Created
December 30, 2009 05:05
-
-
Save co3k/265857 to your computer and use it in GitHub Desktop.
OpenPNE3 の Auth/OpenID に http://trac.openidenabled.com/trac/attachment/ticket/337/php-openid-php5.3.patch を適用した状態のパッチ
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
diff --git a/lib/vendor/php-openid/Auth/OpenID.php b/lib/vendor/php-openid/Auth/OpenID.php | |
index 6556b5b..f0657af 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID.php | |
@@ -120,7 +120,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function isFailure($thing) | |
+ static function isFailure($thing) | |
{ | |
return is_a($thing, 'Auth_OpenID_FailureResponse'); | |
} | |
@@ -141,7 +141,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function getQuery($query_str=null) | |
+ static function getQuery($query_str=null) | |
{ | |
$data = array(); | |
@@ -177,7 +177,7 @@ class Auth_OpenID { | |
return $data; | |
} | |
- function params_from_string($str) | |
+ static function params_from_string($str) | |
{ | |
$chunks = explode("&", $str); | |
@@ -203,7 +203,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function ensureDir($dir_name) | |
+ static function ensureDir($dir_name) | |
{ | |
if (is_dir($dir_name) || @mkdir($dir_name)) { | |
return true; | |
@@ -225,7 +225,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function addPrefix($values, $prefix) | |
+ static function addPrefix($values, $prefix) | |
{ | |
$new_values = array(); | |
foreach ($values as $s) { | |
@@ -241,7 +241,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function arrayGet($arr, $key, $fallback = null) | |
+ static function arrayGet($arr, $key, $fallback = null) | |
{ | |
if (is_array($arr)) { | |
if (array_key_exists($key, $arr)) { | |
@@ -261,7 +261,7 @@ class Auth_OpenID { | |
/** | |
* Replacement for PHP's broken parse_str. | |
*/ | |
- function parse_str($query) | |
+ static function parse_str($query) | |
{ | |
if ($query === null) { | |
return null; | |
@@ -295,7 +295,7 @@ class Auth_OpenID { | |
* pairs from $data into a URL query string | |
* (e.g. "username=bob&id=56"). | |
*/ | |
- function httpBuildQuery($data) | |
+ static function httpBuildQuery($data) | |
{ | |
$pairs = array(); | |
foreach ($data as $key => $value) { | |
@@ -323,7 +323,7 @@ class Auth_OpenID { | |
* @return string $url The original URL with the new parameters added. | |
* | |
*/ | |
- function appendArgs($url, $args) | |
+ static function appendArgs($url, $args) | |
{ | |
if (count($args) == 0) { | |
return $url; | |
@@ -367,7 +367,7 @@ class Auth_OpenID { | |
* @return string $url The URL resulting from assembling the | |
* specified components. | |
*/ | |
- function urlunparse($scheme, $host, $port = null, $path = '/', | |
+ static function urlunparse($scheme, $host, $port = null, $path = '/', | |
$query = '', $fragment = '') | |
{ | |
@@ -412,7 +412,7 @@ class Auth_OpenID { | |
* @return mixed $new_url The URL after normalization, or null if | |
* $url was malformed. | |
*/ | |
- function normalizeUrl($url) | |
+ static function normalizeUrl($url) | |
{ | |
@$parsed = parse_url($url); | |
@@ -443,7 +443,7 @@ class Auth_OpenID { | |
* | |
* @access private | |
*/ | |
- function intval($value) | |
+ static function intval($value) | |
{ | |
$re = "/^\\d+$/"; | |
@@ -461,7 +461,7 @@ class Auth_OpenID { | |
* @param string $str The string of bytes to count. | |
* @return int The number of bytes in $str. | |
*/ | |
- function bytes($str) | |
+ static function bytes($str) | |
{ | |
return strlen(bin2hex($str)) / 2; | |
} | |
@@ -470,7 +470,7 @@ class Auth_OpenID { | |
* Get the bytes in a string independently of multibyte support | |
* conditions. | |
*/ | |
- function toBytes($str) | |
+ static function toBytes($str) | |
{ | |
$hex = bin2hex($str); | |
@@ -486,7 +486,7 @@ class Auth_OpenID { | |
return $b; | |
} | |
- function urldefrag($url) | |
+ static function urldefrag($url) | |
{ | |
$parts = explode("#", $url, 2); | |
@@ -497,7 +497,7 @@ class Auth_OpenID { | |
} | |
} | |
- function filter($callback, &$sequence) | |
+ static function filter($callback, &$sequence) | |
{ | |
$result = array(); | |
@@ -510,7 +510,7 @@ class Auth_OpenID { | |
return $result; | |
} | |
- function update(&$dest, &$src) | |
+ static function update(&$dest, &$src) | |
{ | |
foreach ($src as $k => $v) { | |
$dest[$k] = $v; | |
@@ -524,14 +524,14 @@ class Auth_OpenID { | |
* | |
* @param string $format_string The sprintf format for the message | |
*/ | |
- function log($format_string) | |
+ static function log($format_string) | |
{ | |
$args = func_get_args(); | |
$message = call_user_func_array('sprintf', $args); | |
error_log($message); | |
} | |
- function autoSubmitHTML($form, $title="OpenId transaction in progress") | |
+ static function autoSubmitHTML($form, $title="OpenId transaction in progress") | |
{ | |
return("<html>". | |
"<head><title>". | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/AX.php b/lib/vendor/php-openid/Auth/OpenID/AX.php | |
index 910c2e3..86df166 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/AX.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/AX.php | |
@@ -38,7 +38,7 @@ class Auth_OpenID_AX { | |
* @return bool true if $thing is an Auth_OpenID_AX_Error; false | |
* if not. | |
*/ | |
- function isError($thing) | |
+ static function isError($thing) | |
{ | |
return is_a($thing, 'Auth_OpenID_AX_Error'); | |
} | |
@@ -191,7 +191,7 @@ class Auth_OpenID_AX_AttrInfo { | |
* Construct an attribute information object. For parameter | |
* details, see the constructor. | |
*/ | |
- function make($type_uri, $count=1, $required=false, | |
+ static function make($type_uri, $count=1, $required=false, | |
$alias=null) | |
{ | |
if ($alias !== null) { | |
@@ -235,7 +235,7 @@ class Auth_OpenID_AX_AttrInfo { | |
* return null If an alias is present in the list of aliases but | |
* is not present in the namespace map. | |
*/ | |
-function Auth_OpenID_AX_toTypeURIs(&$namespace_map, $alias_list_s) | |
+function Auth_OpenID_AX_toTypeURIs($namespace_map, $alias_list_s) | |
{ | |
$uris = array(); | |
@@ -386,7 +386,7 @@ class Auth_OpenID_AX_FetchRequest extends Auth_OpenID_AX_Message { | |
* Auth_OpenID_AX_FetchRequest extracted from the request message if | |
* successful | |
*/ | |
- function &fromOpenIDRequest($request) | |
+ static function fromOpenIDRequest($request) | |
{ | |
$m = $request->message; | |
$obj = new Auth_OpenID_AX_FetchRequest(); | |
@@ -484,7 +484,7 @@ class Auth_OpenID_AX_FetchRequest extends Auth_OpenID_AX_Message { | |
Auth_OpenID::arrayGet($ax_args, 'required')); | |
foreach ($required as $type_uri) { | |
- $attrib =& $this->requested_attributes[$type_uri]; | |
+ $attrib = $this->requested_attributes[$type_uri]; | |
$attrib->required = true; | |
} | |
@@ -587,7 +587,7 @@ class Auth_OpenID_AX_KeyValueMessage extends Auth_OpenID_AX_Message { | |
* | |
* @access private | |
*/ | |
- function _getExtensionKVArgs(&$aliases) | |
+ function _getExtensionKVArgs($aliases) | |
{ | |
if ($aliases === null) { | |
$aliases = new Auth_OpenID_NamespaceMap(); | |
@@ -888,7 +888,7 @@ class Auth_OpenID_AX_FetchResponse extends Auth_OpenID_AX_KeyValueMessage { | |
$ax_args['update_url'] = $update_url; | |
} | |
- Auth_OpenID::update(&$ax_args, $kv_args); | |
+ Auth_OpenID::update($ax_args, $kv_args); | |
return $ax_args; | |
