diff options
author | Pierre Schmitz <pierre@archlinux.de> | 2013-08-12 09:28:15 +0200 |
---|---|---|
committer | Pierre Schmitz <pierre@archlinux.de> | 2013-08-12 09:28:15 +0200 |
commit | 08aa4418c30cfc18ccc69a0f0f9cb9e17be6c196 (patch) | |
tree | 577a29fb579188d16003a209ce2a2e9c5b0aa2bd /includes/libs/IEUrlExtension.php | |
parent | cacc939b34e315b85e2d72997811eb6677996cc1 (diff) |
Update to MediaWiki 1.21.1
Diffstat (limited to 'includes/libs/IEUrlExtension.php')
-rw-r--r-- | includes/libs/IEUrlExtension.php | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/includes/libs/IEUrlExtension.php b/includes/libs/IEUrlExtension.php index e9cfa997..79387e63 100644 --- a/includes/libs/IEUrlExtension.php +++ b/includes/libs/IEUrlExtension.php @@ -55,8 +55,8 @@ class IEUrlExtension { * * If the a variable is unset in $_SERVER, it should be unset in $vars. * - * @param $vars array A subset of $_SERVER. - * @param $extWhitelist array Extensions which are allowed, assumed harmless. + * @param array $vars A subset of $_SERVER. + * @param array $extWhitelist Extensions which are allowed, assumed harmless. * @return bool */ public static function areServerVarsBad( $vars, $extWhitelist = array() ) { @@ -92,8 +92,8 @@ class IEUrlExtension { * Given a right-hand portion of a URL, determine whether IE would detect * a potentially harmful file extension. * - * @param $urlPart string The right-hand portion of a URL - * @param $extWhitelist array An array of file extensions which may occur in this + * @param string $urlPart The right-hand portion of a URL + * @param array $extWhitelist An array of file extensions which may occur in this * URL, and which should be allowed. * @return bool */ @@ -187,7 +187,7 @@ class IEUrlExtension { * - if we find a possible extension followed by a dot or another illegal * character, we ignore it and continue searching * - * @param $url string URL + * @param string $url URL * @return mixed Detected extension (string), or false if none found */ public static function findIE6Extension( $url ) { @@ -245,7 +245,7 @@ class IEUrlExtension { * whether the script filename has been obscured. * * The function returns false if the server is not known to have this - * behaviour. Microsoft IIS in particular is known to decode escaped script + * behavior. Microsoft IIS in particular is known to decode escaped script * filenames. * * SERVER_SOFTWARE typically contains either a plain string such as "Zeus", |