@@ -8,7 +8,7 @@ |
||
8 | 8 | /** |
9 | 9 | * |
10 | 10 | */ |
11 | - $root = dirname(dirname(__FILE__)); |
|
12 | - include($root."/config/config.php"); |
|
13 | - set_include_path(get_include_path() . PATH_SEPARATOR . "$root/core" . PATH_SEPARATOR . "$root"); |
|
11 | + $root = dirname(dirname(__FILE__)); |
|
12 | + include($root."/config/config.php"); |
|
13 | + set_include_path(get_include_path() . PATH_SEPARATOR . "$root/core" . PATH_SEPARATOR . "$root"); |
|
14 | 14 | ?> |
@@ -9,6 +9,6 @@ |
||
9 | 9 | * |
10 | 10 | */ |
11 | 11 | $root = dirname(dirname(__FILE__)); |
12 | - include($root."/config/config.php"); |
|
12 | + include($root . "/config/config.php"); |
|
13 | 13 | set_include_path(get_include_path() . PATH_SEPARATOR . "$root/core" . PATH_SEPARATOR . "$root"); |
14 | 14 | ?> |
@@ -141,13 +141,13 @@ discard block |
||
141 | 141 | ]; |
142 | 142 | |
143 | 143 | /** |
144 | - * Configuration for GeoIP2 |
|
145 | - * Beware, the legacy version does not really work with IPv6 addresses |
|
146 | - * version: set to 2 if you wish to use GeoIP2, to 1 for the legacy version or set to 0 to turn off geolocation service |
|
147 | - * geoip2-path-to-autoloader: points to the GeoIP2 autoloader |
|
148 | - * geoip2-path-to-db: points to the GeoIP2 city database |
|
149 | - * @var array |
|
150 | - */ |
|
144 | + * Configuration for GeoIP2 |
|
145 | + * Beware, the legacy version does not really work with IPv6 addresses |
|
146 | + * version: set to 2 if you wish to use GeoIP2, to 1 for the legacy version or set to 0 to turn off geolocation service |
|
147 | + * geoip2-path-to-autoloader: points to the GeoIP2 autoloader |
|
148 | + * geoip2-path-to-db: points to the GeoIP2 city database |
|
149 | + * @var array |
|
150 | + */ |
|
151 | 151 | |
152 | 152 | public static $GEOIP = [ |
153 | 153 | 'version' => 0, |
@@ -174,21 +174,21 @@ discard block |
||
174 | 174 | * @var array |
175 | 175 | */ |
176 | 176 | public static $LANGUAGES = [ |
177 | - 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | - 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
179 | - 'en' => ['display' => 'English(GB)', 'locale' => 'en_GB.utf8'], |
|
180 | - 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | - 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | - 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | - 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | - 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | - 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
186 | - 'sl' => ['display' => 'Slovenščina', 'locale' => 'sl_SI.utf8'], |
|
187 | - 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | - 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | - 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | - 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | - 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
177 | + 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | + 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
179 | + 'en' => ['display' => 'English(GB)', 'locale' => 'en_GB.utf8'], |
|
180 | + 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | + 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | + 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | + 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | + 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | + 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
186 | + 'sl' => ['display' => 'Slovenščina', 'locale' => 'sl_SI.utf8'], |
|
187 | + 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | + 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | + 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | + 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | + 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
192 | 192 | |
193 | 193 | // For the following languages, partial translations exist in Transifex, but |
194 | 194 | // they are not complete enough for display. Their Transifex content is not |
@@ -237,45 +237,45 @@ discard block |
||
237 | 237 | ], |
238 | 238 | |
239 | 239 | 'TLS-clientcerts' => [ |
240 | - 'CA1' => [ |
|
240 | + 'CA1' => [ |
|
241 | 241 | 'status' => 'ACCREDITED', |
242 | 242 | 'issuerCA' => '/DC=org/DC=pki1/CN=PKI 1', |
243 | 243 | 'certificates' => [ |
244 | - [ |
|
244 | + [ |
|
245 | 245 | 'status' => 'CORRECT', |
246 | 246 | 'public' => 'ca1-client-cert.pem', |
247 | 247 | 'private' => 'ca1-client-key.pem', |
248 | 248 | 'expected' => 'PASS'], |
249 | - [ |
|
249 | + [ |
|
250 | 250 | 'status' => 'WRONGPOLICY', |
251 | 251 | 'public' => 'ca1-nopolicy-cert.pem', |
252 | 252 | 'private' => 'ca1-nopolicy-key.key', |
253 | 253 | 'expected' => 'FAIL'], |
254 | - [ |
|
254 | + [ |
|
255 | 255 | 'status' => 'EXPIRED', |
256 | 256 | 'public' => 'ca1-exp.pem', |
257 | 257 | 'private' => 'ca1-exp.key', |
258 | 258 | 'expected' => 'FAIL'], |
259 | - [ |
|
259 | + [ |
|
260 | 260 | 'status' => 'REVOKED', |
261 | 261 | 'public' => 'ca1-revoked.pem', |
262 | 262 | 'private' => 'ca1-revoked.key', |
263 | 263 | 'expected' => 'FAIL'], |
264 | 264 | ] |
265 | - ], |
|
266 | - 'CA-N' => [ |
|
265 | + ], |
|
266 | + 'CA-N' => [ |
|
267 | 267 | 'status' => 'NONACCREDITED', |
268 | 268 | 'issuerCA' => '/DC=org/DC=pkiN/CN=PKI N', |
269 | 269 | 'certificates' => [ |
270 | - [ |
|
270 | + [ |
|
271 | 271 | 'status' => 'CORRECT', |
272 | 272 | 'public' => 'caN-client-cert.pem', |
273 | 273 | 'private' => 'caN-client-cert.key', |
274 | 274 | 'expected' => 'FAIL'], |
275 | - ] |
|
276 | - ] |
|
277 | - ], |
|
278 | - 'accreditedCAsURL' => '', |
|
275 | + ] |
|
276 | + ] |
|
277 | + ], |
|
278 | + 'accreditedCAsURL' => '', |
|
279 | 279 | ]; |
280 | 280 | |
281 | 281 | /** |
@@ -313,11 +313,11 @@ discard block |
||
313 | 313 | 'db' => 'customer_db', |
314 | 314 | 'user' => 'customerservice', |
315 | 315 | 'pass' => '2lame4u'], |
316 | - 'enforce-external-sync' => TRUE, |
|
317 | - /* if you feed your user database from a third-party source and do not want CAT to update it on its own, you can |
|
316 | + 'enforce-external-sync' => TRUE, |
|
317 | + /* if you feed your user database from a third-party source and do not want CAT to update it on its own, you can |
|
318 | 318 | * make it read-only |
319 | 319 | */ |
320 | - 'userdb-readonly' => FALSE, |
|
320 | + 'userdb-readonly' => FALSE, |
|
321 | 321 | ]; |
322 | 322 | |
323 | 323 | /** |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | * pass: password for the username |
164 | 164 | * @var array |
165 | 165 | */ |
166 | - public static $MAILSETTINGS = [ // we always use Submission |
|
166 | + public static $MAILSETTINGS = [// we always use Submission |
|
167 | 167 | 'host' => 'submission.capable.mta', |
168 | 168 | 'user'=> 'mailuser', |
169 | 169 | 'pass' => 'mailpass', |
@@ -174,21 +174,21 @@ discard block |
||
174 | 174 | * @var array |
175 | 175 | */ |
176 | 176 | public static $LANGUAGES = [ |
177 | - 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | - 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
177 | + 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | + 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
179 | 179 | 'en' => ['display' => 'English(GB)', 'locale' => 'en_GB.utf8'], |
180 | - 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | - 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | - 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | - 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | - 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | - 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
180 | + 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | + 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | + 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | + 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | + 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | + 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
186 | 186 | 'sl' => ['display' => 'Slovenščina', 'locale' => 'sl_SI.utf8'], |
187 | - 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | - 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | - 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | - 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | - 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
187 | + 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | + 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | + 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | + 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | + 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
192 | 192 | |
193 | 193 | // For the following languages, partial translations exist in Transifex, but |
194 | 194 | // they are not complete enough for display. Their Transifex content is not |
@@ -343,9 +343,9 @@ discard block |
||
343 | 343 | * NSIS version - with version 3 UTF installers will be created |
