forked from GNUsocial/gnu-social
@@ -1059,7 +1059,7 @@ class Auth_OpenID_GenericConsumer {
|
||||
}
|
||||
}
|
||||
|
||||
// Fragments do not influence discovery, so we cannot compare a
|
||||
// Fragments do not influence discovery, so we can't compare a
|
||||
// claimed identifier with a fragment to discovered
|
||||
// information.
|
||||
list($defragged_claimed_id, $_) =
|
||||
|
@@ -515,7 +515,7 @@ function Auth_OpenID_discoverXRI($iname, &$fetcher)
|
||||
|
||||
function Auth_OpenID_discover($uri, &$fetcher)
|
||||
{
|
||||
// If the fetcher (i.e., PHP) doesn't support SSL, we cannot do
|
||||
// If the fetcher (i.e., PHP) doesn't support SSL, we can't do
|
||||
// discovery on an HTTPS URL.
|
||||
if ($fetcher->isHTTPS($uri) && !$fetcher->supportsSSL()) {
|
||||
return array($uri, array());
|
||||
@@ -527,7 +527,7 @@ function Auth_OpenID_discover($uri, &$fetcher)
|
||||
$result = Auth_OpenID_discoverURI($uri, $fetcher);
|
||||
}
|
||||
|
||||
// If the fetcher doesn't support SSL, we cannot interact with
|
||||
// If the fetcher doesn't support SSL, we can't interact with
|
||||
// HTTPS server URLs; remove those endpoints from the list.
|
||||
if (!$fetcher->supportsSSL()) {
|
||||
$http_endpoints = array();
|
||||
|
@@ -496,7 +496,7 @@ class Auth_OpenID_FileStore extends Auth_OpenID_OpenIDStore {
|
||||
|
||||
return true;
|
||||
} else {
|
||||
// Could not open directory.
|
||||
// Couldn't open directory.
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user