Jump to content
Sign in to follow this  
yboti

Is this a bug, or vastigial code?

Recommended Posts

While investigating another issue I notice that in the before_process function of includes/modules/payment/authorizenet.php in about line 260 we explode $response[0]. The thing is, $response is itself parsed earlier from $authorize which is derived from cURL in includes/modules/authorize_direct.php. $response[0] simply contains the numeric response code form authorize.net - hopefully "1". This leaves the other 3 variables empty and it does not appear that we do anything with them. Have i misinterpreted what is going on?


Put a face on your business

Communicate through video

http://www.helloworld.com/yboti

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×