrongSecVersion)
|
|
- XCTAssertEqual(status, .WrongSecVersion)
|
|
|
|
|
|
+ XCTAssertEqual(status, .wrongSecVersion)
|
|
XCTAssertEqual(status?.description, "This keychain was created by a different version of the system software and cannot be opened.")
|
|
XCTAssertEqual(status?.description, "This keychain was created by a different version of the system software and cannot be opened.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecKeySizeNotAllowed)
|
|
let status = Status(rawValue: errSecKeySizeNotAllowed)
|
|
- XCTAssertEqual(status, .KeySizeNotAllowed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .keySizeNotAllowed)
|
|
XCTAssertEqual(status?.description, "This item specifies a key size which is too large.")
|
|
XCTAssertEqual(status?.description, "This item specifies a key size which is too large.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoStorageModule)
|
|
let status = Status(rawValue: errSecNoStorageModule)
|
|
- XCTAssertEqual(status, .NoStorageModule)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noStorageModule)
|
|
XCTAssertEqual(status?.description, "A required component (data storage module) could not be loaded. You may need to restart your computer.")
|
|
XCTAssertEqual(status?.description, "A required component (data storage module) could not be loaded. You may need to restart your computer.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoCertificateModule)
|
|
let status = Status(rawValue: errSecNoCertificateModule)
|
|
- XCTAssertEqual(status, .NoCertificateModule)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noCertificateModule)
|
|
XCTAssertEqual(status?.description, "A required component (certificate module) could not be loaded. You may need to restart your computer.")
|
|
XCTAssertEqual(status?.description, "A required component (certificate module) could not be loaded. You may need to restart your computer.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoPolicyModule)
|
|
let status = Status(rawValue: errSecNoPolicyModule)
|
|
- XCTAssertEqual(status, .NoPolicyModule)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noPolicyModule)
|
|
XCTAssertEqual(status?.description, "A required component (policy module) could not be loaded. You may need to restart your computer.")
|
|
XCTAssertEqual(status?.description, "A required component (policy module) could not be loaded. You may need to restart your computer.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInteractionRequired)
|
|
let status = Status(rawValue: errSecInteractionRequired)
|
|
- XCTAssertEqual(status, .InteractionRequired)
|
|
|
|
|
|
+ XCTAssertEqual(status, .interactionRequired)
|
|
XCTAssertEqual(status?.description, "User interaction is required, but is currently not allowed.")
|
|
XCTAssertEqual(status?.description, "User interaction is required, but is currently not allowed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDataNotAvailable)
|
|
let status = Status(rawValue: errSecDataNotAvailable)
|
|
- XCTAssertEqual(status, .DataNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .dataNotAvailable)
|
|
XCTAssertEqual(status?.description, "The contents of this item cannot be retrieved.")
|
|
XCTAssertEqual(status?.description, "The contents of this item cannot be retrieved.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDataNotModifiable)
|
|
let status = Status(rawValue: errSecDataNotModifiable)
|
|
- XCTAssertEqual(status, .DataNotModifiable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .dataNotModifiable)
|
|
XCTAssertEqual(status?.description, "The contents of this item cannot be modified.")
|
|
XCTAssertEqual(status?.description, "The contents of this item cannot be modified.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCreateChainFailed)
|
|
let status = Status(rawValue: errSecCreateChainFailed)
|
|
- XCTAssertEqual(status, .CreateChainFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .createChainFailed)
|
|
XCTAssertEqual(status?.description, "One or more certificates required to validate this certificate cannot be found.")
|
|
XCTAssertEqual(status?.description, "One or more certificates required to validate this certificate cannot be found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPrefsDomain)
|
|
let status = Status(rawValue: errSecInvalidPrefsDomain)
|
|
- XCTAssertEqual(status, .InvalidPrefsDomain)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPrefsDomain)
|
|
XCTAssertEqual(status?.description, "The specified preferences domain is not valid.")
|
|
XCTAssertEqual(status?.description, "The specified preferences domain is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInDarkWake)
|
|
let status = Status(rawValue: errSecInDarkWake)
|
|
- XCTAssertEqual(status, .InDarkWake)
|
|
|
|
|
|
+ XCTAssertEqual(status, .inDarkWake)
|
|
XCTAssertEqual(status?.description, "In dark wake, no UI possible")
|
|
XCTAssertEqual(status?.description, "In dark wake, no UI possible")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecACLNotSimple)
|
|
let status = Status(rawValue: errSecACLNotSimple)
|
|
- XCTAssertEqual(status, .ACLNotSimple)
|
|
|
|
|
|
+ XCTAssertEqual(status, .aclNotSimple)
|
|
XCTAssertEqual(status?.description, "The specified access control list is not in standard (simple) form.")
|
|
XCTAssertEqual(status?.description, "The specified access control list is not in standard (simple) form.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPolicyNotFound)
|
|
let status = Status(rawValue: errSecPolicyNotFound)
|
|
- XCTAssertEqual(status, .PolicyNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .policyNotFound)
|
|
XCTAssertEqual(status?.description, "The specified policy cannot be found.")
|
|
XCTAssertEqual(status?.description, "The specified policy cannot be found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTrustSetting)
|
|
let status = Status(rawValue: errSecInvalidTrustSetting)
|
|
- XCTAssertEqual(status, .InvalidTrustSetting)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTrustSetting)
|
|
XCTAssertEqual(status?.description, "The specified trust setting is invalid.")
|
|
XCTAssertEqual(status?.description, "The specified trust setting is invalid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoAccessForItem)
|
|
let status = Status(rawValue: errSecNoAccessForItem)
|
|
- XCTAssertEqual(status, .NoAccessForItem)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noAccessForItem)
|
|
XCTAssertEqual(status?.description, "The specified item has no access control.")
|
|
XCTAssertEqual(status?.description, "The specified item has no access control.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidOwnerEdit)
|
|
let status = Status(rawValue: errSecInvalidOwnerEdit)
|
|
- XCTAssertEqual(status, .InvalidOwnerEdit)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidOwnerEdit)
|
|
XCTAssertEqual(status?.description, "Invalid attempt to change the owner of this item.")
|
|
XCTAssertEqual(status?.description, "Invalid attempt to change the owner of this item.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTrustNotAvailable)
|
|
let status = Status(rawValue: errSecTrustNotAvailable)
|
|
- XCTAssertEqual(status, .TrustNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .trustNotAvailable)
|
|
XCTAssertEqual(status?.description, "No trust results are available.")
|
|
XCTAssertEqual(status?.description, "No trust results are available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedFormat)
|
|
let status = Status(rawValue: errSecUnsupportedFormat)
|
|
- XCTAssertEqual(status, .UnsupportedFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedFormat)
|
|
XCTAssertEqual(status?.description, "Import/Export format unsupported.")
|
|
XCTAssertEqual(status?.description, "Import/Export format unsupported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownFormat)
|
|
let status = Status(rawValue: errSecUnknownFormat)
|
|
- XCTAssertEqual(status, .UnknownFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownFormat)
|
|
XCTAssertEqual(status?.description, "Unknown format in import.")
|
|
XCTAssertEqual(status?.description, "Unknown format in import.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecKeyIsSensitive)
|
|
let status = Status(rawValue: errSecKeyIsSensitive)
|
|
- XCTAssertEqual(status, .KeyIsSensitive)
|
|
|
|
|
|
+ XCTAssertEqual(status, .keyIsSensitive)
|
|
XCTAssertEqual(status?.description, "Key material must be wrapped for export.")
|
|
XCTAssertEqual(status?.description, "Key material must be wrapped for export.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMultiplePrivKeys)
|
|
let status = Status(rawValue: errSecMultiplePrivKeys)
|
|
- XCTAssertEqual(status, .MultiplePrivKeys)
|
|
|
|
|
|
+ XCTAssertEqual(status, .multiplePrivKeys)
|
|
XCTAssertEqual(status?.description, "An attempt was made to import multiple private keys.")
|
|
XCTAssertEqual(status?.description, "An attempt was made to import multiple private keys.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPassphraseRequired)
|
|
let status = Status(rawValue: errSecPassphraseRequired)
|
|
- XCTAssertEqual(status, .PassphraseRequired)
|
|
|
|
|
|
+ XCTAssertEqual(status, .passphraseRequired)
|
|
XCTAssertEqual(status?.description, "Passphrase is required for import/export.")
|
|
XCTAssertEqual(status?.description, "Passphrase is required for import/export.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPasswordRef)
|
|
let status = Status(rawValue: errSecInvalidPasswordRef)
|
|
- XCTAssertEqual(status, .InvalidPasswordRef)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPasswordRef)
|
|
XCTAssertEqual(status?.description, "The password reference was invalid.")
|
|
XCTAssertEqual(status?.description, "The password reference was invalid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTrustSettings)
|
|
let status = Status(rawValue: errSecInvalidTrustSettings)
|
|
- XCTAssertEqual(status, .InvalidTrustSettings)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTrustSettings)
|
|
XCTAssertEqual(status?.description, "The Trust Settings Record was corrupted.")
|
|
XCTAssertEqual(status?.description, "The Trust Settings Record was corrupted.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoTrustSettings)
|
|
let status = Status(rawValue: errSecNoTrustSettings)
|
|
- XCTAssertEqual(status, .NoTrustSettings)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noTrustSettings)
|
|
XCTAssertEqual(status?.description, "No Trust Settings were found.")
|
|
XCTAssertEqual(status?.description, "No Trust Settings were found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPkcs12VerifyFailure)
|
|
let status = Status(rawValue: errSecPkcs12VerifyFailure)
|
|
- XCTAssertEqual(status, .Pkcs12VerifyFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .pkcs12VerifyFailure)
|
|
XCTAssertEqual(status?.description, "MAC verification failed during PKCS12 import (wrong password?)")
|
|
XCTAssertEqual(status?.description, "MAC verification failed during PKCS12 import (wrong password?)")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecInvalidCertificate: OSStatus = -26265
|
|
let errSecInvalidCertificate: OSStatus = -26265
|
|
let status = Status(rawValue: errSecInvalidCertificate)
|
|
let status = Status(rawValue: errSecInvalidCertificate)
|
|
- XCTAssertEqual(status, .InvalidCertificate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCertificate)
|
|
XCTAssertEqual(status?.description, "This certificate could not be decoded.")
|
|
XCTAssertEqual(status?.description, "This certificate could not be decoded.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNotSigner)
|
|
let status = Status(rawValue: errSecNotSigner)
|
|
- XCTAssertEqual(status, .NotSigner)
|
|
|
|
|
|
+ XCTAssertEqual(status, .notSigner)
|
|
XCTAssertEqual(status?.description, "A certificate was not signed by its proposed parent.")
|
|
XCTAssertEqual(status?.description, "A certificate was not signed by its proposed parent.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecPolicyDenied: OSStatus = -26270
|
|
let errSecPolicyDenied: OSStatus = -26270
|
|
let status = Status(rawValue: errSecPolicyDenied)
|
|
let status = Status(rawValue: errSecPolicyDenied)
|
|
- XCTAssertEqual(status, .PolicyDenied)
|
|
|
|
|
|
+ XCTAssertEqual(status, .policyDenied)
|
|
XCTAssertEqual(status?.description, "The certificate chain was not trusted due to a policy not accepting it.")
|
|
XCTAssertEqual(status?.description, "The certificate chain was not trusted due to a policy not accepting it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecInvalidKey: OSStatus = -26274
|
|
let errSecInvalidKey: OSStatus = -26274
|
|
let status = Status(rawValue: errSecInvalidKey)
|
|
let status = Status(rawValue: errSecInvalidKey)
|
|
- XCTAssertEqual(status, .InvalidKey)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKey)
|
|
XCTAssertEqual(status?.description, "The provided key material was not valid.")
|
|
XCTAssertEqual(status?.description, "The provided key material was not valid.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDecode)
|
|
let status = Status(rawValue: errSecDecode)
|
|
- XCTAssertEqual(status, .Decode)
|
|
|
|
|
|
+ XCTAssertEqual(status, .decode)
|
|
XCTAssertEqual(status?.description, "Unable to decode the provided data.")
|
|
XCTAssertEqual(status?.description, "Unable to decode the provided data.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecInternal: OSStatus = -26276
|
|
let errSecInternal: OSStatus = -26276
|
|
let status = Status(rawValue: errSecInternal)
|
|
let status = Status(rawValue: errSecInternal)
|
|
- XCTAssertEqual(status, .Internal)
|
|
|
|
|
|
+ XCTAssertEqual(status, .internal)
|
|
XCTAssertEqual(status?.description, "An internal error occurred in the Security framework.")
|
|
XCTAssertEqual(status?.description, "An internal error occurred in the Security framework.")
|
|
}
|
|
}
|
|
#if os(OSX)
|
|
#if os(OSX)
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecServiceNotAvailable)
|
|
let status = Status(rawValue: errSecServiceNotAvailable)
|
|
- XCTAssertEqual(status, .ServiceNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .serviceNotAvailable)
|
|
XCTAssertEqual(status?.description, "The required service is not available.")
|
|
XCTAssertEqual(status?.description, "The required service is not available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUnsupportedAlgorithm: OSStatus = -26268
|
|
let errSecUnsupportedAlgorithm: OSStatus = -26268
|
|
let status = Status(rawValue: errSecUnsupportedAlgorithm)
|
|
let status = Status(rawValue: errSecUnsupportedAlgorithm)
|
|
- XCTAssertEqual(status, .UnsupportedAlgorithm)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedAlgorithm)
|
|
XCTAssertEqual(status?.description, "An unsupported algorithm was encountered.")
|
|
XCTAssertEqual(status?.description, "An unsupported algorithm was encountered.")
|
|
}
|
|
}
|
|
- do {
|
|
|
|
|
|
+ do {
|
|
let errSecUnsupportedOperation: OSStatus = -26271
|
|
let errSecUnsupportedOperation: OSStatus = -26271
|
|
let status = Status(rawValue: errSecUnsupportedOperation)
|
|
let status = Status(rawValue: errSecUnsupportedOperation)
|
|
- XCTAssertEqual(status, .UnsupportedOperation)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedOperation)
|
|
XCTAssertEqual(status?.description, "The operation you requested is not supported by this key.")
|
|
XCTAssertEqual(status?.description, "The operation you requested is not supported by this key.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUnsupportedPadding: OSStatus = -26273
|
|
let errSecUnsupportedPadding: OSStatus = -26273
|
|
let status = Status(rawValue: errSecUnsupportedPadding)
|
|
let status = Status(rawValue: errSecUnsupportedPadding)
|
|
- XCTAssertEqual(status, .UnsupportedPadding)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedPadding)
|
|
XCTAssertEqual(status?.description, "The padding you requested is not supported.")
|
|
XCTAssertEqual(status?.description, "The padding you requested is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemInvalidKey: OSStatus = -34000
|
|
let errSecItemInvalidKey: OSStatus = -34000
|
|
let status = Status(rawValue: errSecItemInvalidKey)
|
|
let status = Status(rawValue: errSecItemInvalidKey)
|
|
- XCTAssertEqual(status, .ItemInvalidKey)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemInvalidKey)
|
|
XCTAssertEqual(status?.description, "A string key in dictionary is not one of the supported keys.")
|
|
XCTAssertEqual(status?.description, "A string key in dictionary is not one of the supported keys.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemInvalidKeyType: OSStatus = -34001
|
|
let errSecItemInvalidKeyType: OSStatus = -34001
|
|
let status = Status(rawValue: errSecItemInvalidKeyType)
|
|
let status = Status(rawValue: errSecItemInvalidKeyType)
|
|
- XCTAssertEqual(status, .ItemInvalidKeyType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemInvalidKeyType)
|
|
XCTAssertEqual(status?.description, "A key in a dictionary is neither a CFStringRef nor a CFNumberRef.")
|
|
XCTAssertEqual(status?.description, "A key in a dictionary is neither a CFStringRef nor a CFNumberRef.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemInvalidValue: OSStatus = -34002
|
|
let errSecItemInvalidValue: OSStatus = -34002
|
|
let status = Status(rawValue: errSecItemInvalidValue)
|
|
let status = Status(rawValue: errSecItemInvalidValue)
|
|
- XCTAssertEqual(status, .ItemInvalidValue)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemInvalidValue)
|
|
XCTAssertEqual(status?.description, "A value in a dictionary is an invalid (or unsupported) CF type.")
|
|
XCTAssertEqual(status?.description, "A value in a dictionary is an invalid (or unsupported) CF type.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemClassMissing: OSStatus = -34003
|
|
let errSecItemClassMissing: OSStatus = -34003
|
|
let status = Status(rawValue: errSecItemClassMissing)
|
|
let status = Status(rawValue: errSecItemClassMissing)
|
|
- XCTAssertEqual(status, .ItemClassMissing)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemClassMissing)
|
|
XCTAssertEqual(status?.description, "No kSecItemClass key was specified in a dictionary.")
