mirror of
https://github.com/php/php-src.git
synced 2024-09-22 10:27:25 +00:00
77 lines
2.8 KiB
C
77 lines
2.8 KiB
C
/*
|
|
+----------------------------------------------------------------------+
|
|
| PHP Version 7 |
|
|
+----------------------------------------------------------------------+
|
|
| This source file is subject to version 3.01 of the PHP license, |
|
|
| that is bundled with this package in the file LICENSE, and is |
|
|
| available through the world-wide-web at the following url: |
|
|
| http://www.php.net/license/3_01.txt |
|
|
| If you did not receive a copy of the PHP license and are unable to |
|
|
| obtain it through the world-wide-web, please send a note to |
|
|
| license@php.net so we can mail you a copy immediately. |
|
|
+----------------------------------------------------------------------+
|
|
| Authors: Scott MacVicar <scottmac@php.net> |
|
|
+----------------------------------------------------------------------+
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include "php_intl.h"
|
|
#include "spoofchecker_class.h"
|
|
#include "spoofchecker_create.h"
|
|
#include "intl_data.h"
|
|
|
|
/* {{{ proto Spoofchecker Spoofchecker::__construct()
|
|
* Spoofchecker object constructor.
|
|
*/
|
|
PHP_METHOD(Spoofchecker, __construct)
|
|
{
|
|
#if U_ICU_VERSION_MAJOR_NUM < 58
|
|
int checks;
|
|
#endif
|
|
zend_error_handling error_handling;
|
|
SPOOFCHECKER_METHOD_INIT_VARS;
|
|
|
|
if (zend_parse_parameters_throw(ZEND_NUM_ARGS(), "") == FAILURE) {
|
|
return;
|
|
}
|
|
|
|
zend_replace_error_handling(EH_THROW, IntlException_ce_ptr, &error_handling);
|
|
|
|
SPOOFCHECKER_METHOD_FETCH_OBJECT_NO_CHECK;
|
|
|
|
co->uspoof = uspoof_open(SPOOFCHECKER_ERROR_CODE_P(co));
|
|
INTL_METHOD_CHECK_STATUS(co, "spoofchecker: unable to open ICU Spoof Checker");
|
|
|
|
#if U_ICU_VERSION_MAJOR_NUM >= 58
|
|
/* TODO save it into the object for further suspiction check comparison. */
|
|
/* ICU 58 removes WSC and MSC handling. However there are restriction
|
|
levels as defined in
|
|
http://www.unicode.org/reports/tr39/tr39-15.html#Restriction_Level_Detection
|
|
and the default is high restrictive. In further, we might want to utilize
|
|
uspoof_check2 APIs when it became stable, to use extended check result APIs.
|
|
Subsequent changes in the unicode security algos are to be watched.*/
|
|
uspoof_setRestrictionLevel(co->uspoof, SPOOFCHECKER_DEFAULT_RESTRICTION_LEVEL);
|
|
#else
|
|
/* Single-script enforcement is on by default. This fails for languages
|
|
like Japanese that legally use multiple scripts within a single word,
|
|
so we turn it off.
|
|
*/
|
|
checks = uspoof_getChecks(co->uspoof, SPOOFCHECKER_ERROR_CODE_P(co));
|
|
uspoof_setChecks(co->uspoof, checks & ~USPOOF_SINGLE_SCRIPT, SPOOFCHECKER_ERROR_CODE_P(co));
|
|
#endif
|
|
zend_restore_error_handling(&error_handling);
|
|
}
|
|
/* }}} */
|
|
|
|
/*
|
|
* Local variables:
|
|
* tab-width: 4
|
|
* c-basic-offset: 4
|
|
* End:
|
|
* vim600: noet sw=4 ts=4 fdm=marker
|
|
* vim<600: noet sw=4 ts=4
|
|
*/
|