PHP Класс Auth_OpenID_DumbStore

Most of the methods of this class are implementation details. Users of this class need to worry only about the constructor.
Наследование: extends Auth_OpenID_OpenIDStore
Показать файл Открыть проект

Открытые методы

Метод Описание
__construct ( $secret_phrase ) Creates a new {@link Auth_OpenID_DumbStore} instance. For the security of the tokens generated by the library, this class attempts to at least have a secure implementation of getAuthKey.
getAssociation ( $server_url, $handle = null ) This implementation always returns null.
getAuthKey ( ) This method returns the auth key generated by the constructor.
removeAssociation ( $server_url, $handle ) This implementation always returns false.
storeAssociation ( $server_url, $association ) This implementation does nothing.
useNonce ( $server_url, $timestamp, $salt ) In a system truly limited to dumb mode, nonces must all be accepted. This therefore always returns true, which makes replay attacks feasible.

Описание методов

__construct() публичный Метод

When you create an instance of this class, pass in a secret phrase. The phrase is hashed with sha1 to make it the correct length and form for an auth key. That allows you to use a long string as the secret phrase, which means you can make it very difficult to guess. Each {@link Auth_OpenID_DumbStore} instance that is created for use by your consumer site needs to use the same $secret_phrase.
public __construct ( $secret_phrase )

getAssociation() публичный Метод

This implementation always returns null.
public getAssociation ( $server_url, $handle = null )

getAuthKey() публичный Метод

This method returns the auth key generated by the constructor.
public getAuthKey ( )

removeAssociation() публичный Метод

This implementation always returns false.
public removeAssociation ( $server_url, $handle )

storeAssociation() публичный Метод

This implementation does nothing.
public storeAssociation ( $server_url, $association )

useNonce() публичный Метод

In a system truly limited to dumb mode, nonces must all be accepted. This therefore always returns true, which makes replay attacks feasible.
public useNonce ( $server_url, $timestamp, $salt )