|
|
XCTAssertEqual(status?.description, "No kSecItemClass key was specified in a dictionary.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemMatchUnsupported: OSStatus = -34004
|
|
let errSecItemMatchUnsupported: OSStatus = -34004
|
|
let status = Status(rawValue: errSecItemMatchUnsupported)
|
|
let status = Status(rawValue: errSecItemMatchUnsupported)
|
|
- XCTAssertEqual(status, .ItemMatchUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemMatchUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed one or more kSecMatch keys to a function which does not support matches.")
|
|
XCTAssertEqual(status?.description, "The caller passed one or more kSecMatch keys to a function which does not support matches.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUseItemListUnsupported: OSStatus = -34005
|
|
let errSecUseItemListUnsupported: OSStatus = -34005
|
|
let status = Status(rawValue: errSecUseItemListUnsupported)
|
|
let status = Status(rawValue: errSecUseItemListUnsupported)
|
|
- XCTAssertEqual(status, .UseItemListUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .useItemListUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseItemList key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseItemList key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUseKeychainUnsupported: OSStatus = -34006
|
|
let errSecUseKeychainUnsupported: OSStatus = -34006
|
|
let status = Status(rawValue: errSecUseKeychainUnsupported)
|
|
let status = Status(rawValue: errSecUseKeychainUnsupported)
|
|
- XCTAssertEqual(status, .UseKeychainUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .useKeychainUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseKeychain key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseKeychain key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUseKeychainListUnsupported: OSStatus = -34007
|
|
let errSecUseKeychainListUnsupported: OSStatus = -34007
|
|
let status = Status(rawValue: errSecUseKeychainListUnsupported)
|
|
let status = Status(rawValue: errSecUseKeychainListUnsupported)
|
|
- XCTAssertEqual(status, .UseKeychainListUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .useKeychainListUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseKeychainList key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecUseKeychainList key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecReturnDataUnsupported: OSStatus = -34008
|
|
let errSecReturnDataUnsupported: OSStatus = -34008
|
|
let status = Status(rawValue: errSecReturnDataUnsupported)
|
|
let status = Status(rawValue: errSecReturnDataUnsupported)
|
|
- XCTAssertEqual(status, .ReturnDataUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .returnDataUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnData key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnData key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecReturnAttributesUnsupported: OSStatus = -34009
|
|
let errSecReturnAttributesUnsupported: OSStatus = -34009
|
|
let status = Status(rawValue: errSecReturnAttributesUnsupported)
|
|
let status = Status(rawValue: errSecReturnAttributesUnsupported)
|
|
- XCTAssertEqual(status, .ReturnAttributesUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .returnAttributesUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnAttributes key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnAttributes key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecReturnRefUnsupported: OSStatus = -34010
|
|
let errSecReturnRefUnsupported: OSStatus = -34010
|
|
let status = Status(rawValue: errSecReturnRefUnsupported)
|
|
let status = Status(rawValue: errSecReturnRefUnsupported)
|
|
- XCTAssertEqual(status, .ReturnRefUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .returnRefUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnRef key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnRef key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecReturnPersitentRefUnsupported: OSStatus = -34011
|
|
let errSecReturnPersitentRefUnsupported: OSStatus = -34011
|
|
let status = Status(rawValue: errSecReturnPersitentRefUnsupported)
|
|
let status = Status(rawValue: errSecReturnPersitentRefUnsupported)
|
|
- XCTAssertEqual(status, .ReturnPersitentRefUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .returnPersitentRefUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnPersistentRef key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecReturnPersistentRef key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecValueRefUnsupported: OSStatus = -34012
|
|
let errSecValueRefUnsupported: OSStatus = -34012
|
|
let status = Status(rawValue: errSecValueRefUnsupported)
|
|
let status = Status(rawValue: errSecValueRefUnsupported)
|
|
- XCTAssertEqual(status, .ValueRefUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .valueRefUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecValueRef key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecValueRef key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecValuePersistentRefUnsupported: OSStatus = -34013
|
|
let errSecValuePersistentRefUnsupported: OSStatus = -34013
|
|
let status = Status(rawValue: errSecValuePersistentRefUnsupported)
|
|
let status = Status(rawValue: errSecValuePersistentRefUnsupported)
|
|
- XCTAssertEqual(status, .ValuePersistentRefUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .valuePersistentRefUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecValuePersistentRef key to a function which does not support it.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecValuePersistentRef key to a function which does not support it.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecReturnMissingPointer: OSStatus = -34014
|
|
let errSecReturnMissingPointer: OSStatus = -34014
|
|
let status = Status(rawValue: errSecReturnMissingPointer)
|
|
let status = Status(rawValue: errSecReturnMissingPointer)
|
|
- XCTAssertEqual(status, .ReturnMissingPointer)
|
|
|
|
|
|
+ XCTAssertEqual(status, .returnMissingPointer)
|
|
XCTAssertEqual(status?.description, "The caller passed asked for something to be returned but did not pass in a result pointer.")
|
|
XCTAssertEqual(status?.description, "The caller passed asked for something to be returned but did not pass in a result pointer.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecMatchLimitUnsupported: OSStatus = -34015
|
|
let errSecMatchLimitUnsupported: OSStatus = -34015
|
|
let status = Status(rawValue: errSecMatchLimitUnsupported)
|
|
let status = Status(rawValue: errSecMatchLimitUnsupported)
|
|
- XCTAssertEqual(status, .MatchLimitUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .matchLimitUnsupported)
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecMatchLimit key to a call which does not support limits.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a kSecMatchLimit key to a call which does not support limits.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecItemIllegalQuery: OSStatus = -34016
|
|
let errSecItemIllegalQuery: OSStatus = -34016
|
|
let status = Status(rawValue: errSecItemIllegalQuery)
|
|
let status = Status(rawValue: errSecItemIllegalQuery)
|
|
- XCTAssertEqual(status, .ItemIllegalQuery)
|
|
|
|
|
|
+ XCTAssertEqual(status, .itemIllegalQuery)
|
|
XCTAssertEqual(status?.description, "The caller passed in a query which contained too many keys.")
|
|
XCTAssertEqual(status?.description, "The caller passed in a query which contained too many keys.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecWaitForCallback: OSStatus = -34017
|
|
let errSecWaitForCallback: OSStatus = -34017
|
|
let status = Status(rawValue: errSecWaitForCallback)
|
|
let status = Status(rawValue: errSecWaitForCallback)
|
|
- XCTAssertEqual(status, .WaitForCallback)
|
|
|
|
|
|
+ XCTAssertEqual(status, .waitForCallback)
|
|
XCTAssertEqual(status?.description, "This operation is incomplete, until the callback is invoked (not an error).")
|
|
XCTAssertEqual(status?.description, "This operation is incomplete, until the callback is invoked (not an error).")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecMissingEntitlement: OSStatus = -34018
|
|
let errSecMissingEntitlement: OSStatus = -34018
|
|
let status = Status(rawValue: errSecMissingEntitlement)
|
|
let status = Status(rawValue: errSecMissingEntitlement)
|
|
- XCTAssertEqual(status, .MissingEntitlement)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingEntitlement)
|
|
XCTAssertEqual(status?.description, "Internal error when a required entitlement isn't present, client has neither application-identifier nor keychain-access-groups entitlements.")
|
|
XCTAssertEqual(status?.description, "Internal error when a required entitlement isn't present, client has neither application-identifier nor keychain-access-groups entitlements.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecUpgradePending: OSStatus = -34019
|
|
let errSecUpgradePending: OSStatus = -34019
|
|
let status = Status(rawValue: errSecUpgradePending)
|
|
let status = Status(rawValue: errSecUpgradePending)
|
|
- XCTAssertEqual(status, .UpgradePending)
|
|
|
|
|
|
+ XCTAssertEqual(status, .upgradePending)
|
|
XCTAssertEqual(status?.description, "Error returned if keychain database needs a schema migration but the device is locked, clients should wait for a device unlock notification and retry the command.")
|
|
XCTAssertEqual(status?.description, "Error returned if keychain database needs a schema migration but the device is locked, clients should wait for a device unlock notification and retry the command.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecMPSignatureInvalid: OSStatus = -25327
|
|
let errSecMPSignatureInvalid: OSStatus = -25327
|
|
let status = Status(rawValue: errSecMPSignatureInvalid)
|
|
let status = Status(rawValue: errSecMPSignatureInvalid)
|
|
- XCTAssertEqual(status, .MPSignatureInvalid)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mpSignatureInvalid)
|
|
XCTAssertEqual(status?.description, "Signature invalid on MP message")
|
|
XCTAssertEqual(status?.description, "Signature invalid on MP message")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecOTRTooOld: OSStatus = -25328
|
|
let errSecOTRTooOld: OSStatus = -25328
|
|
let status = Status(rawValue: errSecOTRTooOld)
|
|
let status = Status(rawValue: errSecOTRTooOld)
|
|
- XCTAssertEqual(status, .OTRTooOld)
|
|
|
|
|
|
+ XCTAssertEqual(status, .otrTooOld)
|
|
XCTAssertEqual(status?.description, "Message is too old to use")
|
|
XCTAssertEqual(status?.description, "Message is too old to use")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let errSecOTRIDTooNew: OSStatus = -25329
|
|
let errSecOTRIDTooNew: OSStatus = -25329
|
|
let status = Status(rawValue: errSecOTRIDTooNew)
|
|
let status = Status(rawValue: errSecOTRIDTooNew)
|
|
- XCTAssertEqual(status, .OTRIDTooNew)
|
|
|
|
|
|
+ XCTAssertEqual(status, .otrIDTooNew)
|
|
XCTAssertEqual(status?.description, "Key ID is too new to use! Message from the future?")
|
|
XCTAssertEqual(status?.description, "Key ID is too new to use! Message from the future?")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInsufficientClientID)
|
|
let status = Status(rawValue: errSecInsufficientClientID)
|
|
- XCTAssertEqual(status, .InsufficientClientID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .insufficientClientID)
|
|
XCTAssertEqual(status?.description, "The client ID is not correct.")
|
|
XCTAssertEqual(status?.description, "The client ID is not correct.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDeviceReset)
|
|
let status = Status(rawValue: errSecDeviceReset)
|
|
- XCTAssertEqual(status, .DeviceReset)
|
|
|
|
|
|
+ XCTAssertEqual(status, .deviceReset)
|
|
XCTAssertEqual(status?.description, "A device reset has occurred.")
|
|
XCTAssertEqual(status?.description, "A device reset has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDeviceFailed)
|
|
let status = Status(rawValue: errSecDeviceFailed)
|
|
- XCTAssertEqual(status, .DeviceFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .deviceFailed)
|
|
XCTAssertEqual(status?.description, "A device failure has occurred.")
|
|
XCTAssertEqual(status?.description, "A device failure has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAppleAddAppACLSubject)
|
|
let status = Status(rawValue: errSecAppleAddAppACLSubject)
|
|
- XCTAssertEqual(status, .AppleAddAppACLSubject)
|
|
|
|
|
|
+ XCTAssertEqual(status, .appleAddAppACLSubject)
|
|
XCTAssertEqual(status?.description, "Adding an application ACL subject failed.")
|
|
XCTAssertEqual(status?.description, "Adding an application ACL subject failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecApplePublicKeyIncomplete)
|
|
let status = Status(rawValue: errSecApplePublicKeyIncomplete)
|
|
- XCTAssertEqual(status, .ApplePublicKeyIncomplete)
|
|
|
|
|
|
+ XCTAssertEqual(status, .applePublicKeyIncomplete)
|
|
XCTAssertEqual(status?.description, "The public key is incomplete.")
|
|
XCTAssertEqual(status?.description, "The public key is incomplete.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAppleSignatureMismatch)
|
|
let status = Status(rawValue: errSecAppleSignatureMismatch)
|
|
- XCTAssertEqual(status, .AppleSignatureMismatch)
|
|
|
|
|
|
+ XCTAssertEqual(status, .appleSignatureMismatch)
|
|
XCTAssertEqual(status?.description, "A signature mismatch has occurred.")
|
|
XCTAssertEqual(status?.description, "A signature mismatch has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAppleInvalidKeyStartDate)
|
|
let status = Status(rawValue: errSecAppleInvalidKeyStartDate)
|
|
- XCTAssertEqual(status, .AppleInvalidKeyStartDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .appleInvalidKeyStartDate)
|
|
XCTAssertEqual(status?.description, "The specified key has an invalid start date.")
|
|
XCTAssertEqual(status?.description, "The specified key has an invalid start date.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAppleInvalidKeyEndDate)
|
|
let status = Status(rawValue: errSecAppleInvalidKeyEndDate)
|
|
- XCTAssertEqual(status, .AppleInvalidKeyEndDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .appleInvalidKeyEndDate)
|
|
XCTAssertEqual(status?.description, "The specified key has an invalid end date.")
|
|
XCTAssertEqual(status?.description, "The specified key has an invalid end date.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecConversionError)
|
|
let status = Status(rawValue: errSecConversionError)
|
|
- XCTAssertEqual(status, .ConversionError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .conversionError)
|
|
XCTAssertEqual(status?.description, "A conversion error has occurred.")
|
|
XCTAssertEqual(status?.description, "A conversion error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAppleSSLv2Rollback)
|
|
let status = Status(rawValue: errSecAppleSSLv2Rollback)
|
|
- XCTAssertEqual(status, .AppleSSLv2Rollback)
|
|
|
|
|
|
+ XCTAssertEqual(status, .appleSSLv2Rollback)
|
|
XCTAssertEqual(status?.description, "A SSLv2 rollback error has occurred.")
|
|
XCTAssertEqual(status?.description, "A SSLv2 rollback error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDiskFull)
|
|
let status = Status(rawValue: errSecDiskFull)
|
|
- XCTAssertEqual(status, .DiskFull)
|
|
|
|
|
|
+ XCTAssertEqual(status, .diskFull)
|
|
XCTAssertEqual(status?.description, "The disk is full.")
|
|
XCTAssertEqual(status?.description, "The disk is full.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecQuotaExceeded)
|
|
let status = Status(rawValue: errSecQuotaExceeded)
|
|
- XCTAssertEqual(status, .QuotaExceeded)
|
|
|
|
|
|
+ XCTAssertEqual(status, .quotaExceeded)
|
|
XCTAssertEqual(status?.description, "The quota was exceeded.")
|
|
XCTAssertEqual(status?.description, "The quota was exceeded.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecFileTooBig)
|
|
let status = Status(rawValue: errSecFileTooBig)
|
|
- XCTAssertEqual(status, .FileTooBig)
|
|
|
|
|
|
+ XCTAssertEqual(status, .fileTooBig)
|
|
XCTAssertEqual(status?.description, "The file is too big.")
|
|
XCTAssertEqual(status?.description, "The file is too big.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidDatabaseBlob)
|
|
let status = Status(rawValue: errSecInvalidDatabaseBlob)
|
|
- XCTAssertEqual(status, .InvalidDatabaseBlob)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidDatabaseBlob)
|
|
XCTAssertEqual(status?.description, "The specified database has an invalid blob.")
|
|
XCTAssertEqual(status?.description, "The specified database has an invalid blob.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyBlob)
|
|
let status = Status(rawValue: errSecInvalidKeyBlob)
|
|
- XCTAssertEqual(status, .InvalidKeyBlob)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyBlob)
|
|
XCTAssertEqual(status?.description, "The specified database has an invalid key blob.")
|
|
XCTAssertEqual(status?.description, "The specified database has an invalid key blob.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIncompatibleDatabaseBlob)
|
|
let status = Status(rawValue: errSecIncompatibleDatabaseBlob)
|
|
- XCTAssertEqual(status, .IncompatibleDatabaseBlob)
|
|
|
|
|
|
+ XCTAssertEqual(status, .incompatibleDatabaseBlob)
|
|
XCTAssertEqual(status?.description, "The specified database has an incompatible blob.")
|
|
XCTAssertEqual(status?.description, "The specified database has an incompatible blob.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIncompatibleKeyBlob)
|
|
let status = Status(rawValue: errSecIncompatibleKeyBlob)
|
|
- XCTAssertEqual(status, .IncompatibleKeyBlob)
|
|
|
|
|
|
+ XCTAssertEqual(status, .incompatibleKeyBlob)
|
|
XCTAssertEqual(status?.description, "The specified database has an incompatible key blob.")
|
|
XCTAssertEqual(status?.description, "The specified database has an incompatible key blob.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecHostNameMismatch)
|
|
let status = Status(rawValue: errSecHostNameMismatch)
|
|
- XCTAssertEqual(status, .HostNameMismatch)
|
|
|
|
|
|
+ XCTAssertEqual(status, .hostNameMismatch)
|
|
XCTAssertEqual(status?.description, "A host name mismatch has occurred.")
|
|
XCTAssertEqual(status?.description, "A host name mismatch has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownCriticalExtensionFlag)
|
|
let status = Status(rawValue: errSecUnknownCriticalExtensionFlag)
|
|
- XCTAssertEqual(status, .UnknownCriticalExtensionFlag)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownCriticalExtensionFlag)
|
|
XCTAssertEqual(status?.description, "There is an unknown critical extension flag.")