344 | 344 | * see also $PATHS['makensis'] |
345 | 345 | */ |
346 | - public static $NSIS_VERSION = 2 ; |
|
346 | + public static $NSIS_VERSION = 2; |
|
347 | 347 | |
348 | - public static $SUPERADMINS = [ |
|
348 | + public static $SUPERADMINS = [ |
|
349 | 349 | 'eptid:someuser', |
350 | 350 | 'http://sommeopenid.example/anotheruser', |
351 | 351 | 'I do not care about security!', |
@@ -137,10 +137,10 @@ discard block |
||
137 | 137 | <?php |
138 | 138 | if ($wizard_style) { |
139 | 139 | echo "<p>" . |
140 | - sprintf(_("In this section, you define on which media %s should be configured on user devices."),Config::$CONSORTIUM['name']) . "</p> |
|
140 | + sprintf(_("In this section, you define on which media %s should be configured on user devices."), Config::$CONSORTIUM['name']) . "</p> |
|
141 | 141 | <ul>"; |
142 | 142 | echo "<li>"; |
143 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
143 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
144 | 144 | if (count(Config::$CONSORTIUM['ssid']) > 0) { |
145 | 145 | $ssidlist = ""; |
146 | 146 | foreach (Config::$CONSORTIUM['ssid'] as $ssid) |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | echo "</li>"; |
158 | 158 | |
159 | 159 | echo "<li>"; |
160 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
160 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
161 | 161 | if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) { |
162 | 162 | $consortiumlist = ""; |
163 | 163 | foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) |
@@ -170,10 +170,10 @@ discard block |
||
170 | 170 | echo _("Please configure which Consortium OIs should be configured in the installers."); |
171 | 171 | } |
172 | 172 | echo "</li>"; |
173 | - echo "<li><strong>"._("Support for wired IEEE 802.1X:")." </strong>" |
|
174 | - . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail)."). |
|
173 | + echo "<li><strong>" . _("Support for wired IEEE 802.1X:") . " </strong>" |
|
174 | + . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).") . |
|
175 | 175 | "</li>"; |
176 | - echo "<li><strong>"._("Removal of bootstrap/onboarding SSIDs:")." </strong>" |
|
176 | + echo "<li><strong>" . _("Removal of bootstrap/onboarding SSIDs:") . " </strong>" |
|
177 | 177 | . _("If you use a captive portal to distribute configurations, you may want to unconfigure/disable that SSID after the bootstrap process. With this option, the SSID will either be removed, or be defined as 'Only connect manually'.") |
178 | 178 | . "</li>"; |
179 | 179 | echo "</ul>"; |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | echo "</table></div>"; |
139 | 139 | } |
140 | 140 | if (Config::$CONSORTIUM['name'] == 'eduroam') |
141 | - $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>"; |
|
141 | + $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"), "https://wiki.geant.org/x/KQB_AQ") . "</h3>"; |
|
142 | 142 | else |
143 | 143 | $helptext = ""; |
144 | 144 | echo $helptext; |
@@ -186,7 +186,7 @@ discard block |
||
186 | 186 | // deployment status; need to dive into profiles for this |
187 | 187 | // show happy eyeballs if at least one profile is configured/showtime |
188 | 188 | echo "<td>"; |
189 | - echo ($idp_instance->isOneProfileConfigured() ? "C" : "" ) . " " . ($idp_instance->isOneProfileShowtime() ? "V" : "" ); |
|
189 | + echo ($idp_instance->isOneProfileConfigured() ? "C" : "") . " " . ($idp_instance->isOneProfileShowtime() ? "V" : ""); |
|
190 | 190 | echo "</td>"; |
191 | 191 | // get the coarse status overview |
192 | 192 | $status = $idp_instance->getAllProfileStatusOverview(); |
@@ -19,10 +19,10 @@ discard block |
||
19 | 19 | $Cat->set_locale("web_admin"); |
20 | 20 | |
21 | 21 | $additional_message = [ |
22 | - L_OK => '', |
|
23 | - L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
|
24 | - L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
|
25 | - L_ERROR => _("Some configuration errors were observed; the list is below."), |
|
22 | + L_OK => '', |
|
23 | + L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
|
24 | + L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
|
25 | + L_ERROR => _("Some configuration errors were observed; the list is below."), |
|
26 | 26 | |
27 | 27 | ]; |
28 | 28 | |
@@ -32,25 +32,25 @@ discard block |
||
32 | 32 | } |
33 | 33 | |
34 | 34 | function printDN($dn) { |
35 | - $out = ''; |
|
36 | - foreach (array_reverse($dn) as $k => $v) { |
|
37 | - if(is_array ($v)) { |
|
38 | - foreach ($v as $V) { |
|
35 | + $out = ''; |
|
36 | + foreach (array_reverse($dn) as $k => $v) { |
|
37 | + if(is_array ($v)) { |
|
38 | + foreach ($v as $V) { |
|
39 | 39 | if($out) |
40 | - $out .= ','; |
|
40 | + $out .= ','; |
|
41 | 41 | $out .= "$k=$V"; |
42 | - } |
|
43 | - } else { |
|
44 | - if($out) |
|
42 | + } |
|
43 | + } else { |
|
44 | + if($out) |
|
45 | 45 | $out .= ','; |
46 | - $out .= "$k=$v"; |
|
47 | - } |
|
48 | - } |
|
49 | - return($out); |
|
46 | + $out .= "$k=$v"; |
|
47 | + } |
|
48 | + } |
|
49 | + return($out); |
|
50 | 50 | } |
51 | 51 | |
52 | 52 | function printTm($tm) { |
53 | - return(gmdate(DateTime::COOKIE,$tm)); |
|
53 | + return(gmdate(DateTime::COOKIE,$tm)); |
|
54 | 54 | } |
55 | 55 | |
56 | 56 | |
@@ -60,19 +60,19 @@ discard block |
||
60 | 60 | $server_info = []; |
61 | 61 | $udp_result = $testsuite->UDP_reachability_result[$host]; |
62 | 62 | if(isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
63 | - foreach ($udp_result['certdata'] as $certdata) { |
|
64 | - if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
65 | - continue; |
|
66 | - $server_cert = [ |
|
67 | - 'subject' => printDN($certdata['subject']), |
|
68 | - 'issuer' => printDN($certdata['issuer']), |
|
69 | - 'validFrom' => printTm($certdata['validFrom_time_t']), |
|
70 | - 'validTo' => printTm($certdata['validTo_time_t']), |
|
71 | - 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']), |
|
72 | - 'sha1' => $certdata['sha1'], |
|
73 | - 'extensions' => $certdata['extensions'] |
|
74 | - ]; |
|
75 | - } |
|
63 | + foreach ($udp_result['certdata'] as $certdata) { |
|
64 | + if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
65 | + continue; |
|
66 | + $server_cert = [ |
|
67 | + 'subject' => printDN($certdata['subject']), |
|
68 | + 'issuer' => printDN($certdata['issuer']), |
|
69 | + 'validFrom' => printTm($certdata['validFrom_time_t']), |
|
70 | + 'validTo' => printTm($certdata['validTo_time_t']), |
|
71 | + 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']), |
|
72 | + 'sha1' => $certdata['sha1'], |
|
73 | + 'extensions' => $certdata['extensions'] |
|
74 | + ]; |
|
75 | + } |
|
76 | 76 | } |
77 | 77 | $ret['server_cert'] = $server_cert; |
78 | 78 | if(isset($udp_result['incoming_server_names'][0]) ) { |
@@ -120,7 +120,7 @@ discard block |
||
120 | 120 | */ |
121 | 121 | $hostindex = $_REQUEST['hostindex']; |
122 | 122 | if(!is_numeric($hostindex)) |
123 | - exit; |
|
123 | + exit; |
|
124 | 124 | |
125 | 125 | |
126 | 126 | $returnarray = []; |
@@ -177,16 +177,16 @@ discard block |
||
177 | 177 | case RETVAL_OK : |
178 | 178 | $level = $returnarray['result'][$i]['level']; |
179 | 179 | switch($level) { |
180 | - case L_OK : |
|
180 | + case L_OK : |
|
181 | 181 | $message = _("<strong>Test successful.</strong>"); |
182 | - break; |
|
183 | - case L_REMARK : |
|
182 | + break; |
|
183 | + case L_REMARK : |
|
184 | 184 | case L_WARN : |
185 | 185 | $message = _("<strong>Test partially successful</strong>: authentication succeded.") . ' ' . $additional_message[$level]; |
186 | - break; |
|
187 | - case L_ERROR : |
|
186 | + break; |
|
187 | + case L_ERROR : |
|
188 | 188 | $message = _("<strong>Test FAILED</strong>: authentication succeded.") . ' ' . $additional_message[$level]; |
189 | - break; |
|
189 | + break; |
|
190 | 190 | } |
191 | 191 | break; |
192 | 192 | case RETVAL_CONVERSATION_REJECT: |
@@ -18,7 +18,7 @@ discard block |
||
18 | 18 | $Cat = new CAT(); |
19 | 19 | $Cat->set_locale("web_admin"); |
20 | 20 | |
21 | -$additional_message = [ |
|
21 | +$additional_message = [ |
|
22 | 22 | L_OK => '', |
23 | 23 | L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
24 | 24 | L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
@@ -28,20 +28,20 @@ discard block |
||
28 | 28 | |
29 | 29 | function disp_name($eap) { |
30 | 30 | $D = EAP::eapDisplayName($eap); |
31 | - return $D['OUTER'] . ( $D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
31 | + return $D['OUTER'] . ($D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
32 | 32 | } |
33 | 33 | |
34 | 34 | function printDN($dn) { |
35 | 35 | $out = ''; |
36 | 36 | foreach (array_reverse($dn) as $k => $v) { |
37 | - if(is_array ($v)) { |
|
37 | + if (is_array($v)) { |
|
38 | 38 | foreach ($v as $V) { |
39 | - if($out) |
|
39 | + if ($out) |
|
40 | 40 | $out .= ','; |
41 | 41 | $out .= "$k=$V"; |
