|
@@ 812-814 (lines=3) @@
|
| 809 |
|
} |
| 810 |
|
$this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . print_r($servercert, true)); |
| 811 |
|
} |
| 812 |
|
if ($numberServer > 1 && !in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) { |
| 813 |
|
$testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS; |
| 814 |
|
} |
| 815 |
|
break; |
| 816 |
|
case RADIUSTests::CA_ROOT: |
| 817 |
|
if (!in_array(RADIUSTests::CERTPROB_ROOT_INCLUDED, $testresults['cert_oddities'])) { |
|
@@ 817-819 (lines=3) @@
|
| 814 |
|
} |
| 815 |
|
break; |
| 816 |
|
case RADIUSTests::CA_ROOT: |
| 817 |
|
if (!in_array(RADIUSTests::CERTPROB_ROOT_INCLUDED, $testresults['cert_oddities'])) { |
| 818 |
|
$testresults['cert_oddities'][] = RADIUSTests::CERTPROB_ROOT_INCLUDED; |
| 819 |
|
} |
| 820 |
|
// do not save the root CA, it serves no purpose |
| 821 |
|
// chain checks need to be against the UPLOADED CA of the |
| 822 |
|
// IdP/profile, not against an EAP-discovered CA |