|
|
XCTAssertEqual(status?.description, "There is an unknown critical extension flag.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoBasicConstraints)
|
|
let status = Status(rawValue: errSecNoBasicConstraints)
|
|
- XCTAssertEqual(status, .NoBasicConstraints)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noBasicConstraints)
|
|
XCTAssertEqual(status?.description, "No basic constraints were found.")
|
|
XCTAssertEqual(status?.description, "No basic constraints were found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoBasicConstraintsCA)
|
|
let status = Status(rawValue: errSecNoBasicConstraintsCA)
|
|
- XCTAssertEqual(status, .NoBasicConstraintsCA)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noBasicConstraintsCA)
|
|
XCTAssertEqual(status?.description, "No basic CA constraints were found.")
|
|
XCTAssertEqual(status?.description, "No basic CA constraints were found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAuthorityKeyID)
|
|
let status = Status(rawValue: errSecInvalidAuthorityKeyID)
|
|
- XCTAssertEqual(status, .InvalidAuthorityKeyID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAuthorityKeyID)
|
|
XCTAssertEqual(status?.description, "The authority key ID is not valid.")
|
|
XCTAssertEqual(status?.description, "The authority key ID is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSubjectKeyID)
|
|
let status = Status(rawValue: errSecInvalidSubjectKeyID)
|
|
- XCTAssertEqual(status, .InvalidSubjectKeyID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSubjectKeyID)
|
|
XCTAssertEqual(status?.description, "The subject key ID is not valid.")
|
|
XCTAssertEqual(status?.description, "The subject key ID is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyUsageForPolicy)
|
|
let status = Status(rawValue: errSecInvalidKeyUsageForPolicy)
|
|
- XCTAssertEqual(status, .InvalidKeyUsageForPolicy)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyUsageForPolicy)
|
|
XCTAssertEqual(status?.description, "The key usage is not valid for the specified policy.")
|
|
XCTAssertEqual(status?.description, "The key usage is not valid for the specified policy.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidExtendedKeyUsage)
|
|
let status = Status(rawValue: errSecInvalidExtendedKeyUsage)
|
|
- XCTAssertEqual(status, .InvalidExtendedKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidExtendedKeyUsage)
|
|
XCTAssertEqual(status?.description, "The extended key usage is not valid.")
|
|
XCTAssertEqual(status?.description, "The extended key usage is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidIDLinkage)
|
|
let status = Status(rawValue: errSecInvalidIDLinkage)
|
|
- XCTAssertEqual(status, .InvalidIDLinkage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidIDLinkage)
|
|
XCTAssertEqual(status?.description, "The ID linkage is not valid.")
|
|
XCTAssertEqual(status?.description, "The ID linkage is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPathLengthConstraintExceeded)
|
|
let status = Status(rawValue: errSecPathLengthConstraintExceeded)
|
|
- XCTAssertEqual(status, .PathLengthConstraintExceeded)
|
|
|
|
|
|
+ XCTAssertEqual(status, .pathLengthConstraintExceeded)
|
|
XCTAssertEqual(status?.description, "The path length constraint was exceeded.")
|
|
XCTAssertEqual(status?.description, "The path length constraint was exceeded.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidRoot)
|
|
let status = Status(rawValue: errSecInvalidRoot)
|
|
- XCTAssertEqual(status, .InvalidRoot)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidRoot)
|
|
XCTAssertEqual(status?.description, "The root or anchor certificate is not valid.")
|
|
XCTAssertEqual(status?.description, "The root or anchor certificate is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLExpired)
|
|
let status = Status(rawValue: errSecCRLExpired)
|
|
- XCTAssertEqual(status, .CRLExpired)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlExpired)
|
|
XCTAssertEqual(status?.description, "The CRL has expired.")
|
|
XCTAssertEqual(status?.description, "The CRL has expired.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLNotValidYet)
|
|
let status = Status(rawValue: errSecCRLNotValidYet)
|
|
- XCTAssertEqual(status, .CRLNotValidYet)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlNotValidYet)
|
|
XCTAssertEqual(status?.description, "The CRL is not yet valid.")
|
|
XCTAssertEqual(status?.description, "The CRL is not yet valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLNotFound)
|
|
let status = Status(rawValue: errSecCRLNotFound)
|
|
- XCTAssertEqual(status, .CRLNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlNotFound)
|
|
XCTAssertEqual(status?.description, "The CRL was not found.")
|
|
XCTAssertEqual(status?.description, "The CRL was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLServerDown)
|
|
let status = Status(rawValue: errSecCRLServerDown)
|
|
- XCTAssertEqual(status, .CRLServerDown)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlServerDown)
|
|
XCTAssertEqual(status?.description, "The CRL server is down.")
|
|
XCTAssertEqual(status?.description, "The CRL server is down.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLBadURI)
|
|
let status = Status(rawValue: errSecCRLBadURI)
|
|
- XCTAssertEqual(status, .CRLBadURI)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlBadURI)
|
|
XCTAssertEqual(status?.description, "The CRL has a bad Uniform Resource Identifier.")
|
|
XCTAssertEqual(status?.description, "The CRL has a bad Uniform Resource Identifier.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownCertExtension)
|
|
let status = Status(rawValue: errSecUnknownCertExtension)
|
|
- XCTAssertEqual(status, .UnknownCertExtension)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownCertExtension)
|
|
XCTAssertEqual(status?.description, "An unknown certificate extension was encountered.")
|
|
XCTAssertEqual(status?.description, "An unknown certificate extension was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownCRLExtension)
|
|
let status = Status(rawValue: errSecUnknownCRLExtension)
|
|
- XCTAssertEqual(status, .UnknownCRLExtension)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownCRLExtension)
|
|
XCTAssertEqual(status?.description, "An unknown CRL extension was encountered.")
|
|
XCTAssertEqual(status?.description, "An unknown CRL extension was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLNotTrusted)
|
|
let status = Status(rawValue: errSecCRLNotTrusted)
|
|
- XCTAssertEqual(status, .CRLNotTrusted)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlNotTrusted)
|
|
XCTAssertEqual(status?.description, "The CRL is not trusted.")
|
|
XCTAssertEqual(status?.description, "The CRL is not trusted.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLPolicyFailed)
|
|
let status = Status(rawValue: errSecCRLPolicyFailed)
|
|
- XCTAssertEqual(status, .CRLPolicyFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlPolicyFailed)
|
|
XCTAssertEqual(status?.description, "The CRL policy failed.")
|
|
XCTAssertEqual(status?.description, "The CRL policy failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIDPFailure)
|
|
let status = Status(rawValue: errSecIDPFailure)
|
|
- XCTAssertEqual(status, .IDPFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .idpFailure)
|
|
XCTAssertEqual(status?.description, "The issuing distribution point was not valid.")
|
|
XCTAssertEqual(status?.description, "The issuing distribution point was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMEEmailAddressesNotFound)
|
|
let status = Status(rawValue: errSecSMIMEEmailAddressesNotFound)
|
|
- XCTAssertEqual(status, .SMIMEEmailAddressesNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeEmailAddressesNotFound)
|
|
XCTAssertEqual(status?.description, "An email address mismatch was encountered.")
|
|
XCTAssertEqual(status?.description, "An email address mismatch was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMEBadExtendedKeyUsage)
|
|
let status = Status(rawValue: errSecSMIMEBadExtendedKeyUsage)
|
|
- XCTAssertEqual(status, .SMIMEBadExtendedKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeBadExtendedKeyUsage)
|
|
XCTAssertEqual(status?.description, "The appropriate extended key usage for SMIME was not found.")
|
|
XCTAssertEqual(status?.description, "The appropriate extended key usage for SMIME was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMEBadKeyUsage)
|
|
let status = Status(rawValue: errSecSMIMEBadKeyUsage)
|
|
- XCTAssertEqual(status, .SMIMEBadKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeBadKeyUsage)
|
|
XCTAssertEqual(status?.description, "The key usage is not compatible with SMIME.")
|
|
XCTAssertEqual(status?.description, "The key usage is not compatible with SMIME.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMEKeyUsageNotCritical)
|
|
let status = Status(rawValue: errSecSMIMEKeyUsageNotCritical)
|
|
- XCTAssertEqual(status, .SMIMEKeyUsageNotCritical)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeKeyUsageNotCritical)
|
|
XCTAssertEqual(status?.description, "The key usage extension is not marked as critical.")
|
|
XCTAssertEqual(status?.description, "The key usage extension is not marked as critical.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMENoEmailAddress)
|
|
let status = Status(rawValue: errSecSMIMENoEmailAddress)
|
|
- XCTAssertEqual(status, .SMIMENoEmailAddress)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeNoEmailAddress)
|
|
XCTAssertEqual(status?.description, "No email address was found in the certificate.")
|
|
XCTAssertEqual(status?.description, "No email address was found in the certificate.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSMIMESubjAltNameNotCritical)
|
|
let status = Status(rawValue: errSecSMIMESubjAltNameNotCritical)
|
|
- XCTAssertEqual(status, .SMIMESubjAltNameNotCritical)
|
|
|
|
|
|
+ XCTAssertEqual(status, .smimeSubjAltNameNotCritical)
|
|
XCTAssertEqual(status?.description, "The subject alternative name extension is not marked as critical.")
|
|
XCTAssertEqual(status?.description, "The subject alternative name extension is not marked as critical.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSSLBadExtendedKeyUsage)
|
|
let status = Status(rawValue: errSecSSLBadExtendedKeyUsage)
|
|
- XCTAssertEqual(status, .SSLBadExtendedKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .sslBadExtendedKeyUsage)
|
|
XCTAssertEqual(status?.description, "The appropriate extended key usage for SSL was not found.")
|
|
XCTAssertEqual(status?.description, "The appropriate extended key usage for SSL was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPBadResponse)
|
|
let status = Status(rawValue: errSecOCSPBadResponse)
|
|
- XCTAssertEqual(status, .OCSPBadResponse)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspBadResponse)
|
|
XCTAssertEqual(status?.description, "The OCSP response was incorrect or could not be parsed.")
|
|
XCTAssertEqual(status?.description, "The OCSP response was incorrect or could not be parsed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPBadRequest)
|
|
let status = Status(rawValue: errSecOCSPBadRequest)
|
|
- XCTAssertEqual(status, .OCSPBadRequest)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspBadRequest)
|
|
XCTAssertEqual(status?.description, "The OCSP request was incorrect or could not be parsed.")
|
|
XCTAssertEqual(status?.description, "The OCSP request was incorrect or could not be parsed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPUnavailable)
|
|
let status = Status(rawValue: errSecOCSPUnavailable)
|
|
- XCTAssertEqual(status, .OCSPUnavailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspUnavailable)
|
|
XCTAssertEqual(status?.description, "OCSP service is unavailable.")
|
|
XCTAssertEqual(status?.description, "OCSP service is unavailable.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPStatusUnrecognized)
|
|
let status = Status(rawValue: errSecOCSPStatusUnrecognized)
|
|
- XCTAssertEqual(status, .OCSPStatusUnrecognized)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspStatusUnrecognized)
|
|
XCTAssertEqual(status?.description, "The OCSP server did not recognize this certificate.")
|
|
XCTAssertEqual(status?.description, "The OCSP server did not recognize this certificate.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecEndOfData)
|
|
let status = Status(rawValue: errSecEndOfData)
|
|
- XCTAssertEqual(status, .EndOfData)
|
|
|
|
|
|
+ XCTAssertEqual(status, .endOfData)
|
|
XCTAssertEqual(status?.description, "An end-of-data was detected.")
|
|
XCTAssertEqual(status?.description, "An end-of-data was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIncompleteCertRevocationCheck)
|
|
let status = Status(rawValue: errSecIncompleteCertRevocationCheck)
|
|
- XCTAssertEqual(status, .IncompleteCertRevocationCheck)
|
|
|
|
|
|
+ XCTAssertEqual(status, .incompleteCertRevocationCheck)
|
|
XCTAssertEqual(status?.description, "An incomplete certificate revocation check occurred.")
|
|
XCTAssertEqual(status?.description, "An incomplete certificate revocation check occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNetworkFailure)
|
|
let status = Status(rawValue: errSecNetworkFailure)
|
|
- XCTAssertEqual(status, .NetworkFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .networkFailure)
|
|
XCTAssertEqual(status?.description, "A network failure occurred.")
|
|
XCTAssertEqual(status?.description, "A network failure occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPNotTrustedToAnchor)
|
|
let status = Status(rawValue: errSecOCSPNotTrustedToAnchor)
|
|
- XCTAssertEqual(status, .OCSPNotTrustedToAnchor)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspNotTrustedToAnchor)
|
|
XCTAssertEqual(status?.description, "The OCSP response was not trusted to a root or anchor certificate.")
|
|
XCTAssertEqual(status?.description, "The OCSP response was not trusted to a root or anchor certificate.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecRecordModified)
|
|
let status = Status(rawValue: errSecRecordModified)
|
|
- XCTAssertEqual(status, .RecordModified)
|
|
|
|
|
|
+ XCTAssertEqual(status, .recordModified)
|
|
XCTAssertEqual(status?.description, "The record was modified.")
|
|
XCTAssertEqual(status?.description, "The record was modified.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPSignatureError)
|
|
let status = Status(rawValue: errSecOCSPSignatureError)
|
|
- XCTAssertEqual(status, .OCSPSignatureError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspSignatureError)
|
|
XCTAssertEqual(status?.description, "The OCSP response had an invalid signature.")
|
|
XCTAssertEqual(status?.description, "The OCSP response had an invalid signature.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPNoSigner)
|
|
let status = Status(rawValue: errSecOCSPNoSigner)
|
|
- XCTAssertEqual(status, .OCSPNoSigner)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspNoSigner)
|
|
XCTAssertEqual(status?.description, "The OCSP response had no signer.")
|
|
XCTAssertEqual(status?.description, "The OCSP response had no signer.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponderMalformedReq)
|
|
let status = Status(rawValue: errSecOCSPResponderMalformedReq)
|
|
- XCTAssertEqual(status, .OCSPResponderMalformedReq)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponderMalformedReq)
|
|
XCTAssertEqual(status?.description, "The OCSP responder was given a malformed request.")
|
|
XCTAssertEqual(status?.description, "The OCSP responder was given a malformed request.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponderInternalError)
|
|
let status = Status(rawValue: errSecOCSPResponderInternalError)
|
|
- XCTAssertEqual(status, .OCSPResponderInternalError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponderInternalError)
|
|
XCTAssertEqual(status?.description, "The OCSP responder encountered an internal error.")
|
|
XCTAssertEqual(status?.description, "The OCSP responder encountered an internal error.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponderTryLater)
|
|
let status = Status(rawValue: errSecOCSPResponderTryLater)
|
|
- XCTAssertEqual(status, .OCSPResponderTryLater)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponderTryLater)
|
|
XCTAssertEqual(status?.description, "The OCSP responder is busy, try again later.")
|
|
XCTAssertEqual(status?.description, "The OCSP responder is busy, try again later.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponderSignatureRequired)
|
|
let status = Status(rawValue: errSecOCSPResponderSignatureRequired)
|
|
- XCTAssertEqual(status, .OCSPResponderSignatureRequired)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponderSignatureRequired)
|
|
XCTAssertEqual(status?.description, "The OCSP responder requires a signature.")
|
|
XCTAssertEqual(status?.description, "The OCSP responder requires a signature.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponderUnauthorized)
|
|
let status = Status(rawValue: errSecOCSPResponderUnauthorized)
|
|
- XCTAssertEqual(status, .OCSPResponderUnauthorized)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponderUnauthorized)
|
|
XCTAssertEqual(status?.description, "The OCSP responder rejected this request as unauthorized.")
|
|
XCTAssertEqual(status?.description, "The OCSP responder rejected this request as unauthorized.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOCSPResponseNonceMismatch)
|
|
let status = Status(rawValue: errSecOCSPResponseNonceMismatch)
|
|
- XCTAssertEqual(status, .OCSPResponseNonceMismatch)
|
|
|
|
|
|
+ XCTAssertEqual(status, .ocspResponseNonceMismatch)
|
|
XCTAssertEqual(status?.description, "The OCSP response nonce did not match the request.")
|
|
XCTAssertEqual(status?.description, "The OCSP response nonce did not match the request.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCodeSigningBadCertChainLength)
|
|
let status = Status(rawValue: errSecCodeSigningBadCertChainLength)
|
|
- XCTAssertEqual(status, .CodeSigningBadCertChainLength)
|
|
|
|
|
|
+ XCTAssertEqual(status, .codeSigningBadCertChainLength)
|
|
XCTAssertEqual(status?.description, "Code signing encountered an incorrect certificate chain length.")
