|
|
|
|
|
|
|
|
|
|
|
test_returnToVerified_callsVerify(self)
Make sure that verifyReturnTo is calling the trustroot function
verifyReturnTo |
source code
|
|
|
_expectAnswer(self,
answer,
identity=None,
claimed_id=None) |
source code
|
|
|
|
|
|
|
|
|
test_answerAllowWithoutIdentityReally(self) |
source code
|
|
|
|
|
|
|
test_answerAllowWithDelegatedIdentityOpenID2(self)
Answer an IDENTIFIER_SELECT case with a delegated identifier. |
source code
|
|
|
test_answerAllowWithDelegatedIdentityOpenID1(self)
claimed_id parameter doesn't exist in OpenID 1. |
source code
|
|
|
|
|
test_answerAllowWithIdentityNormalization(self) |
source code
|
|
|
|
|
|
|
|
|
test_fromMessageClaimedIDWithoutIdentityOpenID2(self) |
source code
|
|
|
test_fromMessageIdentityWithoutClaimedIDOpenID2(self) |
source code
|
|
|
test_trustRootOpenID1(self)
Ignore openid.realm in OpenID 1 |
source code
|
|
|
test_trustRootOpenID2(self)
Ignore openid.trust_root in OpenID 2 |
source code
|
|
|
|
|
|
|
|
|
test_fromMessageWithoutTrustRootOrReturnTo(self) |
source code
|
|
|
test_answerAllowNoEndpointOpenID1(self)
Test .allow() with an OpenID 1.x Message on a CheckIDRequest built
without an op_endpoint parameter. |
source code
|
|
|
|
|
test_answerImmediateDenyOpenID1(self)
Look for user_setup_url in checkid_immediate negative response in
OpenID 1 case. |
source code
|
|
|
|
|
|
|
|
|
|