42 | 42 | } |
43 | 43 | } else { |
44 | - if($out) |
|
44 | + if ($out) |
|
45 | 45 | $out .= ','; |
46 | 46 | $out .= "$k=$v"; |
47 | 47 | } |
@@ -50,32 +50,32 @@ discard block |
||
50 | 50 | } |
51 | 51 | |
52 | 52 | function printTm($tm) { |
53 | - return(gmdate(DateTime::COOKIE,$tm)); |
|
53 | + return(gmdate(DateTime::COOKIE, $tm)); |
|
54 | 54 | } |
55 | 55 | |
56 | 56 | |
57 | 57 | |
58 | -function process_result($testsuite,$host) { |
|
58 | +function process_result($testsuite, $host) { |
|
59 | 59 | $ret = []; |
60 | 60 | $server_info = []; |
61 | 61 | $udp_result = $testsuite->UDP_reachability_result[$host]; |
62 | - if(isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
62 | + if (isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
63 | 63 | foreach ($udp_result['certdata'] as $certdata) { |
64 | - if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
64 | + if ($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned') |
|
65 | 65 | continue; |
66 | - $server_cert = [ |
|
66 | + $server_cert = [ |
|
67 | 67 | 'subject' => printDN($certdata['subject']), |
68 | 68 | 'issuer' => printDN($certdata['issuer']), |
69 | 69 | 'validFrom' => printTm($certdata['validFrom_time_t']), |
70 | 70 | 'validTo' => printTm($certdata['validTo_time_t']), |
71 | - 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']), |
|
71 | + 'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']), |
|
72 | 72 | 'sha1' => $certdata['sha1'], |
73 | 73 | 'extensions' => $certdata['extensions'] |
74 | 74 | ]; |
75 | 75 | } |
76 | 76 | } |
77 | 77 | $ret['server_cert'] = $server_cert; |
78 | - if(isset($udp_result['incoming_server_names'][0]) ) { |
|
78 | + if (isset($udp_result['incoming_server_names'][0])) { |
|
79 | 79 | $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]); |
80 | 80 | } |
81 | 81 | else |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | exit; |
120 | 120 | */ |
121 | 121 | $hostindex = $_REQUEST['hostindex']; |
122 | -if(!is_numeric($hostindex)) |
|
122 | +if (!is_numeric($hostindex)) |
|
123 | 123 | exit; |
124 | 124 | |
125 | 125 | |
@@ -140,14 +140,14 @@ discard block |
||
140 | 140 | if ($_FILES['cert']['error'] == UPLOAD_ERR_OK) { |
141 | 141 | $clientcertdata = file_get_contents($_FILES['cert']['tmp_name']); |
142 | 142 | $privkey_pass = isset($_REQUEST['privkey_pass']) && $_REQUEST['privkey_pass'] ? $_REQUEST['privkey_pass'] : ""; //!! |
143 | - if(isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
143 | + if (isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
144 | 144 | $tls_username = valid_user($_REQUEST['tls_username']); |
145 | 145 | } else { |
146 | - if(openssl_pkcs12_read($clientcertdata,$certs,$privkey_pass)) { |
|
146 | + if (openssl_pkcs12_read($clientcertdata, $certs, $privkey_pass)) { |
|
147 | 147 | $mydetails = openssl_x509_parse($certs['cert']); |
148 | - if(isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
149 | - $tls_username=$mydetails['subject']['CN']; |
|
150 | - debug(4,"PKCS12-CN=$tls_username\n"); |
|
148 | + if (isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
149 | + $tls_username = $mydetails['subject']['CN']; |
|
150 | + debug(4, "PKCS12-CN=$tls_username\n"); |
|
151 | 151 | } else { |
152 | 152 | $testresult = RETVAL_INCOMPLETE_DATA; |
153 | 153 | $run_test = FALSE; |
@@ -161,14 +161,14 @@ discard block |
||
161 | 161 | $testresult = RETVAL_INCOMPLETE_DATA; |
162 | 162 | $run_test = FALSE; |
163 | 163 | } |
164 | - if($run_test) { |
|
165 | - debug(4,"TLS-USERNAME=$tls_username\n"); |
|
166 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass,'', TRUE, TRUE, $clientcertdata); |
|
164 | + if ($run_test) { |
|
165 | + debug(4, "TLS-USERNAME=$tls_username\n"); |
|
166 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass, '', TRUE, TRUE, $clientcertdata); |
|
167 | 167 | } |
168 | 168 | } else { |
169 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password,$outer_user_name); |
|
169 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password, $outer_user_name); |
|
170 | 170 | } |
171 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
171 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
172 | 172 | $returnarray['result'][$i]['eap'] = display_name($eap); |
173 | 173 | $returnarray['returncode'][$i] = $testresult; |
174 | 174 | |
@@ -176,7 +176,7 @@ discard block |
||
176 | 176 | switch ($testresult) { |
177 | 177 | case RETVAL_OK : |
178 | 178 | $level = $returnarray['result'][$i]['level']; |
179 | - switch($level) { |
|
179 | + switch ($level) { |
|
180 | 180 | case L_OK : |
181 | 181 | $message = _("<strong>Test successful.</strong>"); |
182 | 182 | break; |
@@ -228,21 +228,21 @@ discard block |
||
228 | 228 | $i = 0; |
229 | 229 | $returnarray['hostindex'] = $hostindex; |
230 | 230 | $testresult = $testsuite->UDP_reachability($hostindex); |
231 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
231 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
232 | 232 | $returnarray['result'][$i]['eap'] = 'ALL'; |
233 | 233 | $returnarray['returncode'][$i] = $testresult; |
234 | 234 | // a failed check may not have gotten any certificate, be prepared for that |
235 | 235 | switch ($testresult) { |
236 | 236 | case RETVAL_CONVERSATION_REJECT: |
237 | 237 | $level = $returnarray['result'][$i]['level']; |
238 | - if($level > L_OK) |
|
238 | + if ($level > L_OK) |
|
239 | 239 | $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level]; |
240 | 240 | else |
241 | 241 | $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned."); |
242 | 242 | break; |
243 | 243 | case RETVAL_IMMEDIATE_REJECT: |
244 | 244 | $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable."); |
245 | - $level= L_WARN; |
|
245 | + $level = L_WARN; |
|
246 | 246 | break; |
247 | 247 | case RETVAL_NO_RESPONSE: |
248 | 248 | $returnarray['result'][$i]['server'] = 0; |
@@ -255,10 +255,10 @@ discard block |
||
255 | 255 | break; |
256 | 256 | default: |
257 | 257 | $message = _("unhandled error"); |
258 | - $level= L_ERROR; |
|
258 | + $level = L_ERROR; |
|
259 | 259 | break; |
260 | 260 | } |
261 | -debug(4,"SERVER=".$returnarray['result'][$i]['server']."\n"); |
|
261 | +debug(4, "SERVER=" . $returnarray['result'][$i]['server'] . "\n"); |
|
262 | 262 | $returnarray['result'][$i]['level'] = $level; |
263 | 263 | $returnarray['result'][$i]['message'] = $message; |
264 | 264 | break; |
@@ -36,53 +36,53 @@ discard block |
||
36 | 36 | require_once("SanityTests.php"); |
37 | 37 | |
38 | 38 | function print_test_results($t) { |
39 | - $out = ''; |
|
40 | - switch($t->test_result['global']) { |
|
41 | - case L_OK: |
|
39 | + $out = ''; |
|
40 | + switch($t->test_result['global']) { |
|
41 | + case L_OK: |
|
42 | 42 | $message = "Your configuration appears to be fine."; |
43 | - break; |
|
44 | - case L_WARN: |
|
43 | + break; |
|
44 | + case L_WARN: |
|
45 | 45 | $message = "There were some warnings, but your configuration should work."; |
46 | - break; |
|
47 | - case L_ERROR: |
|
46 | + break; |
|
47 | + case L_ERROR: |
|
48 | 48 | $message = "Your configuration appears to be broken, please fix the errors."; |
49 | - break; |
|
50 | - case L_NOTICE: |
|
49 | + break; |
|
50 | + case L_NOTICE: |
|
51 | 51 | $message = "Your configuration appears to be fine."; |
52 | - break; |
|
53 | - } |
|
54 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
55 | - foreach ($t->out as $test => $test_val) { |
|
56 | - foreach ($test_val as $o) { |
|
57 | - $out .= UI_message($o['level'],$o['message']); |
|
58 | - } |
|
59 | - } |
|
60 | - return($out); |
|
52 | + break; |
|
53 | + } |
|
54 | + $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
55 | + foreach ($t->out as $test => $test_val) { |
|
56 | + foreach ($test_val as $o) { |
|
57 | + $out .= UI_message($o['level'],$o['message']); |
|
58 | + } |
|
59 | + } |
|
60 | + return($out); |
|
61 | 61 | } |
62 | 62 | |
63 | 63 | function return_test_results($t) { |
64 | - $out = ''; |
|
65 | - switch($t->test_result['global']) { |
|
66 | - case L_OK: |
|
64 | + $out = ''; |
|
65 | + switch($t->test_result['global']) { |
|
66 | + case L_OK: |
|
67 | 67 | $message = "Your configuration appears to be fine."; |
68 | - break; |
|
69 | - case L_WARN: |
|
68 | + break; |
|
69 | + case L_WARN: |
|
70 | 70 | $message = "There were some warnings, but your configuration should work."; |
71 | - break; |
|
72 | - case L_ERROR: |
|
71 | + break; |
|
72 | + case L_ERROR: |
|
73 | 73 | $message = "Your configuration appears to be broken, please fix the errors."; |
74 | - break; |
|
75 | - case L_NOTICE: |
|
74 | + break; |
|
75 | + case L_NOTICE: |
|
76 | 76 | $message = "Your configuration appears to be fine."; |
77 | - break; |
|
78 | - } |
|
79 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
80 | - foreach ($t->out as $test => $test_val) { |
|
81 | - foreach ($test_val as $o) { |
|