|
|
XCTAssertEqual(status?.description, "Code signing encountered an incorrect certificate chain length.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCodeSigningNoBasicConstraints)
|
|
let status = Status(rawValue: errSecCodeSigningNoBasicConstraints)
|
|
- XCTAssertEqual(status, .CodeSigningNoBasicConstraints)
|
|
|
|
|
|
+ XCTAssertEqual(status, .codeSigningNoBasicConstraints)
|
|
XCTAssertEqual(status?.description, "Code signing found no basic constraints.")
|
|
XCTAssertEqual(status?.description, "Code signing found no basic constraints.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCodeSigningBadPathLengthConstraint)
|
|
let status = Status(rawValue: errSecCodeSigningBadPathLengthConstraint)
|
|
- XCTAssertEqual(status, .CodeSigningBadPathLengthConstraint)
|
|
|
|
|
|
+ XCTAssertEqual(status, .codeSigningBadPathLengthConstraint)
|
|
XCTAssertEqual(status?.description, "Code signing encountered an incorrect path length constraint.")
|
|
XCTAssertEqual(status?.description, "Code signing encountered an incorrect path length constraint.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCodeSigningNoExtendedKeyUsage)
|
|
let status = Status(rawValue: errSecCodeSigningNoExtendedKeyUsage)
|
|
- XCTAssertEqual(status, .CodeSigningNoExtendedKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .codeSigningNoExtendedKeyUsage)
|
|
XCTAssertEqual(status?.description, "Code signing found no extended key usage.")
|
|
XCTAssertEqual(status?.description, "Code signing found no extended key usage.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCodeSigningDevelopment)
|
|
let status = Status(rawValue: errSecCodeSigningDevelopment)
|
|
- XCTAssertEqual(status, .CodeSigningDevelopment)
|
|
|
|
|
|
+ XCTAssertEqual(status, .codeSigningDevelopment)
|
|
XCTAssertEqual(status?.description, "Code signing indicated use of a development-only certificate.")
|
|
XCTAssertEqual(status?.description, "Code signing indicated use of a development-only certificate.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecResourceSignBadCertChainLength)
|
|
let status = Status(rawValue: errSecResourceSignBadCertChainLength)
|
|
- XCTAssertEqual(status, .ResourceSignBadCertChainLength)
|
|
|
|
|
|
+ XCTAssertEqual(status, .resourceSignBadCertChainLength)
|
|
XCTAssertEqual(status?.description, "Resource signing has encountered an incorrect certificate chain length.")
|
|
XCTAssertEqual(status?.description, "Resource signing has encountered an incorrect certificate chain length.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecResourceSignBadExtKeyUsage)
|
|
let status = Status(rawValue: errSecResourceSignBadExtKeyUsage)
|
|
- XCTAssertEqual(status, .ResourceSignBadExtKeyUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .resourceSignBadExtKeyUsage)
|
|
XCTAssertEqual(status?.description, "Resource signing has encountered an error in the extended key usage.")
|
|
XCTAssertEqual(status?.description, "Resource signing has encountered an error in the extended key usage.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTrustSettingDeny)
|
|
let status = Status(rawValue: errSecTrustSettingDeny)
|
|
- XCTAssertEqual(status, .TrustSettingDeny)
|
|
|
|
|
|
+ XCTAssertEqual(status, .trustSettingDeny)
|
|
XCTAssertEqual(status?.description, "The trust setting for this policy was set to Deny.")
|
|
XCTAssertEqual(status?.description, "The trust setting for this policy was set to Deny.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSubjectName)
|
|
let status = Status(rawValue: errSecInvalidSubjectName)
|
|
- XCTAssertEqual(status, .InvalidSubjectName)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSubjectName)
|
|
XCTAssertEqual(status?.description, "An invalid certificate subject name was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid certificate subject name was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownQualifiedCertStatement)
|
|
let status = Status(rawValue: errSecUnknownQualifiedCertStatement)
|
|
- XCTAssertEqual(status, .UnknownQualifiedCertStatement)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownQualifiedCertStatement)
|
|
XCTAssertEqual(status?.description, "An unknown qualified certificate statement was encountered.")
|
|
XCTAssertEqual(status?.description, "An unknown qualified certificate statement was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeRequestQueued)
|
|
let status = Status(rawValue: errSecMobileMeRequestQueued)
|
|
- XCTAssertEqual(status, .MobileMeRequestQueued)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeRequestQueued)
|
|
XCTAssertEqual(status?.description, "The MobileMe request will be sent during the next connection.")
|
|
XCTAssertEqual(status?.description, "The MobileMe request will be sent during the next connection.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeRequestRedirected)
|
|
let status = Status(rawValue: errSecMobileMeRequestRedirected)
|
|
- XCTAssertEqual(status, .MobileMeRequestRedirected)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeRequestRedirected)
|
|
XCTAssertEqual(status?.description, "The MobileMe request was redirected.")
|
|
XCTAssertEqual(status?.description, "The MobileMe request was redirected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeServerError)
|
|
let status = Status(rawValue: errSecMobileMeServerError)
|
|
- XCTAssertEqual(status, .MobileMeServerError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeServerError)
|
|
XCTAssertEqual(status?.description, "A MobileMe server error occurred.")
|
|
XCTAssertEqual(status?.description, "A MobileMe server error occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeServerNotAvailable)
|
|
let status = Status(rawValue: errSecMobileMeServerNotAvailable)
|
|
- XCTAssertEqual(status, .MobileMeServerNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeServerNotAvailable)
|
|
XCTAssertEqual(status?.description, "The MobileMe server is not available.")
|
|
XCTAssertEqual(status?.description, "The MobileMe server is not available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeServerAlreadyExists)
|
|
let status = Status(rawValue: errSecMobileMeServerAlreadyExists)
|
|
- XCTAssertEqual(status, .MobileMeServerAlreadyExists)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeServerAlreadyExists)
|
|
XCTAssertEqual(status?.description, "The MobileMe server reported that the item already exists.")
|
|
XCTAssertEqual(status?.description, "The MobileMe server reported that the item already exists.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeServerServiceErr)
|
|
let status = Status(rawValue: errSecMobileMeServerServiceErr)
|
|
- XCTAssertEqual(status, .MobileMeServerServiceErr)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeServerServiceErr)
|
|
XCTAssertEqual(status?.description, "A MobileMe service error has occurred.")
|
|
XCTAssertEqual(status?.description, "A MobileMe service error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeRequestAlreadyPending)
|
|
let status = Status(rawValue: errSecMobileMeRequestAlreadyPending)
|
|
- XCTAssertEqual(status, .MobileMeRequestAlreadyPending)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeRequestAlreadyPending)
|
|
XCTAssertEqual(status?.description, "A MobileMe request is already pending.")
|
|
XCTAssertEqual(status?.description, "A MobileMe request is already pending.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeNoRequestPending)
|
|
let status = Status(rawValue: errSecMobileMeNoRequestPending)
|
|
- XCTAssertEqual(status, .MobileMeNoRequestPending)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeNoRequestPending)
|
|
XCTAssertEqual(status?.description, "MobileMe has no request pending.")
|
|
XCTAssertEqual(status?.description, "MobileMe has no request pending.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeCSRVerifyFailure)
|
|
let status = Status(rawValue: errSecMobileMeCSRVerifyFailure)
|
|
- XCTAssertEqual(status, .MobileMeCSRVerifyFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeCSRVerifyFailure)
|
|
XCTAssertEqual(status?.description, "A MobileMe CSR verification failure has occurred.")
|
|
XCTAssertEqual(status?.description, "A MobileMe CSR verification failure has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMobileMeFailedConsistencyCheck)
|
|
let status = Status(rawValue: errSecMobileMeFailedConsistencyCheck)
|
|
- XCTAssertEqual(status, .MobileMeFailedConsistencyCheck)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mobileMeFailedConsistencyCheck)
|
|
XCTAssertEqual(status?.description, "MobileMe has found a failed consistency check.")
|
|
XCTAssertEqual(status?.description, "MobileMe has found a failed consistency check.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNotInitialized)
|
|
let status = Status(rawValue: errSecNotInitialized)
|
|
- XCTAssertEqual(status, .NotInitialized)
|
|
|
|
|
|
+ XCTAssertEqual(status, .notInitialized)
|
|
XCTAssertEqual(status?.description, "A function was called without initializing CSSM.")
|
|
XCTAssertEqual(status?.description, "A function was called without initializing CSSM.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidHandleUsage)
|
|
let status = Status(rawValue: errSecInvalidHandleUsage)
|
|
- XCTAssertEqual(status, .InvalidHandleUsage)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidHandleUsage)
|
|
XCTAssertEqual(status?.description, "The CSSM handle does not match with the service type.")
|
|
XCTAssertEqual(status?.description, "The CSSM handle does not match with the service type.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPVCReferentNotFound)
|
|
let status = Status(rawValue: errSecPVCReferentNotFound)
|
|
- XCTAssertEqual(status, .PVCReferentNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .pvcReferentNotFound)
|
|
XCTAssertEqual(status?.description, "A reference to the calling module was not found in the list of authorized callers.")
|
|
XCTAssertEqual(status?.description, "A reference to the calling module was not found in the list of authorized callers.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecFunctionIntegrityFail)
|
|
let status = Status(rawValue: errSecFunctionIntegrityFail)
|
|
- XCTAssertEqual(status, .FunctionIntegrityFail)
|
|
|
|
|
|
+ XCTAssertEqual(status, .functionIntegrityFail)
|
|
XCTAssertEqual(status?.description, "A function address was not within the verified module.")
|
|
XCTAssertEqual(status?.description, "A function address was not within the verified module.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInternalError)
|
|
let status = Status(rawValue: errSecInternalError)
|
|
- XCTAssertEqual(status, .InternalError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .internalError)
|
|
XCTAssertEqual(status?.description, "An internal error has occurred.")
|
|
XCTAssertEqual(status?.description, "An internal error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMemoryError)
|
|
let status = Status(rawValue: errSecMemoryError)
|
|
- XCTAssertEqual(status, .MemoryError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .memoryError)
|
|
XCTAssertEqual(status?.description, "A memory error has occurred.")
|
|
XCTAssertEqual(status?.description, "A memory error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidData)
|
|
let status = Status(rawValue: errSecInvalidData)
|
|
- XCTAssertEqual(status, .InvalidData)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidData)
|
|
XCTAssertEqual(status?.description, "Invalid data was encountered.")
|
|
XCTAssertEqual(status?.description, "Invalid data was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMDSError)
|
|
let status = Status(rawValue: errSecMDSError)
|
|
- XCTAssertEqual(status, .MDSError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .mdsError)
|
|
XCTAssertEqual(status?.description, "A Module Directory Service error has occurred.")
|
|
XCTAssertEqual(status?.description, "A Module Directory Service error has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPointer)
|
|
let status = Status(rawValue: errSecInvalidPointer)
|
|
- XCTAssertEqual(status, .InvalidPointer)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPointer)
|
|
XCTAssertEqual(status?.description, "An invalid pointer was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid pointer was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSelfCheckFailed)
|
|
let status = Status(rawValue: errSecSelfCheckFailed)
|
|
- XCTAssertEqual(status, .SelfCheckFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .selfCheckFailed)
|
|
XCTAssertEqual(status?.description, "Self-check has failed.")
|
|
XCTAssertEqual(status?.description, "Self-check has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecFunctionFailed)
|
|
let status = Status(rawValue: errSecFunctionFailed)
|
|
- XCTAssertEqual(status, .FunctionFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .functionFailed)
|
|
XCTAssertEqual(status?.description, "A function has failed.")
|
|
XCTAssertEqual(status?.description, "A function has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecModuleManifestVerifyFailed)
|
|
let status = Status(rawValue: errSecModuleManifestVerifyFailed)
|
|
- XCTAssertEqual(status, .ModuleManifestVerifyFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .moduleManifestVerifyFailed)
|
|
XCTAssertEqual(status?.description, "A module manifest verification failure has occurred.")
|
|
XCTAssertEqual(status?.description, "A module manifest verification failure has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidGUID)
|
|
let status = Status(rawValue: errSecInvalidGUID)
|
|
- XCTAssertEqual(status, .InvalidGUID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidGUID)
|
|
XCTAssertEqual(status?.description, "An invalid GUID was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid GUID was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidHandle)
|
|
let status = Status(rawValue: errSecInvalidHandle)
|
|
- XCTAssertEqual(status, .InvalidHandle)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidHandle)
|
|
XCTAssertEqual(status?.description, "An invalid handle was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid handle was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidDBList)
|
|
let status = Status(rawValue: errSecInvalidDBList)
|
|
- XCTAssertEqual(status, .InvalidDBList)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidDBList)
|
|
XCTAssertEqual(status?.description, "An invalid DB list was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid DB list was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPassthroughID)
|
|
let status = Status(rawValue: errSecInvalidPassthroughID)
|
|
- XCTAssertEqual(status, .InvalidPassthroughID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPassthroughID)
|
|
XCTAssertEqual(status?.description, "An invalid passthrough ID was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid passthrough ID was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidNetworkAddress)
|
|
let status = Status(rawValue: errSecInvalidNetworkAddress)
|
|
- XCTAssertEqual(status, .InvalidNetworkAddress)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidNetworkAddress)
|
|
XCTAssertEqual(status?.description, "An invalid network address was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid network address was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCRLAlreadySigned)
|
|
let status = Status(rawValue: errSecCRLAlreadySigned)
|
|
- XCTAssertEqual(status, .CRLAlreadySigned)
|
|
|
|
|
|
+ XCTAssertEqual(status, .crlAlreadySigned)
|
|
XCTAssertEqual(status?.description, "The certificate revocation list is already signed.")
|
|
XCTAssertEqual(status?.description, "The certificate revocation list is already signed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidNumberOfFields)
|
|
let status = Status(rawValue: errSecInvalidNumberOfFields)
|
|
- XCTAssertEqual(status, .InvalidNumberOfFields)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidNumberOfFields)
|
|
XCTAssertEqual(status?.description, "An invalid number of fields were encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid number of fields were encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecVerificationFailure)
|
|
let status = Status(rawValue: errSecVerificationFailure)
|
|
- XCTAssertEqual(status, .VerificationFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .verificationFailure)
|
|
XCTAssertEqual(status?.description, "A verification failure occurred.")
|
|
XCTAssertEqual(status?.description, "A verification failure occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnknownTag)
|
|
let status = Status(rawValue: errSecUnknownTag)
|
|
- XCTAssertEqual(status, .UnknownTag)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unknownTag)
|
|
XCTAssertEqual(status?.description, "An unknown tag was encountered.")
|
|
XCTAssertEqual(status?.description, "An unknown tag was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSignature)
|
|
let status = Status(rawValue: errSecInvalidSignature)
|
|
- XCTAssertEqual(status, .InvalidSignature)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSignature)
|
|
XCTAssertEqual(status?.description, "An invalid signature was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid signature was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidName)
|
|
let status = Status(rawValue: errSecInvalidName)
|
|
- XCTAssertEqual(status, .InvalidName)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidName)
|
|
XCTAssertEqual(status?.description, "An invalid name was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid name was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCertificateRef)
|
|
let status = Status(rawValue: errSecInvalidCertificateRef)
|
|
- XCTAssertEqual(status, .InvalidCertificateRef)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCertificateRef)
|
|
XCTAssertEqual(status?.description, "An invalid certificate reference was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid certificate reference was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCertificateGroup)
|
|
let status = Status(rawValue: errSecInvalidCertificateGroup)
|
|
- XCTAssertEqual(status, .InvalidCertificateGroup)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCertificateGroup)
|
|
XCTAssertEqual(status?.description, "An invalid certificate group was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid certificate group was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTagNotFound)
|
|
let status = Status(rawValue: errSecTagNotFound)
|
|
- XCTAssertEqual(status, .TagNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .tagNotFound)
|
|
XCTAssertEqual(status?.description, "The specified tag was not found.")
|
|
XCTAssertEqual(status?.description, "The specified tag was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidQuery)
|
|
let status = Status(rawValue: errSecInvalidQuery)
|
|
- XCTAssertEqual(status, .InvalidQuery)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidQuery)
|
|
XCTAssertEqual(status?.description, "The specified query was not valid.")
|
|
XCTAssertEqual(status?.description, "The specified query was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidValue)
|
|
let status = Status(rawValue: errSecInvalidValue)
|
|
- XCTAssertEqual(status, .InvalidValue)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidValue)
|
|
XCTAssertEqual(status?.description, "An invalid value was detected.")
|
|
XCTAssertEqual(status?.description, "An invalid value was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCallbackFailed)
|
|
let status = Status(rawValue: errSecCallbackFailed)
|
|
- XCTAssertEqual(status, .CallbackFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .callbackFailed)
|
|
XCTAssertEqual(status?.description, "A callback has failed.")
|
|
XCTAssertEqual(status?.description, "A callback has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecACLDeleteFailed)
|
|
let status = Status(rawValue: errSecACLDeleteFailed)
|
|
- XCTAssertEqual(status, .ACLDeleteFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .aclDeleteFailed)
|
|
XCTAssertEqual(status?.description, "An ACL delete operation has failed.")