} | |
@@ -922,7 +922,7 @@ class Auth_OpenID_AX_FetchResponse extends Auth_OpenID_AX_KeyValueMessage { | |
* @return $response A FetchResponse containing the data from the | |
* OpenID message | |
*/ | |
- function fromSuccessResponse($success_response, $signed=true) | |
+ static function fromSuccessResponse($success_response, $signed=true) | |
{ | |
$obj = new Auth_OpenID_AX_FetchResponse(); | |
if ($signed) { | |
@@ -960,7 +960,7 @@ class Auth_OpenID_AX_StoreRequest extends Auth_OpenID_AX_KeyValueMessage { | |
{ | |
$ax_args = $this->_newArgs(); | |
$kv_args = $this->_getExtensionKVArgs($aliases); | |
- Auth_OpenID::update(&$ax_args, $kv_args); | |
+ Auth_OpenID::update($ax_args, $kv_args); | |
return $ax_args; | |
} | |
} | |
@@ -980,7 +980,7 @@ class Auth_OpenID_AX_StoreResponse extends Auth_OpenID_AX_Message { | |
* Returns Auth_OpenID_AX_Error on error or an | |
* Auth_OpenID_AX_StoreResponse object on success. | |
*/ | |
- function &make($succeeded=true, $error_message=null) | |
+ function make($succeeded=true, $error_message=null) | |
{ | |
if (($succeeded) && ($error_message !== null)) { | |
return new Auth_OpenID_AX_Error('An error message may only be '. | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Association.php b/lib/vendor/php-openid/Auth/OpenID/Association.php | |
index 37ce0cb..34909ba 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Association.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Association.php | |
@@ -94,7 +94,7 @@ class Auth_OpenID_Association { | |
* @return association An {@link Auth_OpenID_Association} | |
* instance. | |
*/ | |
- function fromExpiresIn($expires_in, $handle, $secret, $assoc_type) | |
+ static function fromExpiresIn($expires_in, $handle, $secret, $assoc_type) | |
{ | |
$issued = time(); | |
$lifetime = $expires_in; | |
@@ -206,7 +206,7 @@ class Auth_OpenID_Association { | |
* @param string $assoc_s Association as serialized by serialize() | |
* @return Auth_OpenID_Association $result instance of this class | |
*/ | |
- function deserialize($class_name, $assoc_s) | |
+ static function deserialize($class_name, $assoc_s) | |
{ | |
$pairs = Auth_OpenID_KVForm::toArray($assoc_s, $strict = true); | |
$keys = array(); | |
@@ -327,7 +327,7 @@ class Auth_OpenID_Association { | |
* | |
* @access private | |
*/ | |
- function _makePairs(&$message) | |
+ function _makePairs($message) | |
{ | |
$signed = $message->getArg(Auth_OpenID_OPENID_NS, 'signed'); | |
if (!$signed || Auth_OpenID::isFailure($signed)) { | |
@@ -352,7 +352,7 @@ class Auth_OpenID_Association { | |
* | |
* @access private | |
*/ | |
- function getMessageSignature(&$message) | |
+ function getMessageSignature($message) | |
{ | |
$pairs = $this->_makePairs($message); | |
return base64_encode($this->sign($pairs)); | |
@@ -364,7 +364,7 @@ class Auth_OpenID_Association { | |
* | |
* @access private | |
*/ | |
- function checkMessageSignature(&$message) | |
+ function checkMessageSignature($message) | |
{ | |
$sig = $message->getArg(Auth_OpenID_OPENID_NS, | |
'sig'); | |
@@ -469,18 +469,16 @@ function Auth_OpenID_getOnlyEncryptedOrder() | |
return $result; | |
} | |
-function &Auth_OpenID_getDefaultNegotiator() | |
+function Auth_OpenID_getDefaultNegotiator() | |
{ | |
- $x = new Auth_OpenID_SessionNegotiator( | |
+ return new Auth_OpenID_SessionNegotiator( | |
Auth_OpenID_getDefaultAssociationOrder()); | |
- return $x; | |
} | |
-function &Auth_OpenID_getEncryptedNegotiator() | |
+function Auth_OpenID_getEncryptedNegotiator() | |
{ | |
- $x = new Auth_OpenID_SessionNegotiator( | |
+ return new Auth_OpenID_SessionNegotiator( | |
Auth_OpenID_getOnlyEncryptedOrder()); | |
- return $x; | |
} | |
/** | |
@@ -610,4 +608,4 @@ class Auth_OpenID_SessionNegotiator { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/BigMath.php b/lib/vendor/php-openid/Auth/OpenID/BigMath.php | |
index 4510494..777dbbd 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/BigMath.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/BigMath.php | |
@@ -351,8 +351,7 @@ function Auth_OpenID_math_extensions() | |
'class' => 'Auth_OpenID_GmpMathWrapper'); | |
} | |
- $result[] = array( | |
- 'modules' => array('bcmath', 'php_bcmath'), | |
+ $result[] = array('modules' => array('bcmath', 'php_bcmath'), | |
'extension' => 'bcmath', | |
'class' => 'Auth_OpenID_BcMathWrapper'); | |
@@ -364,29 +363,8 @@ function Auth_OpenID_math_extensions() | |
*/ | |
function Auth_OpenID_detectMathLibrary($exts) | |
{ | |
- $loaded = false; | |
- | |
foreach ($exts as $extension) { | |
- // See if the extension specified is already loaded. | |
- if ($extension['extension'] && | |
- extension_loaded($extension['extension'])) { | |
- $loaded = true; | |
- } | |
- | |
- // Try to load dynamic modules. | |
- if (!$loaded) { | |
- foreach ($extension['modules'] as $module) { | |
- if (@dl($module . "." . PHP_SHLIB_SUFFIX)) { | |
- $loaded = true; | |
- break; | |
- } | |
- } | |
- } | |
- | |
- // If the load succeeded, supply an instance of | |
- // Auth_OpenID_MathWrapper which wraps the specified | |
- // module's functionality. | |
- if ($loaded) { | |
+ if (extension_loaded($extension['extension'])) { | |
return $extension; | |
} | |
} | |
@@ -405,7 +383,7 @@ function Auth_OpenID_detectMathLibrary($exts) | |
* instance of a wrapper for that extension module. If no extension | |
* module is found, an instance of {@link Auth_OpenID_MathWrapper} is | |
* returned, which wraps the native PHP integer implementation. The | |
- * proper calling convention for this method is $lib =& | |
+ * proper calling convention for this method is $lib = | |
* Auth_OpenID_getMathLib(). | |
* | |
* This function checks for the existence of specific long number | |
@@ -416,7 +394,7 @@ function Auth_OpenID_detectMathLibrary($exts) | |
* | |
* @package OpenID | |
*/ | |
-function &Auth_OpenID_getMathLib() | |
+function Auth_OpenID_getMathLib() | |
{ | |
// The instance of Auth_OpenID_MathWrapper that we choose to | |
// supply will be stored here, so that subseqent calls to this | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Consumer.php b/lib/vendor/php-openid/Auth/OpenID/Consumer.php | |
index 500890b..20cdd73 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Consumer.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Consumer.php | |
@@ -258,19 +258,19 @@ class Auth_OpenID_Consumer { | |
* when creating the internal consumer object. This is used for | |
* testing. | |
*/ | |
- function Auth_OpenID_Consumer(&$store, $session = null, | |
+ function Auth_OpenID_Consumer($store, $session = null, | |
$consumer_cls = null) | |
{ | |
if ($session === null) { | |
$session = new Auth_Yadis_PHPSession(); | |
} | |
- $this->session =& $session; | |
+ $this->session = $session; | |
if ($consumer_cls !== null) { | |
- $this->consumer =& new $consumer_cls($store); | |
+ $this->consumer = new $consumer_cls($store); | |
} else { | |
- $this->consumer =& new Auth_OpenID_GenericConsumer($store); | |
+ $this->consumer = new Auth_OpenID_GenericConsumer($store); | |
} | |
$this->_token_key = $this->session_key_prefix . $this->_token_suffix; | |
@@ -281,7 +281,7 @@ class Auth_OpenID_Consumer { | |
* | |
* @access private | |
*/ | |
- function getDiscoveryObject(&$session, $openid_url, | |
+ function getDiscoveryObject($session, $openid_url, | |