82 | - $out .= UI_message($o['level'],$o['message']); |
|
83 | - } |
|
84 | - } |
|
85 | - return($out); |
|
77 | + break; |
|
78 | + } |
|
79 | + $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
80 | + foreach ($t->out as $test => $test_val) { |
|
81 | + foreach ($test_val as $o) { |
|
82 | + $out .= UI_message($o['level'],$o['message']); |
|
83 | + } |
|
84 | + } |
|
85 | + return($out); |
|
86 | 86 | } |
87 | 87 | |
88 | 88 | |
@@ -93,8 +93,8 @@ discard block |
||
93 | 93 | authenticate(); |
94 | 94 | $user = new User($_SESSION['user']); |
95 | 95 | if (!$user->isSuperadmin()) { |
96 | - print "Not Superadmin"; |
|
97 | - exit; |
|
96 | + print "Not Superadmin"; |
|
97 | + exit; |
|
98 | 98 | } |
99 | 99 | |
100 | 100 | } |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | break; |
109 | 109 | case 'html': |
110 | 110 | header("Content-Type:text/html;charset=utf-8"); |
111 | - echo "<!DOCTYPE html> |
|
111 | + echo "<!DOCTYPE html> |
|
112 | 112 | <html xmlns='http://www.w3.org/1999/xhtml' lang='$ourlocale'> |
113 | 113 | <head lang='$ourlocale'> |
114 | 114 | <meta http-equiv='Content-Type' content='text/html; charset=UTF-8'></head>"; |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | |
38 | 38 | function print_test_results($t) { |
39 | 39 | $out = ''; |
40 | - switch($t->test_result['global']) { |
|
40 | + switch ($t->test_result['global']) { |
|
41 | 41 | case L_OK: |
42 | 42 | $message = "Your configuration appears to be fine."; |
43 | 43 | break; |
@@ -51,10 +51,10 @@ discard block |
||
51 | 51 | $message = "Your configuration appears to be fine."; |
52 | 52 | break; |
53 | 53 | } |
54 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
55 | - foreach ($t->out as $test => $test_val) { |
|
56 | - foreach ($test_val as $o) { |
|
57 | - $out .= UI_message($o['level'],$o['message']); |
|
54 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
55 | + foreach ($t->out as $test => $test_val) { |
|
56 | + foreach ($test_val as $o) { |
|
57 | + $out .= UI_message($o['level'], $o['message']); |
|
58 | 58 | } |
59 | 59 | } |
60 | 60 | return($out); |
@@ -62,7 +62,7 @@ discard block |
||
62 | 62 | |
63 | 63 | function return_test_results($t) { |
64 | 64 | $out = ''; |
65 | - switch($t->test_result['global']) { |
|
65 | + switch ($t->test_result['global']) { |
|
66 | 66 | case L_OK: |
67 | 67 | $message = "Your configuration appears to be fine."; |
68 | 68 | break; |
@@ -76,10 +76,10 @@ discard block |
||
76 | 76 | $message = "Your configuration appears to be fine."; |
77 | 77 | break; |
78 | 78 | } |
79 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
80 | - foreach ($t->out as $test => $test_val) { |
|
81 | - foreach ($test_val as $o) { |
|
82 | - $out .= UI_message($o['level'],$o['message']); |
|
79 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
80 | + foreach ($t->out as $test => $test_val) { |
|
81 | + foreach ($test_val as $o) { |
|
82 | + $out .= UI_message($o['level'], $o['message']); |
|
83 | 83 | } |
84 | 84 | } |
85 | 85 | return($out); |
@@ -100,7 +100,7 @@ discard block |
||
100 | 100 | } |
101 | 101 | $test = new SanityTest(); |
102 | 102 | $test->run_tests($Tests); |
103 | -$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
103 | +$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
104 | 104 | switch ($format) { |
105 | 105 | case 'include': |
106 | 106 | $o = print_test_results($test); |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | <div class='infobox' style='text-align:center;'> |
86 | 86 | <h2><?php echo _("Institution Download Area QR Code"); ?></h2> |
87 | 87 | <?php |
88 | - $displayurl = ( isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier; |
|
88 | + $displayurl = (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier; |
|
89 | 89 | $uri = "data:image/png;base64," . base64_encode(png_inject_consortium_logo(QRcode::png($displayurl, FALSE, QR_ECLEVEL_Q, 12))); |
90 | 90 | $size = getimagesize($uri); |
91 | 91 | echo "<img width='" . ($size[0] / 4) . "' height='" . ($size[1] / 4) . "' src='$uri' alt='QR-code'/>"; |
@@ -115,7 +115,7 @@ discard block |
||
115 | 115 | </td> |
116 | 116 | <td> |
117 | 117 | <form action='edit_idp_result.php?inst_id=<?php echo $my_inst->identifier; ?>' method='post' accept-charset='UTF-8'> |
118 | - <button class='delete' type='submit' name='submitbutton' value='<?php echo BUTTON_DELETE; ?>' onclick="return confirm('<?php echo ( Config::$CONSORTIUM['selfservice_registration'] === NULL ? _("After deleting the IdP, you can not recreate it yourself - you need a new invitation token from the federation administrator!") . " " : "" ) . sprintf(_("Do you really want to delete your IdP %s?"), $my_inst->name); ?>')"><?php echo _("Delete IdP"); ?></button> |
|
118 | + <button class='delete' type='submit' name='submitbutton' value='<?php echo BUTTON_DELETE; ?>' onclick="return confirm('<?php echo (Config::$CONSORTIUM['selfservice_registration'] === NULL ? _("After deleting the IdP, you can not recreate it yourself - you need a new invitation token from the federation administrator!") . " " : "") . sprintf(_("Do you really want to delete your IdP %s?"), $my_inst->name); ?>')"><?php echo _("Delete IdP"); ?></button> |
|
119 | 119 | </form> |
120 | 120 | |
121 | 121 | </td> |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | $has_realm = $profile_list->getAttributes("internal:realm"); |
231 | 231 | $has_realm = $has_realm[0]['value']; |
232 | 232 | echo "<div class='profilemodulebuttons' style='float:right;'>"; |
233 | - if (count(Config::$RADIUSTESTS['UDP-hosts']) > 0 || ( count(Config::$RADIUSTESTS['TLS-clientcerts']) > 0 && Config::$RADIUSTESTS['TLS-discoverytag'] != "")) |
|
233 | + if (count(Config::$RADIUSTESTS['UDP-hosts']) > 0 || (count(Config::$RADIUSTESTS['TLS-clientcerts']) > 0 && Config::$RADIUSTESTS['TLS-discoverytag'] != "")) |
|
234 | 234 | echo "<form action='action_realmcheck.php?inst_id=$my_inst->identifier&profile_id=$profile_list->identifier' method='post' accept-charset='UTF-8'> |
235 | 235 | <button type='submit' name='profile_action' value='check' " . ($has_realm ? "" : "disabled='disabled' title='" . _("The realm can only be checked if you configure the realm!") . "'") . "> |
236 | 236 | " . _("Check realm reachability") . " |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | if (isset($URL['device-specific:redirect'])) |
265 | 265 | $displayurl = $URL['device-specific:redirect'][0]; |
266 | 266 | else |
267 | - $displayurl = ( isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://' ) . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier . "&profile=" . $profile_list->identifier; |
|
267 | + $displayurl = (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier . "&profile=" . $profile_list->identifier; |
|
268 | 268 | echo "<a href='$displayurl' style='white-space: nowrap; text-align: center;'>"; |
269 | 269 | $uri = "data:image/png;base64," . base64_encode(png_inject_consortium_logo(QRcode::png($displayurl, FALSE, QR_ECLEVEL_Q, 12))); |
270 | 270 | $size = getimagesize($uri); |
@@ -28,30 +28,30 @@ discard block |
||
28 | 28 | else |
29 | 29 | $my_profile = NULL; |
30 | 30 | if ($my_profile != NULL) { |
31 | - $cr = $my_profile->getAttributes("internal:realm"); |
|
32 | - if ($cr) { |
|
33 | - // checking our own stuff. Enable thorough checks |
|
34 | - $check_thorough = TRUE; |
|
35 | - $check_realm = $cr[0]['value']; |
|
36 | - $testsuite = new RADIUSTests($check_realm, $my_profile->identifier); |
|
37 | - } else { |
|
38 | - $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
|
39 | - } |
|
31 | + $cr = $my_profile->getAttributes("internal:realm"); |
|
32 | + if ($cr) { |
|
33 | + // checking our own stuff. Enable thorough checks |
|
34 | + $check_thorough = TRUE; |
|
35 | + $check_realm = $cr[0]['value']; |
|
36 | + $testsuite = new RADIUSTests($check_realm, $my_profile->identifier); |
|
37 | + } else { |
|
38 | + $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
|
39 | + } |
|
40 | 40 | } else { // someone else's realm... only shallow checks |
41 | - if(!empty($_REQUEST['realm'])) { |
|
42 | - if($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
43 | - $_SESSION['check_realm'] = $check_realm; |
|
44 | - } |
|
45 | - } else { |
|
46 | - if(!empty($_SESSION['check_realm'])) |
|
47 | - $check_realm = $_SESSION['check_realm']; |
|
48 | - else |
|
49 | - $check_realm = FALSE; |
|
50 | - } |
|
51 | - if($check_realm) |
|
52 | - $testsuite = new RADIUSTests($check_realm); |
|
53 | - else |
|
54 | - $error_message = _("No valid realm name given, cannot execute any checks!"); |
|
41 | + if(!empty($_REQUEST['realm'])) { |
|
42 | + if($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
43 | + $_SESSION['check_realm'] = $check_realm; |
|
44 | + } |
|
45 | + } else { |
|
46 | + if(!empty($_SESSION['check_realm'])) |
|
47 | + $check_realm = $_SESSION['check_realm']; |
