summaryrefslogtreecommitdiff
path: root/SmartDeviceLink/private/SDLSecurityQueryErrorCode.m
diff options
context:
space:
mode:
Diffstat (limited to 'SmartDeviceLink/private/SDLSecurityQueryErrorCode.m')
-rw-r--r--SmartDeviceLink/private/SDLSecurityQueryErrorCode.m48
1 files changed, 48 insertions, 0 deletions
diff --git a/SmartDeviceLink/private/SDLSecurityQueryErrorCode.m b/SmartDeviceLink/private/SDLSecurityQueryErrorCode.m
new file mode 100644
index 000000000..a1a55ea6c
--- /dev/null
+++ b/SmartDeviceLink/private/SDLSecurityQueryErrorCode.m
@@ -0,0 +1,48 @@
+//
+// SDLSecurityQueryErrorCode.m
+// SmartDeviceLink
+//
+// Created by Frank Elias on 8/12/21.
+// Copyright © 2021 smartdevicelink. All rights reserved.
+//
+
+#import "SDLSecurityQueryErrorCode.h"
+
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeSuccess = @"Success";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeInvalidQuerySize = @"Wrong size of query data";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeInvalidQueryID = @"Unknown Query ID";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeNotSupported = @"SDL does not support encryption";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeServiceAlreadyProtected = @"Received request to protect a service that was protected before";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeServiceNotProtected = @"Received handshake or encrypted data for not protected service";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeDecryptionFailed = @"Decryption failed";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeEncryptionFailed = @"Encryption failed";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeSSLInvalidData = @"SSL invalid data";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeHandshakeFailed = @"In case of all other handshake errors";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeInvalidCertificate = @"Handshake failed because certificate is invalid";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeExpiredCertificate = @"Handshake failed because certificate is expired";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeInternal = @"Internal error";
+SDLSecurityQueryErrorCode const SDLSecurityQueryErrorCodeUnknownInternalError = @"Error value for testing";
+
+
+@implementation SDLSecurityQueryError
+
++ (SDLSecurityQueryErrorCode)convertErrorIdToStringEnum:(NSNumber *)errorId {
+ switch (errorId.unsignedIntegerValue) {
+ case 0x00: return SDLSecurityQueryErrorCodeSuccess;
+ case 0x01: return SDLSecurityQueryErrorCodeInvalidQuerySize;
+ case 0x02: return SDLSecurityQueryErrorCodeInvalidQueryID;
+ case 0x03: return SDLSecurityQueryErrorCodeNotSupported;
+ case 0x04: return SDLSecurityQueryErrorCodeServiceAlreadyProtected;
+ case 0x05: return SDLSecurityQueryErrorCodeServiceNotProtected;
+ case 0x06: return SDLSecurityQueryErrorCodeDecryptionFailed;
+ case 0x07: return SDLSecurityQueryErrorCodeEncryptionFailed;
+ case 0x08: return SDLSecurityQueryErrorCodeSSLInvalidData;
+ case 0x09: return SDLSecurityQueryErrorCodeHandshakeFailed;
+ case 0x0A: return SDLSecurityQueryErrorCodeInvalidCertificate;
+ case 0x0B: return SDLSecurityQueryErrorCodeExpiredCertificate;
+ case 0xFF: return SDLSecurityQueryErrorCodeInternal;
+ default: return SDLSecurityQueryErrorCodeUnknownInternalError;
+ }
+}
+
+@end