$session_key_prefix) | |
{ | |
return new Auth_Yadis_Discovery($session, $openid_url, | |
@@ -339,7 +339,7 @@ class Auth_OpenID_Consumer { | |
$this->consumer->fetcher); | |
// Reset the 'stale' attribute of the manager. | |
- $m =& $disco->getManager(); | |
+ $m = $disco->getManager(); | |
if ($m) { | |
$m->stale = false; | |
$disco->session->set($disco->session_key, | |
@@ -370,7 +370,7 @@ class Auth_OpenID_Consumer { | |
* @return Auth_OpenID_AuthRequest $auth_request An OpenID | |
* authentication request object. | |
*/ | |
- function &beginWithoutDiscovery($endpoint, $anonymous=false) | |
+ function beginWithoutDiscovery($endpoint, $anonymous=false) | |
{ | |
$loader = new Auth_OpenID_ServiceEndpointLoader(); | |
$auth_req = $this->consumer->begin($endpoint); | |
@@ -467,7 +467,7 @@ class Auth_OpenID_DiffieHellmanSHA1ConsumerSession { | |
function getRequest() | |
{ | |
- $math =& Auth_OpenID_getMathLib(); | |
+ $math = Auth_OpenID_getMathLib(); | |
$cpub = $math->longToBase64($this->dh->public); | |
@@ -496,7 +496,7 @@ class Auth_OpenID_DiffieHellmanSHA1ConsumerSession { | |
return null; | |
} | |
- $math =& Auth_OpenID_getMathLib(); | |
+ $math = Auth_OpenID_getMathLib(); | |
$spub = $math->base64ToLong($response->getArg(Auth_OpenID_OPENID_NS, | |
'dh_server_public')); | |
@@ -611,10 +611,10 @@ class Auth_OpenID_GenericConsumer { | |
* in the module description. The default value is False, which | |
* disables immediate mode. | |
*/ | |
- function Auth_OpenID_GenericConsumer(&$store) | |
+ function Auth_OpenID_GenericConsumer($store) | |
{ | |
- $this->store =& $store; | |
- $this->negotiator =& Auth_OpenID_getDefaultNegotiator(); | |
+ $this->store = $store; | |
+ $this->negotiator = Auth_OpenID_getDefaultNegotiator(); | |
$this->_use_assocs = ($this->store ? true : false); | |
$this->fetcher = Auth_Yadis_Yadis::getHTTPFetcher(); | |
@@ -665,14 +665,14 @@ class Auth_OpenID_GenericConsumer { | |
$method = Auth_OpenID::arrayGet($mode_methods, $mode, | |
'_completeInvalid'); | |
- return call_user_func_array(array(&$this, $method), | |
+ return call_user_func_array(array($this, $method), | |
array($message, $endpoint, $return_to)); | |
} | |
/** | |
* @access private | |
*/ | |
- function _completeInvalid($message, &$endpoint, $unused) | |
+ function _completeInvalid($message, $endpoint, $unused) | |
{ | |
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode', | |
'<No mode set>'); | |
@@ -684,7 +684,7 @@ class Auth_OpenID_GenericConsumer { | |
/** | |
* @access private | |
*/ | |
- function _complete_cancel($message, &$endpoint, $unused) | |
+ function _complete_cancel($message, $endpoint, $unused) | |
{ | |
return new Auth_OpenID_CancelResponse($endpoint); | |
} | |
@@ -692,7 +692,7 @@ class Auth_OpenID_GenericConsumer { | |
/** | |
* @access private | |
*/ | |
- function _complete_error($message, &$endpoint, $unused) | |
+ function _complete_error($message, $endpoint, $unused) | |
{ | |
$error = $message->getArg(Auth_OpenID_OPENID_NS, 'error'); | |
$contact = $message->getArg(Auth_OpenID_OPENID_NS, 'contact'); | |
@@ -705,7 +705,7 @@ class Auth_OpenID_GenericConsumer { | |
/** | |
* @access private | |
*/ | |
- function _complete_setup_needed($message, &$endpoint, $unused) | |
+ function _complete_setup_needed($message, $endpoint, $unused) | |
{ | |
if (!$message->isOpenID2()) { | |
return $this->_completeInvalid($message, $endpoint); | |
@@ -719,7 +719,7 @@ class Auth_OpenID_GenericConsumer { | |
/** | |
* @access private | |
*/ | |
- function _complete_id_res($message, &$endpoint, $return_to) | |
+ function _complete_id_res($message, $endpoint, $return_to) | |
{ | |
$user_setup_url = $message->getArg(Auth_OpenID_OPENID1_NS, | |
'user_setup_url'); | |
@@ -1197,7 +1197,7 @@ class Auth_OpenID_GenericConsumer { | |
* @access private | |
*/ | |
function _verifyDiscoveryServices($claimed_id, | |
- &$services, &$to_match_endpoints) | |
+ $services, $to_match_endpoints) | |
{ | |
// Search the services resulting from discovery to find one | |
// that matches the information from the assertion | |
@@ -1397,7 +1397,7 @@ class Auth_OpenID_GenericConsumer { | |
* | |
* @access private | |
*/ | |
- function _httpResponseToMessage($response, $server_url) | |
+ static function _httpResponseToMessage($response, $server_url) | |
{ | |
// Should this function be named Message.fromHTTPResponse instead? | |
$response_message = Auth_OpenID_Message::fromKVForm($response->body); | |
@@ -1461,7 +1461,7 @@ class Auth_OpenID_GenericConsumer { | |
* | |
* @access private | |
*/ | |
- function _extractSupportedAssociationType(&$server_error, &$endpoint, | |
+ function _extractSupportedAssociationType($server_error, $endpoint, | |
$assoc_type) | |
{ | |
// Any error message whose code is not 'unsupported-type' | |
@@ -1566,7 +1566,7 @@ class Auth_OpenID_GenericConsumer { | |
/** | |
* @access private | |
*/ | |
- function _extractAssociation(&$assoc_response, &$assoc_session) | |
+ function _extractAssociation($assoc_response, $assoc_session) | |
{ | |
// Extract the common fields from the response, raising an | |
// exception if they are not found | |
@@ -1748,10 +1748,10 @@ class Auth_OpenID_AuthRequest { | |
* class. Instances of this class are created by the library when | |
* needed. | |
*/ | |
- function Auth_OpenID_AuthRequest(&$endpoint, $assoc) | |
+ function Auth_OpenID_AuthRequest($endpoint, $assoc) | |
{ | |
$this->assoc = $assoc; | |
- $this->endpoint =& $endpoint; | |
+ $this->endpoint = $endpoint; | |
$this->return_to_args = array(); | |
$this->message = new Auth_OpenID_Message( | |
$endpoint->preferredNamespace()); | |
@@ -1764,7 +1764,7 @@ class Auth_OpenID_AuthRequest { | |
* $extension_request: An object that implements the extension | |
* request interface for adding arguments to an OpenID message. | |
*/ | |
- function addExtension(&$extension_request) | |
+ function addExtension($extension_request) | |
{ | |
$extension_request->toMessage($this->message); | |
} | |
@@ -2167,7 +2167,7 @@ class Auth_OpenID_ServerErrorContainer { | |
/** | |
* @access private | |
*/ | |
- function fromMessage($message) | |
+ static function fromMessage($message) | |
{ | |
$error_text = $message->getArg( | |
Auth_OpenID_OPENID_NS, 'error', '<no error message supplied>'); | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/CryptUtil.php b/lib/vendor/php-openid/Auth/OpenID/CryptUtil.php | |
index aacc3cd..1e905b2 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/CryptUtil.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/CryptUtil.php | |
@@ -37,7 +37,7 @@ class Auth_OpenID_CryptUtil { | |
* @param int $num_bytes The length of the return value | |
* @return string $bytes random bytes | |
*/ | |
- function getBytes($num_bytes) | |
+ static function getBytes($num_bytes) | |
{ | |
static $f = null; | |
$bytes = ''; | |
@@ -77,7 +77,7 @@ class Auth_OpenID_CryptUtil { | |
* @return string $result A string of randomly-chosen characters | |
* from $chrs | |
*/ | |
- function randomString($length, $population = null) | |
+ static function randomString($length, $population = null) | |
{ | |
if ($population === null) { | |
return Auth_OpenID_CryptUtil::getBytes($length); | |
@@ -106,4 +106,4 @@ class Auth_OpenID_CryptUtil { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/DiffieHellman.php b/lib/vendor/php-openid/Auth/OpenID/DiffieHellman.php | |
