-rw-r--r-- | include/opkele/exception.h | 30 |
1 files changed, 29 insertions, 1 deletions
diff --git a/include/opkele/exception.h b/include/opkele/exception.h index d003ce4..c200a13 100644 --- a/include/opkele/exception.h +++ b/include/opkele/exception.h | |||
@@ -148,33 +148,33 @@ namespace opkele { | |||
148 | }; | 148 | }; |
149 | 149 | ||
150 | /** | 150 | /** |
151 | * thrown if the id_res request result is negative | 151 | * thrown if the id_res request result is negative |
152 | */ | 152 | */ |
153 | class id_res_failed : public exception { | 153 | class id_res_failed : public exception { |
154 | public: | 154 | public: |
155 | id_res_failed(OPKELE_E_PARS) | 155 | id_res_failed(OPKELE_E_PARS) |
156 | : exception(OPKELE_E_CONS) { } | 156 | : exception(OPKELE_E_CONS) { } |
157 | }; | 157 | }; |
158 | /** | 158 | /** |
159 | * thrown if the user_setup_url is provided with negative response | 159 | * thrown if the user_setup_url is provided with negative response |
160 | */ | 160 | */ |
161 | class id_res_setup : public id_res_failed { | 161 | class id_res_setup : public id_res_failed { |
162 | public: | 162 | public: |
163 | string setup_url; | 163 | string setup_url; |
164 | id_res_setup(OPKELE_E_PARS,const string& su) | 164 | id_res_setup(OPKELE_E_PARS,const string& su="") |
165 | : id_res_failed(OPKELE_E_CONS), setup_url(su) { } | 165 | : id_res_failed(OPKELE_E_CONS), setup_url(su) { } |
166 | ~id_res_setup() throw() { } | 166 | ~id_res_setup() throw() { } |
167 | }; | 167 | }; |
168 | /** | 168 | /** |
169 | * thrown in case of signature mismatch | 169 | * thrown in case of signature mismatch |
170 | */ | 170 | */ |
171 | class id_res_mismatch : public id_res_failed { | 171 | class id_res_mismatch : public id_res_failed { |
172 | public: | 172 | public: |
173 | id_res_mismatch(OPKELE_E_PARS) | 173 | id_res_mismatch(OPKELE_E_PARS) |
174 | : id_res_failed(OPKELE_E_CONS) { } | 174 | : id_res_failed(OPKELE_E_CONS) { } |
175 | }; | 175 | }; |
176 | 176 | ||
177 | /** | 177 | /** |
178 | * thrown if the association has expired before it could've been verified. | 178 | * thrown if the association has expired before it could've been verified. |
179 | */ | 179 | */ |
180 | class id_res_expired_on_delivery : public id_res_failed { | 180 | class id_res_expired_on_delivery : public id_res_failed { |
@@ -189,32 +189,50 @@ namespace opkele { | |||
189 | class id_res_cancel : public id_res_failed { | 189 | class id_res_cancel : public id_res_failed { |
190 | public: | 190 | public: |
191 | id_res_cancel(OPKELE_E_PARS) | 191 | id_res_cancel(OPKELE_E_PARS) |
192 | : id_res_failed(OPKELE_E_CONS) { } | 192 | : id_res_failed(OPKELE_E_CONS) { } |
193 | }; | 193 | }; |
194 | 194 | ||
195 | /** | 195 | /** |
196 | * thrown in case of nonce reuse or otherwise imperfect nonce. | 196 | * thrown in case of nonce reuse or otherwise imperfect nonce. |
197 | */ | 197 | */ |
198 | class id_res_bad_nonce : public id_res_failed { | 198 | class id_res_bad_nonce : public id_res_failed { |
199 | public: | 199 | public: |
200 | id_res_bad_nonce(OPKELE_E_PARS) | 200 | id_res_bad_nonce(OPKELE_E_PARS) |
201 | : id_res_failed(OPKELE_E_CONS) { } | 201 | : id_res_failed(OPKELE_E_CONS) { } |
202 | }; | 202 | }; |
203 | 203 | ||
204 | /** | 204 | /** |
205 | * thrown if return_to didn't pass verification | ||
206 | */ | ||
207 | class id_res_bad_return_to : public id_res_failed { | ||
208 | public: | ||
209 | id_res_bad_return_to(OPKELE_E_PARS) | ||
210 | : id_res_failed(OPKELE_E_CONS) { } | ||
211 | }; | ||
212 | |||
213 | /** | ||
214 | * thrown if OP isn't authorized to make an assertion | ||
215 | */ | ||
216 | class id_res_unauthorized : public id_res_failed { | ||
217 | public: | ||
218 | id_res_unauthorized(OPKELE_E_PARS) | ||
219 | : id_res_failed(OPKELE_E_CONS) { } | ||
220 | }; | ||
221 | |||
222 | /** | ||
205 | * openssl malfunction occured | 223 | * openssl malfunction occured |
206 | */ | 224 | */ |
207 | class exception_openssl : public exception { | 225 | class exception_openssl : public exception { |
208 | public: | 226 | public: |
209 | unsigned long _error; | 227 | unsigned long _error; |
210 | string _ssl_string; | 228 | string _ssl_string; |
211 | exception_openssl(OPKELE_E_PARS); | 229 | exception_openssl(OPKELE_E_PARS); |
212 | ~exception_openssl() throw() { } | 230 | ~exception_openssl() throw() { } |
213 | }; | 231 | }; |
214 | 232 | ||
215 | /** | 233 | /** |
216 | * network operation related error occured | 234 | * network operation related error occured |
217 | */ | 235 | */ |
218 | class exception_network : public exception { | 236 | class exception_network : public exception { |
219 | public: | 237 | public: |
220 | exception_network(OPKELE_E_PARS) | 238 | exception_network(OPKELE_E_PARS) |
@@ -259,19 +277,29 @@ namespace opkele { | |||
259 | */ | 277 | */ |
260 | class not_implemented : public exception { | 278 | class not_implemented : public exception { |
261 | public: | 279 | public: |
262 | not_implemented(OPKELE_E_PARS) | 280 | not_implemented(OPKELE_E_PARS) |
263 | : exception(OPKELE_E_CONS) { } | 281 | : exception(OPKELE_E_CONS) { } |
264 | }; | 282 | }; |
265 | 283 | ||
266 | /** | 284 | /** |
267 | * internal error, indicates internal libopkele problem | 285 | * internal error, indicates internal libopkele problem |
268 | */ | 286 | */ |
269 | class internal_error : public exception { | 287 | class internal_error : public exception { |
270 | public: | 288 | public: |
271 | internal_error(OPKELE_E_PARS) | 289 | internal_error(OPKELE_E_PARS) |
272 | : exception(OPKELE_E_CONS) { } | 290 | : exception(OPKELE_E_CONS) { } |
273 | }; | 291 | }; |
274 | 292 | ||
293 | /** | ||
294 | * thrown in case of unsupported parameter encountered (e.g. unsupported | ||
295 | * association type). | ||
296 | */ | ||
297 | class unsupported : public exception { | ||
298 | public: | ||
299 | unsupported(OPKELE_E_PARS) | ||
300 | : exception(OPKELE_E_CONS) { } | ||
301 | }; | ||
302 | |||
275 | } | 303 | } |
276 | 304 | ||
277 | #endif /* __OPKELE_EXCEPTION_H */ | 305 | #endif /* __OPKELE_EXCEPTION_H */ |