Test Failed
Push — release_2_1 ( 3f8229...a38cec )
by Tomasz
34:27 queued 23:52
created
web/admin/action_enrollment.php 2 patches
Switch Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -49,15 +49,15 @@
 block discarded – undo
49 49
 }
50 50
 
51 51
 switch ($_GET['token']) {
52
-    case "SELF-REGISTER":
53
-        $token = "SELF-REGISTER";
54
-        $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW;
55
-        $federation = \config\ConfAssistant::CONSORTIUM['selfservice_registration'];
56
-        break;
57
-    default:
58
-        $tokenUnfiltered = $validator->token(filter_input(INPUT_GET,'token'));
59
-        $token = htmlspecialchars(strip_tags($tokenUnfiltered));
60
-        $checkval = $usermgmt->checkTokenValidity($token);
52
+        case "SELF-REGISTER":
53
+            $token = "SELF-REGISTER";
54
+            $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW;
55
+            $federation = \config\ConfAssistant::CONSORTIUM['selfservice_registration'];
56
+            break;
57
+        default:
58
+            $tokenUnfiltered = $validator->token(filter_input(INPUT_GET,'token'));
59
+            $token = htmlspecialchars(strip_tags($tokenUnfiltered));
60
+            $checkval = $usermgmt->checkTokenValidity($token);
61 61
 }
62 62
 
63 63
 if ($checkval < 0) {
Please login to merge, or discard this patch.
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -30,7 +30,7 @@  discard block
 block discarded – undo
30 30
 ?>
31 31
 <?php
32 32
 
33
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
33
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
34 34
 
35 35
 $auth = new \web\lib\admin\Authentication();
36 36
 $deco = new \web\lib\admin\PageDecoration();
@@ -41,11 +41,11 @@  discard block
 block discarded – undo
41 41
 $auth->authenticate();
42 42
 
43 43
 if (!isset($_GET['token'])) {
44
-    $elements->errorPage(_("Error creating new IdP binding!"),_("This page needs to be called with a valid invitation token!"));
44
+    $elements->errorPage(_("Error creating new IdP binding!"), _("This page needs to be called with a valid invitation token!"));
45 45
 }
46 46
 
47 47
 if (\config\ConfAssistant::CONSORTIUM['selfservice_registration'] === NULL && $_GET['token'] == "SELF-REGISTER") {
48
-    $elements->errorPage(_("Error creating new IdP binding!"),_("You tried to register in self-service, but this deployment does not allow self-service!"));
48
+    $elements->errorPage(_("Error creating new IdP binding!"), _("You tried to register in self-service, but this deployment does not allow self-service!"));
49 49
 }
50 50
 
51 51
 switch ($_GET['token']) {
@@ -55,23 +55,23 @@  discard block
 block discarded – undo
55 55
         $federation = \config\ConfAssistant::CONSORTIUM['selfservice_registration'];
56 56
         break;
57 57
     default:
58
-        $tokenUnfiltered = $validator->token(filter_input(INPUT_GET,'token'));
58
+        $tokenUnfiltered = $validator->token(filter_input(INPUT_GET, 'token'));
59 59
         $token = htmlspecialchars(strip_tags($tokenUnfiltered));
60 60
         $checkval = $usermgmt->checkTokenValidity($token);
61 61
 }
62 62
 
63 63
 if ($checkval < 0) {
64 64
     echo $deco->pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP");
65
-    echo "<h1>" . _("Error creating new IdP binding!") . "</h1>";
65
+    echo "<h1>"._("Error creating new IdP binding!")."</h1>";
66 66
     switch ($checkval) {
67 67
         case \core\UserManagement::TOKENSTATUS_FAIL_ALREADYCONSUMED:
68
-            echo "<p>" . sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureParticipant) . "</p>";
68
+            echo "<p>".sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureParticipant)."</p>";
69 69
             break;
70 70
         case \core\UserManagement::TOKENSTATUS_FAIL_EXPIRED:
71
-            echo "<p>" . sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed) . "</p>";
71
+            echo "<p>".sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed)."</p>";
72 72
             break;
73 73
         default:
74
-            echo "<p>" . _("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.") . "</p>";
74
+            echo "<p>"._("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.")."</p>";
75 75
     }
76 76
     echo $deco->footer();
77 77
     throw new Exception("Terminating because something is wrong with the token we received.");
@@ -86,12 +86,12 @@  discard block
 block discarded – undo
86 86
     case "SELF-REGISTER":
87 87
         $fed = new \core\Federation($federation);
88 88
         $newidp = new \core\IdP($fed->newIdP(core\IdP::TYPE_IDPSP, $user, "FED", "SELFSERVICE"));
89
-        $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - selfservice registration");
89
+        $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - selfservice registration");
90 90
         break;
91 91
     default:
92 92
         $newidp = $usermgmt->createIdPFromToken($token, $user);
93 93
         $usermgmt->invalidateToken($token);
94
-        $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated");
94
+        $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - Token used and invalidated");
95 95
         break;
96 96
 }
97 97
 
Please login to merge, or discard this patch.
core/CertificationAuthorityEduPkiServer.php 1 patch
Spacing   +42 added lines, -42 removed lines patch added patch discarded remove patch
@@ -35,10 +35,10 @@  discard block
 block discarded – undo
35 35
     public function __construct()
36 36
     {
37 37
             
38
-        if ( \config\ConfAssistant::eduPKI['testing'] === true ) {
39
-            $this->locationRaCert = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
40
-            $this->locationRaKey = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
41
-            $this->locationWebRoot = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
38
+        if (\config\ConfAssistant::eduPKI['testing'] === true) {
39
+            $this->locationRaCert = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
40
+            $this->locationRaKey = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
41
+            $this->locationWebRoot = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
42 42
             $this->eduPkiRaId = 700;
43 43
             $this->eduPkiCertProfileBoth = "Radius Server SOAP";
44 44
             $this->eduPkiCertProfileIdp = "Radius Server SOAP";
@@ -47,9 +47,9 @@  discard block
 block discarded – undo
47 47
             $this->eduPkiEndpointPublic = "https://pki.edupki.org/edupki-test-ca/cgi-bin/pub/soap?wsdl=1";
48 48
             $this->eduPkiEndpointRa = "https://ra.edupki.org/edupki-test-ca/cgi-bin/ra/soap?wsdl=1";
49 49
         } else {
50
-            $this->locationRaCert = ROOT . "/config/SilverbulletClientCerts/edupki-prod-ra.pem";
51
-            $this->locationRaKey = ROOT . "/config/SilverbulletClientCerts/edupki-prod-ra.clearkey";
52
-            $this->locationWebRoot = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
50
+            $this->locationRaCert = ROOT."/config/SilverbulletClientCerts/edupki-prod-ra.pem";
51
+            $this->locationRaKey = ROOT."/config/SilverbulletClientCerts/edupki-prod-ra.clearkey";
52
+            $this->locationWebRoot = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
53 53
             $this->eduPkiRaId = 100;
54 54
             $this->eduPkiCertProfileBoth = "eduroam IdP and SP";
55 55
             $this->eduPkiCertProfileIdp = "eduroam IdP";
@@ -63,13 +63,13 @@  discard block
 block discarded – undo
63 63
         parent::__construct();
64 64
 