index f4ded7e..83e1389 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/DiffieHellman.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/DiffieHellman.php | |
@@ -51,9 +51,9 @@ class Auth_OpenID_DiffieHellman { | |
$private = null, $lib = null) | |
{ | |
if ($lib === null) { | |
- $this->lib =& Auth_OpenID_getMathLib(); | |
+ $this->lib = Auth_OpenID_getMathLib(); | |
} else { | |
- $this->lib =& $lib; | |
+ $this->lib = $lib; | |
} | |
if ($mod === null) { | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Discover.php b/lib/vendor/php-openid/Auth/OpenID/Discover.php | |
index 62aeb1d..dcfd194 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Discover.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Discover.php | |
@@ -124,7 +124,7 @@ class Auth_OpenID_ServiceEndpoint { | |
return in_array(Auth_OpenID_TYPE_2_0_IDP, $this->type_uris); | |
} | |
- function fromOPEndpointURL($op_endpoint_url) | |
+ static function fromOPEndpointURL($op_endpoint_url) | |
{ | |
// Construct an OP-Identifier OpenIDServiceEndpoint object for | |
// a given OP Endpoint URL | |
@@ -177,9 +177,9 @@ class Auth_OpenID_ServiceEndpoint { | |
* @return array of Auth_OpenID_ServiceEndpoint or null if the | |
* document cannot be parsed. | |
*/ | |
- function fromXRDS($uri, $xrds_text) | |
+ static function fromXRDS($uri, $xrds_text) | |
{ | |
- $xrds =& Auth_Yadis_XRDS::parseXRDS($xrds_text); | |
+ $xrds = Auth_Yadis_XRDS::parseXRDS($xrds_text); | |
if ($xrds) { | |
$yadis_services = | |
@@ -197,7 +197,7 @@ class Auth_OpenID_ServiceEndpoint { | |
* @return array of Auth_OpenID_ServiceEndpoint or null if | |
* endpoints cannot be created. | |
*/ | |
- function fromDiscoveryResult($discoveryResult) | |
+ static function fromDiscoveryResult($discoveryResult) | |
{ | |
if ($discoveryResult->isXRDS()) { | |
return Auth_OpenID_ServiceEndpoint::fromXRDS( | |
@@ -210,7 +210,7 @@ class Auth_OpenID_ServiceEndpoint { | |
} | |
} | |
- function fromHTML($uri, $html) | |
+ static function fromHTML($uri, $html) | |
{ | |
$discovery_types = array( | |
array(Auth_OpenID_TYPE_2_0, | |
@@ -273,7 +273,7 @@ function Auth_OpenID_findOPLocalIdentifier($service, $type_uris) | |
$service->parser->registerNamespace('xrd', | |
Auth_Yadis_XMLNS_XRD_2_0); | |
- $parser =& $service->parser; | |
+ $parser = $service->parser; | |
$permitted_tags = array(); | |
@@ -305,7 +305,7 @@ function Auth_OpenID_findOPLocalIdentifier($service, $type_uris) | |
return $local_id; | |
} | |
-function filter_MatchesAnyOpenIDType(&$service) | |
+function filter_MatchesAnyOpenIDType($service) | |
{ | |
$uris = $service->getTypes(); | |
@@ -415,7 +415,7 @@ function Auth_OpenID_makeOpenIDEndpoints($uri, $yadis_services) | |
return $s; | |
} | |
-function Auth_OpenID_discoverWithYadis($uri, &$fetcher, | |
+function Auth_OpenID_discoverWithYadis($uri, $fetcher, | |
$endpoint_filter='Auth_OpenID_getOPOrUserServices', | |
$discover_function=null) | |
{ | |
@@ -433,7 +433,7 @@ function Auth_OpenID_discoverWithYadis($uri, &$fetcher, | |
$openid_services = array(); | |
$response = call_user_func_array($discover_function, | |
- array($uri, &$fetcher)); | |
+ array($uri, $fetcher)); | |
$yadis_url = $response->normalized_uri; | |
$yadis_services = array(); | |
@@ -460,18 +460,18 @@ function Auth_OpenID_discoverWithYadis($uri, &$fetcher, | |
} | |
$openid_services = call_user_func_array($endpoint_filter, | |
- array(&$openid_services)); | |
+ array($openid_services)); | |
return array($yadis_url, $openid_services); | |
} | |
-function Auth_OpenID_discoverURI($uri, &$fetcher) | |
+function Auth_OpenID_discoverURI($uri, $fetcher) | |
{ | |
$uri = Auth_OpenID::normalizeUrl($uri); | |
return Auth_OpenID_discoverWithYadis($uri, $fetcher); | |
} | |
-function Auth_OpenID_discoverWithoutYadis($uri, &$fetcher) | |
+function Auth_OpenID_discoverWithoutYadis($uri, $fetcher) | |
{ | |
$http_resp = @$fetcher->get($uri); | |
@@ -490,7 +490,7 @@ function Auth_OpenID_discoverWithoutYadis($uri, &$fetcher) | |
return array($identity_url, $openid_services); | |
} | |
-function Auth_OpenID_discoverXRI($iname, &$fetcher) | |
+function Auth_OpenID_discoverXRI($iname, $fetcher) | |
{ | |
$resolver = new Auth_Yadis_ProxyResolver($fetcher); | |
list($canonicalID, $yadis_services) = | |
@@ -513,7 +513,7 @@ function Auth_OpenID_discoverXRI($iname, &$fetcher) | |
return array($iname, $openid_services); | |
} | |
-function Auth_OpenID_discover($uri, &$fetcher) | |
+function Auth_OpenID_discover($uri, $fetcher) | |
{ | |
// If the fetcher (i.e., PHP) doesn't support SSL, we can't do | |
// discovery on an HTTPS URL. | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Extension.php b/lib/vendor/php-openid/Auth/OpenID/Extension.php | |
index f362a4b..a5f86b8 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Extension.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Extension.php | |
@@ -39,7 +39,7 @@ class Auth_OpenID_Extension { | |
* | |
* Returns the message with the extension arguments added. | |
*/ | |
- function toMessage(&$message) | |
+ function toMessage($message) | |
{ | |
$implicit = $message->isOpenID1(); | |
$added = $message->namespaces->addAlias($this->ns_uri, | |
@@ -59,4 +59,4 @@ class Auth_OpenID_Extension { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/FileStore.php b/lib/vendor/php-openid/Auth/OpenID/FileStore.php | |
index 29d8d20..4fdf013 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/FileStore.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/FileStore.php | |
@@ -519,7 +519,7 @@ class Auth_OpenID_FileStore extends Auth_OpenID_OpenIDStore { | |
/** | |
* @access private | |
*/ | |
- function _mkdtemp($dir) | |
+ static function _mkdtemp($dir) | |
{ | |
foreach (range(0, 4) as $i) { | |
$name = $dir . strval(DIRECTORY_SEPARATOR) . strval(getmypid()) . | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/KVForm.php b/lib/vendor/php-openid/Auth/OpenID/KVForm.php | |
index fb342a0..7389195 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/KVForm.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/KVForm.php | |
@@ -26,7 +26,7 @@ class Auth_OpenID_KVForm { | |
* @static | |
* @access private | |
*/ | |
- function toArray($kvs, $strict=false) | |
+ static function toArray($kvs, $strict=false) | |
{ | |
$lines = explode("\n", $kvs); | |
@@ -78,7 +78,7 @@ class Auth_OpenID_KVForm { | |
* @static | |
* @access private | |
*/ | |
- function fromArray($values) | |
+ static function fromArray($values) | |
{ | |
if ($values === null) { | |
return null; | |
@@ -109,4 +109,4 @@ class Auth_OpenID_KVForm { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Message.php b/lib/vendor/php-openid/Auth/OpenID/Message.php | |
index 5ab115a..872b689 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Message.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Message.php | |
@@ -143,7 +143,7 @@ class Auth_OpenID_Mapping { | |
* Returns true if $thing is an Auth_OpenID_Mapping object; false | |
* if not. | |
*/ | |
- function isA($thing) | |
+ static function isA($thing) | |
{ | |
return (is_object($thing) && | |
strtolower(get_class($thing)) == 'auth_openid_mapping'); | |
@@ -442,7 +442,7 @@ class Auth_OpenID_Message { | |
return $this->getOpenIDNamespace() == Auth_OpenID_OPENID2_NS; | |
