Revision control

Copy as Markdown

Other Tools

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
pub use crate::ctap2::commands::{client_pin::PinError, CommandError};
pub use crate::transport::errors::HIDError;
use std::fmt;
use std::io;
use std::sync::mpsc;
// This composite error type is patterned from Phil Daniels' blog:
#[derive(Debug)]
pub enum UnsupportedOption {
CredProtect,
EmptyAllowList,
MaxPinLength,
PubCredParams,
ResidentKey,
UserVerification,
}
#[derive(Debug)]
pub enum AuthenticatorError {
// Errors from external libraries...
Io(io::Error),
// Errors raised by us...
InvalidRelyingPartyInput,
NoConfiguredTransports,
Platform,
InternalError(String),
U2FToken(U2FTokenError),
Custom(String),
VersionMismatch(&'static str, u32),
HIDError(HIDError),
CryptoError,
PinError(PinError),
UnsupportedOption(UnsupportedOption),
CancelledByUser,
CredentialExcluded,
}
impl std::error::Error for AuthenticatorError {}
impl fmt::Display for AuthenticatorError {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
match *self {
AuthenticatorError::Io(ref err) => err.fmt(f),
AuthenticatorError::InvalidRelyingPartyInput => {
write!(f, "invalid input from relying party")
}
AuthenticatorError::NoConfiguredTransports => write!(
f,
"no transports were configured in the authenticator service"
),
AuthenticatorError::Platform => write!(f, "unknown platform error"),
AuthenticatorError::InternalError(ref err) => write!(f, "internal error: {err}"),
AuthenticatorError::U2FToken(ref err) => {
write!(f, "A u2f token error occurred {err:?}")
}
AuthenticatorError::Custom(ref err) => write!(f, "A custom error occurred {err:?}"),
AuthenticatorError::VersionMismatch(manager, version) => {
write!(f, "{manager} expected arguments of version CTAP{version}")
}
AuthenticatorError::HIDError(ref e) => write!(f, "Device error: {e}"),
AuthenticatorError::CryptoError => {
write!(f, "The cryptography implementation encountered an error")
}
AuthenticatorError::PinError(ref e) => write!(f, "PIN Error: {e}"),
AuthenticatorError::UnsupportedOption(ref e) => {
write!(f, "Unsupported option: {e:?}")
}
AuthenticatorError::CancelledByUser => {
write!(f, "Cancelled by user.")
}
AuthenticatorError::CredentialExcluded => {
write!(f, "Credential excluded.")
}
}
}
}
impl From<io::Error> for AuthenticatorError {
fn from(err: io::Error) -> AuthenticatorError {
AuthenticatorError::Io(err)
}
}
impl From<HIDError> for AuthenticatorError {
fn from(err: HIDError) -> AuthenticatorError {
AuthenticatorError::HIDError(err)
}
}
impl From<CommandError> for AuthenticatorError {
fn from(err: CommandError) -> AuthenticatorError {
AuthenticatorError::HIDError(HIDError::Command(err))
}
}
impl<T> From<mpsc::SendError<T>> for AuthenticatorError {
fn from(err: mpsc::SendError<T>) -> AuthenticatorError {
AuthenticatorError::InternalError(err.to_string())
}
}
#[derive(Clone, Copy, Debug, Eq, Hash, Ord, PartialEq, PartialOrd)]
pub enum U2FTokenError {
Unknown = 1,
NotSupported = 2,
InvalidState = 3,
ConstraintError = 4,
NotAllowed = 5,
}
impl U2FTokenError {
fn as_str(&self) -> &str {
match *self {
U2FTokenError::Unknown => "unknown",
U2FTokenError::NotSupported => "not supported",
U2FTokenError::InvalidState => "invalid state",
U2FTokenError::ConstraintError => "constraint error",
U2FTokenError::NotAllowed => "not allowed",
}
}
}
impl std::fmt::Display for U2FTokenError {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "{}", self.as_str())
}
}
impl std::error::Error for U2FTokenError {}