|
|
XCTAssertEqual(status?.description, "An ACL delete operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecACLReplaceFailed)
|
|
let status = Status(rawValue: errSecACLReplaceFailed)
|
|
- XCTAssertEqual(status, .ACLReplaceFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .aclReplaceFailed)
|
|
XCTAssertEqual(status?.description, "An ACL replace operation has failed.")
|
|
XCTAssertEqual(status?.description, "An ACL replace operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecACLAddFailed)
|
|
let status = Status(rawValue: errSecACLAddFailed)
|
|
- XCTAssertEqual(status, .ACLAddFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .aclAddFailed)
|
|
XCTAssertEqual(status?.description, "An ACL add operation has failed.")
|
|
XCTAssertEqual(status?.description, "An ACL add operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecACLChangeFailed)
|
|
let status = Status(rawValue: errSecACLChangeFailed)
|
|
- XCTAssertEqual(status, .ACLChangeFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .aclChangeFailed)
|
|
XCTAssertEqual(status?.description, "An ACL change operation has failed.")
|
|
XCTAssertEqual(status?.description, "An ACL change operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAccessCredentials)
|
|
let status = Status(rawValue: errSecInvalidAccessCredentials)
|
|
- XCTAssertEqual(status, .InvalidAccessCredentials)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAccessCredentials)
|
|
XCTAssertEqual(status?.description, "Invalid access credentials were encountered.")
|
|
XCTAssertEqual(status?.description, "Invalid access credentials were encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidRecord)
|
|
let status = Status(rawValue: errSecInvalidRecord)
|
|
- XCTAssertEqual(status, .InvalidRecord)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidRecord)
|
|
XCTAssertEqual(status?.description, "An invalid record was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid record was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidACL)
|
|
let status = Status(rawValue: errSecInvalidACL)
|
|
- XCTAssertEqual(status, .InvalidACL)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidACL)
|
|
XCTAssertEqual(status?.description, "An invalid ACL was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid ACL was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSampleValue)
|
|
let status = Status(rawValue: errSecInvalidSampleValue)
|
|
- XCTAssertEqual(status, .InvalidSampleValue)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSampleValue)
|
|
XCTAssertEqual(status?.description, "An invalid sample value was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid sample value was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIncompatibleVersion)
|
|
let status = Status(rawValue: errSecIncompatibleVersion)
|
|
- XCTAssertEqual(status, .IncompatibleVersion)
|
|
|
|
|
|
+ XCTAssertEqual(status, .incompatibleVersion)
|
|
XCTAssertEqual(status?.description, "An incompatible version was encountered.")
|
|
XCTAssertEqual(status?.description, "An incompatible version was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPrivilegeNotGranted)
|
|
let status = Status(rawValue: errSecPrivilegeNotGranted)
|
|
- XCTAssertEqual(status, .PrivilegeNotGranted)
|
|
|
|
|
|
+ XCTAssertEqual(status, .privilegeNotGranted)
|
|
XCTAssertEqual(status?.description, "The privilege was not granted.")
|
|
XCTAssertEqual(status?.description, "The privilege was not granted.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidScope)
|
|
let status = Status(rawValue: errSecInvalidScope)
|
|
- XCTAssertEqual(status, .InvalidScope)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidScope)
|
|
XCTAssertEqual(status?.description, "An invalid scope was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid scope was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPVCAlreadyConfigured)
|
|
let status = Status(rawValue: errSecPVCAlreadyConfigured)
|
|
- XCTAssertEqual(status, .PVCAlreadyConfigured)
|
|
|
|
|
|
+ XCTAssertEqual(status, .pvcAlreadyConfigured)
|
|
XCTAssertEqual(status?.description, "The PVC is already configured.")
|
|
XCTAssertEqual(status?.description, "The PVC is already configured.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPVC)
|
|
let status = Status(rawValue: errSecInvalidPVC)
|
|
- XCTAssertEqual(status, .InvalidPVC)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPVC)
|
|
XCTAssertEqual(status?.description, "An invalid PVC was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid PVC was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecEMMLoadFailed)
|
|
let status = Status(rawValue: errSecEMMLoadFailed)
|
|
- XCTAssertEqual(status, .EMMLoadFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .emmLoadFailed)
|
|
XCTAssertEqual(status?.description, "The EMM load has failed.")
|
|
XCTAssertEqual(status?.description, "The EMM load has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecEMMUnloadFailed)
|
|
let status = Status(rawValue: errSecEMMUnloadFailed)
|
|
- XCTAssertEqual(status, .EMMUnloadFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .emmUnloadFailed)
|
|
XCTAssertEqual(status?.description, "The EMM unload has failed.")
|
|
XCTAssertEqual(status?.description, "The EMM unload has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAddinLoadFailed)
|
|
let status = Status(rawValue: errSecAddinLoadFailed)
|
|
- XCTAssertEqual(status, .AddinLoadFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .addinLoadFailed)
|
|
XCTAssertEqual(status?.description, "The add-in load operation has failed.")
|
|
XCTAssertEqual(status?.description, "The add-in load operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyRef)
|
|
let status = Status(rawValue: errSecInvalidKeyRef)
|
|
- XCTAssertEqual(status, .InvalidKeyRef)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyRef)
|
|
XCTAssertEqual(status?.description, "An invalid key was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid key was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyHierarchy)
|
|
let status = Status(rawValue: errSecInvalidKeyHierarchy)
|
|
- XCTAssertEqual(status, .InvalidKeyHierarchy)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyHierarchy)
|
|
XCTAssertEqual(status?.description, "An invalid key hierarchy was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid key hierarchy was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAddinUnloadFailed)
|
|
let status = Status(rawValue: errSecAddinUnloadFailed)
|
|
- XCTAssertEqual(status, .AddinUnloadFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .addinUnloadFailed)
|
|
XCTAssertEqual(status?.description, "The add-in unload operation has failed.")
|
|
XCTAssertEqual(status?.description, "The add-in unload operation has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecLibraryReferenceNotFound)
|
|
let status = Status(rawValue: errSecLibraryReferenceNotFound)
|
|
- XCTAssertEqual(status, .LibraryReferenceNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .libraryReferenceNotFound)
|
|
XCTAssertEqual(status?.description, "A library reference was not found.")
|
|
XCTAssertEqual(status?.description, "A library reference was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAddinFunctionTable)
|
|
let status = Status(rawValue: errSecInvalidAddinFunctionTable)
|
|
- XCTAssertEqual(status, .InvalidAddinFunctionTable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAddinFunctionTable)
|
|
XCTAssertEqual(status?.description, "An invalid add-in function table was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid add-in function table was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidServiceMask)
|
|
let status = Status(rawValue: errSecInvalidServiceMask)
|
|
- XCTAssertEqual(status, .InvalidServiceMask)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidServiceMask)
|
|
XCTAssertEqual(status?.description, "An invalid service mask was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid service mask was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecModuleNotLoaded)
|
|
let status = Status(rawValue: errSecModuleNotLoaded)
|
|
- XCTAssertEqual(status, .ModuleNotLoaded)
|
|
|
|
|
|
+ XCTAssertEqual(status, .moduleNotLoaded)
|
|
XCTAssertEqual(status?.description, "A module was not loaded.")
|
|
XCTAssertEqual(status?.description, "A module was not loaded.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidSubServiceID)
|
|
let status = Status(rawValue: errSecInvalidSubServiceID)
|
|
- XCTAssertEqual(status, .InvalidSubServiceID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidSubServiceID)
|
|
XCTAssertEqual(status?.description, "An invalid subservice ID was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid subservice ID was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAttributeNotInContext)
|
|
let status = Status(rawValue: errSecAttributeNotInContext)
|
|
- XCTAssertEqual(status, .AttributeNotInContext)
|
|
|
|
|
|
+ XCTAssertEqual(status, .attributeNotInContext)
|
|
XCTAssertEqual(status?.description, "An attribute was not in the context.")
|
|
XCTAssertEqual(status?.description, "An attribute was not in the context.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecModuleManagerInitializeFailed)
|
|
let status = Status(rawValue: errSecModuleManagerInitializeFailed)
|
|
- XCTAssertEqual(status, .ModuleManagerInitializeFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .moduleManagerInitializeFailed)
|
|
XCTAssertEqual(status?.description, "A module failed to initialize.")
|
|
XCTAssertEqual(status?.description, "A module failed to initialize.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecModuleManagerNotFound)
|
|
let status = Status(rawValue: errSecModuleManagerNotFound)
|
|
- XCTAssertEqual(status, .ModuleManagerNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .moduleManagerNotFound)
|
|
XCTAssertEqual(status?.description, "A module was not found.")
|
|
XCTAssertEqual(status?.description, "A module was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecEventNotificationCallbackNotFound)
|
|
let status = Status(rawValue: errSecEventNotificationCallbackNotFound)
|
|
- XCTAssertEqual(status, .EventNotificationCallbackNotFound)
|
|
|
|
|
|
+ XCTAssertEqual(status, .eventNotificationCallbackNotFound)
|
|
XCTAssertEqual(status?.description, "An event notification callback was not found.")
|
|
XCTAssertEqual(status?.description, "An event notification callback was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInputLengthError)
|
|
let status = Status(rawValue: errSecInputLengthError)
|
|
- XCTAssertEqual(status, .InputLengthError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .inputLengthError)
|
|
XCTAssertEqual(status?.description, "An input length error was encountered.")
|
|
XCTAssertEqual(status?.description, "An input length error was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecOutputLengthError)
|
|
let status = Status(rawValue: errSecOutputLengthError)
|
|
- XCTAssertEqual(status, .OutputLengthError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .outputLengthError)
|
|
XCTAssertEqual(status?.description, "An output length error was encountered.")
|
|
XCTAssertEqual(status?.description, "An output length error was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPrivilegeNotSupported)
|
|
let status = Status(rawValue: errSecPrivilegeNotSupported)
|
|
- XCTAssertEqual(status, .PrivilegeNotSupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .privilegeNotSupported)
|
|
XCTAssertEqual(status?.description, "The privilege is not supported.")
|
|
XCTAssertEqual(status?.description, "The privilege is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDeviceError)
|
|
let status = Status(rawValue: errSecDeviceError)
|
|
- XCTAssertEqual(status, .DeviceError)
|
|
|
|
|
|
+ XCTAssertEqual(status, .deviceError)
|
|
XCTAssertEqual(status?.description, "A device error was encountered.")
|
|
XCTAssertEqual(status?.description, "A device error was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAttachHandleBusy)
|
|
let status = Status(rawValue: errSecAttachHandleBusy)
|
|
- XCTAssertEqual(status, .AttachHandleBusy)
|
|
|
|
|
|
+ XCTAssertEqual(status, .attachHandleBusy)
|
|
XCTAssertEqual(status?.description, "The CSP handle was busy.")
|
|
XCTAssertEqual(status?.description, "The CSP handle was busy.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNotLoggedIn)
|
|
let status = Status(rawValue: errSecNotLoggedIn)
|
|
- XCTAssertEqual(status, .NotLoggedIn)
|
|
|
|
|
|
+ XCTAssertEqual(status, .notLoggedIn)
|
|
XCTAssertEqual(status?.description, "You are not logged in.")
|
|
XCTAssertEqual(status?.description, "You are not logged in.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAlgorithmMismatch)
|
|
let status = Status(rawValue: errSecAlgorithmMismatch)
|
|
- XCTAssertEqual(status, .AlgorithmMismatch)
|
|
|
|
|
|
+ XCTAssertEqual(status, .algorithmMismatch)
|
|
XCTAssertEqual(status?.description, "An algorithm mismatch was encountered.")
|
|
XCTAssertEqual(status?.description, "An algorithm mismatch was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecKeyUsageIncorrect)
|
|
let status = Status(rawValue: errSecKeyUsageIncorrect)
|
|
- XCTAssertEqual(status, .KeyUsageIncorrect)
|
|
|
|
|
|
+ XCTAssertEqual(status, .keyUsageIncorrect)
|
|
XCTAssertEqual(status?.description, "The key usage is incorrect.")
|
|
XCTAssertEqual(status?.description, "The key usage is incorrect.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecKeyBlobTypeIncorrect)
|
|
let status = Status(rawValue: errSecKeyBlobTypeIncorrect)
|
|
- XCTAssertEqual(status, .KeyBlobTypeIncorrect)
|
|
|
|
|
|
+ XCTAssertEqual(status, .keyBlobTypeIncorrect)
|
|
XCTAssertEqual(status?.description, "The key blob type is incorrect.")
|
|
XCTAssertEqual(status?.description, "The key blob type is incorrect.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecKeyHeaderInconsistent)
|
|
let status = Status(rawValue: errSecKeyHeaderInconsistent)
|
|
- XCTAssertEqual(status, .KeyHeaderInconsistent)
|
|
|
|
|
|
+ XCTAssertEqual(status, .keyHeaderInconsistent)
|
|
XCTAssertEqual(status?.description, "The key header is inconsistent.")
|
|
XCTAssertEqual(status?.description, "The key header is inconsistent.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedKeyFormat)
|
|
let status = Status(rawValue: errSecUnsupportedKeyFormat)
|
|
- XCTAssertEqual(status, .UnsupportedKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedKeyFormat)
|
|
XCTAssertEqual(status?.description, "The key header format is not supported.")
|
|
XCTAssertEqual(status?.description, "The key header format is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedKeySize)
|
|
let status = Status(rawValue: errSecUnsupportedKeySize)
|
|
- XCTAssertEqual(status, .UnsupportedKeySize)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedKeySize)
|
|
XCTAssertEqual(status?.description, "The key size is not supported.")
|
|
XCTAssertEqual(status?.description, "The key size is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyUsageMask)
|
|
let status = Status(rawValue: errSecInvalidKeyUsageMask)
|
|
- XCTAssertEqual(status, .InvalidKeyUsageMask)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyUsageMask)
|
|
XCTAssertEqual(status?.description, "The key usage mask is not valid.")
|
|
XCTAssertEqual(status?.description, "The key usage mask is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedKeyUsageMask)
|
|
let status = Status(rawValue: errSecUnsupportedKeyUsageMask)
|
|
- XCTAssertEqual(status, .UnsupportedKeyUsageMask)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedKeyUsageMask)
|
|
XCTAssertEqual(status?.description, "The key usage mask is not supported.")
|
|
XCTAssertEqual(status?.description, "The key usage mask is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyAttributeMask)
|
|
let status = Status(rawValue: errSecInvalidKeyAttributeMask)
|
|
- XCTAssertEqual(status, .InvalidKeyAttributeMask)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyAttributeMask)
|
|
XCTAssertEqual(status?.description, "The key attribute mask is not valid.")
|
|
XCTAssertEqual(status?.description, "The key attribute mask is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedKeyAttributeMask)
|
|
let status = Status(rawValue: errSecUnsupportedKeyAttributeMask)
|
|
- XCTAssertEqual(status, .UnsupportedKeyAttributeMask)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedKeyAttributeMask)
|
|
XCTAssertEqual(status?.description, "The key attribute mask is not supported.")
|
|
XCTAssertEqual(status?.description, "The key attribute mask is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyLabel)
|
|
let status = Status(rawValue: errSecInvalidKeyLabel)
|
|
- XCTAssertEqual(status, .InvalidKeyLabel)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyLabel)
|
|
XCTAssertEqual(status?.description, "The key label is not valid.")
|
|
XCTAssertEqual(status?.description, "The key label is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedKeyLabel)
|
|
let status = Status(rawValue: errSecUnsupportedKeyLabel)
|
|
- XCTAssertEqual(status, .UnsupportedKeyLabel)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedKeyLabel)
|
|
XCTAssertEqual(status?.description, "The key label is not supported.")
|
|
XCTAssertEqual(status?.description, "The key label is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidKeyFormat)
|
|
let status = Status(rawValue: errSecInvalidKeyFormat)
|
|
- XCTAssertEqual(status, .InvalidKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidKeyFormat)
|
|
XCTAssertEqual(status?.description, "The key format is not valid.")
|
|
XCTAssertEqual(status?.description, "The key format is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedVectorOfBuffers)
|
|
let status = Status(rawValue: errSecUnsupportedVectorOfBuffers)
|
|
- XCTAssertEqual(status, .UnsupportedVectorOfBuffers)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedVectorOfBuffers)
|
|
XCTAssertEqual(status?.description, "The vector of buffers is not supported.")
|
|
XCTAssertEqual(status?.description, "The vector of buffers is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidInputVector)
|
|
let status = Status(rawValue: errSecInvalidInputVector)
|
|
- XCTAssertEqual(status, .InvalidInputVector)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidInputVector)
|
|
XCTAssertEqual(status?.description, "The input vector is not valid.")
|
|
XCTAssertEqual(status?.description, "The input vector is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidOutputVector)
|
|
let status = Status(rawValue: errSecInvalidOutputVector)
|
|
- XCTAssertEqual(status, .InvalidOutputVector)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidOutputVector)
|
|
XCTAssertEqual(status?.description, "The output vector is not valid.")