} | |
- function fromPostArgs($args) | |
+ static function fromPostArgs($args) | |
{ | |
// Construct a Message containing a set of POST arguments | |
$obj = new Auth_OpenID_Message(); | |
@@ -477,7 +477,7 @@ class Auth_OpenID_Message { | |
} | |
} | |
- function fromOpenIDArgs($openid_args) | |
+ static function fromOpenIDArgs($openid_args) | |
{ | |
// Takes an array. | |
@@ -594,7 +594,7 @@ class Auth_OpenID_Message { | |
return $this->_openid_ns_uri; | |
} | |
- function fromKVForm($kvform_string) | |
+ static function fromKVForm($kvform_string) | |
{ | |
// Create a Message from a KVForm string | |
return Auth_OpenID_Message::fromOpenIDArgs( | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/PAPE.php b/lib/vendor/php-openid/Auth/OpenID/PAPE.php | |
index 62cba8a..7a268b2 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/PAPE.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/PAPE.php | |
@@ -21,7 +21,7 @@ define('PAPE_AUTH_PHISHING_RESISTANT', | |
'http://schemas.openid.net/pape/policies/2007/06/phishing-resistant'); | |
define('PAPE_TIME_VALIDATOR', | |
- '^[0-9]{4,4}-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]Z$'); | |
+ '/^[0-9]{4,4}-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]Z$/'); | |
/** | |
* A Provider Authentication Policy request, sent from a relying party | |
* to a provider | |
@@ -82,7 +82,7 @@ class Auth_OpenID_PAPE_Request extends Auth_OpenID_Extension { | |
* Instantiate a Request object from the arguments in a checkid_* | |
* OpenID message | |
*/ | |
- function fromOpenIDRequest($request) | |
+ static function fromOpenIDRequest($request) | |
{ | |
$obj = new Auth_OpenID_PAPE_Request(); | |
$args = $request->message->getArgs(Auth_OpenID_PAPE_NS_URI); | |
@@ -201,7 +201,7 @@ class Auth_OpenID_PAPE_Response extends Auth_OpenID_Extension { | |
* @returns: A provider authentication policy response from the | |
* data that was supplied with the id_res response. | |
*/ | |
- function fromSuccessResponse($success_response) | |
+ static function fromSuccessResponse($success_response) | |
{ | |
$obj = new Auth_OpenID_PAPE_Response(); | |
@@ -262,7 +262,7 @@ class Auth_OpenID_PAPE_Response extends Auth_OpenID_Extension { | |
$auth_time = Auth_OpenID::arrayGet($args, 'auth_time'); | |
if ($auth_time !== null) { | |
- if (ereg(PAPE_TIME_VALIDATOR, $auth_time)) { | |
+ if (preg_match(PAPE_TIME_VALIDATOR, $auth_time)) { | |
$this->auth_time = $auth_time; | |
} else if ($strict) { | |
return false; | |
@@ -287,7 +287,7 @@ class Auth_OpenID_PAPE_Response extends Auth_OpenID_Extension { | |
} | |
if ($this->auth_time !== null) { | |
- if (!ereg(PAPE_TIME_VALIDATOR, $this->auth_time)) { | |
+ if (!preg_match(PAPE_TIME_VALIDATOR, $this->auth_time)) { | |
return false; | |
} | |
@@ -298,4 +298,4 @@ class Auth_OpenID_PAPE_Response extends Auth_OpenID_Extension { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/SReg.php b/lib/vendor/php-openid/Auth/OpenID/SReg.php | |
index 6328076..bcf8394 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/SReg.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/SReg.php | |
@@ -94,7 +94,7 @@ Auth_OpenID_registerNamespaceAlias(Auth_OpenID_SREG_NS_URI_1_1, 'sreg'); | |
* $endpoint: The endpoint object as returned by OpenID discovery. | |
* returns whether an sreg type was advertised by the endpoint | |
*/ | |
-function Auth_OpenID_supportsSReg(&$endpoint) | |
+function Auth_OpenID_supportsSReg($endpoint) | |
{ | |
return ($endpoint->usesExtension(Auth_OpenID_SREG_NS_URI_1_1) || | |
$endpoint->usesExtension(Auth_OpenID_SREG_NS_URI_1_0)); | |
@@ -122,7 +122,7 @@ class Auth_OpenID_SRegBase extends Auth_OpenID_Extension { | |
* | |
* @access private | |
*/ | |
- function _getSRegNS(&$message) | |
+ static function _getSRegNS($message) | |
{ | |
$alias = null; | |
$found_ns_uri = null; | |
@@ -173,7 +173,7 @@ class Auth_OpenID_SRegRequest extends Auth_OpenID_SRegBase { | |
/** | |
* Initialize an empty simple registration request. | |
*/ | |
- function build($required=null, $optional=null, | |
+ static function build($required=null, $optional=null, | |
$policy_url=null, | |
$sreg_ns_uri=Auth_OpenID_SREG_NS_URI, | |
$cls='Auth_OpenID_SRegRequest') | |
@@ -213,7 +213,7 @@ class Auth_OpenID_SRegRequest extends Auth_OpenID_SRegBase { | |
* | |
* Returns the newly created simple registration request | |
*/ | |
- function fromOpenIDRequest($request, $cls='Auth_OpenID_SRegRequest') | |
+ static function fromOpenIDRequest($request, $cls='Auth_OpenID_SRegRequest') | |
{ | |
$obj = call_user_func_array(array($cls, 'build'), | |
@@ -442,7 +442,7 @@ class Auth_OpenID_SRegResponse extends Auth_OpenID_SRegBase { | |
* string (unicode) value. For instance, the nickname should be | |
* stored under the key 'nickname'. | |
*/ | |
- function extractResponse($request, $data) | |
+ static function extractResponse($request, $data) | |
{ | |
$obj = new Auth_OpenID_SRegResponse(); | |
$obj->ns_uri = $request->ns_uri; | |
@@ -471,7 +471,7 @@ class Auth_OpenID_SRegResponse extends Auth_OpenID_SRegBase { | |
* Returns a simple registration response containing the data that | |
* was supplied with the C{id_res} response. | |
*/ | |
- function fromSuccessResponse(&$success_response, $signed_only=true) | |
+ static function fromSuccessResponse($success_response, $signed_only=true) | |
{ | |
global $Auth_OpenID_sreg_data_fields; | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/Server.php b/lib/vendor/php-openid/Auth/OpenID/Server.php | |
index f1db4d8..9af1d1d 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/Server.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/Server.php | |
@@ -365,7 +365,7 @@ class Auth_OpenID_CheckAuthRequest extends Auth_OpenID_Request { | |
$this->message = null; | |
} | |
- function fromMessage($message, $server=null) | |
+ static function fromMessage($message, $server=null) | |
{ | |
$required_keys = array('assoc_handle', 'sig', 'signed'); | |
@@ -396,7 +396,7 @@ class Auth_OpenID_CheckAuthRequest extends Auth_OpenID_Request { | |
return $result; | |
} | |
- function answer(&$signatory) | |
+ function answer($signatory) | |
{ | |
$is_valid = $signatory->verify($this->assoc_handle, $this->signed); | |
@@ -436,7 +436,7 @@ class Auth_OpenID_PlainTextServerSession { | |
var $needs_math = false; | |
var $allowed_assoc_types = array('HMAC-SHA1', 'HMAC-SHA256'); | |
- function fromMessage($unused_request) | |
+ static function fromMessage($unused_request) | |
{ | |
return new Auth_OpenID_PlainTextServerSession(); | |
} | |
@@ -469,7 +469,7 @@ class Auth_OpenID_DiffieHellmanSHA1ServerSession { | |
$this->consumer_pubkey = $consumer_pubkey; | |
} | |
- function getDH($message) | |
+ static function getDH($message) | |
{ | |
$dh_modulus = $message->getArg(Auth_OpenID_OPENID_NS, 'dh_modulus'); | |
$dh_gen = $message->getArg(Auth_OpenID_OPENID_NS, 'dh_gen'); | |
@@ -489,7 +489,7 @@ class Auth_OpenID_DiffieHellmanSHA1ServerSession { | |
$missing); | |
} | |
- $lib =& Auth_OpenID_getMathLib(); | |
+ $lib = Auth_OpenID_getMathLib(); | |
if ($dh_modulus || $dh_gen) { | |
$dh_modulus = $lib->base64ToLong($dh_modulus); | |
@@ -523,7 +523,7 @@ class Auth_OpenID_DiffieHellmanSHA1ServerSession { | |
return array($dh, $consumer_pubkey); | |
} | |
- function fromMessage($message) | |