65 65
         if (stat($this->locationRaCert) === FALSE) {
66
-            throw new Exception("RA operator PEM file not found: " . $this->locationRaCert);
66
+            throw new Exception("RA operator PEM file not found: ".$this->locationRaCert);
67 67
         }
68 68
         if (stat($this->locationRaKey) === FALSE) {
69
-            throw new Exception("RA operator private key file not found: " . $this->locationRaKey);
69
+            throw new Exception("RA operator private key file not found: ".$this->locationRaKey);
70 70
         }
71 71
         if (stat($this->locationWebRoot) === FALSE) {
72
-            throw new Exception("CA website root CA file not found: " . $this->locationWebRoot);
72
+            throw new Exception("CA website root CA file not found: ".$this->locationWebRoot);
73 73
         }
74 74
     }
75 75
 
@@ -136,22 +136,22 @@  discard block
 block discarded – undo
136 136
                 throw new Exception("Unexpected policies requested.");
137 137
             }
138 138
             $altArray = [# Array mit den Subject Alternative Names
139
-                "email:" . $csr["USERMAIL"]
139
+                "email:".$csr["USERMAIL"]
140 140
             ];
141 141
             foreach ($csr["ALTNAMES"] as $oneAltName) {
142
-                $altArray[] = "DNS:" . $oneAltName;
142
+                $altArray[] = "DNS:".$oneAltName;
143 143
             }
144 144
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
145 145
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
146
-            $this->loggerInstance->debug(5, "PARAM_1: " . $this->eduPkiRaId . "\n");
147
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n");
146
+            $this->loggerInstance->debug(5, "PARAM_1: ".$this->eduPkiRaId."\n");
147
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n");
148 148
             $this->loggerInstance->debug(5, "PARAM_3: ");
149 149
             $this->loggerInstance->debug(5, $altArray);
150
-            $this->loggerInstance->debug(5, "PARAM_4: " . $profile . "\n");
151
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
152
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
153
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n");
154
-            $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n");
150
+            $this->loggerInstance->debug(5, "PARAM_4: ".$profile."\n");
151
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
152
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
153
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n");
154
+            $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n");
155 155
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
156 156
             $soapNewRequest = $soapPub->newRequest(
157 157
                     $this->eduPkiRaId, # RA-ID
@@ -173,11 +173,11 @@  discard block
 block discarded – undo
173 173
         } catch (Exception $e) {
174 174
             // PHP 7.1 can do this much better
175 175
             if (is_soap_fault($e)) {
176
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
176
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
177 177
                     $e->faultstring
178 178
                 }\n");
179 179
             }
180
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
180
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
181 181
         }
182 182
         try {
183 183
             $soap = $this->initEduPKISoapSession("RA");
@@ -209,7 +209,7 @@  discard block
 block discarded – undo
209 209
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
210 210
             // rather than just using the string. Grr.
211 211
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
212
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
212
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
213 213
             // retrieve our RA cert from filesystem                    
214 214
             // the RA certificates are not needed right now because we
215 215
             // have resorted to S/MIME signatures with openssl command-line
@@ -221,7 +221,7 @@  discard block
 block discarded – undo
221 221
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
222 222
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
223 223
             $this->loggerInstance->debug(2, "Actual content to be signed is this:\n  $soapCleartext\n");
224
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . $this->locationRaKey . " -signer " . $this->locationRaCert;
224
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".$this->locationRaKey." -signer ".$this->locationRaCert;
225 225
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
226 226
             $output = [];
227 227
             $return = 999;
@@ -230,21 +230,21 @@  discard block
 block discarded – undo
230 230
                 throw new Exception("Non-zero return value from openssl smime!");
231 231
             }
232 232
             // and get the signature blob back from the filesystem
233
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
233
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
234 234
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
235
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
236
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
237
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
235
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
236
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
237
+            $this->loggerInstance->debug(5, $detachedSig."\n");
238 238
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
239
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
240
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
239
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
240
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
241 241
             if ($soapIssueCert === FALSE) {
242 242
                 throw new Exception("The locally approved request was NOT processed by the CA.");
243 243
             }
244 244
         } catch (SoapFault $e) {
245
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
245
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
246 246
         } catch (Exception $e) {
247
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
247
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
248 248
         }
249 249
         return $soapReqnum;
250 250
     }
@@ -296,9 +296,9 @@  discard block
 block discarded – undo
296 296
                 throw new Exception("CAInfo has no root certificate for us!");
297 297
             }
298 298
         } catch (SoapFault $e) {
299
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
299
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
300 300
         } catch (Exception $e) {
301
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
301
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
302 302
         }
303 303
         return [
304 304
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -331,12 +331,12 @@  discard block
 block discarded – undo
331 331
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
332 332
             // rather than just using the string. Grr.
333 333
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
334
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
334
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
335 335
             // retrieve our RA cert from filesystem
336 336
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
337 337
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
338 338
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
339
-        $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . $this->locationRaKey . " -signer " . $this->locationRaCert;
339
+        $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".$this->locationRaKey." -signer ".$this->locationRaCert;
340 340
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
341 341
             $output = [];
342 342
             $return = 999;
@@ -345,7 +345,7 @@  discard block
 block discarded – undo
345 345
                 throw new Exception("Non-zero return value from openssl smime!");
346 346
             }
347 347
             // and get the signature blob back from the filesystem
348
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
348
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
349 349
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
350 350
             if ($soapIssueRev === FALSE) {
351 351
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -353,9 +353,9 @@  discard block
 block discarded – undo
353 353
         } catch (Exception $e) {
354 354
             // PHP 7.1 can do this much better
355 355
             if (is_soap_fault($e)) {
356
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
356
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
357 357
             }
358
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
358
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
359 359
         }
360 360
     }
361 361
 
@@ -455,9 +455,9 @@  discard block
 block discarded – undo
455 455
      */
456 456
     public function soapToXmlInteger($x)
457 457
     {
458
-        return '<' . $x[0] . '>'
458
+        return '<'.$x[0].'>'
459 459
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
460
-                . '</' . $x[0] . '>';
460
+                . '</'.$x[0].'>';
461 461
     }
462 462
 
463 463
     /**
@@ -476,9 +476,9 @@  discard block
 block discarded – undo
476 476
         // dump private key into directory
477 477
         $outstring = "";
478 478
         openssl_pkey_export($privateKey, $outstring);
479
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
479
+        file_put_contents($tempdir."/pkey.pem", $outstring);
480 480
         // PHP can only do one DC in the Subject. But we need three.
481
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
481
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
482 482
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
483 483
         $output = [];
484 484
         $return = 999;
Please login to merge, or discard this patch.
core/diag/RADIUSTests.php 1 patch
Spacing   +56 added lines, -57 removed lines patch added patch discarded remove patch
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
             }
166 166
         }
167 167
 
168
-        $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . /** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
168
+        $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, "./** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
169 169
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedServerNames, true));
170 170
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedCABundle, true));
171 171
 
@@ -252,7 +252,7 @@  discard block
 block discarded – undo
252 252
                 $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME;
253 253
                 continue; // otherwise we'd ALSO complain that it's not a real hostname
254 254
             }
255
-            if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
255
+            if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
256 256
                 $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME;
257 257
             }
258 258
         }
@@ -278,7 +278,7 @@  discard block
 block discarded – undo
278 278
             $probValue = RADIUSTests::CERTPROB_SHA1_SIGNATURE;
279 279
             $returnarray[] = $probValue;
280 280
         }
281
-        $this->loggerInstance->debug(4, "CERT IS: " . /** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
281
+        $this->loggerInstance->debug(4, "CERT IS: "./** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
282 282
         if ($intermediateCa['basicconstraints_set'] == 0) {
283 283
             $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS;
284 284
         }
@@ -326,7 +326,7 @@  discard block
 block discarded – undo
326 326
     public function udpReachability($probeindex, $opnameCheck = TRUE, $frag = TRUE) {
327 327
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
328 328
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
329
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
329
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
330 330
         if ($clientcert === FALSE) {
331 331
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
332 332
         }
@@ -335,7 +335,7 @@  discard block
 block discarded – undo
335 335
         if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) {
336 336
             return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert);
337 337
         }
338
-        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
338
+        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
339 339
     }
340 340
 