|
|
XCTAssertEqual(status?.description, "The output vector is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidContext)
|
|
let status = Status(rawValue: errSecInvalidContext)
|
|
- XCTAssertEqual(status, .InvalidContext)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidContext)
|
|
XCTAssertEqual(status?.description, "An invalid context was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid context was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAlgorithm)
|
|
let status = Status(rawValue: errSecInvalidAlgorithm)
|
|
- XCTAssertEqual(status, .InvalidAlgorithm)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAlgorithm)
|
|
XCTAssertEqual(status?.description, "An invalid algorithm was encountered.")
|
|
XCTAssertEqual(status?.description, "An invalid algorithm was encountered.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeKey)
|
|
let status = Status(rawValue: errSecInvalidAttributeKey)
|
|
- XCTAssertEqual(status, .InvalidAttributeKey)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeKey)
|
|
XCTAssertEqual(status?.description, "A key attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A key attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeKey)
|
|
let status = Status(rawValue: errSecMissingAttributeKey)
|
|
- XCTAssertEqual(status, .MissingAttributeKey)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeKey)
|
|
XCTAssertEqual(status?.description, "A key attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A key attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeInitVector)
|
|
let status = Status(rawValue: errSecInvalidAttributeInitVector)
|
|
- XCTAssertEqual(status, .InvalidAttributeInitVector)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeInitVector)
|
|
XCTAssertEqual(status?.description, "An init vector attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An init vector attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeInitVector)
|
|
let status = Status(rawValue: errSecMissingAttributeInitVector)
|
|
- XCTAssertEqual(status, .MissingAttributeInitVector)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeInitVector)
|
|
XCTAssertEqual(status?.description, "An init vector attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An init vector attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeSalt)
|
|
let status = Status(rawValue: errSecInvalidAttributeSalt)
|
|
- XCTAssertEqual(status, .InvalidAttributeSalt)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeSalt)
|
|
XCTAssertEqual(status?.description, "A salt attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A salt attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeSalt)
|
|
let status = Status(rawValue: errSecMissingAttributeSalt)
|
|
- XCTAssertEqual(status, .MissingAttributeSalt)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeSalt)
|
|
XCTAssertEqual(status?.description, "A salt attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A salt attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributePadding)
|
|
let status = Status(rawValue: errSecInvalidAttributePadding)
|
|
- XCTAssertEqual(status, .InvalidAttributePadding)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributePadding)
|
|
XCTAssertEqual(status?.description, "A padding attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A padding attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributePadding)
|
|
let status = Status(rawValue: errSecMissingAttributePadding)
|
|
- XCTAssertEqual(status, .MissingAttributePadding)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributePadding)
|
|
XCTAssertEqual(status?.description, "A padding attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A padding attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeRandom)
|
|
let status = Status(rawValue: errSecInvalidAttributeRandom)
|
|
- XCTAssertEqual(status, .InvalidAttributeRandom)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeRandom)
|
|
XCTAssertEqual(status?.description, "A random number attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A random number attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeRandom)
|
|
let status = Status(rawValue: errSecMissingAttributeRandom)
|
|
- XCTAssertEqual(status, .MissingAttributeRandom)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeRandom)
|
|
XCTAssertEqual(status?.description, "A random number attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A random number attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeSeed)
|
|
let status = Status(rawValue: errSecInvalidAttributeSeed)
|
|
- XCTAssertEqual(status, .InvalidAttributeSeed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeSeed)
|
|
XCTAssertEqual(status?.description, "A seed attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A seed attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeSeed)
|
|
let status = Status(rawValue: errSecMissingAttributeSeed)
|
|
- XCTAssertEqual(status, .MissingAttributeSeed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeSeed)
|
|
XCTAssertEqual(status?.description, "A seed attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A seed attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributePassphrase)
|
|
let status = Status(rawValue: errSecInvalidAttributePassphrase)
|
|
- XCTAssertEqual(status, .InvalidAttributePassphrase)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributePassphrase)
|
|
XCTAssertEqual(status?.description, "A passphrase attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A passphrase attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributePassphrase)
|
|
let status = Status(rawValue: errSecMissingAttributePassphrase)
|
|
- XCTAssertEqual(status, .MissingAttributePassphrase)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributePassphrase)
|
|
XCTAssertEqual(status?.description, "A passphrase attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A passphrase attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeKeyLength)
|
|
let status = Status(rawValue: errSecInvalidAttributeKeyLength)
|
|
- XCTAssertEqual(status, .InvalidAttributeKeyLength)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeKeyLength)
|
|
XCTAssertEqual(status?.description, "A key length attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A key length attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeKeyLength)
|
|
let status = Status(rawValue: errSecMissingAttributeKeyLength)
|
|
- XCTAssertEqual(status, .MissingAttributeKeyLength)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeKeyLength)
|
|
XCTAssertEqual(status?.description, "A key length attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A key length attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeBlockSize)
|
|
let status = Status(rawValue: errSecInvalidAttributeBlockSize)
|
|
- XCTAssertEqual(status, .InvalidAttributeBlockSize)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeBlockSize)
|
|
XCTAssertEqual(status?.description, "A block size attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A block size attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeBlockSize)
|
|
let status = Status(rawValue: errSecMissingAttributeBlockSize)
|
|
- XCTAssertEqual(status, .MissingAttributeBlockSize)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeBlockSize)
|
|
XCTAssertEqual(status?.description, "A block size attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A block size attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeOutputSize)
|
|
let status = Status(rawValue: errSecInvalidAttributeOutputSize)
|
|
- XCTAssertEqual(status, .InvalidAttributeOutputSize)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeOutputSize)
|
|
XCTAssertEqual(status?.description, "An output size attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An output size attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeOutputSize)
|
|
let status = Status(rawValue: errSecMissingAttributeOutputSize)
|
|
- XCTAssertEqual(status, .MissingAttributeOutputSize)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeOutputSize)
|
|
XCTAssertEqual(status?.description, "An output size attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An output size attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeRounds)
|
|
let status = Status(rawValue: errSecInvalidAttributeRounds)
|
|
- XCTAssertEqual(status, .InvalidAttributeRounds)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeRounds)
|
|
XCTAssertEqual(status?.description, "The number of rounds attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "The number of rounds attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeRounds)
|
|
let status = Status(rawValue: errSecMissingAttributeRounds)
|
|
- XCTAssertEqual(status, .MissingAttributeRounds)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeRounds)
|
|
XCTAssertEqual(status?.description, "The number of rounds attribute was missing.")
|
|
XCTAssertEqual(status?.description, "The number of rounds attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAlgorithmParms)
|
|
let status = Status(rawValue: errSecInvalidAlgorithmParms)
|
|
- XCTAssertEqual(status, .InvalidAlgorithmParms)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAlgorithmParms)
|
|
XCTAssertEqual(status?.description, "An algorithm parameters attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An algorithm parameters attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAlgorithmParms)
|
|
let status = Status(rawValue: errSecMissingAlgorithmParms)
|
|
- XCTAssertEqual(status, .MissingAlgorithmParms)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAlgorithmParms)
|
|
XCTAssertEqual(status?.description, "An algorithm parameters attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An algorithm parameters attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeLabel)
|
|
let status = Status(rawValue: errSecInvalidAttributeLabel)
|
|
- XCTAssertEqual(status, .InvalidAttributeLabel)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeLabel)
|
|
XCTAssertEqual(status?.description, "A label attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A label attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeLabel)
|
|
let status = Status(rawValue: errSecMissingAttributeLabel)
|
|
- XCTAssertEqual(status, .MissingAttributeLabel)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeLabel)
|
|
XCTAssertEqual(status?.description, "A label attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A label attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeKeyType)
|
|
let status = Status(rawValue: errSecInvalidAttributeKeyType)
|
|
- XCTAssertEqual(status, .InvalidAttributeKeyType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeKeyType)
|
|
XCTAssertEqual(status?.description, "A key type attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A key type attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeKeyType)
|
|
let status = Status(rawValue: errSecMissingAttributeKeyType)
|
|
- XCTAssertEqual(status, .MissingAttributeKeyType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeKeyType)
|
|
XCTAssertEqual(status?.description, "A key type attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A key type attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeMode)
|
|
let status = Status(rawValue: errSecInvalidAttributeMode)
|
|
- XCTAssertEqual(status, .InvalidAttributeMode)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeMode)
|
|
XCTAssertEqual(status?.description, "A mode attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A mode attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeMode)
|
|
let status = Status(rawValue: errSecMissingAttributeMode)
|
|
- XCTAssertEqual(status, .MissingAttributeMode)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeMode)
|
|
XCTAssertEqual(status?.description, "A mode attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A mode attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeEffectiveBits)
|
|
let status = Status(rawValue: errSecInvalidAttributeEffectiveBits)
|
|
- XCTAssertEqual(status, .InvalidAttributeEffectiveBits)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeEffectiveBits)
|
|
XCTAssertEqual(status?.description, "An effective bits attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An effective bits attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeEffectiveBits)
|
|
let status = Status(rawValue: errSecMissingAttributeEffectiveBits)
|
|
- XCTAssertEqual(status, .MissingAttributeEffectiveBits)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeEffectiveBits)
|
|
XCTAssertEqual(status?.description, "An effective bits attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An effective bits attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeStartDate)
|
|
let status = Status(rawValue: errSecInvalidAttributeStartDate)
|
|
- XCTAssertEqual(status, .InvalidAttributeStartDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeStartDate)
|
|
XCTAssertEqual(status?.description, "A start date attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A start date attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeStartDate)
|
|
let status = Status(rawValue: errSecMissingAttributeStartDate)
|
|
- XCTAssertEqual(status, .MissingAttributeStartDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeStartDate)
|
|
XCTAssertEqual(status?.description, "A start date attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A start date attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeEndDate)
|
|
let status = Status(rawValue: errSecInvalidAttributeEndDate)
|
|
- XCTAssertEqual(status, .InvalidAttributeEndDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeEndDate)
|
|
XCTAssertEqual(status?.description, "An end date attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An end date attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeEndDate)
|
|
let status = Status(rawValue: errSecMissingAttributeEndDate)
|
|
- XCTAssertEqual(status, .MissingAttributeEndDate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeEndDate)
|
|
XCTAssertEqual(status?.description, "An end date attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An end date attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeVersion)
|
|
let status = Status(rawValue: errSecInvalidAttributeVersion)
|
|
- XCTAssertEqual(status, .InvalidAttributeVersion)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeVersion)
|
|
XCTAssertEqual(status?.description, "A version attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A version attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeVersion)
|
|
let status = Status(rawValue: errSecMissingAttributeVersion)
|
|
- XCTAssertEqual(status, .MissingAttributeVersion)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeVersion)
|
|
XCTAssertEqual(status?.description, "A version attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A version attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributePrime)
|
|
let status = Status(rawValue: errSecInvalidAttributePrime)
|
|
- XCTAssertEqual(status, .InvalidAttributePrime)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributePrime)
|
|
XCTAssertEqual(status?.description, "A prime attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A prime attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributePrime)
|
|
let status = Status(rawValue: errSecMissingAttributePrime)
|
|
- XCTAssertEqual(status, .MissingAttributePrime)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributePrime)
|
|
XCTAssertEqual(status?.description, "A prime attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A prime attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeBase)
|
|
let status = Status(rawValue: errSecInvalidAttributeBase)
|
|
- XCTAssertEqual(status, .InvalidAttributeBase)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeBase)
|
|
XCTAssertEqual(status?.description, "A base attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A base attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeBase)
|
|
let status = Status(rawValue: errSecMissingAttributeBase)
|
|
- XCTAssertEqual(status, .MissingAttributeBase)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeBase)
|
|
XCTAssertEqual(status?.description, "A base attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A base attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeSubprime)
|
|
let status = Status(rawValue: errSecInvalidAttributeSubprime)
|
|
- XCTAssertEqual(status, .InvalidAttributeSubprime)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeSubprime)
|
|
XCTAssertEqual(status?.description, "A subprime attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A subprime attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeSubprime)
|
|
let status = Status(rawValue: errSecMissingAttributeSubprime)
|
|
- XCTAssertEqual(status, .MissingAttributeSubprime)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeSubprime)
|
|
XCTAssertEqual(status?.description, "A subprime attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A subprime attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeIterationCount)
|
|
let status = Status(rawValue: errSecInvalidAttributeIterationCount)
|
|
- XCTAssertEqual(status, .InvalidAttributeIterationCount)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeIterationCount)
|
|
XCTAssertEqual(status?.description, "An iteration count attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An iteration count attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeIterationCount)
|
|
let status = Status(rawValue: errSecMissingAttributeIterationCount)
|
|
- XCTAssertEqual(status, .MissingAttributeIterationCount)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeIterationCount)
|
|
XCTAssertEqual(status?.description, "An iteration count attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An iteration count attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeDLDBHandle)
|
|
let status = Status(rawValue: errSecInvalidAttributeDLDBHandle)
|
|
- XCTAssertEqual(status, .InvalidAttributeDLDBHandle)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeDLDBHandle)
|
|
XCTAssertEqual(status?.description, "A database handle attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A database handle attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeDLDBHandle)
|
|
let status = Status(rawValue: errSecMissingAttributeDLDBHandle)
|
|
- XCTAssertEqual(status, .MissingAttributeDLDBHandle)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeDLDBHandle)
|
|
XCTAssertEqual(status?.description, "A database handle attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A database handle attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeAccessCredentials)
|
|
let status = Status(rawValue: errSecInvalidAttributeAccessCredentials)
|
|
- XCTAssertEqual(status, .InvalidAttributeAccessCredentials)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeAccessCredentials)
|
|
XCTAssertEqual(status?.description, "An access credentials attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "An access credentials attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeAccessCredentials)
|
|
let status = Status(rawValue: errSecMissingAttributeAccessCredentials)
|
|
- XCTAssertEqual(status, .MissingAttributeAccessCredentials)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeAccessCredentials)
|
|
XCTAssertEqual(status?.description, "An access credentials attribute was missing.")
|
|
XCTAssertEqual(status?.description, "An access credentials attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributePublicKeyFormat)
|
|
let status = Status(rawValue: errSecInvalidAttributePublicKeyFormat)
|
|
- XCTAssertEqual(status, .InvalidAttributePublicKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributePublicKeyFormat)
|
|
XCTAssertEqual(status?.description, "A public key format attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A public key format attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributePublicKeyFormat)
|
|
let status = Status(rawValue: errSecMissingAttributePublicKeyFormat)
|
|
- XCTAssertEqual(status, .MissingAttributePublicKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributePublicKeyFormat)
|
|
XCTAssertEqual(status?.description, "A public key format attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A public key format attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributePrivateKeyFormat)
|
|
let status = Status(rawValue: errSecInvalidAttributePrivateKeyFormat)
|
|
- XCTAssertEqual(status, .InvalidAttributePrivateKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributePrivateKeyFormat)
|
|
XCTAssertEqual(status?.description, "A private key format attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A private key format attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributePrivateKeyFormat)
|
|
let status = Status(rawValue: errSecMissingAttributePrivateKeyFormat)
|
|
- XCTAssertEqual(status, .MissingAttributePrivateKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributePrivateKeyFormat)
|
|
XCTAssertEqual(status?.description, "A private key format attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A private key format attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeSymmetricKeyFormat)
|
|
let status = Status(rawValue: errSecInvalidAttributeSymmetricKeyFormat)
|
|
- XCTAssertEqual(status, .InvalidAttributeSymmetricKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeSymmetricKeyFormat)
|
|
XCTAssertEqual(status?.description, "A symmetric key format attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A symmetric key format attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeSymmetricKeyFormat)
|
|
let status = Status(rawValue: errSecMissingAttributeSymmetricKeyFormat)
|
|
- XCTAssertEqual(status, .MissingAttributeSymmetricKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeSymmetricKeyFormat)
|
|
XCTAssertEqual(status?.description, "A symmetric key format attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A symmetric key format attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAttributeWrappedKeyFormat)
|
|
let status = Status(rawValue: errSecInvalidAttributeWrappedKeyFormat)
|
|
- XCTAssertEqual(status, .InvalidAttributeWrappedKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAttributeWrappedKeyFormat)
|
|
XCTAssertEqual(status?.description, "A wrapped key format attribute was not valid.")
|
|
XCTAssertEqual(status?.description, "A wrapped key format attribute was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingAttributeWrappedKeyFormat)
|
|
let status = Status(rawValue: errSecMissingAttributeWrappedKeyFormat)
|
|
- XCTAssertEqual(status, .MissingAttributeWrappedKeyFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingAttributeWrappedKeyFormat)
|
|
XCTAssertEqual(status?.description, "A wrapped key format attribute was missing.")
