|
@@ 928-930 (lines=3) @@
|
| 925 |
|
// mention trust chain failure only if no expired cert was in the chain; otherwise path validation will trivially fail |
| 926 |
|
if (in_array(RADIUSTests::CERTPROB_OUTSIDE_VALIDITY_PERIOD, $testresults['cert_oddities'])) { |
| 927 |
|
$this->loggerInstance->debug(4, "Deleting trust chain problem report, if present."); |
| 928 |
|
if (($key = array_search(RADIUSTests::CERTPROB_TRUST_ROOT_NOT_REACHED, $testresults['cert_oddities'])) !== false) { |
| 929 |
|
unset($testresults['cert_oddities'][$key]); |
| 930 |
|
} |
| 931 |
|
if (($key = array_search(RADIUSTests::CERTPROB_TRUST_ROOT_REACHED_ONLY_WITH_OOB_INTERMEDIATES, $testresults['cert_oddities'])) !== false) { |
| 932 |
|
unset($testresults['cert_oddities'][$key]); |
| 933 |
|
} |
|
@@ 931-933 (lines=3) @@
|
| 928 |
|
if (($key = array_search(RADIUSTests::CERTPROB_TRUST_ROOT_NOT_REACHED, $testresults['cert_oddities'])) !== false) { |
| 929 |
|
unset($testresults['cert_oddities'][$key]); |
| 930 |
|
} |
| 931 |
|
if (($key = array_search(RADIUSTests::CERTPROB_TRUST_ROOT_REACHED_ONLY_WITH_OOB_INTERMEDIATES, $testresults['cert_oddities'])) !== false) { |
| 932 |
|
unset($testresults['cert_oddities'][$key]); |
| 933 |
|
} |
| 934 |
|
} |
| 935 |
|
} |
| 936 |
|
$this->loggerInstance->debug(4, "UDP_LOGIN\n"); |