+ static function fromMessage($message) | |
{ | |
$result = Auth_OpenID_DiffieHellmanSHA1ServerSession::getDH($message); | |
@@ -538,7 +538,7 @@ class Auth_OpenID_DiffieHellmanSHA1ServerSession { | |
function answer($secret) | |
{ | |
- $lib =& Auth_OpenID_getMathLib(); | |
+ $lib = Auth_OpenID_getMathLib(); | |
$mac_key = $this->dh->xorSecret($this->consumer_pubkey, $secret, | |
$this->hash_func); | |
return array( | |
@@ -560,7 +560,7 @@ class Auth_OpenID_DiffieHellmanSHA256ServerSession | |
var $hash_func = 'Auth_OpenID_SHA256'; | |
var $allowed_assoc_types = array('HMAC-SHA256'); | |
- function fromMessage($message) | |
+ static function fromMessage($message) | |
{ | |
$result = Auth_OpenID_DiffieHellmanSHA1ServerSession::getDH($message); | |
@@ -582,7 +582,7 @@ class Auth_OpenID_DiffieHellmanSHA256ServerSession | |
class Auth_OpenID_AssociateRequest extends Auth_OpenID_Request { | |
var $mode = "associate"; | |
- function getSessionClasses() | |
+ static function getSessionClasses() | |
{ | |
return array( | |
'no-encryption' => 'Auth_OpenID_PlainTextServerSession', | |
@@ -590,14 +590,14 @@ class Auth_OpenID_AssociateRequest extends Auth_OpenID_Request { | |
'DH-SHA256' => 'Auth_OpenID_DiffieHellmanSHA256ServerSession'); | |
} | |
- function Auth_OpenID_AssociateRequest(&$session, $assoc_type) | |
+ function Auth_OpenID_AssociateRequest($session, $assoc_type) | |
{ | |
- $this->session =& $session; | |
+ $this->session = $session; | |
$this->namespace = Auth_OpenID_OPENID2_NS; | |
$this->assoc_type = $assoc_type; | |
} | |
- function fromMessage($message, $server=null) | |
+ static function fromMessage($message, $server=null) | |
{ | |
if ($message->isOpenID1()) { | |
$session_type = $message->getArg(Auth_OpenID_OPENID_NS, | |
@@ -734,7 +734,7 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
*/ | |
var $namespace; | |
- function make(&$message, $identity, $return_to, $trust_root = null, | |
+ static function make($message, $identity, $return_to, $trust_root = null, | |
$immediate = false, $assoc_handle = null, $server = null) | |
{ | |
if ($server === null) { | |
@@ -752,7 +752,7 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
$assoc_handle, $server); | |
$r->namespace = $message->getOpenIDNamespace(); | |
- $r->message =& $message; | |
+ $r->message = $message; | |
if (!$r->trustRootValid()) { | |
return new Auth_OpenID_UntrustedReturnURL($message, | |
@@ -778,7 +778,7 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
} | |
$this->return_to = $return_to; | |
$this->trust_root = $trust_root; | |
- $this->server =& $server; | |
+ $this->server = $server; | |
if ($immediate) { | |
$this->immediate = true; | |
@@ -821,7 +821,7 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
array($this->trust_root, $this->return_to)); | |
} | |
- function fromMessage(&$message, $server) | |
+ static function fromMessage($message, $server) | |
{ | |
$mode = $message->getArg(Auth_OpenID_OPENID_NS, 'mode'); | |
$immediate = null; | |
@@ -1097,7 +1097,7 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
in OpenID 1.x immediate mode.'); | |
} | |
- $setup_request =& new Auth_OpenID_CheckIDRequest( | |
+ $setup_request = new Auth_OpenID_CheckIDRequest( | |
$this->identity, | |
$this->return_to, | |
$this->trust_root, | |
@@ -1183,9 +1183,9 @@ class Auth_OpenID_CheckIDRequest extends Auth_OpenID_Request { | |
*/ | |
class Auth_OpenID_ServerResponse { | |
- function Auth_OpenID_ServerResponse(&$request) | |
+ function Auth_OpenID_ServerResponse($request) | |
{ | |
- $this->request =& $request; | |
+ $this->request = $request; | |
$this->fields = new Auth_OpenID_Message($this->request->namespace); | |
} | |
@@ -1310,10 +1310,10 @@ class Auth_OpenID_Signatory { | |
/** | |
* Create a new signatory using a given store. | |
*/ | |
- function Auth_OpenID_Signatory(&$store) | |
+ function Auth_OpenID_Signatory($store) | |
{ | |
// assert store is not None | |
- $this->store =& $store; | |
+ $this->store = $store; | |
} | |
/** | |
@@ -1447,7 +1447,7 @@ class Auth_OpenID_Encoder { | |
* Encode an {@link Auth_OpenID_ServerResponse} and return an | |
* {@link Auth_OpenID_WebResponse}. | |
*/ | |
- function encode(&$response) | |
+ function encode($response) | |
{ | |
$cls = $this->responseFactory; | |
@@ -1478,16 +1478,16 @@ class Auth_OpenID_Encoder { | |
*/ | |
class Auth_OpenID_SigningEncoder extends Auth_OpenID_Encoder { | |
- function Auth_OpenID_SigningEncoder(&$signatory) | |
+ function Auth_OpenID_SigningEncoder($signatory) | |
{ | |
- $this->signatory =& $signatory; | |
+ $this->signatory = $signatory; | |
} | |
/** | |
* Sign an {@link Auth_OpenID_ServerResponse} and return an | |
* {@link Auth_OpenID_WebResponse}. | |
*/ | |
- function encode(&$response) | |
+ function encode($response) | |
{ | |
// the isinstance is a bit of a kludge... it means there isn't | |
// really an adapter to make the interfaces quite match. | |
@@ -1516,9 +1516,9 @@ class Auth_OpenID_SigningEncoder extends Auth_OpenID_Encoder { | |
*/ | |
class Auth_OpenID_Decoder { | |
- function Auth_OpenID_Decoder(&$server) | |
+ function Auth_OpenID_Decoder($server) | |
{ | |
- $this->server =& $server; | |
+ $this->server = $server; | |
$this->handlers = array( | |
'checkid_setup' => 'Auth_OpenID_CheckIDRequest', | |
@@ -1599,9 +1599,9 @@ class Auth_OpenID_Decoder { | |
* @package OpenID | |
*/ | |
class Auth_OpenID_EncodingError { | |
- function Auth_OpenID_EncodingError(&$response) | |
+ function Auth_OpenID_EncodingError($response) | |
{ | |
- $this->response =& $response; | |
+ $this->response = $response; | |
} | |
} | |
@@ -1674,14 +1674,14 @@ class Auth_OpenID_UntrustedReturnURL extends Auth_OpenID_ServerError { | |
* @package OpenID | |
*/ | |
class Auth_OpenID_Server { | |
- function Auth_OpenID_Server(&$store, $op_endpoint=null) | |
+ function Auth_OpenID_Server($store, $op_endpoint=null) | |
{ | |
- $this->store =& $store; | |
- $this->signatory =& new Auth_OpenID_Signatory($this->store); | |
- $this->encoder =& new Auth_OpenID_SigningEncoder($this->signatory); | |
- $this->decoder =& new Auth_OpenID_Decoder($this); | |
+ $this->store = $store; | |
+ $this->signatory = new Auth_OpenID_Signatory($this->store); | |
+ $this->encoder = new Auth_OpenID_SigningEncoder($this->signatory); | |
+ $this->decoder = new Auth_OpenID_Decoder($this); | |
$this->op_endpoint = $op_endpoint; | |
- $this->negotiator =& Auth_OpenID_getDefaultNegotiator(); | |
+ $this->negotiator = Auth_OpenID_getDefaultNegotiator(); | |
} | |
/** | |
@@ -1707,7 +1707,7 @@ class Auth_OpenID_Server { | |
/** | |
* The callback for 'check_authentication' messages. | |
*/ | |
- function openid_check_authentication(&$request) | |
+ function openid_check_authentication($request) | |
{ | |
return $request->answer($this->signatory); | |
} | |
@@ -1715,7 +1715,7 @@ class Auth_OpenID_Server { | |
/** | |
* The callback for 'associate' messages. | |
*/ | |
- function openid_associate(&$request) | |
+ function openid_associate($request) | |
{ | |
$assoc_type = $request->assoc_type; | |
$session_type = $request->session->session_type; | |
@@ -1738,7 +1738,7 @@ class Auth_OpenID_Server { | |
* Encodes as response in the appropriate format suitable for | |
* sending to the user agent. | |
*/ | |
- function encodeResponse(&$response) | |
+ function encodeResponse($response) | |
