summaryrefslogtreecommitdiffstats
path: root/lib/private
diff options
context:
space:
mode:
authorLukas Reschke <lukas@owncloud.com>2014-09-29 17:20:29 +0200
committerLukas Reschke <lukas@owncloud.com>2014-09-29 17:20:29 +0200
commit41374986d3260e501bfb00918317387d8a358910 (patch)
treee3969d061edc1b4cd5d64175bf97f4d021ec1035 /lib/private
parent6b45cb5416ddd8d06de628b984cc773567770565 (diff)
downloadnextcloud-server-41374986d3260e501bfb00918317387d8a358910.tar.gz
nextcloud-server-41374986d3260e501bfb00918317387d8a358910.zip
Remove dead code
Diffstat (limited to 'lib/private')
-rw-r--r--lib/private/appframework/http/request.php1
-rwxr-xr-xlib/private/util.php17
2 files changed, 0 insertions, 18 deletions
diff --git a/lib/private/appframework/http/request.php b/lib/private/appframework/http/request.php
index 8b68ca486ff..350694dca81 100644
--- a/lib/private/appframework/http/request.php
+++ b/lib/private/appframework/http/request.php
@@ -350,7 +350,6 @@ class Request implements \ArrayAccess, \Countable, IRequest {
/**
* Checks if the CSRF check was correct
* @return bool true if CSRF check passed
- * @see OC_Util::$callLifespan
* @see OC_Util::callRegister()
*/
public function passesCSRFCheck() {
diff --git a/lib/private/util.php b/lib/private/util.php
index 46a61716333..5097174ac11 100755
--- a/lib/private/util.php
+++ b/lib/private/util.php
@@ -897,28 +897,13 @@ class OC_Util {
}
/**
- * Static lifespan (in seconds) when a request token expires.
- *
- * @see OC_Util::callRegister()
- * @see OC_Util::isCallRegistered()
- * @description
- * Also required for the client side to compute the point in time when to
- * request a fresh token. The client will do so when nearly 97% of the
- * time span coded here has expired.
- */
- public static $callLifespan = 3600; // 3600 secs = 1 hour
-
- /**
* Register an get/post call. Important to prevent CSRF attacks.
*
- * @todo Write howto: CSRF protection guide
* @return string Generated token.
* @description
* Creates a 'request token' (random) and stores it inside the session.
* Ever subsequent (ajax) request must use such a valid token to succeed,
* otherwise the request will be denied as a protection against CSRF.
- * The tokens expire after a fixed lifespan.
- * @see OC_Util::$callLifespan
* @see OC_Util::isCallRegistered()
*/
public static function callRegister() {
@@ -938,7 +923,6 @@ class OC_Util {
* Check an ajax get/post call if the request token is valid.
*
* @return boolean False if request token is not set or is invalid.
- * @see OC_Util::$callLifespan
* @see OC_Util::callRegister()
*/
public static function isCallRegistered() {
@@ -948,7 +932,6 @@ class OC_Util {
/**
* Check an ajax get/post call if the request token is valid. Exit if not.
*
- * @todo Write howto
* @return void
*/
public static function callCheck() {