341 341
     /**
@@ -356,7 +356,7 @@  discard block
 block discarded – undo
356 356
             return RADIUSTests::CERTPROB_NO_CDP_HTTP;
357 357
         }
358 358
         // first and second sub-match is the full URL... check it
359
-        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2]), \config\Diagnostics::TIMEOUTS['crl_download']);
359
+        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2]), \config\Diagnostics::TIMEOUTS['crl_download']);
360 360
         if ($crlcontent === FALSE) {
361 361
             return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL;
362 362
         }
@@ -371,7 +371,7 @@  discard block
 block discarded – undo
371 371
         // $pem = chunk_split(base64_encode($crlcontent), 64, "\n");
372 372
         // inspired by https://stackoverflow.com/questions/2390604/how-to-pass-variables-as-stdin-into-command-line-from-php
373 373
 
374
-        $proc = \config\Master::PATHS['openssl'] . " crl -inform der";
374
+        $proc = \config\Master::PATHS['openssl']." crl -inform der";
375 375
         $descriptorspec = [
376 376
             0 => ["pipe", "r"],
377 377
             1 => ["pipe", "w"],
@@ -409,7 +409,7 @@  discard block
 block discarded – undo
409 409
         $origLength = strlen($hex);
410 410
         for ($i = 1; $i < $origLength; $i++) {
411 411
             if ($i % 2 == 1 && $i != strlen($hex)) {
412
-                $spaced .= $hex[$i] . " ";
412
+                $spaced .= $hex[$i]." ";
413 413
             } else {
414 414
                 $spaced .= $hex[$i];
415 415
             }
@@ -534,19 +534,19 @@  discard block
 block discarded – undo
534 534
         $eapText = \core\common\EAP::eapDisplayName($eaptype);
535 535
         $config = '
536 536
 network={
537
-  ssid="' . \config\Master::APPEARANCE['productname'] . ' testing"
537
+  ssid="' . \config\Master::APPEARANCE['productname'].' testing"
538 538
   key_mgmt=WPA-EAP
539 539
   proto=WPA2
540 540
   pairwise=CCMP
541 541
   group=CCMP
542 542
   ';
543 543
 // phase 1
544
-        $config .= 'eap=' . $eapText['OUTER'] . "\n";
544
+        $config .= 'eap='.$eapText['OUTER']."\n";
545 545
         $logConfig = $config;
546 546
 // phase 2 if applicable; all inner methods have passwords
547 547
         if (isset($eapText['INNER']) && $eapText['INNER'] != "") {
548
-            $config .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
549
-            $logConfig .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
548
+            $config .= '  phase2="auth='.$eapText['INNER']."\"\n";
549
+            $logConfig .= '  phase2="auth='.$eapText['INNER']."\"\n";
550 550
         }
551 551
 // all methods set a password, except EAP-TLS
552 552
         if ($eaptype != \core\common\EAP::EAPTYPE_TLS) {
@@ -562,11 +562,11 @@  discard block
 block discarded – undo
562 562
         }
563 563
 
564 564
 // inner identity
565
-        $config .= '  identity="' . $inner . "\"\n";
566
-        $logConfig .= '  identity="' . $inner . "\"\n";
565
+        $config .= '  identity="'.$inner."\"\n";
566
+        $logConfig .= '  identity="'.$inner."\"\n";
567 567
 // outer identity, may be equal
568
-        $config .= '  anonymous_identity="' . $outer . "\"\n";
569
-        $logConfig .= '  anonymous_identity="' . $outer . "\"\n";
568
+        $config .= '  anonymous_identity="'.$outer."\"\n";
569
+        $logConfig .= '  anonymous_identity="'.$outer."\"\n";
570 570
 // done
571 571
         $config .= "}";
572 572
         $logConfig .= "}";
@@ -627,13 +627,13 @@  discard block
 block discarded – undo
627 627
      * @return string the command-line for eapol_test
628 628
      */
629 629
     private function eapolTestConfig($probeindex, $opName, $frag) {
630
-        $cmdline = \config\Diagnostics::PATHS['eapol_test'] .
631
-                " -a " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'] .
632
-                " -s " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'] .
633
-                " -o serverchain.pem" .
634
-                " -c ./udp_login_test.conf" .
635
-                " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " .
636
-                " -t " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout'] . " ";
630
+        $cmdline = \config\Diagnostics::PATHS['eapol_test'].
631
+                " -a ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'].
632
+                " -s ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'].
633
+                " -o serverchain.pem".
634
+                " -c ./udp_login_test.conf".
635
+                " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ".
636
+                " -t ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout']." ";
637 637
         if ($opName) {
638 638
             $cmdline .= '-N126:s:"1cat.eduroam.org" ';
639 639
         }
@@ -662,10 +662,10 @@  discard block
 block discarded – undo
662 662
      * @throws Exception
663 663
      */
664 664
     private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs) {
665
-        if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) {
665
+        if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) {
666 666
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n");
667 667
         }
668
-        if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) {
668
+        if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) {
669 669
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n");
670 670
         }
671 671
 // make a copy of the EAP-received chain and add the configured intermediates, if any
@@ -679,15 +679,15 @@  discard block
 block discarded – undo
679 679
             }
680 680
             if ($decoded['ca'] == 1) {
681 681
                 if ($decoded['root'] == 1) { // save CAT roots to the root directory
682
-                    file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
683
-                    file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
682
+                    file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']);
683
+                    file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']);
684 684
                     $catRoots[] = $decoded['pem'];
685 685
                 } else { // save the intermediates to allcerts directory
686
-                    file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']);
686
+                    file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']);
687 687
                     $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded));
688 688
                     if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) {
689 689
                         $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
690
-                        file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]);
690
+                        file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]);
691 691
                     }
692 692
                     $catIntermediates[] = $decoded['pem'];
693 693
                 }
@@ -696,26 +696,26 @@  discard block
 block discarded – undo
696 696
         // save all intermediate certificates and CRLs to separate files in 
697 697
         // both root-ca directories
698 698
         foreach ($eapIntermediates as $index => $onePem) {
699
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem);
700
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem);
699
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem);
700
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem);
701 701
         }
702 702
         foreach ($eapIntermediateCRLs as $index => $onePem) {
703
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
703
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
705 705
         }
706 706
 
707 707
         $checkstring = "";
708 708
         if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) {
709 709
             $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
710 710
             $checkstring = "-crl_check_all";
711
-            file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
-            file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
711
+            file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
+            file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
713 713
         }
714 714
 
715 715
 
716 716
 // now c_rehash the root CA directory ...
717
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null");
718
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null");
717
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null");
718
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null");
719 719
         return $checkstring;
720 720
     }
721 721
 