{ | |
return $this->encoder->encode($response); | |
} | |
diff --git a/lib/vendor/php-openid/Auth/OpenID/TrustRoot.php b/lib/vendor/php-openid/Auth/OpenID/TrustRoot.php | |
index 4919a60..32683cf 100644 | |
--- a/lib/vendor/php-openid/Auth/OpenID/TrustRoot.php | |
+++ b/lib/vendor/php-openid/Auth/OpenID/TrustRoot.php | |
@@ -58,7 +58,7 @@ class Auth_OpenID_TrustRoot { | |
* @return The URL upon which relying party discovery should be | |
* run in order to verify the return_to URL | |
*/ | |
- function buildDiscoveryURL($realm) | |
+ static function buildDiscoveryURL($realm) | |
{ | |
$parsed = Auth_OpenID_TrustRoot::_parse($realm); | |
@@ -93,7 +93,7 @@ class Auth_OpenID_TrustRoot { | |
* @return mixed $parsed Either an associative array of trust root | |
* parts or false if parsing failed. | |
*/ | |
- function _parse($trust_root) | |
+ static function _parse($trust_root) | |
{ | |
$trust_root = Auth_OpenID_urinorm($trust_root); | |
if ($trust_root === null) { | |
@@ -199,7 +199,7 @@ class Auth_OpenID_TrustRoot { | |
* @param string $trust_root The trust root to check | |
* @return bool $sanity Whether the trust root looks OK | |
*/ | |
- function isSane($trust_root) | |
+ static function isSane($trust_root) | |
{ | |
$parts = Auth_OpenID_TrustRoot::_parse($trust_root); | |
if ($parts === false) { | |
@@ -269,7 +269,7 @@ class Auth_OpenID_TrustRoot { | |
* @return bool $matches Whether the URL matches against the | |
* trust root | |
*/ | |
- function match($trust_root, $url) | |
+ static function match($trust_root, $url) | |
{ | |
$trust_root_parsed = Auth_OpenID_TrustRoot::_parse($trust_root); | |
$url_parsed = Auth_OpenID_TrustRoot::_parse($url); | |
@@ -341,7 +341,7 @@ class Auth_OpenID_TrustRoot { | |
* @returns: The endpoint URL or None if the endpoint is not a | |
* relying party endpoint. | |
*/ | |
-function filter_extractReturnURL(&$endpoint) | |
+function filter_extractReturnURL($endpoint) | |
{ | |
if ($endpoint->matchTypes(array(Auth_OpenID_RP_RETURN_TO_URL_TYPE))) { | |
return $endpoint; | |
@@ -394,7 +394,7 @@ function Auth_OpenID_returnToMatches($allowed_return_to_urls, $return_to) | |
* Given a relying party discovery URL return a list of return_to | |
* URLs. | |
*/ | |
-function Auth_OpenID_getAllowedReturnURLs($relying_party_url, &$fetcher, | |
+function Auth_OpenID_getAllowedReturnURLs($relying_party_url, $fetcher, | |
$discover_function=null) | |
{ | |
if ($discover_function === null) { | |
@@ -435,7 +435,7 @@ function Auth_OpenID_getAllowedReturnURLs($relying_party_url, &$fetcher, | |
* | |
* @return true if the return_to URL is valid for the realm | |
*/ | |
-function Auth_OpenID_verifyReturnTo($realm_str, $return_to, &$fetcher, | |
+function Auth_OpenID_verifyReturnTo($realm_str, $return_to, $fetcher, | |
$_vrfy='Auth_OpenID_getAllowedReturnURLs') | |
{ | |
$disco_url = Auth_OpenID_TrustRoot::buildDiscoveryURL($realm_str); | |
@@ -445,7 +445,7 @@ function Auth_OpenID_verifyReturnTo($realm_str, $return_to, &$fetcher, | |
} | |
$allowable_urls = call_user_func_array($_vrfy, | |
- array($disco_url, &$fetcher)); | |
+ array($disco_url, $fetcher)); | |
// The realm_str could not be parsed. | |
if ($allowable_urls === false) { | |
@@ -459,4 +459,4 @@ function Auth_OpenID_verifyReturnTo($realm_str, $return_to, &$fetcher, | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/Manager.php b/lib/vendor/php-openid/Auth/Yadis/Manager.php | |
index d50cf7a..743e2ec 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/Manager.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/Manager.php | |
@@ -387,11 +387,11 @@ class Auth_Yadis_Discovery { | |
* @param string $session_key_suffix The optional session key | |
* suffix override. | |
*/ | |
- function Auth_Yadis_Discovery(&$session, $url, | |
+ function Auth_Yadis_Discovery($session, $url, | |
$session_key_suffix = null) | |
{ | |
/// Initialize a discovery object | |
- $this->session =& $session; | |
+ $this->session = $session; | |
$this->url = $url; | |
if ($session_key_suffix === null) { | |
$session_key_suffix = $this->DEFAULT_SUFFIX; | |
@@ -405,7 +405,7 @@ class Auth_Yadis_Discovery { | |
* Return the next authentication service for the pair of | |
* user_input and session. This function handles fallback. | |
*/ | |
- function getNextService($discover_cb, &$fetcher) | |
+ function getNextService($discover_cb, $fetcher) | |
{ | |
$manager = $this->getManager(); | |
if (!$manager || (!$manager->services)) { | |
@@ -466,7 +466,7 @@ class Auth_Yadis_Discovery { | |
* @param $force True if the manager should be returned regardless | |
* of whether it's a manager for $this->url. | |
*/ | |
- function &getManager($force=false) | |
+ function getManager($force=false) | |
{ | |
// Extract the YadisServiceManager for this object's URL and | |
// suffix from the session. | |
@@ -481,16 +481,13 @@ class Auth_Yadis_Discovery { | |
if ($manager && ($manager->forURL($this->url) || $force)) { | |
return $manager; | |
- } else { | |
- $unused = null; | |
- return $unused; | |
} | |
} | |
/** | |
* @access private | |
*/ | |
- function &createManager($services, $yadis_url = null) | |
+ function createManager($services, $yadis_url = null) | |
{ | |
$key = $this->getSessionKey(); | |
if ($this->getManager()) { | |
@@ -504,10 +501,6 @@ class Auth_Yadis_Discovery { | |
$this->session->set($this->session_key, | |
serialize($loader->toSession($manager))); | |
return $manager; | |
- } else { | |
- // Oh, PHP. | |
- $unused = null; | |
- return $unused; | |
} | |
} | |
@@ -526,4 +519,4 @@ class Auth_Yadis_Discovery { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/ParanoidHTTPFetcher.php b/lib/vendor/php-openid/Auth/Yadis/ParanoidHTTPFetcher.php | |
index 6a41826..04dbc8a 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/ParanoidHTTPFetcher.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/ParanoidHTTPFetcher.php | |
@@ -109,9 +109,9 @@ class Auth_Yadis_ParanoidHTTPFetcher extends Auth_Yadis_HTTPFetcher { | |
} | |
curl_setopt($c, CURLOPT_WRITEFUNCTION, | |
- array(&$this, "_writeData")); | |
+ array($this, "_writeData")); | |
curl_setopt($c, CURLOPT_HEADERFUNCTION, | |
- array(&$this, "_writeHeader")); | |
+ array($this, "_writeHeader")); | |
if ($extra_headers) { | |
curl_setopt($c, CURLOPT_HTTPHEADER, $extra_headers); | |
@@ -190,7 +190,7 @@ class Auth_Yadis_ParanoidHTTPFetcher extends Auth_Yadis_HTTPFetcher { | |
curl_setopt($c, CURLOPT_TIMEOUT, $this->timeout); | |
curl_setopt($c, CURLOPT_URL, $url); | |
curl_setopt($c, CURLOPT_WRITEFUNCTION, | |
- array(&$this, "_writeData")); | |
+ array($this, "_writeData")); | |
curl_exec($c); | |
@@ -223,4 +223,4 @@ class Auth_Yadis_ParanoidHTTPFetcher extends Auth_Yadis_HTTPFetcher { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/XML.php b/lib/vendor/php-openid/Auth/Yadis/XML.php | |
index 81b2ce2..2704c78 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/XML.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/XML.php | |
@@ -310,20 +310,16 @@ $__Auth_Yadis_defaultParser = null; | |
* @param Auth_Yadis_XMLParser $parser An instance of a | |
* Auth_Yadis_XMLParser subclass. | |
*/ | |
-function Auth_Yadis_setDefaultParser(&$parser) | |
+function Auth_Yadis_setDefaultParser($parser) | |
{ | |
global $__Auth_Yadis_defaultParser; | |
