PHP Class Auth_OpenID_DumbStore

Most of the methods of this class are implementation details. Users of this class need to worry only about the constructor.
Inheritance: extends Auth_OpenID_OpenIDStore
Show file Open project: openid/php-openid

Public Methods

Method Description
__construct ( $secret_phrase ) Creates a new {@link Auth_OpenID_DumbStore} instance. For the security of the tokens generated by the library, this class attempts to at least have a secure implementation of getAuthKey.
getAssociation ( $server_url, $handle = null ) This implementation always returns null.
getAuthKey ( ) This method returns the auth key generated by the constructor.
removeAssociation ( $server_url, $handle ) This implementation always returns false.
storeAssociation ( $server_url, $association ) This implementation does nothing.
useNonce ( $server_url, $timestamp, $salt ) In a system truly limited to dumb mode, nonces must all be accepted. This therefore always returns true, which makes replay attacks feasible.

Method Details

__construct() public method

When you create an instance of this class, pass in a secret phrase. The phrase is hashed with sha1 to make it the correct length and form for an auth key. That allows you to use a long string as the secret phrase, which means you can make it very difficult to guess. Each {@link Auth_OpenID_DumbStore} instance that is created for use by your consumer site needs to use the same $secret_phrase.
public __construct ( $secret_phrase )

getAssociation() public method

This implementation always returns null.
public getAssociation ( $server_url, $handle = null )

getAuthKey() public method

This method returns the auth key generated by the constructor.
public getAuthKey ( )

removeAssociation() public method

This implementation always returns false.
public removeAssociation ( $server_url, $handle )

storeAssociation() public method

This implementation does nothing.
public storeAssociation ( $server_url, $association )

useNonce() public method

In a system truly limited to dumb mode, nonces must all be accepted. This therefore always returns true, which makes replay attacks feasible.
public useNonce ( $server_url, $timestamp, $salt )