@@ -746,14 +746,14 @@  discard block
 block discarded – undo
746 746
 // so test if there's something PEMy in the file at all
747 747
 // serverchain.pem is the output from eapol_test; incomingserver.pem is written by extractIncomingCertsfromEAP() if there was at least one server cert.
748 748
         if (filesize("$tmpDir/serverchain.pem") > 10 && filesize("$tmpDir/incomingserver.pem") > 10) {
749
-            $cmdString = \config\Master::PATHS['openssl'] . " verify $crlCheckString  -no-CAstore -no-CApath -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem 2>&1";
749
+            $cmdString = \config\Master::PATHS['openssl']." verify $crlCheckString  -no-CAstore -no-CApath -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem 2>&1";
750 750
             exec($cmdString, $verifyResultEaponly);
751 751
             $this->loggerInstance->debug(4, $cmdString."\n");
752
-            $this->loggerInstance->debug(4, "Chain verify pass 1: " . /** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE) . "\n");
753
-            $cmdString = \config\Master::PATHS['openssl'] . " verify $crlCheckString  -no-CAstore -no-CApath -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem 2>&1";
752
+            $this->loggerInstance->debug(4, "Chain verify pass 1: "./** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE)."\n");
753
+            $cmdString = \config\Master::PATHS['openssl']." verify $crlCheckString  -no-CAstore -no-CApath -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem 2>&1";
754 754
             exec($cmdString, $verifyResultAllcerts);
755 755
             $this->loggerInstance->debug(4, $cmdString."\n");
756
-            $this->loggerInstance->debug(4, "Chain verify pass 2: " . /** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE) . "\n");
756
+            $this->loggerInstance->debug(4, "Chain verify pass 2: "./** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE)."\n");
757 757
         }
758 758
 
759 759
 // now we do certificate verification against the collected parents
@@ -821,7 +821,7 @@  discard block
 block discarded – undo
821 821
         // we are UNHAPPY if no names match!
822 822
         $happiness = "UNHAPPY";
823 823
         foreach ($this->expectedServerNames as $expectedName) {
824
-            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . /** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE) . /** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
824
+            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: "./** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE)./** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
825 825
             if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) {
826 826
                 $this->loggerInstance->debug(4, "Totally happy!");
827 827
                 $happiness = "TOTALLY";
@@ -865,11 +865,11 @@  discard block
 block discarded – undo
865 865
         $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password);
866 866
         // the config intentionally does not include CA checking. We do this
867 867
         // ourselves after getting the chain with -o.
868
-        file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]);
868
+        file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]);
869 869
 
870 870
         $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag);
871 871
         $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n");
872
-        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n");
872
+        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n");
873 873
         $time_start = microtime(true);
874 874
         $pflow = [];
875 875
         exec($cmdline, $pflow);
@@ -878,7 +878,7 @@  discard block
 block discarded – undo
878 878
         }
879 879
         $time_stop = microtime(true);
880 880
         $output = print_r($this->redact($password, $pflow), TRUE);
881
-        file_put_contents($tmpDir . "/eapol_test_output_redacted_$probeindex.txt", $output);
881
+        file_put_contents($tmpDir."/eapol_test_output_redacted_$probeindex.txt", $output);
882 882
         $this->loggerInstance->debug(5, "eapol_test output saved to eapol_test_output_redacted_$probeindex.txt\n");
883 883
         return [
884 884
             "time" => ($time_stop - $time_start) * 1000,
@@ -913,7 +913,7 @@  discard block
 block discarded – undo
913 913
         if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) {
914 914
             array_pop($packetflow);
915 915
         }
916
-        $this->loggerInstance->debug(5, "Packetflow: " . /** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
916
+        $this->loggerInstance->debug(5, "Packetflow: "./** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
917 917
         $packetcount = array_count_values($packetflow);
918 918
         $testresults['packetcount'] = $packetcount;
919 919
         $testresults['packetflow'] = $packetflow;
@@ -953,7 +953,7 @@  discard block
 block discarded – undo
953 953
      */
954 954
     private function wasModernTlsNegotiated(&$testresults, $packetflow_orig) {
955 955
         $negotiatedTlsVersion = $this->checkLineparse($packetflow_orig, self::LINEPARSE_TLSVERSION);
956
-        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion" . "\n");
956
+        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion"."\n");
957 957
         if ($negotiatedTlsVersion === FALSE) {
958 958
             $testresults['cert_oddities'][] = RADIUSTests::TLSPROB_UNKNOWN_TLS_VERSION;
959 959
         } elseif ($negotiatedTlsVersion != self::TLS_VERSION_1_2 && $negotiatedTlsVersion != self::TLS_VERSION_1_3) {
@@ -1010,7 +1010,7 @@  discard block
 block discarded – undo
1010 1010
 
1011 1011
         $x509 = new \core\common\X509();
1012 1012
 // $eap_certarray holds all certs received in EAP conversation
1013
-        $incomingData = file_get_contents($tmpDir . "/serverchain.pem");
1013
+        $incomingData = file_get_contents($tmpDir."/serverchain.pem");
1014 1014
         if ($incomingData !== FALSE && strlen($incomingData) > 0) {
1015 1015
             $eapCertArray = $x509->splitCertificate($incomingData);
1016 1016
         } else {
@@ -1040,10 +1040,10 @@  discard block
 block discarded – undo
1040 1040
                 case RADIUSTests::SERVER_CA_SELFSIGNED:
1041 1041
                     $servercert[] = $cert;
1042 1042
                     if (count($servercert) == 1) {
1043
-                        if (file_put_contents($tmpDir . "/incomingserver.pem", $cert['pem'] . "\n") === FALSE) {
1043
+                        if (file_put_contents($tmpDir."/incomingserver.pem", $cert['pem']."\n") === FALSE) {
1044 1044
                             $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n");
1045 1045
                         }
1046
-                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . /** @scrutinizer ignore-type */ print_r($servercert[0], true));
1046
+                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: "./** @scrutinizer ignore-type */ print_r($servercert[0], true));
1047 1047
                     } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) {
1048 1048
                         $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS;
1049 1049
                     }
@@ -1113,7 +1113,7 @@  discard block
 block discarded – undo
1113 1113
     public function autodetectCAWithProbe($outerId) {
1114 1114
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
1115 1115
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
1116
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
1116
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
1117 1117
         if ($clientcert === FALSE) {
1118 1118
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
1119 1119
         }
@@ -1128,7 +1128,7 @@  discard block
 block discarded – undo
1128 1128
         $tmpDir = $temporary['dir'];
1129 1129
         chdir($tmpDir);
1130 1130
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1131
-        file_put_contents($tmpDir . "/client.p12", $clientcert);
1131
+        file_put_contents($tmpDir."/client.p12", $clientcert);
1132 1132
         $testresults = ['cert_oddities' => []];
1133 1133
         $runtime_results = $this->executeEapolTest($tmpDir, $probeindex, \core\common\EAP::EAPTYPE_ANY, $outerId, $outerId, "eaplab", FALSE, FALSE);
1134 1134
         $packetflow_orig = $runtime_results['output'];
@@ -1144,8 +1144,7 @@  discard block
 block discarded – undo
1144 1144
         // that's not the case if we do EAP-pwd or could not negotiate an EAP method at
1145 1145
         // all
1146 1146
         // in that case: no server CA guess possible
1147
-        if (!
1148
-                ($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1147
+        if (!($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1149 1148
         ) {
1150 1149
             return RADIUSTests::RETVAL_INVALID;
1151 1150
         }
@@ -1185,7 +1184,7 @@  discard block
 block discarded – undo
1185 1184
         // trust, and custom ones we may have configured
1186 1185
         $ourRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-custom']);
1187 1186
         $mozillaRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-mozilla']);
1188
-        $allRoots = $x509->splitCertificate($ourRoots . "\n" . $mozillaRoots);
1187
+        $allRoots = $x509->splitCertificate($ourRoots."\n".$mozillaRoots);
1189 1188
         foreach ($allRoots as $oneRoot) {
1190 1189
             $processedRoot = $x509->processCertificate($oneRoot);
1191 1190
             if ($processedRoot['full_details']['subject'] == $currentHighestKnownIssuer) {
@@ -1229,7 +1228,7 @@  discard block
 block discarded – undo
1229 1228
         chdir($tmpDir);
1230 1229
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1231 1230
         if ($clientcertdata !== NULL) {
1232
-            file_put_contents($tmpDir . "/client.p12", $clientcertdata);
1231
+            file_put_contents($tmpDir."/client.p12", $clientcertdata);
1233 1232
         }
1234 1233
         $testresults = [];
1235 1234
         // initialise the sub-array for cleaner parsing
@@ -1334,7 +1333,7 @@  discard block
 block discarded – undo
1334 1333
                     'issuer' => $this->printDN($certdata['issuer']),
1335 1334
                     'validFrom' => $this->printTm($certdata['validFrom_time_t']),
1336 1335
                     'validTo' => $this->printTm($certdata['validTo_time_t']),
1337
-                    'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']),
1336
+                    'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']),
1338 1337
                     'sha1' => $certdata['sha1'],
1339 1338
                     'public_key_length' => $certdata['public_key_length'],
1340 1339
                     'extensions' => $certdata['extensions']
Please login to merge, or discard this patch.
core/SanityTests.php 1 patch
Spacing   +48 added lines, -48 removed lines patch added patch discarded remove patch
@@ -129,7 +129,7 @@  discard block
 block discarded – undo
129 129
         $this->test_result = [];
130 130
         $this->test_result['global'] = 0;
131 131
         // parse the schema file to find out the number of expected rows...
132
-        $schema = file(dirname(dirname(__FILE__)) . "/schema/schema.sql");
132
+        $schema = file(dirname(dirname(__FILE__))."/schema/schema.sql");
133 133
         $this->profileOptionCount = 0;
134 134
         $passedTheWindmill = FALSE;
135 135
         foreach ($schema as $schemaLine) {
@@ -156,7 +156,7 @@  discard block
 block discarded – undo
156 156
     {
157 157
         $this->out[$test] = [];
158 158
         $this->name = $test;
159
-        $m_name = 'test' . $test;
159
+        $m_name = 'test'.$test;
160 160
         $this->test_result[$test] = 0;
161 161
         if (!method_exists($this, $m_name)) {
162 162
             $this->storeTestResult(\core\common\Entity::L_ERROR, "Configuration error, no test configured for <strong>$test</strong>.");
@@ -269,9 +269,9 @@  discard block
 block discarded – undo
269 269
     private function testPhp()
270 270
     {
271 271
         if (version_compare(phpversion(), $this->needversionPHP, '>=')) {
272
-            $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running " . phpversion() . ".");
272
+            $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running ".phpversion().".");
273 273
         } else {
274
-            $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have " . phpversion() . ".");
274
+            $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have ".phpversion().".");
275 275
         }
276 276
     }
277 277
     