|
|
XCTAssertEqual(status?.description, "A wrapped key format attribute was missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecStagedOperationInProgress)
|
|
let status = Status(rawValue: errSecStagedOperationInProgress)
|
|
- XCTAssertEqual(status, .StagedOperationInProgress)
|
|
|
|
|
|
+ XCTAssertEqual(status, .stagedOperationInProgress)
|
|
XCTAssertEqual(status?.description, "A staged operation is in progress.")
|
|
XCTAssertEqual(status?.description, "A staged operation is in progress.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecStagedOperationNotStarted)
|
|
let status = Status(rawValue: errSecStagedOperationNotStarted)
|
|
- XCTAssertEqual(status, .StagedOperationNotStarted)
|
|
|
|
|
|
+ XCTAssertEqual(status, .stagedOperationNotStarted)
|
|
XCTAssertEqual(status?.description, "A staged operation was not started.")
|
|
XCTAssertEqual(status?.description, "A staged operation was not started.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecVerifyFailed)
|
|
let status = Status(rawValue: errSecVerifyFailed)
|
|
- XCTAssertEqual(status, .VerifyFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .verifyFailed)
|
|
XCTAssertEqual(status?.description, "A cryptographic verification failure has occurred.")
|
|
XCTAssertEqual(status?.description, "A cryptographic verification failure has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecQuerySizeUnknown)
|
|
let status = Status(rawValue: errSecQuerySizeUnknown)
|
|
- XCTAssertEqual(status, .QuerySizeUnknown)
|
|
|
|
|
|
+ XCTAssertEqual(status, .querySizeUnknown)
|
|
XCTAssertEqual(status?.description, "The query size is unknown.")
|
|
XCTAssertEqual(status?.description, "The query size is unknown.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecBlockSizeMismatch)
|
|
let status = Status(rawValue: errSecBlockSizeMismatch)
|
|
- XCTAssertEqual(status, .BlockSizeMismatch)
|
|
|
|
|
|
+ XCTAssertEqual(status, .blockSizeMismatch)
|
|
XCTAssertEqual(status?.description, "A block size mismatch occurred.")
|
|
XCTAssertEqual(status?.description, "A block size mismatch occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecPublicKeyInconsistent)
|
|
let status = Status(rawValue: errSecPublicKeyInconsistent)
|
|
- XCTAssertEqual(status, .PublicKeyInconsistent)
|
|
|
|
|
|
+ XCTAssertEqual(status, .publicKeyInconsistent)
|
|
XCTAssertEqual(status?.description, "The public key was inconsistent.")
|
|
XCTAssertEqual(status?.description, "The public key was inconsistent.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDeviceVerifyFailed)
|
|
let status = Status(rawValue: errSecDeviceVerifyFailed)
|
|
- XCTAssertEqual(status, .DeviceVerifyFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .deviceVerifyFailed)
|
|
XCTAssertEqual(status?.description, "A device verification failure has occurred.")
|
|
XCTAssertEqual(status?.description, "A device verification failure has occurred.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidLoginName)
|
|
let status = Status(rawValue: errSecInvalidLoginName)
|
|
- XCTAssertEqual(status, .InvalidLoginName)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidLoginName)
|
|
XCTAssertEqual(status?.description, "An invalid login name was detected.")
|
|
XCTAssertEqual(status?.description, "An invalid login name was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecAlreadyLoggedIn)
|
|
let status = Status(rawValue: errSecAlreadyLoggedIn)
|
|
- XCTAssertEqual(status, .AlreadyLoggedIn)
|
|
|
|
|
|
+ XCTAssertEqual(status, .alreadyLoggedIn)
|
|
XCTAssertEqual(status?.description, "The user is already logged in.")
|
|
XCTAssertEqual(status?.description, "The user is already logged in.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidDigestAlgorithm)
|
|
let status = Status(rawValue: errSecInvalidDigestAlgorithm)
|
|
- XCTAssertEqual(status, .InvalidDigestAlgorithm)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidDigestAlgorithm)
|
|
XCTAssertEqual(status?.description, "An invalid digest algorithm was detected.")
|
|
XCTAssertEqual(status?.description, "An invalid digest algorithm was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCRLGroup)
|
|
let status = Status(rawValue: errSecInvalidCRLGroup)
|
|
- XCTAssertEqual(status, .InvalidCRLGroup)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCRLGroup)
|
|
XCTAssertEqual(status?.description, "An invalid CRL group was detected.")
|
|
XCTAssertEqual(status?.description, "An invalid CRL group was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCertificateCannotOperate)
|
|
let status = Status(rawValue: errSecCertificateCannotOperate)
|
|
- XCTAssertEqual(status, .CertificateCannotOperate)
|
|
|
|
|
|
+ XCTAssertEqual(status, .certificateCannotOperate)
|
|
XCTAssertEqual(status?.description, "The certificate cannot operate.")
|
|
XCTAssertEqual(status?.description, "The certificate cannot operate.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCertificateExpired)
|
|
let status = Status(rawValue: errSecCertificateExpired)
|
|
- XCTAssertEqual(status, .CertificateExpired)
|
|
|
|
|
|
+ XCTAssertEqual(status, .certificateExpired)
|
|
XCTAssertEqual(status?.description, "An expired certificate was detected.")
|
|
XCTAssertEqual(status?.description, "An expired certificate was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCertificateNotValidYet)
|
|
let status = Status(rawValue: errSecCertificateNotValidYet)
|
|
- XCTAssertEqual(status, .CertificateNotValidYet)
|
|
|
|
|
|
+ XCTAssertEqual(status, .certificateNotValidYet)
|
|
XCTAssertEqual(status?.description, "The certificate is not yet valid.")
|
|
XCTAssertEqual(status?.description, "The certificate is not yet valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCertificateRevoked)
|
|
let status = Status(rawValue: errSecCertificateRevoked)
|
|
- XCTAssertEqual(status, .CertificateRevoked)
|
|
|
|
|
|
+ XCTAssertEqual(status, .certificateRevoked)
|
|
XCTAssertEqual(status?.description, "The certificate was revoked.")
|
|
XCTAssertEqual(status?.description, "The certificate was revoked.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecCertificateSuspended)
|
|
let status = Status(rawValue: errSecCertificateSuspended)
|
|
- XCTAssertEqual(status, .CertificateSuspended)
|
|
|
|
|
|
+ XCTAssertEqual(status, .certificateSuspended)
|
|
XCTAssertEqual(status?.description, "The certificate was suspended.")
|
|
XCTAssertEqual(status?.description, "The certificate was suspended.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInsufficientCredentials)
|
|
let status = Status(rawValue: errSecInsufficientCredentials)
|
|
- XCTAssertEqual(status, .InsufficientCredentials)
|
|
|
|
|
|
+ XCTAssertEqual(status, .insufficientCredentials)
|
|
XCTAssertEqual(status?.description, "Insufficient credentials were detected.")
|
|
XCTAssertEqual(status?.description, "Insufficient credentials were detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAction)
|
|
let status = Status(rawValue: errSecInvalidAction)
|
|
- XCTAssertEqual(status, .InvalidAction)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAction)
|
|
XCTAssertEqual(status?.description, "The action was not valid.")
|
|
XCTAssertEqual(status?.description, "The action was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAuthority)
|
|
let status = Status(rawValue: errSecInvalidAuthority)
|
|
- XCTAssertEqual(status, .InvalidAuthority)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAuthority)
|
|
XCTAssertEqual(status?.description, "The authority was not valid.")
|
|
XCTAssertEqual(status?.description, "The authority was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecVerifyActionFailed)
|
|
let status = Status(rawValue: errSecVerifyActionFailed)
|
|
- XCTAssertEqual(status, .VerifyActionFailed)
|
|
|
|
|
|
+ XCTAssertEqual(status, .verifyActionFailed)
|
|
XCTAssertEqual(status?.description, "A verify action has failed.")
|
|
XCTAssertEqual(status?.description, "A verify action has failed.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCertAuthority)
|
|
let status = Status(rawValue: errSecInvalidCertAuthority)
|
|
- XCTAssertEqual(status, .InvalidCertAuthority)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCertAuthority)
|
|
XCTAssertEqual(status?.description, "The certificate authority was not valid.")
|
|
XCTAssertEqual(status?.description, "The certificate authority was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvaldCRLAuthority)
|
|
let status = Status(rawValue: errSecInvaldCRLAuthority)
|
|
- XCTAssertEqual(status, .InvaldCRLAuthority)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invaldCRLAuthority)
|
|
XCTAssertEqual(status?.description, "The CRL authority was not valid.")
|
|
XCTAssertEqual(status?.description, "The CRL authority was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCRLEncoding)
|
|
let status = Status(rawValue: errSecInvalidCRLEncoding)
|
|
- XCTAssertEqual(status, .InvalidCRLEncoding)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCRLEncoding)
|
|
XCTAssertEqual(status?.description, "The CRL encoding was not valid.")
|
|
XCTAssertEqual(status?.description, "The CRL encoding was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCRLType)
|
|
let status = Status(rawValue: errSecInvalidCRLType)
|
|
- XCTAssertEqual(status, .InvalidCRLType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCRLType)
|
|
XCTAssertEqual(status?.description, "The CRL type was not valid.")
|
|
XCTAssertEqual(status?.description, "The CRL type was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCRL)
|
|
let status = Status(rawValue: errSecInvalidCRL)
|
|
- XCTAssertEqual(status, .InvalidCRL)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCRL)
|
|
XCTAssertEqual(status?.description, "The CRL was not valid.")
|
|
XCTAssertEqual(status?.description, "The CRL was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidFormType)
|
|
let status = Status(rawValue: errSecInvalidFormType)
|
|
- XCTAssertEqual(status, .InvalidFormType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidFormType)
|
|
XCTAssertEqual(status?.description, "The form type was not valid.")
|
|
XCTAssertEqual(status?.description, "The form type was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidID)
|
|
let status = Status(rawValue: errSecInvalidID)
|
|
- XCTAssertEqual(status, .InvalidID)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidID)
|
|
XCTAssertEqual(status?.description, "The ID was not valid.")
|
|
XCTAssertEqual(status?.description, "The ID was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidIdentifier)
|
|
let status = Status(rawValue: errSecInvalidIdentifier)
|
|
- XCTAssertEqual(status, .InvalidIdentifier)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidIdentifier)
|
|
XCTAssertEqual(status?.description, "The identifier was not valid.")
|
|
XCTAssertEqual(status?.description, "The identifier was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidIndex)
|
|
let status = Status(rawValue: errSecInvalidIndex)
|
|
- XCTAssertEqual(status, .InvalidIndex)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidIndex)
|
|
XCTAssertEqual(status?.description, "The index was not valid.")
|
|
XCTAssertEqual(status?.description, "The index was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidPolicyIdentifiers)
|
|
let status = Status(rawValue: errSecInvalidPolicyIdentifiers)
|
|
- XCTAssertEqual(status, .InvalidPolicyIdentifiers)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidPolicyIdentifiers)
|
|
XCTAssertEqual(status?.description, "The policy identifiers are not valid.")
|
|
XCTAssertEqual(status?.description, "The policy identifiers are not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTimeString)
|
|
let status = Status(rawValue: errSecInvalidTimeString)
|
|
- XCTAssertEqual(status, .InvalidTimeString)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTimeString)
|
|
XCTAssertEqual(status?.description, "The time specified was not valid.")
|
|
XCTAssertEqual(status?.description, "The time specified was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidReason)
|
|
let status = Status(rawValue: errSecInvalidReason)
|
|
- XCTAssertEqual(status, .InvalidReason)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidReason)
|
|
XCTAssertEqual(status?.description, "The trust policy reason was not valid.")
|
|
XCTAssertEqual(status?.description, "The trust policy reason was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidRequestInputs)
|
|
let status = Status(rawValue: errSecInvalidRequestInputs)
|
|
- XCTAssertEqual(status, .InvalidRequestInputs)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidRequestInputs)
|
|
XCTAssertEqual(status?.description, "The request inputs are not valid.")
|
|
XCTAssertEqual(status?.description, "The request inputs are not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidResponseVector)
|
|
let status = Status(rawValue: errSecInvalidResponseVector)
|
|
- XCTAssertEqual(status, .InvalidResponseVector)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidResponseVector)
|
|
XCTAssertEqual(status?.description, "The response vector was not valid.")
|
|
XCTAssertEqual(status?.description, "The response vector was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidStopOnPolicy)
|
|
let status = Status(rawValue: errSecInvalidStopOnPolicy)
|
|
- XCTAssertEqual(status, .InvalidStopOnPolicy)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidStopOnPolicy)
|
|
XCTAssertEqual(status?.description, "The stop-on policy was not valid.")
|
|
XCTAssertEqual(status?.description, "The stop-on policy was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTuple)
|
|
let status = Status(rawValue: errSecInvalidTuple)
|
|
- XCTAssertEqual(status, .InvalidTuple)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTuple)
|
|
XCTAssertEqual(status?.description, "The tuple was not valid.")
|
|
XCTAssertEqual(status?.description, "The tuple was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMultipleValuesUnsupported)
|
|
let status = Status(rawValue: errSecMultipleValuesUnsupported)
|
|
- XCTAssertEqual(status, .MultipleValuesUnsupported)
|
|
|
|
|
|
+ XCTAssertEqual(status, .multipleValuesUnsupported)
|
|
XCTAssertEqual(status?.description, "Multiple values are not supported.")
|
|
XCTAssertEqual(status?.description, "Multiple values are not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNotTrusted)
|
|
let status = Status(rawValue: errSecNotTrusted)
|
|
- XCTAssertEqual(status, .NotTrusted)
|
|
|
|
|
|
+ XCTAssertEqual(status, .notTrusted)
|
|
XCTAssertEqual(status?.description, "The trust policy was not trusted.")
|
|
XCTAssertEqual(status?.description, "The trust policy was not trusted.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoDefaultAuthority)
|
|
let status = Status(rawValue: errSecNoDefaultAuthority)
|
|
- XCTAssertEqual(status, .NoDefaultAuthority)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noDefaultAuthority)
|
|
XCTAssertEqual(status?.description, "No default authority was detected.")
|
|
XCTAssertEqual(status?.description, "No default authority was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecRejectedForm)
|
|
let status = Status(rawValue: errSecRejectedForm)
|
|
- XCTAssertEqual(status, .RejectedForm)
|
|
|
|
|
|
+ XCTAssertEqual(status, .rejectedForm)
|
|
XCTAssertEqual(status?.description, "The trust policy had a rejected form.")
|
|
XCTAssertEqual(status?.description, "The trust policy had a rejected form.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecRequestLost)
|
|
let status = Status(rawValue: errSecRequestLost)
|
|
- XCTAssertEqual(status, .RequestLost)
|
|
|
|
|
|
+ XCTAssertEqual(status, .requestLost)
|
|
XCTAssertEqual(status?.description, "The request was lost.")
|
|
XCTAssertEqual(status?.description, "The request was lost.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecRequestRejected)
|
|
let status = Status(rawValue: errSecRequestRejected)
|
|
- XCTAssertEqual(status, .RequestRejected)
|
|
|
|
|
|
+ XCTAssertEqual(status, .requestRejected)
|
|
XCTAssertEqual(status?.description, "The request was rejected.")
|
|
XCTAssertEqual(status?.description, "The request was rejected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedAddressType)
|
|
let status = Status(rawValue: errSecUnsupportedAddressType)
|
|
- XCTAssertEqual(status, .UnsupportedAddressType)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedAddressType)
|
|
XCTAssertEqual(status?.description, "The address type is not supported.")
|
|
XCTAssertEqual(status?.description, "The address type is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedService)
|
|
let status = Status(rawValue: errSecUnsupportedService)
|
|
- XCTAssertEqual(status, .UnsupportedService)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedService)
|
|
XCTAssertEqual(status?.description, "The service is not supported.")
|
|
XCTAssertEqual(status?.description, "The service is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTupleGroup)
|
|
let status = Status(rawValue: errSecInvalidTupleGroup)
|
|
- XCTAssertEqual(status, .InvalidTupleGroup)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTupleGroup)
|
|
XCTAssertEqual(status?.description, "The tuple group was not valid.")
|
|
XCTAssertEqual(status?.description, "The tuple group was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidBaseACLs)
|
|
let status = Status(rawValue: errSecInvalidBaseACLs)
|
|
- XCTAssertEqual(status, .InvalidBaseACLs)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidBaseACLs)
|
|
XCTAssertEqual(status?.description, "The base ACLs are not valid.")
|
|
XCTAssertEqual(status?.description, "The base ACLs are not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidTupleCredendtials)
|
|
let status = Status(rawValue: errSecInvalidTupleCredendtials)
|
|
- XCTAssertEqual(status, .InvalidTupleCredendtials)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidTupleCredendtials)
|
|
XCTAssertEqual(status?.description, "The tuple credentials are not valid.")
|
|
XCTAssertEqual(status?.description, "The tuple credentials are not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidEncoding)
|
|
let status = Status(rawValue: errSecInvalidEncoding)
|
|
- XCTAssertEqual(status, .InvalidEncoding)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidEncoding)
|
|
XCTAssertEqual(status?.description, "The encoding was not valid.")