|
48 | + else |
|
49 | + $check_realm = FALSE; |
|
50 | + } |
|
51 | + if($check_realm) |
|
52 | + $testsuite = new RADIUSTests($check_realm); |
|
53 | + else |
|
54 | + $error_message = _("No valid realm name given, cannot execute any checks!"); |
|
55 | 55 | } |
56 | 56 | |
57 | 57 | $translate = _("STATIC"); |
@@ -401,7 +401,7 @@ discard block |
||
401 | 401 | var formData = new FormData($('#live_form')[0]); |
402 | 402 | <?php |
403 | 403 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
404 | - print " |
|
404 | + print " |
|
405 | 405 | $(\"#live_src".$hostindex."_img\").attr('src',icon_loading); |
406 | 406 | $(\"#live_src".$hostindex."_img\").show(); |
407 | 407 | $.ajax({ |
@@ -438,7 +438,7 @@ discard block |
||
438 | 438 | else |
439 | 439 | $extraarg = ""; |
440 | 440 | |
441 | - print " |
|
441 | + print " |
|
442 | 442 | $(\"#src".$hostindex."_img\").attr('src',icon_loading); |
443 | 443 | $(\"#src$hostindex\").html(''); |
444 | 444 | running_ajax_stat++; |
@@ -480,89 +480,89 @@ discard block |
||
480 | 480 | <strong><?php echo _("Overview") ?></strong> |
481 | 481 | </legend> |
482 | 482 | <?php |
483 | - // NAPTR existence check |
|
484 | - echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
485 | - $naptr = $testsuite->NAPTR(); |
|
486 | - if ($naptr != RETVAL_NOTCONFIGURED) { |
|
487 | - echo "<table>"; |
|
488 | - // output in friendly words |
|
489 | - echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>"; |
|
490 | - switch ($naptr) { |
|
491 | - case RETVAL_NONAPTR: |
|
483 | + // NAPTR existence check |
|
484 | + echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
485 | + $naptr = $testsuite->NAPTR(); |
|
486 | + if ($naptr != RETVAL_NOTCONFIGURED) { |
|
487 | + echo "<table>"; |
|
488 | + // output in friendly words |
|
489 | + echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>"; |
|
490 | + switch ($naptr) { |
|
491 | + case RETVAL_NONAPTR: |
|
492 | 492 | echo _("This realm has no NAPTR records."); |
493 | 493 | break; |
494 | - case RETVAL_ONLYUNRELATEDNAPTR: |
|
494 | + case RETVAL_ONLYUNRELATEDNAPTR: |
|
495 | 495 | printf(_("This realm has NAPTR records, but none are associated with %s."), Config::$CONSORTIUM['name']); |
496 | 496 | break; |
497 | - default: // if none of the possible negative retvals, then we have matching NAPTRs |
|
497 | + default: // if none of the possible negative retvals, then we have matching NAPTRs |
|
498 | 498 | printf(_("This realm has %d %s NAPTR records."), $naptr, Config::$CONSORTIUM['name']); |
499 | - } |
|
500 | - echo "</td></tr>"; |
|
499 | + } |
|
500 | + echo "</td></tr>"; |
|
501 | 501 | |
502 | - // compliance checks for NAPTRs |
|
502 | + // compliance checks for NAPTRs |
|
503 | 503 | |
504 | - if ($naptr > 0) { |
|
505 | - echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>"; |
|
506 | - $naptr_valid = $testsuite->NAPTR_compliance(); |
|
507 | - switch ($naptr_valid) { |
|
508 | - case RETVAL_OK: |
|
504 | + if ($naptr > 0) { |
|
505 | + echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>"; |
|
506 | + $naptr_valid = $testsuite->NAPTR_compliance(); |
|
507 | + switch ($naptr_valid) { |
|
508 | + case RETVAL_OK: |
|
509 | 509 | echo _("No issues found."); |
510 | 510 | break; |
511 | - case RETVAL_INVALID: |
|
511 | + case RETVAL_INVALID: |
|
512 | 512 | printf(_("At least one NAPTR with invalid content found!")); |
513 | 513 | break; |
514 | - } |
|
515 | - echo "</td></tr>"; |
|
514 | + } |
|
515 | + echo "</td></tr>"; |
|
516 | 516 | } |
517 | 517 | |
518 | 518 | // SRV resolution |
519 | 519 | |
520 | 520 | if ($naptr > 0 && $naptr_valid == RETVAL_OK) { |
521 | - $srv = $testsuite->NAPTR_SRV(); |
|
522 | - echo "<tr><td>" . _("Checking SRVs:") . "</td><td>"; |
|
523 | - switch ($srv) { |
|
524 | - case RETVAL_SKIPPED: |
|
521 | + $srv = $testsuite->NAPTR_SRV(); |
|
522 | + echo "<tr><td>" . _("Checking SRVs:") . "</td><td>"; |
|
523 | + switch ($srv) { |
|
524 | + case RETVAL_SKIPPED: |
|
525 | 525 | echo _("This check was skipped."); |
526 | - break; |
|
527 | - case RETVAL_INVALID: |
|
526 | + break; |
|
527 | + case RETVAL_INVALID: |
|
528 | 528 | printf(_("At least one NAPTR with invalid content found!")); |
529 | - break; |
|
530 | - default: // print number of successfully retrieved SRV targets |
|
529 | + break; |
|
530 | + default: // print number of successfully retrieved SRV targets |
|
531 | 531 | printf(_("%d host names discovered."), $srv); |
532 | - } |
|
533 | - echo "</td></tr>"; |
|
532 | + } |
|
533 | + echo "</td></tr>"; |
|
534 | 534 | } |
535 | 535 | // IP addresses for the hosts |
536 | 536 | if ($naptr > 0 && $naptr_valid == RETVAL_OK && $srv > 0) { |
537 | - $hosts = $testsuite->NAPTR_hostnames(); |
|
538 | - echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>"; |
|
539 | - switch ($srv) { |
|
540 | - case RETVAL_SKIPPED: |
|
537 | + $hosts = $testsuite->NAPTR_hostnames(); |
|
538 | + echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>"; |
|
539 | + switch ($srv) { |
|
540 | + case RETVAL_SKIPPED: |
|
541 | 541 | echo _("This check was skipped."); |
542 | - break; |
|
543 | - case RETVAL_INVALID: |
|
542 | + break; |
|
543 | + case RETVAL_INVALID: |
|
544 | 544 | printf(_("At least one hostname could not be resolved!")); |
545 | - break; |
|
546 | - default: // print number of successfully retrieved SRV targets |
|
545 | + break; |
|
546 | + default: // print number of successfully retrieved SRV targets |
|
547 | 547 | printf(_("%d IP addresses resolved."), $hosts); |
548 | - } |
|
549 | - echo "</td></tr>"; |
|
548 | + } |
|
549 | + echo "</td></tr>"; |
|
550 | 550 | } |
551 | 551 | |
552 | 552 | echo "</table><table>"; |
553 | - if (count($testsuite->listerrors()) == 0) { |
|
553 | + if (count($testsuite->listerrors()) == 0) { |
|
554 | 554 | echo UI_message(L_OK,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
555 | 555 | echo "</table>"; |
556 | - } else { |
|
556 | + } else { |
|
557 | 557 | echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
558 | 558 | echo "</table><div class='notacceptable'><table>"; |
559 | 559 | foreach ($testsuite->listerrors() as $details) |
560 | - echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
560 | + echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
561 | 561 | echo "</table></div>"; |
562 | - } |
|
563 | - echo '</div>'; |
|
562 | + } |
|
563 | + echo '</div>'; |
|
564 | 564 | |
565 | - echo '<script type="text/javascript"> |
|
565 | + echo '<script type="text/javascript"> |
|
566 | 566 | function run_dynamic() { |
567 | 567 | running_ajax_dyn = 0; |
568 | 568 | $("#main_dynamic_ico").attr("src",icon_loading); |
@@ -571,37 +571,37 @@ discard block |
||
571 | 571 | global_level_dyn = L_OK; |
572 | 572 | $("#dynamic_tests").show(); |
573 | 573 | '; |
574 | - foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
575 | - $host = ''; |
|
576 | - if ($addr['family'] == "IPv6") $host .= '['; |
|
577 | - $host .= $addr['IP']; |
|
578 | - if ($addr['family'] == "IPv6") $host .= ']'; |
|
579 | - $host .= ':' . $addr['port']; |
|
574 | + foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
575 | + $host = ''; |
|
576 | + if ($addr['family'] == "IPv6") $host .= '['; |
|
577 | + $host .= $addr['IP']; |
|
578 | + if ($addr['family'] == "IPv6") $host .= ']'; |
|
579 | + $host .= ':' . $addr['port']; |
|
580 | 580 | /*if($addr['family'] == "IPv6") |
581 | 581 | continue;*/ |
582 | - print " |
|
582 | + print " |
|
583 | 583 | running_ajax_dyn++; |
584 | 584 | $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
585 | 585 | running_ajax_dyn++; |
586 | 586 | $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
587 | 587 | "; |
588 | - } |
|
589 | - echo "} |
|
588 | + } |
|
589 | + echo "} |
|
590 | 590 | </script><hr>"; |
591 | 591 | |
592 | - } else { |
|
593 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
594 | - } |
|
595 | - echo "<strong>"._("Static connectivity tests")."</strong> |
|
592 | + } else { |
|
593 | + echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
594 | + } |
|
595 | + echo "<strong>"._("Static connectivity tests")."</strong> |
|
596 | 596 | <table><tr> |
597 | 597 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
598 | 598 | </tr></table>"; |
599 | - if($naptr > 0) { |
|
600 | - echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
599 | + if($naptr > 0) { |
|
600 | + echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
601 | 601 | <table><tr> |
602 | 602 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
603 | 603 | </tr></table>"; |
604 | - } |
|
604 | + } |
|
605 | 605 | ?> |
606 | 606 | |
607 | 607 | </fieldset> |
@@ -613,11 +613,11 @@ discard block |
||
613 | 613 | <fieldset class="option_container" id="static_tests"> |
614 | 614 | <legend><strong> <?php echo _("STATIC connectivity tests");?> </strong> </legend> |