@@ -284,12 +284,12 @@  discard block
 block discarded – undo
284 284
      */
285 285
     private function runConstantsTest($config)
286 286
     {
287
-        $templateConfig = file_get_contents(ROOT . "/config/$config-template.php");
288
-        $newTemplateConfig = preg_replace("/class *$config/", "class $config" . "_template", $templateConfig);
289
-        file_put_contents(ROOT . "/var/tmp/$config-template.php", $newTemplateConfig);
290
-        include(ROOT . "/var/tmp/$config-template.php");
291
-        unlink(ROOT . "/var/tmp/$config-template.php");
292
-        $rft = new \ReflectionClass("\config\\$config" . "_template");
287
+        $templateConfig = file_get_contents(ROOT."/config/$config-template.php");
288
+        $newTemplateConfig = preg_replace("/class *$config/", "class $config"."_template", $templateConfig);
289
+        file_put_contents(ROOT."/var/tmp/$config-template.php", $newTemplateConfig);
290
+        include(ROOT."/var/tmp/$config-template.php");
291
+        unlink(ROOT."/var/tmp/$config-template.php");
292
+        $rft = new \ReflectionClass("\config\\$config"."_template");
293 293
         $templateConstants = $rft->getConstants();
294 294
         $failResults = [];
295 295
         foreach ($templateConstants as $constant => $value) {
@@ -306,7 +306,7 @@  discard block
 block discarded – undo
306 306
      * Check if all required constants are set
307 307
      */
308 308
     private function testConfigConstants() {
309
-        set_error_handler(function ($severity, $message, $file, $line) {
309
+        set_error_handler(function($severity, $message, $file, $line) {
310 310
             throw new \ErrorException($message, $severity, $severity, $file, $line);
311 311
         });
312 312
         
@@ -317,7 +317,7 @@  discard block
 block discarded – undo
317 317
             $failCount = $failCount + count($failResults);
318 318
             if (count($failResults) > 0) {
319 319
             $this->storeTestResult(\core\common\Entity::L_ERROR, 
320
-                    "<strong>The following constants are not set:</strong>" . implode(', ', $failResults));
320
+                    "<strong>The following constants are not set:</strong>".implode(', ', $failResults));
321 321
             }
322 322
         }
323 323
         
@@ -341,7 +341,7 @@  discard block
 block discarded – undo
341 341
             $this->storeTestResult(\core\common\Entity::L_OK, "<strong>cat_base_url</strong> set correctly");
342 342
         } else {
343 343
             $rootFromScript = $m[1] === '' ? '/' : $m[1];
344
-            $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>" . \config\Master::PATHS['cat_base_url'] . "</strong> and should be <strong>$rootFromScript</strong>");
344
+            $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>".\config\Master::PATHS['cat_base_url']."</strong> and should be <strong>$rootFromScript</strong>");
345 345
         }
346 346
     }
347 347
 
@@ -362,7 +362,7 @@  discard block
 block discarded – undo
362 362
         if (count($probeReturns) == 0) {
363 363
             $this->storeTestResult(common\Entity::L_OK, "All configured RADIUS/UDP probes are reachable.");
364 364
         } else {
365
-            $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: " . implode(', ', $probeReturns));
365
+            $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: ".implode(', ', $probeReturns));
366 366
         }
367 367
     }
368 368
 