|
|
XCTAssertEqual(status?.description, "The encoding was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidValidityPeriod)
|
|
let status = Status(rawValue: errSecInvalidValidityPeriod)
|
|
- XCTAssertEqual(status, .InvalidValidityPeriod)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidValidityPeriod)
|
|
XCTAssertEqual(status?.description, "The validity period was not valid.")
|
|
XCTAssertEqual(status?.description, "The validity period was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidRequestor)
|
|
let status = Status(rawValue: errSecInvalidRequestor)
|
|
- XCTAssertEqual(status, .InvalidRequestor)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidRequestor)
|
|
XCTAssertEqual(status?.description, "The requestor was not valid.")
|
|
XCTAssertEqual(status?.description, "The requestor was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecRequestDescriptor)
|
|
let status = Status(rawValue: errSecRequestDescriptor)
|
|
- XCTAssertEqual(status, .RequestDescriptor)
|
|
|
|
|
|
+ XCTAssertEqual(status, .requestDescriptor)
|
|
XCTAssertEqual(status?.description, "The request descriptor was not valid.")
|
|
XCTAssertEqual(status?.description, "The request descriptor was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidBundleInfo)
|
|
let status = Status(rawValue: errSecInvalidBundleInfo)
|
|
- XCTAssertEqual(status, .InvalidBundleInfo)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidBundleInfo)
|
|
XCTAssertEqual(status?.description, "The bundle information was not valid.")
|
|
XCTAssertEqual(status?.description, "The bundle information was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidCRLIndex)
|
|
let status = Status(rawValue: errSecInvalidCRLIndex)
|
|
- XCTAssertEqual(status, .InvalidCRLIndex)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidCRLIndex)
|
|
XCTAssertEqual(status?.description, "The CRL index was not valid.")
|
|
XCTAssertEqual(status?.description, "The CRL index was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecNoFieldValues)
|
|
let status = Status(rawValue: errSecNoFieldValues)
|
|
- XCTAssertEqual(status, .NoFieldValues)
|
|
|
|
|
|
+ XCTAssertEqual(status, .noFieldValues)
|
|
XCTAssertEqual(status?.description, "No field values were detected.")
|
|
XCTAssertEqual(status?.description, "No field values were detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedFieldFormat)
|
|
let status = Status(rawValue: errSecUnsupportedFieldFormat)
|
|
- XCTAssertEqual(status, .UnsupportedFieldFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedFieldFormat)
|
|
XCTAssertEqual(status?.description, "The field format is not supported.")
|
|
XCTAssertEqual(status?.description, "The field format is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedIndexInfo)
|
|
let status = Status(rawValue: errSecUnsupportedIndexInfo)
|
|
- XCTAssertEqual(status, .UnsupportedIndexInfo)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedIndexInfo)
|
|
XCTAssertEqual(status?.description, "The index information is not supported.")
|
|
XCTAssertEqual(status?.description, "The index information is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedLocality)
|
|
let status = Status(rawValue: errSecUnsupportedLocality)
|
|
- XCTAssertEqual(status, .UnsupportedLocality)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedLocality)
|
|
XCTAssertEqual(status?.description, "The locality is not supported.")
|
|
XCTAssertEqual(status?.description, "The locality is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedNumAttributes)
|
|
let status = Status(rawValue: errSecUnsupportedNumAttributes)
|
|
- XCTAssertEqual(status, .UnsupportedNumAttributes)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedNumAttributes)
|
|
XCTAssertEqual(status?.description, "The number of attributes is not supported.")
|
|
XCTAssertEqual(status?.description, "The number of attributes is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedNumIndexes)
|
|
let status = Status(rawValue: errSecUnsupportedNumIndexes)
|
|
- XCTAssertEqual(status, .UnsupportedNumIndexes)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedNumIndexes)
|
|
XCTAssertEqual(status?.description, "The number of indexes is not supported.")
|
|
XCTAssertEqual(status?.description, "The number of indexes is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedNumRecordTypes)
|
|
let status = Status(rawValue: errSecUnsupportedNumRecordTypes)
|
|
- XCTAssertEqual(status, .UnsupportedNumRecordTypes)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedNumRecordTypes)
|
|
XCTAssertEqual(status?.description, "The number of record types is not supported.")
|
|
XCTAssertEqual(status?.description, "The number of record types is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecFieldSpecifiedMultiple)
|
|
let status = Status(rawValue: errSecFieldSpecifiedMultiple)
|
|
- XCTAssertEqual(status, .FieldSpecifiedMultiple)
|
|
|
|
|
|
+ XCTAssertEqual(status, .fieldSpecifiedMultiple)
|
|
XCTAssertEqual(status?.description, "Too many fields were specified.")
|
|
XCTAssertEqual(status?.description, "Too many fields were specified.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecIncompatibleFieldFormat)
|
|
let status = Status(rawValue: errSecIncompatibleFieldFormat)
|
|
- XCTAssertEqual(status, .IncompatibleFieldFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .incompatibleFieldFormat)
|
|
XCTAssertEqual(status?.description, "The field format was incompatible.")
|
|
XCTAssertEqual(status?.description, "The field format was incompatible.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidParsingModule)
|
|
let status = Status(rawValue: errSecInvalidParsingModule)
|
|
- XCTAssertEqual(status, .InvalidParsingModule)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidParsingModule)
|
|
XCTAssertEqual(status?.description, "The parsing module was not valid.")
|
|
XCTAssertEqual(status?.description, "The parsing module was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDatabaseLocked)
|
|
let status = Status(rawValue: errSecDatabaseLocked)
|
|
- XCTAssertEqual(status, .DatabaseLocked)
|
|
|
|
|
|
+ XCTAssertEqual(status, .databaseLocked)
|
|
XCTAssertEqual(status?.description, "The database is locked.")
|
|
XCTAssertEqual(status?.description, "The database is locked.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecDatastoreIsOpen)
|
|
let status = Status(rawValue: errSecDatastoreIsOpen)
|
|
- XCTAssertEqual(status, .DatastoreIsOpen)
|
|
|
|
|
|
+ XCTAssertEqual(status, .datastoreIsOpen)
|
|
XCTAssertEqual(status?.description, "The data store is open.")
|
|
XCTAssertEqual(status?.description, "The data store is open.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingValue)
|
|
let status = Status(rawValue: errSecMissingValue)
|
|
- XCTAssertEqual(status, .MissingValue)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingValue)
|
|
XCTAssertEqual(status?.description, "A missing value was detected.")
|
|
XCTAssertEqual(status?.description, "A missing value was detected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedQueryLimits)
|
|
let status = Status(rawValue: errSecUnsupportedQueryLimits)
|
|
- XCTAssertEqual(status, .UnsupportedQueryLimits)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedQueryLimits)
|
|
XCTAssertEqual(status?.description, "The query limits are not supported.")
|
|
XCTAssertEqual(status?.description, "The query limits are not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedNumSelectionPreds)
|
|
let status = Status(rawValue: errSecUnsupportedNumSelectionPreds)
|
|
- XCTAssertEqual(status, .UnsupportedNumSelectionPreds)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedNumSelectionPreds)
|
|
XCTAssertEqual(status?.description, "The number of selection predicates is not supported.")
|
|
XCTAssertEqual(status?.description, "The number of selection predicates is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecUnsupportedOperator)
|
|
let status = Status(rawValue: errSecUnsupportedOperator)
|
|
- XCTAssertEqual(status, .UnsupportedOperator)
|
|
|
|
|
|
+ XCTAssertEqual(status, .unsupportedOperator)
|
|
XCTAssertEqual(status?.description, "The operator is not supported.")
|
|
XCTAssertEqual(status?.description, "The operator is not supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidDBLocation)
|
|
let status = Status(rawValue: errSecInvalidDBLocation)
|
|
- XCTAssertEqual(status, .InvalidDBLocation)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidDBLocation)
|
|
XCTAssertEqual(status?.description, "The database location is not valid.")
|
|
XCTAssertEqual(status?.description, "The database location is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidAccessRequest)
|
|
let status = Status(rawValue: errSecInvalidAccessRequest)
|
|
- XCTAssertEqual(status, .InvalidAccessRequest)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidAccessRequest)
|
|
XCTAssertEqual(status?.description, "The access request is not valid.")
|
|
XCTAssertEqual(status?.description, "The access request is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidIndexInfo)
|
|
let status = Status(rawValue: errSecInvalidIndexInfo)
|
|
- XCTAssertEqual(status, .InvalidIndexInfo)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidIndexInfo)
|
|
XCTAssertEqual(status?.description, "The index information is not valid.")
|
|
XCTAssertEqual(status?.description, "The index information is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidNewOwner)
|
|
let status = Status(rawValue: errSecInvalidNewOwner)
|
|
- XCTAssertEqual(status, .InvalidNewOwner)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidNewOwner)
|
|
XCTAssertEqual(status?.description, "The new owner is not valid.")
|
|
XCTAssertEqual(status?.description, "The new owner is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecInvalidModifyMode)
|
|
let status = Status(rawValue: errSecInvalidModifyMode)
|
|
- XCTAssertEqual(status, .InvalidModifyMode)
|
|
|
|
|
|
+ XCTAssertEqual(status, .invalidModifyMode)
|
|
XCTAssertEqual(status?.description, "The modify mode is not valid.")
|
|
XCTAssertEqual(status?.description, "The modify mode is not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecMissingRequiredExtension)
|
|
let status = Status(rawValue: errSecMissingRequiredExtension)
|
|
- XCTAssertEqual(status, .MissingRequiredExtension)
|
|
|
|
|
|
+ XCTAssertEqual(status, .missingRequiredExtension)
|
|
XCTAssertEqual(status?.description, "A required certificate extension is missing.")
|
|
XCTAssertEqual(status?.description, "A required certificate extension is missing.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecExtendedKeyUsageNotCritical)
|
|
let status = Status(rawValue: errSecExtendedKeyUsageNotCritical)
|
|
- XCTAssertEqual(status, .ExtendedKeyUsageNotCritical)
|
|
|
|
|
|
+ XCTAssertEqual(status, .extendedKeyUsageNotCritical)
|
|
XCTAssertEqual(status?.description, "The extended key usage extension was not marked critical.")
|
|
XCTAssertEqual(status?.description, "The extended key usage extension was not marked critical.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampMissing)
|
|
let status = Status(rawValue: errSecTimestampMissing)
|
|
- XCTAssertEqual(status, .TimestampMissing)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampMissing)
|
|
XCTAssertEqual(status?.description, "A timestamp was expected but was not found.")
|
|
XCTAssertEqual(status?.description, "A timestamp was expected but was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampInvalid)
|
|
let status = Status(rawValue: errSecTimestampInvalid)
|
|
- XCTAssertEqual(status, .TimestampInvalid)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampInvalid)
|
|
XCTAssertEqual(status?.description, "The timestamp was not valid.")
|
|
XCTAssertEqual(status?.description, "The timestamp was not valid.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampNotTrusted)
|
|
let status = Status(rawValue: errSecTimestampNotTrusted)
|
|
- XCTAssertEqual(status, .TimestampNotTrusted)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampNotTrusted)
|
|
XCTAssertEqual(status?.description, "The timestamp was not trusted.")
|
|
XCTAssertEqual(status?.description, "The timestamp was not trusted.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampServiceNotAvailable)
|
|
let status = Status(rawValue: errSecTimestampServiceNotAvailable)
|
|
- XCTAssertEqual(status, .TimestampServiceNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampServiceNotAvailable)
|
|
XCTAssertEqual(status?.description, "The timestamp service is not available.")
|
|
XCTAssertEqual(status?.description, "The timestamp service is not available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampBadAlg)
|
|
let status = Status(rawValue: errSecTimestampBadAlg)
|
|
- XCTAssertEqual(status, .TimestampBadAlg)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampBadAlg)
|
|
XCTAssertEqual(status?.description, "An unrecognized or unsupported Algorithm Identifier in timestamp.")
|
|
XCTAssertEqual(status?.description, "An unrecognized or unsupported Algorithm Identifier in timestamp.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampBadRequest)
|
|
let status = Status(rawValue: errSecTimestampBadRequest)
|
|
- XCTAssertEqual(status, .TimestampBadRequest)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampBadRequest)
|
|
XCTAssertEqual(status?.description, "The timestamp transaction is not permitted or supported.")
|
|
XCTAssertEqual(status?.description, "The timestamp transaction is not permitted or supported.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampBadDataFormat)
|
|
let status = Status(rawValue: errSecTimestampBadDataFormat)
|
|
- XCTAssertEqual(status, .TimestampBadDataFormat)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampBadDataFormat)
|
|
XCTAssertEqual(status?.description, "The timestamp data submitted has the wrong format.")
|
|
XCTAssertEqual(status?.description, "The timestamp data submitted has the wrong format.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampTimeNotAvailable)
|
|
let status = Status(rawValue: errSecTimestampTimeNotAvailable)
|
|
- XCTAssertEqual(status, .TimestampTimeNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampTimeNotAvailable)
|
|
XCTAssertEqual(status?.description, "The time source for the Timestamp Authority is not available.")
|
|
XCTAssertEqual(status?.description, "The time source for the Timestamp Authority is not available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampUnacceptedPolicy)
|
|
let status = Status(rawValue: errSecTimestampUnacceptedPolicy)
|
|
- XCTAssertEqual(status, .TimestampUnacceptedPolicy)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampUnacceptedPolicy)
|
|
XCTAssertEqual(status?.description, "The requested policy is not supported by the Timestamp Authority.")
|
|
XCTAssertEqual(status?.description, "The requested policy is not supported by the Timestamp Authority.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampUnacceptedExtension)
|
|
let status = Status(rawValue: errSecTimestampUnacceptedExtension)
|
|
- XCTAssertEqual(status, .TimestampUnacceptedExtension)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampUnacceptedExtension)
|
|
XCTAssertEqual(status?.description, "The requested extension is not supported by the Timestamp Authority.")
|
|
XCTAssertEqual(status?.description, "The requested extension is not supported by the Timestamp Authority.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampAddInfoNotAvailable)
|
|
let status = Status(rawValue: errSecTimestampAddInfoNotAvailable)
|
|
- XCTAssertEqual(status, .TimestampAddInfoNotAvailable)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampAddInfoNotAvailable)
|
|
XCTAssertEqual(status?.description, "The additional information requested is not available.")
|
|
XCTAssertEqual(status?.description, "The additional information requested is not available.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampSystemFailure)
|
|
let status = Status(rawValue: errSecTimestampSystemFailure)
|
|
- XCTAssertEqual(status, .TimestampSystemFailure)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampSystemFailure)
|
|
XCTAssertEqual(status?.description, "The timestamp request cannot be handled due to system failure.")
|
|
XCTAssertEqual(status?.description, "The timestamp request cannot be handled due to system failure.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecSigningTimeMissing)
|
|
let status = Status(rawValue: errSecSigningTimeMissing)
|
|
- XCTAssertEqual(status, .SigningTimeMissing)
|
|
|
|
|
|
+ XCTAssertEqual(status, .signingTimeMissing)
|
|
XCTAssertEqual(status?.description, "A signing time was expected but was not found.")
|
|
XCTAssertEqual(status?.description, "A signing time was expected but was not found.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampRejection)
|
|
let status = Status(rawValue: errSecTimestampRejection)
|
|
- XCTAssertEqual(status, .TimestampRejection)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampRejection)
|
|
XCTAssertEqual(status?.description, "A timestamp transaction was rejected.")
|
|
XCTAssertEqual(status?.description, "A timestamp transaction was rejected.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampWaiting)
|
|
let status = Status(rawValue: errSecTimestampWaiting)
|
|
- XCTAssertEqual(status, .TimestampWaiting)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampWaiting)
|
|
XCTAssertEqual(status?.description, "A timestamp transaction is waiting.")
|
|
XCTAssertEqual(status?.description, "A timestamp transaction is waiting.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampRevocationWarning)
|
|
let status = Status(rawValue: errSecTimestampRevocationWarning)
|
|
- XCTAssertEqual(status, .TimestampRevocationWarning)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampRevocationWarning)
|
|
XCTAssertEqual(status?.description, "A timestamp authority revocation warning was issued.")
|
|
XCTAssertEqual(status?.description, "A timestamp authority revocation warning was issued.")
|
|
}
|
|
}
|
|
do {
|
|
do {
|
|
let status = Status(rawValue: errSecTimestampRevocationNotification)
|
|
let status = Status(rawValue: errSecTimestampRevocationNotification)
|
|
- XCTAssertEqual(status, .TimestampRevocationNotification)
|
|
|
|
|
|
+ XCTAssertEqual(status, .timestampRevocationNotification)
|
|
XCTAssertEqual(status?.description, "A timestamp authority revocation notification was issued.")
|
|
XCTAssertEqual(status?.description, "A timestamp authority revocation notification was issued.")
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|