615 | 615 | <?php |
616 | - echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']); |
|
616 | + echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']); |
|
617 | 617 | print "<p>"; |
618 | 618 | |
619 | 619 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
620 | - print "<hr>"; |
|
620 | + print "<hr>"; |
|
621 | 621 | printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
622 | 622 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
623 | 623 | <tr> |
@@ -637,28 +637,28 @@ discard block |
||
637 | 637 | </div> |
638 | 638 | |
639 | 639 | <?php |
640 | - if ($naptr > 0) { |
|
640 | + if ($naptr > 0) { |
|
641 | 641 | ?> |
642 | 642 | <div id="tabs-3"> |
643 | 643 | <button id="run_d_tests" onclick="run_dynamic()"><?php echo _("Repeat dynamic connectivity tests") ?></button> |
644 | 644 | |
645 | 645 | <?php |
646 | - echo "<div id='dynamic_tests'><fieldset class='option_container'> |
|
646 | + echo "<div id='dynamic_tests'><fieldset class='option_container'> |
|
647 | 647 | <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>"; |
648 | 648 | |
649 | - $resultstoprint = []; |
|
650 | - if (count($testsuite->NAPTR_hostname_records)>0) { |
|
651 | - $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>'; |
|
652 | - $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
|
653 | - foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
649 | + $resultstoprint = []; |
|
650 | + if (count($testsuite->NAPTR_hostname_records)>0) { |
|
651 | + $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>'; |
|
652 | + $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
|
653 | + foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
654 | 654 | /* if ($addr['family'] == "IPv6") { |
655 | 655 | $resultstoprint[] = '<strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . "</strong><ul style='list-style-type: none;'><li>" . _('Due to OpenSSL limitations, it is not possible to check IPv6 addresses at this time.') . '</li></ul>'; |
656 | 656 | continue; |
657 | 657 | }*/ |
658 | - $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]); |
|
659 | - $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong>'; |
|
660 | - $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
|
661 | - $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
|
658 | + $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]); |
|
659 | + $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong>'; |
|
660 | + $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
|
661 | + $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
|
662 | 662 | <tr> |
663 | 663 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td> |
664 | 664 | <td id='srcca$hostindex'> |
@@ -666,17 +666,17 @@ discard block |
||
666 | 666 | </td> |
667 | 667 | </tr> |
668 | 668 | </table>"; |
669 | - $resultstoprint[] = '</li></ul>'; |
|
670 | - } |
|
671 | - $clientstest = []; |
|
672 | - foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
673 | - //$clientsres = $testsuite->TLS_client_side_tests(); |
|
669 | + $resultstoprint[] = '</li></ul>'; |
|
670 | + } |
|
671 | + $clientstest = []; |
|
672 | + foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
|
673 | + //$clientsres = $testsuite->TLS_client_side_tests(); |
|
674 | 674 | /* if ($addr['family'] == 'IPv6') { |
675 | 675 | $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p>' . "<ul style='list-style-type: none;'><li>" . _('Due to OpenSSL limitations, it is not possible to check IPv6 addresses at this time.') . '</li></ul>'; |
676 | 676 | continue; |
677 | 677 | }*/ |
678 | - $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
|
679 | - $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
|
678 | + $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
|
679 | + $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
|
680 | 680 | <tr> |
681 | 681 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td> |
682 | 682 | <td id='srcclient$hostindex'> |
@@ -684,29 +684,29 @@ discard block |
||
684 | 684 | </td> |
685 | 685 | </tr> |
686 | 686 | </table></span>"; |
687 | - $clientstest[] = '</ol>'; |
|
688 | - } |
|
689 | - echo '<div style="align:right;">'; |
|
690 | - echo join('',$resultstoprint); |
|
691 | - echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | - print join('',$clientstest); |
|
693 | - echo '</span>'; |
|
694 | - echo '</div>'; |
|
695 | - } |
|
696 | - echo "</fieldset></div></div>"; |
|
697 | - } |
|
698 | - // further checks TBD: |
|
699 | - // check if accepts certificates from all accredited CAs |
|
700 | - // check if doesn't accept revoked certificates |
|
701 | - // check if RADIUS request gets rejected timely |
|
702 | - // check if truncates/dies on Operator-Name |
|
703 | - if ($check_thorough) { |
|
704 | - echo "<div id='tabs-4'><fieldset class='option_container'> |
|
687 | + $clientstest[] = '</ol>'; |
|
688 | + } |
|
689 | + echo '<div style="align:right;">'; |
|
690 | + echo join('',$resultstoprint); |
|
691 | + echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | + print join('',$clientstest); |
|
693 | + echo '</span>'; |
|
694 | + echo '</div>'; |
|
695 | + } |
|
696 | + echo "</fieldset></div></div>"; |
|
697 | + } |
|
698 | + // further checks TBD: |
|
699 | + // check if accepts certificates from all accredited CAs |
|
700 | + // check if doesn't accept revoked certificates |
|
701 | + // check if RADIUS request gets rejected timely |
|
702 | + // check if truncates/dies on Operator-Name |
|
703 | + if ($check_thorough) { |
|
704 | + echo "<div id='tabs-4'><fieldset class='option_container'> |
|
705 | 705 | <legend><strong>" . _("Live login test") . "</strong></legend>"; |
706 | - $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1); |
|
707 | - if (count($prof_compl) > 0) { |
|
706 | + $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1); |
|
707 | + if (count($prof_compl) > 0) { |
|
708 | 708 | |
709 | - echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p> |
|
709 | + echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p> |
|
710 | 710 | <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.") . "</p> |
711 | 711 | <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
712 | 712 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
@@ -715,44 +715,44 @@ discard block |
||
715 | 715 | <input type='hidden' name='profile_id' value='".$my_profile->identifier."'> |
716 | 716 | <table id='live_tests'>"; |
717 | 717 | // if any password based EAP methods are available enable this section |
718 | - if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) || |
|
718 | + if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) || |
|
719 | 719 | in_array(EAP::$TTLS_MSCHAP2, $prof_compl) || |
720 | 720 | in_array(EAP::$TTLS_GTC, $prof_compl) || |
721 | 721 | in_array(EAP::$FAST_GTC, $prof_compl) || |
722 | 722 | in_array(EAP::$PWD, $prof_compl) || |
723 | 723 | in_array(EAP::$TTLS_PAP, $prof_compl) |
724 | - ) { |
|
725 | - echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr> |
|
724 | + ) { |
|
725 | + echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr> |
|
726 | 726 | <tr><td>" . _("Real (inner) username:") . "</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
727 | - echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
728 | - echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
729 | - } |
|
730 | - // ask for cert + privkey if TLS-based method is active |
|
731 | - if (in_array(EAP::$TLS, $prof_compl)) |
|
732 | - echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
727 | + echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
728 | + echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
729 | + } |
|
730 | + // ask for cert + privkey if TLS-based method is active |
|
731 | + if (in_array(EAP::$TLS, $prof_compl)) |
|
732 | + echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
733 | 733 | <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
734 | 734 | <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
735 | 735 | <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
736 | - echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
|
737 | - echo "<div id='live_login_results' style='display:none'>"; |
|
738 | - foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
|
736 | + echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
|
737 | + echo "<div id='live_login_results' style='display:none'>"; |
|
738 | + foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
|
739 | 739 | print "<hr>"; |
740 | - printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
741 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
740 | + printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
741 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
742 | 742 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
743 | 743 | } |
744 | - echo "</div>"; |