@@ -379,10 +379,10 @@  discard block
 block discarded – undo
379 379
             include_once \config\Master::AUTHENTICATION['ssp-path-to-autoloader'];
380 380
             $SSPconfig = \SimpleSAML\Configuration::getInstance();
381 381
             $sspVersion = explode('.', $SSPconfig->getVersion());
382
-            if ( (int) $sspVersion[0] > $this->needversionSSP['major'] || ((int) $sspVersion[0] == $this->needversionSSP['major'] && (int) $sspVersion[1] >= $this->needversionSSP['minor'])) {
383
-                $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficiently recent. You are running " . implode('.', $sspVersion));
382
+            if ((int) $sspVersion[0] > $this->needversionSSP['major'] || ((int) $sspVersion[0] == $this->needversionSSP['major'] && (int) $sspVersion[1] >= $this->needversionSSP['minor'])) {
383
+                $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficiently recent. You are running ".implode('.', $sspVersion));
384 384
             } else {
385
-                $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least " . implode('.', $this->needversionSSP));
385
+                $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least ".implode('.', $this->needversionSSP));
386 386
             }
387 387
         }
388 388
     }
@@ -409,7 +409,7 @@  discard block
 block discarded – undo
409 409
         $A = $this->getExecPath('zip');
410 410
         if ($A['exec'] != "") {
411 411
             $fullOutput = [];
412
-            $t = exec($A['exec'] . ' --version', $fullOutput);
412
+            $t = exec($A['exec'].' --version', $fullOutput);
413 413
             if ($A['exec_is'] == "EXPLICIT") {
414 414
                 $this->storeTestResult(\core\common\Entity::L_OK, "<strong>".$fullOutput[1]."</strong> was found and is configured explicitly in your config.");
415 415
             } else {
@@ -447,8 +447,8 @@  discard block
 block discarded – undo
447 447
      */
448 448
     private function testLogdir()
449 449
     {
450
-        if (fopen(\config\Master::PATHS['logdir'] . "/debug.log", "a") == FALSE) {
451
-            $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>" . \config\Master::PATHS['logdir'] . "</strong> are not writable!");
450
+        if (fopen(\config\Master::PATHS['logdir']."/debug.log", "a") == FALSE) {
451
+            $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>".\config\Master::PATHS['logdir']."</strong> are not writable!");
452 452
         } else {
453 453
             $this->storeTestResult(\core\common\Entity::L_OK, "Log directory is writable.");
454 454
         }
@@ -576,7 +576,7 @@  discard block
 block discarded – undo
576 576
     {
577 577
         $A = $this->getExecPath('openssl');
578 578
         if ($A['exec'] != "") {
579
-            $t = exec($A['exec'] . ' version');
579
+            $t = exec($A['exec'].' version');
580 580
             if ($A['exec_is'] == "EXPLICIT") {
581 581
                 $this->storeTestResult(\core\common\Entity::L_OK, "<strong>$t</strong> was found and is configured explicitly in your config.");
582 582
             } else {
@@ -598,13 +598,13 @@  discard block
 block discarded – undo
598 598
         if ($A['exec'] != "" && $A['exec_is'] == "EXPLICIT" && !file_exists($A['exec'])) { 
599 599
             $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>sslscan</strong> is configured explicitly and was not found on your system!");    
600 600
         } else {
601
-            exec($A['exec'] . ' --version --xml=-', $output, $res);
601
+            exec($A['exec'].' --version --xml=-', $output, $res);
602 602
             if ($res == 0) {
603 603
                 $xml = simplexml_load_string(implode($output));
604
-                $resarray = json_decode(json_encode((array)$xml),true);
604
+                $resarray = json_decode(json_encode((array) $xml), true);
605 605
                 $t = 'sslscan';
606 606
                 if (isset($resarray['@attributes']) and isset($resarray['@attributes']['version'])) {
607
-                    $t = 'sslscan ' . $resarray['@attributes']['version'];
607
+                    $t = 'sslscan '.$resarray['@attributes']['version'];
608 608
                 }
609 609
             } else {
610 610
                 $t = '';
@@ -637,14 +637,14 @@  discard block
 block discarded – undo
637 637
         }
638 638
         $A = $this->getExecPath('makensis');
639 639
         if ($A['exec'] != "") {
640
-            $t = exec($A['exec'] . ' -VERSION');
640
+            $t = exec($A['exec'].' -VERSION');
641 641
             if ($A['exec_is'] == "EXPLICIT") {
642 642
                 $this->storeTestResult(\core\common\Entity::L_OK, "<strong>makensis $t</strong> was found and is configured explicitly in your config.");
643 643
             } else {
644 644
                 $this->storeTestResult(\core\common\Entity::L_WARN, "<strong>makensis $t</strong> was found, but is not configured with an absolute path in your config.");
645 645
             }
646 646
             $outputArray = [];
647
-            exec($A['exec'] . ' -HELP', $outputArray);
647
+            exec($A['exec'].' -HELP', $outputArray);
648 648
             $t1 = count(preg_grep('/INPUTCHARSET/', $outputArray));
649 649
             if ($t1 == 1 && \config\ConfAssistant::NSIS_VERSION == 2) {
650 650
                 $this->storeTestResult(\core\common\Entity::L_ERROR, "Declared NSIS_VERSION does not seem to match the file pointed to by PATHS['makensis']!");
@@ -674,7 +674,7 @@  discard block
 block discarded – undo
674 674
         $NSIS_Module_status = [];
675 675
         foreach ($this->NSISModules as $module) {
676 676
             unset($out);
677
-            exec(\config\ConfAssistant::PATHS['makensis'] . " -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval);
677
+            exec(\config\ConfAssistant::PATHS['makensis']." -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval);
678 678
             if ($retval > 0) {
679 679
                 $NSIS_Module_status[$module] = 0;
680 680
             } else {
@@ -741,8 +741,8 @@  discard block
 block discarded – undo
741 741
         $locales = shell_exec("locale -a");
742 742
         $allthere = "";
743 743
         foreach (\config\Master::LANGUAGES as $onelanguage) {
744
-            if (preg_match("/" . $onelanguage['locale'] . "/", $locales) == 0) {
745
-                $allthere .= $onelanguage['locale'] . " ";
744
+            if (preg_match("/".$onelanguage['locale']."/", $locales) == 0) {
745
+                $allthere .= $onelanguage['locale']." ";
746 746
             }
747 747
         }
748 748
         if ($allthere == "") {
@@ -756,47 +756,47 @@  discard block
 block discarded – undo
756 756
         ["SETTING" => \config\Master::APPEARANCE['from-mail'],
757 757
             "DEFVALUE" => "[email protected]",
758 758
             "COMPLAINTSTRING" => "APPEARANCE/from-mail ",
759
-            "REQUIRED" => FALSE,],
759
+            "REQUIRED" => FALSE, ],
760 760
         ["SETTING" => \config\Master::APPEARANCE['support-contact']['url'],
761 761
             "DEFVALUE" => "[email protected]?body=Only%20English%20language%20please!",
762 762
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/url ",
763
-            "REQUIRED" => FALSE,],
763
+            "REQUIRED" => FALSE, ],
764 764
         ["SETTING" => \config\Master::APPEARANCE['support-contact']['display'],
765 765
             "DEFVALUE" => "[email protected]",
766 766
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/display ",
767
-            "REQUIRED" => FALSE,],
767
+            "REQUIRED" => FALSE, ],
768 768
         ["SETTING" => \config\Master::APPEARANCE['support-contact']['developer-mail'],
769 769
             "DEFVALUE" => "[email protected]",
770 770
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/mail ",
771
-            "REQUIRED" => FALSE,],
771
+            "REQUIRED" => FALSE, ],
772 772
         ["SETTING" => \config\Master::APPEARANCE['abuse-mail'],
773 773
             "DEFVALUE" => "[email protected]",
774 774
             "COMPLAINTSTRING" => "APPEARANCE/abuse-mail ",
775
-            "REQUIRED" => FALSE,],
775
+            "REQUIRED" => FALSE, ],
776 776
         ["SETTING" => \config\Master::APPEARANCE['MOTD'],
777 777
             "DEFVALUE" => "Release Candidate. All bugs to be shot on sight!",
778 778
             "COMPLAINTSTRING" => "APPEARANCE/MOTD ",
779
-            "REQUIRED" => FALSE,],
779
+            "REQUIRED" => FALSE, ],
780 780
         ["SETTING" => \config\Master::APPEARANCE['webcert_CRLDP'],
781 781
             "DEFVALUE" => ['list', 'of', 'CRL', 'pointers'],
782 782
             "COMPLAINTSTRING" => "APPEARANCE/webcert_CRLDP ",
783
-            "REQUIRED" => TRUE,],
783
+            "REQUIRED" => TRUE, ],
784 784
         ["SETTING" => \config\Master::APPEARANCE['webcert_OCSP'],
785 785
             "DEFVALUE" => ['list', 'of', 'OCSP', 'pointers'],
786 786
             "COMPLAINTSTRING" => "APPEARANCE/webcert_OCSP ",
787
-            "REQUIRED" => TRUE,],
787
+            "REQUIRED" => TRUE, ],
788 788
         ["SETTING" => \config\Master::DB['INST']['host'],
789 789
             "DEFVALUE" => "db.host.example",
790 790
             "COMPLAINTSTRING" => "DB/INST ",
791
-            "REQUIRED" => TRUE,],
791
+            "REQUIRED" => TRUE, ],
792 792
         ["SETTING" => \config\Master::DB['INST']['host'],
793 793
             "DEFVALUE" => "db.host.example",
794 794
             "COMPLAINTSTRING" => "DB/USER ",
795
-            "REQUIRED" => TRUE,],
795
+            "REQUIRED" => TRUE, ],
796 796
         ["SETTING" => \config\Master::DB['EXTERNAL']['host'],
797 797
             "DEFVALUE" => "customerdb.otherhost.example",
798 798
             "COMPLAINTSTRING" => "DB/EXTERNAL ",
799
-            "REQUIRED" => FALSE,],
799
+            "REQUIRED" => FALSE, ],
800 800
     ];
801 801
 
