diff options
author | Lukas Reschke <lukas@owncloud.com> | 2014-09-29 17:20:29 +0200 |
---|---|---|
committer | Lukas Reschke <lukas@owncloud.com> | 2014-09-29 17:20:29 +0200 |
commit | 41374986d3260e501bfb00918317387d8a358910 (patch) | |
tree | e3969d061edc1b4cd5d64175bf97f4d021ec1035 /lib/private | |
parent | 6b45cb5416ddd8d06de628b984cc773567770565 (diff) | |
download | nextcloud-server-41374986d3260e501bfb00918317387d8a358910.tar.gz nextcloud-server-41374986d3260e501bfb00918317387d8a358910.zip |
Remove dead code
Diffstat (limited to 'lib/private')
-rw-r--r-- | lib/private/appframework/http/request.php | 1 | ||||
-rwxr-xr-x | lib/private/util.php | 17 |
2 files changed, 0 insertions, 18 deletions
diff --git a/lib/private/appframework/http/request.php b/lib/private/appframework/http/request.php index 8b68ca486ff..350694dca81 100644 --- a/lib/private/appframework/http/request.php +++ b/lib/private/appframework/http/request.php @@ -350,7 +350,6 @@ class Request implements \ArrayAccess, \Countable, IRequest { /** * Checks if the CSRF check was correct * @return bool true if CSRF check passed - * @see OC_Util::$callLifespan * @see OC_Util::callRegister() */ public function passesCSRFCheck() { diff --git a/lib/private/util.php b/lib/private/util.php index 46a61716333..5097174ac11 100755 --- a/lib/private/util.php +++ b/lib/private/util.php @@ -897,28 +897,13 @@ class OC_Util { } /** - * Static lifespan (in seconds) when a request token expires. - * - * @see OC_Util::callRegister() - * @see OC_Util::isCallRegistered() - * @description - * Also required for the client side to compute the point in time when to - * request a fresh token. The client will do so when nearly 97% of the - * time span coded here has expired. - */ - public static $callLifespan = 3600; // 3600 secs = 1 hour - - /** * Register an get/post call. Important to prevent CSRF attacks. * - * @todo Write howto: CSRF protection guide * @return string Generated token. * @description * Creates a 'request token' (random) and stores it inside the session. * Ever subsequent (ajax) request must use such a valid token to succeed, * otherwise the request will be denied as a protection against CSRF. - * The tokens expire after a fixed lifespan. - * @see OC_Util::$callLifespan * @see OC_Util::isCallRegistered() */ public static function callRegister() { @@ -938,7 +923,6 @@ class OC_Util { * Check an ajax get/post call if the request token is valid. * * @return boolean False if request token is not set or is invalid. - * @see OC_Util::$callLifespan * @see OC_Util::callRegister() */ public static function isCallRegistered() { @@ -948,7 +932,6 @@ class OC_Util { /** * Check an ajax get/post call if the request token is valid. Exit if not. * - * @todo Write howto * @return void */ public static function callCheck() { |