|
744 | + echo "</div>"; |
|
745 | 745 | |
746 | - } else {// no EAP methods fully defined |
|
747 | - echo "Live Login Checks require at least one fully configured EAP type."; |
|
748 | - } |
|
749 | - echo "</fieldset></div>"; |
|
750 | - } |
|
746 | + } else {// no EAP methods fully defined |
|
747 | + echo "Live Login Checks require at least one fully configured EAP type."; |
|
748 | + } |
|
749 | + echo "</fieldset></div>"; |
|
750 | + } |
|
751 | 751 | echo " |
752 | 752 | </div> |
753 | 753 | "; |
754 | 754 | } |
755 | - ?> |
|
755 | + ?> |
|
756 | 756 | <form method='post' action='overview_idp.php?inst_id=<?php echo $my_inst->identifier; ?>' accept-charset='UTF-8'> |
757 | 757 | <button type='submit' name='submitbutton' value='<?php echo BUTTON_CLOSE; ?>'><?php echo _("Return to dashboard"); ?></button> |
758 | 758 | </form> |
@@ -763,11 +763,11 @@ discard block |
||
763 | 763 | run_udp(); |
764 | 764 | <?php |
765 | 765 | if ($naptr > 0) |
766 | - echo "run_dynamic();"; |
|
766 | + echo "run_dynamic();"; |
|
767 | 767 | else |
768 | - echo '$("#tabs-d-li").hide();'; |
|
768 | + echo '$("#tabs-d-li").hide();'; |
|
769 | 769 | if (!$check_thorough) |
770 | - echo '$("#tabs-through").hide();'; |
|
770 | + echo '$("#tabs-through").hide();'; |
|
771 | 771 | ?> |
772 | 772 | </script> |
773 | 773 | <?php footer() ?> |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | |
21 | 21 | $cat = defaultPagePrelude(_("Sanity check for dynamic discovery of realms")); |
22 | 22 | $check_thorough = FALSE; |
23 | -$error_message =''; |
|
23 | +$error_message = ''; |
|
24 | 24 | $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']); |
25 | 25 | |
26 | 26 | if (isset($_GET['profile_id'])) |
@@ -38,17 +38,17 @@ discard block |
||
38 | 38 | $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
39 | 39 | } |
40 | 40 | } else { // someone else's realm... only shallow checks |
41 | - if(!empty($_REQUEST['realm'])) { |
|
42 | - if($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
41 | + if (!empty($_REQUEST['realm'])) { |
|
42 | + if ($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
43 | 43 | $_SESSION['check_realm'] = $check_realm; |
44 | 44 | } |
45 | 45 | } else { |
46 | - if(!empty($_SESSION['check_realm'])) |
|
46 | + if (!empty($_SESSION['check_realm'])) |
|
47 | 47 | $check_realm = $_SESSION['check_realm']; |
48 | 48 | else |
49 | 49 | $check_realm = FALSE; |
50 | 50 | } |
51 | - if($check_realm) |
|
51 | + if ($check_realm) |
|
52 | 52 | $testsuite = new RADIUSTests($check_realm); |
53 | 53 | else |
54 | 54 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | } |
227 | 227 | } |
228 | 228 | cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] +'" style="width: 24px;"></td><td>' + state; |
229 | - cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."),"'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
229 | + cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
230 | 230 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
231 | 231 | if (data.ca[key].certificate[c].finalerror==1) { |
232 | 232 | cliinfo = cliinfo + '<li>' + restskipped + '</li>'; |
@@ -316,7 +316,7 @@ discard block |
||
316 | 316 | var v = data.result[0]; |
317 | 317 | $("#src"+data.hostindex+"_img").attr('src',icons[v.level]); |
318 | 318 | if(v.server != 0 ) { |
319 | - $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
319 | + $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
320 | 320 | var cert_data = "<tr class='server_cert'><td> </td><td colspan=2><div><dl class='server_cert_list'>"; |
321 | 321 | $.each(server_cert, function(l,s) { |
322 | 322 | cert_data = cert_data + "<dt>" + s + "</dt><dd>"+ v.server_cert[l] + "</dd>"; |
@@ -339,7 +339,7 @@ discard block |
||
339 | 339 | } |
340 | 340 | $("#src"+data.hostindex).append(cert_data); |
341 | 341 | } else { |
342 | - $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
342 | + $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
343 | 343 | } |
344 | 344 | global_level_udp = Math.max(global_level_udp,v.level); |
345 | 345 | $(".server_cert").show(); |
@@ -391,7 +391,7 @@ discard block |
||
391 | 391 | }); |
392 | 392 | } |
393 | 393 | o = o + cert_data+'</table>'; |
394 | - $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
394 | + $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
395 | 395 | }); |
396 | 396 | } |
397 | 397 | |
@@ -402,8 +402,8 @@ discard block |
||
402 | 402 | <?php |
403 | 403 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
404 | 404 | print " |
405 | -$(\"#live_src".$hostindex."_img\").attr('src',icon_loading); |
|
406 | -$(\"#live_src".$hostindex."_img\").show(); |
|
405 | +$(\"#live_src".$hostindex . "_img\").attr('src',icon_loading); |
|
406 | +$(\"#live_src".$hostindex . "_img\").show(); |
|
407 | 407 | $.ajax({ |
408 | 408 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
409 | 409 | type: 'POST', |
@@ -434,15 +434,15 @@ discard block |
||
434 | 434 | <?php |
435 | 435 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
436 | 436 | if ($check_thorough) |
437 | - $extraarg = "profile_id: ".$my_profile->identifier.", "; |
|
437 | + $extraarg = "profile_id: " . $my_profile->identifier . ", "; |
|
438 | 438 | else |
439 | 439 | $extraarg = ""; |
440 | 440 | |
441 | 441 | print " |
442 | -$(\"#src".$hostindex."_img\").attr('src',icon_loading); |
|
442 | +$(\"#src".$hostindex . "_img\").attr('src',icon_loading); |
|
443 | 443 | $(\"#src$hostindex\").html(''); |
444 | 444 | running_ajax_stat++; |
445 | -$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, udp, 'json'); |
|
445 | +$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, udp, 'json'); |
|
446 | 446 | |
447 | 447 | "; |
448 | 448 | } |
@@ -461,8 +461,8 @@ discard block |
||
461 | 461 | </script> |
462 | 462 | <?php |
463 | 463 | productheader("ADMIN", CAT::get_lang()); |
464 | - print "<h1>".sprintf(_("Realm testing for: %s"),$check_realm)."</h1>\n"; |
|
465 | - if($error_message) { |
|
464 | + print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
465 | + if ($error_message) { |
|
466 | 466 | print "<p>$error_message</p>"; |
467 | 467 | } else { |
468 | 468 | ?> |
@@ -481,7 +481,7 @@ discard block |
||
481 | 481 | </legend> |
482 | 482 | <?php |
483 | 483 | // NAPTR existence check |
484 | - echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
484 | + echo "<strong>" . _("DNS chekcs") . "</strong><div>"; |
|
485 | 485 | $naptr = $testsuite->NAPTR(); |
486 | 486 | if ($naptr != RETVAL_NOTCONFIGURED) { |
487 | 487 | echo "<table>"; |
@@ -551,10 +551,10 @@ discard block |
||
551 | 551 | |
552 | 552 | echo "</table><table>"; |
553 | 553 | if (count($testsuite->listerrors()) == 0) { |
554 | - echo UI_message(L_OK,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
554 | + echo UI_message(L_OK, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
555 | 555 | echo "</table>"; |
556 | 556 | } else { |
557 | - echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
557 | + echo UI_message(L_ERROR, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
558 | 558 | echo "</table><div class='notacceptable'><table>"; |
559 | 559 | foreach ($testsuite->listerrors() as $details) |
560 | 560 | echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
@@ -581,9 +581,9 @@ discard block |
||
581 | 581 | continue;*/ |
582 | 582 | print " |
583 | 583 | running_ajax_dyn++; |
584 | - $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
584 | + $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
585 | 585 | running_ajax_dyn++; |
586 | - $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
586 | + $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
587 | 587 | "; |
588 | 588 | } |
589 | 589 | echo "} |
@@ -592,12 +592,12 @@ discard block |
||
592 | 592 | } else { |
593 | 593 | echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
594 | 594 | } |
595 | - echo "<strong>"._("Static connectivity tests")."</strong> |
|
595 | + echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
596 | 596 | <table><tr> |
597 | 597 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
598 | 598 | </tr></table>"; |
599 | - if($naptr > 0) { |
|
600 | - echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
599 | + if ($naptr > 0) { |
|
600 | + echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
601 | 601 | <table><tr> |
602 | 602 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
603 | 603 | </tr></table>"; |
@@ -611,19 +611,19 @@ discard block |
||
611 | 611 | <button id="run_s_tests" onclick="run_udp()"><?php echo _("Repeat static connectivity tests") ?></button> |
612 | 612 | <p> |
613 | 613 | <fieldset class="option_container" id="static_tests"> |
614 | - <legend><strong> <?php echo _("STATIC connectivity tests");?> </strong> </legend> |
|
614 | + <legend><strong> <?php echo _("STATIC connectivity tests"); ?> </strong> </legend> |