802 802
     /**
@@ -825,11 +825,11 @@  discard block
 block discarded – undo
825 825
         if (isset(\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'])) {
826 826
             foreach (\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'] as $cadata) {
827 827
                 foreach ($cadata['certificates'] as $cert_files) {
828
-                    if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['public']) === FALSE) {
829
-                        $defaultvalues .= "CERTIFICATE/" . $cert_files['public'] . " ";
828
+                    if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['public']) === FALSE) {
829
+                        $defaultvalues .= "CERTIFICATE/".$cert_files['public']." ";
830 830
                     }
831
-                    if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['private']) === FALSE) {
832
-                        $defaultvalues .= "CERTIFICATE/" . $cert_files['private'] . " ";
831
+                    if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['private']) === FALSE) {
832
+                        $defaultvalues .= "CERTIFICATE/".$cert_files['private']." ";
833 833
                     }
834 834
                 }
835 835
             }
@@ -922,14 +922,14 @@  discard block
 block discarded – undo
922 922
         if ($global_no_cache) {
923 923
             foreach ($Devs as $dev => $D) {
924 924
                 if (empty($D['options']['no_cache']) || $D['options']['no_cache'] != 0) {
925
-                    $no_cache_dev .= $dev . " ";
925
+                    $no_cache_dev .= $dev." ";
926 926
                     $no_cache_dev_count++;
927 927
                 }
928 928
             }
929 929
         } else {
930 930
             foreach ($Devs as $dev => $D) {
931 931
                 if (!empty($D['options']['no_cache']) && $D['options']['no_cache'] != 0) {
932
-                    $no_cache_dev .= $dev . " ";
932
+                    $no_cache_dev .= $dev." ";
933 933
                     $no_cache_dev_count++;
934 934
                 }
935 935
             }
@@ -973,14 +973,14 @@  discard block
 block discarded – undo
973 973
         $mail->isHTML(FALSE);
974 974
         $mail->CharSet = 'UTF-8';
975 975
         $mail->From = \config\Master::APPEARANCE['from-mail'];
976
-        $mail->FromName = \config\Master::APPEARANCE['productname'] . " Invitation System";
976
+        $mail->FromName = \config\Master::APPEARANCE['productname']." Invitation System";
977 977
         $mail->addAddress(\config\Master::APPEARANCE['abuse-mail']);
978 978
         $mail->Subject = "testing CAT configuration mail";
979 979
         $mail->Body = "Testing CAT mailing\n";
980 980
         $sent = $mail->send();
981 981
         
982 982
         if ($sent) {
983
-            $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check " . \config\Master::APPEARANCE['abuse-mail'] . " mailbox if the message was receiced.");
983
+            $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check ".\config\Master::APPEARANCE['abuse-mail']." mailbox if the message was receiced.");
984 984
         } else {
985 985
             $this->storeTestResult(\core\common\Entity::L_ERROR, "mailer settings failed, check the Config::MAILSETTINGS");
986 986
         }
Please login to merge, or discard this patch.
core/ExternalEduroamDBData.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -125,7 +125,7 @@  discard block
 block discarded – undo
125 125
             return $this->counter;
126 126
         }
127 127
 
128
-        $cachedNumber = @file_get_contents(ROOT . "/var/tmp/cachedSPNumber.serialised");
128
+        $cachedNumber = @file_get_contents(ROOT."/var/tmp/cachedSPNumber.serialised");
129 129
         if ($cachedNumber !== FALSE) {
130 130
             $numberData = unserialize($cachedNumber);
131 131
             $now = new \DateTime();
@@ -138,7 +138,7 @@  discard block
 block discarded – undo
138 138
         } else { // data in cache is too old or doesn't exist. We really need to ask the database
139 139
             $list = $this->listAllServiceProviders();
140 140
             $this->counter = count($list);
141
-            file_put_contents(ROOT . "/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()]));
141
+            file_put_contents(ROOT."/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()]));
142 142
             return $this->counter;
143 143
         }
144 144
     }
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
         $returnarray = [];
188 188
         $query = "SELECT id_institution AS id, country, inst_realm as realmlist, name AS collapsed_name, contact AS collapsed_contact, type FROM view_active_institution WHERE country = ?";
189 189
         if ($eduroamDbType !== NULL) {
190
-            $query .= " AND ( type = '" . ExternalEduroamDBData::TYPE_IDPSP . "' OR type = '" . $eduroamDbType . "')";
190
+            $query .= " AND ( type = '".ExternalEduroamDBData::TYPE_IDPSP."' OR type = '".$eduroamDbType."')";
191 191
         }
192 192
         $externals = $this->db->exec($query, "s", $tld);
193 193
         // was a SELECT query, so a resource and not a boolean
@@ -292,7 +292,7 @@  discard block
 block discarded – undo
292 292
             $contactList = $this::dissectCollapsedContacts($instServerResponses->contacts);
293 293
             $names = $this->splitNames($instServerResponses->inst_name);
294 294
             $thelanguage = $names[$this->languageInstance->getLang()] ?? $names["en"] ?? array_shift($names);
295
-            $retval[$instServerResponses->ROid . "-". $instServerResponses->instid] = [
295
+            $retval[$instServerResponses->ROid."-".$instServerResponses->instid] = [
296 296
                 "names" => $names,
297 297
                 "name" => $thelanguage,
298 298
                 "type" => array_search($instServerResponses->type, self::TYPE_MAPPING),
Please login to merge, or discard this patch.
devices/ms/WindowsCommon.php 1 patch
Spacing   +24 added lines, -24 removed lines patch added patch discarded remove patch
@@ -103,7 +103,7 @@  discard block
 block discarded – undo
103 103
 
104 104
         $this->loggerInstance->debug(5, "translateFile($source_name, $output_name)\n");
105 105
         ob_start();
106
-        $this->loggerInstance->debug(5, $this->module_path . '/Files/' . $this->device_id . '/' . $source_name . "\n");
106
+        $this->loggerInstance->debug(5, $this->module_path.'/Files/'.$this->device_id.'/'.$source_name."\n");
107 107
         $source = $this->findSourceFile($source_name);
108 108
 