- $__Auth_Yadis_defaultParser =& $parser; | |
+ $__Auth_Yadis_defaultParser = $parser; | |
} | |
function Auth_Yadis_getSupportedExtensions() | |
{ | |
- return array( | |
- 'dom' => array('classname' => 'Auth_Yadis_dom', | |
- 'libname' => array('dom.so', 'dom.dll')), | |
- 'domxml' => array('classname' => 'Auth_Yadis_domxml', | |
- 'libname' => array('domxml.so', 'php_domxml.dll')), | |
- ); | |
+ return array('dom' => 'Auth_Yadis_dom', | |
+ 'domxml' => 'Auth_Yadis_domxml'); | |
} | |
/** | |
@@ -332,43 +328,25 @@ function Auth_Yadis_getSupportedExtensions() | |
* Auth_Yadis_setDefaultParser has been called, the parser used in | |
* that call will be returned instead. | |
*/ | |
-function &Auth_Yadis_getXMLParser() | |
+function Auth_Yadis_getXMLParser() | |
{ | |
global $__Auth_Yadis_defaultParser; | |
- | |
+ | |
if (isset($__Auth_Yadis_defaultParser)) { | |
return $__Auth_Yadis_defaultParser; | |
} | |
- | |
- $p = null; | |
- $classname = null; | |
- | |
- $extensions = Auth_Yadis_getSupportedExtensions(); | |
- | |
- // Return a wrapper for the resident implementation, if any. | |
- foreach ($extensions as $name => $params) { | |
- if (!extension_loaded($name)) { | |
- foreach ($params['libname'] as $libname) { | |
- if (@dl($libname)) { | |
- $classname = $params['classname']; | |
- } | |
- } | |
- } else { | |
- $classname = $params['classname']; | |
- } | |
- if (isset($classname)) { | |
- $p = new $classname(); | |
- return $p; | |
- } | |
- } | |
- | |
- if (!isset($p)) { | |
- trigger_error('No XML parser was found', E_USER_ERROR); | |
- } else { | |
+ | |
+ foreach(Auth_Yadis_getSupportedExtensions() as $extension => $classname) | |
+ { | |
+ if (extension_loaded($extension)) | |
+ { | |
+ $p = new $classname(); | |
Auth_Yadis_setDefaultParser($p); | |
+ return $p; | |
+ } | |
} | |
- | |
- return $p; | |
+ | |
+ return false; | |
} | |
?> | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/XRDS.php b/lib/vendor/php-openid/Auth/Yadis/XRDS.php | |
index f14a794..3f10fac 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/XRDS.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/XRDS.php | |
@@ -255,11 +255,11 @@ class Auth_Yadis_XRDS { | |
* Instantiate a Auth_Yadis_XRDS object. Requires an XPath | |
* instance which has been used to parse a valid XRDS document. | |
*/ | |
- function Auth_Yadis_XRDS(&$xmlParser, &$xrdNodes) | |
+ function Auth_Yadis_XRDS($xmlParser, $xrdNodes) | |
{ | |
- $this->parser =& $xmlParser; | |
+ $this->parser = $xmlParser; | |
$this->xrdNode = $xrdNodes[count($xrdNodes) - 1]; | |
- $this->allXrdNodes =& $xrdNodes; | |
+ $this->allXrdNodes = $xrdNodes; | |
$this->serviceList = array(); | |
$this->_parse(); | |
} | |
@@ -273,7 +273,7 @@ class Auth_Yadis_XRDS { | |
* @return mixed $xrds An instance of Auth_Yadis_XRDS or null, | |
* depending on the validity of $xml_string | |
*/ | |
- function &parseXRDS($xml_string, $extra_ns_map = null) | |
+ static function parseXRDS($xml_string, $extra_ns_map = null) | |
{ | |
$_null = null; | |
@@ -352,9 +352,9 @@ class Auth_Yadis_XRDS { | |
$services = $this->parser->evalXPath('xrd:Service', $this->xrdNode); | |
foreach ($services as $node) { | |
- $s =& new Auth_Yadis_Service(); | |
+ $s = new Auth_Yadis_Service(); | |
$s->element = $node; | |
- $s->parser =& $this->parser; | |
+ $s->parser = $this->parser; | |
$priority = $s->getPriority(); | |
@@ -475,4 +475,4 @@ class Auth_Yadis_XRDS { | |
} | |
} | |
-?> | |
\ No newline at end of file | |
+?> | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/XRI.php b/lib/vendor/php-openid/Auth/Yadis/XRI.php | |
index 4e34623..79647b9 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/XRI.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/XRI.php | |
@@ -190,7 +190,7 @@ function Auth_Yadis_getCanonicalID($iname, $xrds) | |
// Now nodes are in reverse order. | |
$xrd_list = array_reverse($xrds->allXrdNodes); | |
- $parser =& $xrds->parser; | |
+ $parser = $xrds->parser; | |
$node = $xrd_list[0]; | |
$canonicalID_nodes = $parser->evalXPath('xrd:CanonicalID', $node); | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/XRIRes.php b/lib/vendor/php-openid/Auth/Yadis/XRIRes.php | |
index 4e8e8d0..d42f713 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/XRIRes.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/XRIRes.php | |
@@ -8,9 +8,9 @@ require_once 'Auth/Yadis/XRDS.php'; | |
require_once 'Auth/Yadis/XRI.php'; | |
class Auth_Yadis_ProxyResolver { | |
- function Auth_Yadis_ProxyResolver(&$fetcher, $proxy_url = null) | |
+ function Auth_Yadis_ProxyResolver($fetcher, $proxy_url = null) | |
{ | |
- $this->fetcher =& $fetcher; | |
+ $this->fetcher = $fetcher; | |
$this->proxy_url = $proxy_url; | |
if (!$this->proxy_url) { | |
$this->proxy_url = Auth_Yadis_getDefaultProxy(); | |
diff --git a/lib/vendor/php-openid/Auth/Yadis/Yadis.php b/lib/vendor/php-openid/Auth/Yadis/Yadis.php | |
index d89f77c..b4cfa6c 100644 | |
--- a/lib/vendor/php-openid/Auth/Yadis/Yadis.php | |
+++ b/lib/vendor/php-openid/Auth/Yadis/Yadis.php | |
@@ -196,7 +196,7 @@ function Auth_Yadis_getServiceEndpoints($input_url, $xrds_parse_func, | |
* The filter functions (whose names appear in the array passed to | |
* services()) take the following form: | |
* | |
- * <pre> function myFilter(&$service) { | |
+ * <pre> function myFilter($service) { | |
* // Query $service object here. Return true if the service | |
* // matches your query; false if not. | |
* }</pre> | |
@@ -207,7 +207,7 @@ function Auth_Yadis_getServiceEndpoints($input_url, $xrds_parse_func, | |
* this contrived example): | |
* | |
* <pre> | |
- * function URIMatcher(&$service) { | |
+ * function URIMatcher($service) { | |
* foreach ($service->getElements('xrd:URI') as $uri) { | |
* if (preg_match("/some_pattern/", | |
* $service->parser->content($uri))) { | |
@@ -250,7 +250,7 @@ class Auth_Yadis_Yadis { | |
* If Auth_Yadis_CURL_OVERRIDE is defined, this method will always | |
* return a {@link Auth_Yadis_PlainHTTPFetcher}. | |
*/ | |
- function getHTTPFetcher($timeout = 20) | |
+ static function getHTTPFetcher($timeout = 20) | |
{ | |
if (Auth_Yadis_Yadis::curlPresent() && | |
(!defined('Auth_Yadis_CURL_OVERRIDE'))) { | |
@@ -261,7 +261,7 @@ class Auth_Yadis_Yadis { | |
return $fetcher; | |
} | |
- function curlPresent() | |
+ static function curlPresent() | |
{ | |
return function_exists('curl_init'); | |
} | |
@@ -269,7 +269,7 @@ class Auth_Yadis_Yadis { | |
/** | |
* @access private | |
*/ | |
- function _getHeader($header_list, $names) | |
+ static function _getHeader($header_list, $names) | |
{ | |
foreach ($header_list as $name => $value) { | |
foreach ($names as $n) { | |
@@ -285,7 +285,7 @@ class Auth_Yadis_Yadis { | |
/** | |
* @access private | |
*/ | |
- function _getContentType($content_type_header) | |
+ static function _getContentType($content_type_header) | |
{ | |
if ($content_type_header) { | |
$parts = explode(";", $content_type_header); | |
@@ -317,7 +317,7 @@ class Auth_Yadis_Yadis { | |
* Auth_Yadis_Yadis, depending on whether the discovery | |
* succeeded. | |
*/ | |
- function discover($uri, &$fetcher, | |
+ static function discover($uri, $fetcher, | |
$extra_ns_map = null, $timeout = 20) | |
{ | |
$result = new Auth_Yadis_DiscoveryResult($uri); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment