author | Michael Krelin <hacker@klever.net> | 2007-12-21 21:22:54 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2008-01-04 18:34:12 (UTC) |
commit | 14f6295f3ffb22848d848265042b088a28451677 (patch) (side-by-side diff) | |
tree | d0ee0b91728aa635c435b9859193cb903c849087 /include/opkele | |
parent | b52ad4dc051835fdf8417f748bf40ba4c17449d4 (diff) | |
download | libopkele-14f6295f3ffb22848d848265042b088a28451677.zip libopkele-14f6295f3ffb22848d848265042b088a28451677.tar.gz libopkele-14f6295f3ffb22848d848265042b088a28451677.tar.bz2 |
id_res_cancel and id_res_bad_nonce exceptions
Signed-off-by: Michael Krelin <hacker@klever.net>
-rw-r--r-- | include/opkele/exception.h | 18 |
1 files changed, 18 insertions, 0 deletions
diff --git a/include/opkele/exception.h b/include/opkele/exception.h index 64f189e..d003ce4 100644 --- a/include/opkele/exception.h +++ b/include/opkele/exception.h @@ -175,24 +175,42 @@ namespace opkele { }; /** * thrown if the association has expired before it could've been verified. */ class id_res_expired_on_delivery : public id_res_failed { public: id_res_expired_on_delivery(OPKELE_E_PARS) : id_res_failed(OPKELE_E_CONS) { } }; /** + * thown when the user cancelled authentication process. + */ + class id_res_cancel : public id_res_failed { + public: + id_res_cancel(OPKELE_E_PARS) + : id_res_failed(OPKELE_E_CONS) { } + }; + + /** + * thrown in case of nonce reuse or otherwise imperfect nonce. + */ + class id_res_bad_nonce : public id_res_failed { + public: + id_res_bad_nonce(OPKELE_E_PARS) + : id_res_failed(OPKELE_E_CONS) { } + }; + + /** * openssl malfunction occured */ class exception_openssl : public exception { public: unsigned long _error; string _ssl_string; exception_openssl(OPKELE_E_PARS); ~exception_openssl() throw() { } }; /** * network operation related error occured |