gehe zum Quellcode dieser Datei
Datenstrukturen | |
class | Auth_OpenID_TrustRoot |
Namensbereiche | |
namespace | OpenID |
Aufzählungen | |
enum | Auth_OpenID___TLDs |
enum | Auth_OpenID___HostSegmentRe |
Funktionen | |
filter_extractReturnURL (&$endpoint) | |
& | Auth_OpenID_extractReturnURL (&$endpoint_list) |
Auth_OpenID_returnToMatches ($allowed_return_to_urls, $return_to) | |
Auth_OpenID_getAllowedReturnURLs ($relying_party_url, &$fetcher, $discover_function=null) | |
Auth_OpenID_verifyReturnTo ($realm_str, $return_to, &$fetcher, $_vrfy='Auth_OpenID_getAllowedReturnURLs') |
Definiert in Zeile 42 der Datei TrustRoot.php.
enum Auth_OpenID___TLDs |
A regular expression that matches a domain ending in a top-level domains. Used in checking trust roots for sanity.
private
Definiert in Zeile 23 der Datei TrustRoot.php.
& Auth_OpenID_extractReturnURL | ( | &$ | endpoint_list | ) |
Definiert in Zeile 351 der Datei TrustRoot.php.
00354 { 00355 $result = array(); 00356 00357 foreach ($endpoint_list as $endpoint) { 00358 if (filter_extractReturnURL($endpoint)) { 00359 $result[] = $endpoint; 00360 } 00361 } 00362
Auth_OpenID_getAllowedReturnURLs | ( | $ | relying_party_url, | |
&$ | fetcher, | |||
$ | discover_function = null | |||
) |
Definiert in Zeile 395 der Datei TrustRoot.php.
00399 { 00400 if ($discover_function === null) { 00401 $discover_function = array('Auth_Yadis_Yadis', 'discover'); 00402 } 00403 00404 $xrds_parse_cb = array('Auth_OpenID_ServiceEndpoint', 'fromXRDS'); 00405 00406 list($rp_url_after_redirects, $endpoints) = 00407 Auth_Yadis_getServiceEndpoints($relying_party_url, $xrds_parse_cb, 00408 $discover_function, $fetcher); 00409 00410 if ($rp_url_after_redirects != $relying_party_url) { 00411 // Verification caused a redirect 00412 return false; 00413 } 00414 00415 call_user_func_array($discover_function, 00416 array($relying_party_url, $fetcher)); 00417 00418 $return_to_urls = array(); 00419 $matching_endpoints = Auth_OpenID_extractReturnURL($endpoints); 00420 00421 foreach ($matching_endpoints as $e) { 00422 $return_to_urls[] = $e->server_url; 00423 } 00424
Auth_OpenID_returnToMatches | ( | $ | allowed_return_to_urls, | |
$ | return_to | |||
) |
Definiert in Zeile 368 der Datei TrustRoot.php.
00371 { 00372 foreach ($allowed_return_to_urls as $allowed_return_to) { 00373 // A return_to pattern works the same as a realm, except that 00374 // it's not allowed to use a wildcard. We'll model this by 00375 // parsing it as a realm, and not trying to match it if it has 00376 // a wildcard. 00377 00378 $return_realm = Auth_OpenID_TrustRoot::_parse($allowed_return_to); 00379 if (// Parses as a trust root 00380 ($return_realm !== false) && 00381 // Does not have a wildcard 00382 (!$return_realm['wildcard']) && 00383 // Matches the return_to that we passed in with it 00384 (Auth_OpenID_TrustRoot::match($allowed_return_to, $return_to))) { 00385 return true; 00386 } 00387 } 00388 00389 // No URL in the list matched
Auth_OpenID_verifyReturnTo | ( | $ | realm_str, | |
$ | return_to, | |||
&$ | fetcher, | |||
$ | _vrfy = 'Auth_OpenID_getAllowedReturnURLs' | |||
) |
Definiert in Zeile 436 der Datei TrustRoot.php.
00440 { 00441 $disco_url = Auth_OpenID_TrustRoot::buildDiscoveryURL($realm_str); 00442 00443 if ($disco_url === false) { 00444 return false; 00445 } 00446 00447 $allowable_urls = call_user_func_array($_vrfy, 00448 array($disco_url, &$fetcher)); 00449 00450 // The realm_str could not be parsed. 00451 if ($allowable_urls === false) { 00452 return false; 00453 } 00454 00455 if (Auth_OpenID_returnToMatches($allowable_urls, $return_to)) { 00456 return true; 00457 } else { 00458 return false;
filter_extractReturnURL | ( | &$ | endpoint | ) |
Definiert in Zeile 342 der Datei TrustRoot.php.
00345 { 00346 if ($endpoint->matchTypes(array(Auth_OpenID_RP_RETURN_TO_URL_TYPE))) { 00347 return $endpoint; 00348 } else { 00349 return null;
Copyright © 2003 - 2009 MyOOS [Shopsystem]. All rights reserved. MyOOS [Shopsystem] is Free Software released under the GNU/GPL License. Webmaster: info@r23.de (Impressum) |
|