|
615 | 615 | <?php |
616 | 616 | echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']); |
617 | 617 | print "<p>"; |
618 | 618 | |
619 | 619 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
620 | 620 | print "<hr>"; |
621 | -printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
621 | +printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
622 | 622 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
623 | 623 | <tr> |
624 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
624 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
625 | 625 | <td id='src$hostindex' colspan=2> |
626 | -"._("testing...")." |
|
626 | +" . _("testing...") . " |
|
627 | 627 | </td> |
628 | 628 | </tr>" . |
629 | 629 | //server_cert('udp-'.$hostindex) . |
@@ -647,8 +647,8 @@ discard block |
||
647 | 647 | <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>"; |
648 | 648 | |
649 | 649 | $resultstoprint = []; |
650 | - if (count($testsuite->NAPTR_hostname_records)>0) { |
|
651 | - $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>'; |
|
650 | + if (count($testsuite->NAPTR_hostname_records) > 0) { |
|
651 | + $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR, _("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK, _("All tests passed, congratulations!")) . '</table>'; |
|
652 | 652 | $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
653 | 653 | foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
654 | 654 | /* if ($addr['family'] == "IPv6") { |
@@ -660,9 +660,9 @@ discard block |
||
660 | 660 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
661 | 661 | $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
662 | 662 | <tr> |
663 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td> |
|
663 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca" . $hostindex . "_img'></td> |
|
664 | 664 | <td id='srcca$hostindex'> |
665 | -"._("testing...")." |
|
665 | +" . _("testing...") . " |
|
666 | 666 | </td> |
667 | 667 | </tr> |
668 | 668 | </table>"; |
@@ -678,18 +678,18 @@ discard block |
||
678 | 678 | $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
679 | 679 | $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
680 | 680 | <tr> |
681 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td> |
|
681 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient" . $hostindex . "_img'></td> |
|
682 | 682 | <td id='srcclient$hostindex'> |
683 | -"._("testing...")." |
|
683 | +" . _("testing...") . " |
|
684 | 684 | </td> |
685 | 685 | </tr> |
686 | 686 | </table></span>"; |
687 | 687 | $clientstest[] = '</ol>'; |
688 | 688 | } |
689 | 689 | echo '<div style="align:right;">'; |
690 | - echo join('',$resultstoprint); |
|
691 | - echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | - print join('',$clientstest); |
|
690 | + echo join('', $resultstoprint); |
|
691 | + echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | + print join('', $clientstest); |
|
693 | 693 | echo '</span>'; |
694 | 694 | echo '</div>'; |
695 | 695 | } |
@@ -711,8 +711,8 @@ discard block |
||
711 | 711 | <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
712 | 712 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
713 | 713 | <input type='hidden' name='test_type' value='udp_login'> |
714 | - <input type='hidden' name='lang' value='".CAT::get_lang()."'> |
|
715 | - <input type='hidden' name='profile_id' value='".$my_profile->identifier."'> |
|
714 | + <input type='hidden' name='lang' value='".CAT::get_lang() . "'> |
|
715 | + <input type='hidden' name='profile_id' value='".$my_profile->identifier . "'> |
|
716 | 716 | <table id='live_tests'>"; |
717 | 717 | // if any password based EAP methods are available enable this section |
718 | 718 | if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) || |
@@ -737,8 +737,8 @@ discard block |
||
737 | 737 | echo "<div id='live_login_results' style='display:none'>"; |
738 | 738 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
739 | 739 | print "<hr>"; |
740 | - printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
741 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
740 | + printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
741 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
742 | 742 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
743 | 743 | } |
744 | 744 | echo "</div>"; |
@@ -18,7 +18,7 @@ discard block |
||
18 | 18 | require_once("../resources/inc/header.php"); |
19 | 19 | require_once("../resources/inc/footer.php"); |
20 | 20 | |
21 | -function profilechecks(IdP $idpinfo,Profile $profile) { |
|
21 | +function profilechecks(IdP $idpinfo, Profile $profile) { |
|
22 | 22 | |
23 | 23 | $tabletext = "<tr><td>" . $idpinfo->name . "</td><td>" . $profile->name . "</td>"; |
24 | 24 | |
@@ -30,12 +30,12 @@ discard block |
||
30 | 30 | // update database with the findings |
31 | 31 | |
32 | 32 | DBConnection::exec("INST", "UPDATE profile SET " |
33 | - . "status_dns = ".RETVAL_SKIPPED.", " |
|
34 | - . "status_cert = ".RETVAL_SKIPPED.", " |
|
35 | - . "status_reachability = ". RETVAL_SKIPPED.", " |
|
36 | - . "status_TLS = ".RETVAL_SKIPPED.", " |
|
33 | + . "status_dns = " . RETVAL_SKIPPED . ", " |
|
34 | + . "status_cert = " . RETVAL_SKIPPED . ", " |
|
35 | + . "status_reachability = " . RETVAL_SKIPPED . ", " |
|
36 | + . "status_TLS = " . RETVAL_SKIPPED . ", " |
|
37 | 37 | . "last_status_check = NOW() " |
38 | - . "WHERE profile_id = ".$profile->identifier); |
|
38 | + . "WHERE profile_id = " . $profile->identifier); |
|
39 | 39 | |
40 | 40 | return $tabletext; |
41 | 41 | } |
@@ -82,9 +82,9 @@ discard block |
||
82 | 82 | } |
83 | 83 | |
84 | 84 | if ($NAPTR_issues) { |
85 | - $tabletext .= UI_error(0,0,true); |
|
85 | + $tabletext .= UI_error(0, 0, true); |
|
86 | 86 | } else { |
87 | - $tabletext .= UI_okay(0,0,true); |
|
87 | + $tabletext .= UI_okay(0, 0, true); |
|
88 | 88 | } |
89 | 89 | |
90 | 90 | $UDP_errors = false; |
@@ -106,13 +106,13 @@ discard block |
||
106 | 106 | } |
107 | 107 | |
108 | 108 | $tabletext .= "</td><td>"; |
109 | - $tabletext .= UI_message($cert_biggest_oddity,0,0,true); |
|
109 | + $tabletext .= UI_message($cert_biggest_oddity, 0, 0, true); |
|
110 | 110 | |
111 | 111 | $tabletext .= "</td><td>"; |
112 | 112 | if (!$UDP_errors) { |
113 | - $tabletext .= UI_okay(0,0,true); |
|
113 | + $tabletext .= UI_okay(0, 0, true); |
|
114 | 114 | } else { |
115 | - $tabletext .= UI_error(0,0,true); |
|
115 | + $tabletext .= UI_error(0, 0, true); |
|
116 | 116 | } |
117 | 117 | |
118 | 118 | $tabletext .= "</td><td>"; |
@@ -127,19 +127,19 @@ discard block |
||
127 | 127 | } |
128 | 128 | } |
129 | 129 | if (!$dynamic_errors) { |
130 | - $tabletext .= UI_okay(0,0,true); |
|
130 | + $tabletext .= UI_okay(0, 0, true); |
|
131 | 131 | } else { |
132 | - $tabletext .= UI_error(0,0,true); |
|
132 | + $tabletext .= UI_error(0, 0, true); |
|
133 | 133 | } |
134 | 134 | $tabletext .= "</td></tr>"; |
135 | 135 | |
136 | 136 | DBConnection::exec("INST", "UPDATE profile SET " |
137 | - . "status_dns = ".($NAPTR_issues ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
138 | - . "status_cert = ".($cert_biggest_oddity) . ", " |
|
139 | - . "status_reachability = ".($UDP_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
140 | - . "status_TLS = ".($dynamic_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
137 | + . "status_dns = " . ($NAPTR_issues ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
138 | + . "status_cert = " . ($cert_biggest_oddity) . ", " |
|
139 | + . "status_reachability = " . ($UDP_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
140 | + . "status_TLS = " . ($dynamic_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
141 | 141 | . "last_status_check = NOW() " |
142 | - . "WHERE profile_id = ".$profile->identifier); |
|
142 | + . "WHERE profile_id = " . $profile->identifier); |
|
143 | 143 | |
144 | 144 | return $tabletext; |
145 | 145 | } |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | echo "<h2>" . _("Profiles marked as visible (V)") . "</h2>" . "<table>"; |
178 | 178 | echo rowdescription(); |
179 | 179 | foreach ($profiles_showtime as $oneprofile) |
180 | - echo profilechecks($oneprofile['idp'],$oneprofile['profile']); |
|
180 | + echo profilechecks($oneprofile['idp'], $oneprofile['profile']); |
|
181 | 181 | echo "</table>"; |
182 | 182 | } |
183 | 183 | |
@@ -185,7 +185,7 @@ discard block |
||
185 | 185 | echo "<h2>" . _("Profiles with sufficient configuration, not marked as visible (C)") . "</h2>" . "<table>"; |
186 | 186 | echo rowdescription(); |
187 | 187 | foreach ($profiles_confready as $oneprofile) |
188 | - echo profilechecks($oneprofile['idp'],$oneprofile['profile']); |
|
188 | + echo profilechecks($oneprofile['idp'], $oneprofile['profile']); |
|
189 | 189 | echo "</table>"; |
190 | 190 | } |
191 | 191 | ?> |