109 109
         if ($source !== false) { // if there is no file found, don't attempt to include an uninitialised variable
@@ -230,8 +230,8 @@  discard block
 block discarded – undo
230 230
         $out .= sprintf(_("%s installer will be in the form of an EXE file. It will configure %s on your device, by creating wireless network profiles.<p>When you click the download button, the installer will be saved by your browser. Copy it to the machine you want to configure and execute."), \config\ConfAssistant::CONSORTIUM['display_name'], \config\ConfAssistant::CONSORTIUM['display_name']);
231 231
         $out .= "<p>";
232 232
         if ($networksCount > $configCount) {
233
-            $out .= sprintf(ngettext("In addition to <strong>%s</strong> the installer will also configure access to:", "In addition to <strong>%s</strong> the installer will also configure access to the following networks:", $networksCount - $configCount), implode(', ', $configNetworkList)) . " ";
234
-            $out .= '<strong>' . join('</strong>, <strong>', array_diff($networkList, $configNetworkList)) . '</strong>';
233
+            $out .= sprintf(ngettext("In addition to <strong>%s</strong> the installer will also configure access to:", "In addition to <strong>%s</strong> the installer will also configure access to the following networks:", $networksCount - $configCount), implode(', ', $configNetworkList))." ";
234
+            $out .= '<strong>'.join('</strong>, <strong>', array_diff($networkList, $configNetworkList)).'</strong>';
235 235
             $out .= "<p>";
236 236
         }
237 237
 // TODO - change this below
@@ -340,14 +340,14 @@  discard block
 block discarded – undo
340 340
      */
341 341
     protected function signInstaller()
342 342
     {
343
-        $fileName = $this->installerBasename . '.exe';
343
+        $fileName = $this->installerBasename.'.exe';
344 344
         if (!$this->sign) {
345 345
             rename("installer.exe", $fileName);
346 346
             return $fileName;
347 347
         }
348 348
         $retval = 0;
349 349
         // are actually signing
350
-        $outputFromSigning = system($this->sign . " installer.exe '$fileName' > /dev/null", $retval);
350
+        $outputFromSigning = system($this->sign." installer.exe '$fileName' > /dev/null", $retval);
351 351
         $this->loggerInstance->debug(4, $retval, "Output from Windows signing:", "==\n");
352 352
         if ($retval !== 0 || $outputFromSigning === false) {
353 353
             $this->loggerInstance->debug(2, "Signing the WindowsCommon installer $fileName FAILED!\n");
@@ -365,12 +365,12 @@  discard block
 block discarded – undo
365 365
      */
366 366
     protected function compileNSIS()
367 367
     {
368
-        $makensis = \config\ConfAssistant::PATHS['makensis'] . " -INPUTCHARSET UTF8";
368
+        $makensis = \config\ConfAssistant::PATHS['makensis']." -INPUTCHARSET UTF8";
369 369
         $lcAll = getenv("LC_ALL");
370 370
         putenv("LC_ALL=en_US.UTF-8");
371
-        $command = $makensis . ' -V4 cat.NSI > nsis.log 2>&1';
371
+        $command = $makensis.' -V4 cat.NSI > nsis.log 2>&1';
372 372
         system($command);
373
-        putenv("LC_ALL=" . $lcAll);
373
+        putenv("LC_ALL=".$lcAll);
374 374
         $this->loggerInstance->debug(4, "compileNSIS:$command\n");
375 375
     }
376 376
 
@@ -387,10 +387,10 @@  discard block
 block discarded – undo
387 387
             'email' => 'SUPPORT',
388 388
             'url' => 'URL',
389 389
         ];
390
-        $s = "support_" . $type . "_substitute";
390
+        $s = "support_".$type."_substitute";
391 391
         $substitute = $this->translateString($this->$s);
392
-        $returnValue = !empty($attr['support:' . $type][0]) ? $attr['support:' . $type][0] : $substitute;
393
-        return '!define ' . $supportString[$type] . ' "' . $returnValue . '"' . "\n";
392
+        $returnValue = !empty($attr['support:'.$type][0]) ? $attr['support:'.$type][0] : $substitute;
393
+        return '!define '.$supportString[$type].' "'.$returnValue.'"'."\n";
394 394
     }
395 395
 
396 396
     /**
@@ -403,18 +403,18 @@  discard block
 block discarded – undo
403 403
     {
404 404
         $fcontents = '';
405 405
         if ($attr['internal:profile_count'][0] > 1) {
406
-            $fcontents .= "\n" . '!define USER_GROUP "' . $this->translateString(str_replace('"', '$\\"', $attr['profile:name'][0])) . '"
406
+            $fcontents .= "\n".'!define USER_GROUP "'.$this->translateString(str_replace('"', '$\\"', $attr['profile:name'][0])).'"
407 407
 ';
408 408
         }
409 409
         $fcontents .= '
410
-Caption "' . $this->translateString(sprintf(WindowsCommon::sprintNsis(_("%s installer for %s")), \config\ConfAssistant::CONSORTIUM['display_name'], $attr['general:instname'][0])) . '"
411
-!define APPLICATION "' . $this->translateString(sprintf(WindowsCommon::sprintNsis(_("%s installer for %s")), \config\ConfAssistant::CONSORTIUM['display_name'], $attr['general:instname'][0])) . '"
412
-!define VERSION "' . \core\CAT::VERSION_MAJOR . '.' . \core\CAT::VERSION_MINOR . '.' . \core\CAT::VERSION_PATCH . '"
410
+Caption "' . $this->translateString(sprintf(WindowsCommon::sprintNsis(_("%s installer for %s")), \config\ConfAssistant::CONSORTIUM['display_name'], $attr['general:instname'][0])).'"
411
+!define APPLICATION "' . $this->translateString(sprintf(WindowsCommon::sprintNsis(_("%s installer for %s")), \config\ConfAssistant::CONSORTIUM['display_name'], $attr['general:instname'][0])).'"
412
+!define VERSION "' . \core\CAT::VERSION_MAJOR.'.'.\core\CAT::VERSION_MINOR.'.'.\core\CAT::VERSION_PATCH.'"
413 413
 !define INSTALLER_NAME "installer.exe"
414
-!define LANG "' . $this->lang . '"
415
-!define LOCALE "' . preg_replace('/\..*$/', '', \config\Master::LANGUAGES[$this->languageInstance->getLang()]['locale']) . '"
414
+!define LANG "' . $this->lang.'"
415
+!define LOCALE "' . preg_replace('/\..*$/', '', \config\Master::LANGUAGES[$this->languageInstance->getLang()]['locale']).'"
416 416
 ;--------------------------------
417
-!define ORGANISATION "' . $this->translateString($attr['general:instname'][0]) . '"
417
+!define ORGANISATION "' . $this->translateString($attr['general:instname'][0]).'"
418 418
 ';
419 419
         $fcontents .= $this->getSupport($attr, 'email');
420 420
         $fcontents .= $this->getSupport($attr, 'url');
@@ -422,18 +422,18 @@  discard block
 block discarded – undo
422 422
             $fcontents .= '!define WIRED
423 423
         ';
424 424
         }
425
-        $fcontents .= '!define PROVIDERID "urn:UUID:' . $this->deviceUUID . '"
425
+        $fcontents .= '!define PROVIDERID "urn:UUID:'.$this->deviceUUID.'"
426 426
 ';
427 427
         if (!empty($attr['internal:realm'][0])) {
428
-            $fcontents .= '!define REALM "' . $attr['internal:realm'][0] . '"
428
+            $fcontents .= '!define REALM "'.$attr['internal:realm'][0].'"
429 429
 ';
430 430
         }
431 431
         if (!empty($attr['internal:hint_userinput_suffix'][0]) && $attr['internal:hint_userinput_suffix'][0] == 1) {
432
-            $fcontents .= '!define HINT_USER_INPUT "' . $attr['internal:hint_userinput_suffix'][0] . '"
432
+            $fcontents .= '!define HINT_USER_INPUT "'.$attr['internal:hint_userinput_suffix'][0].'"
433 433
 ';
434 434
         }
435 435
         if (!empty($attr['internal:verify_userinput_suffix'][0]) && $attr['internal:verify_userinput_suffix'][0] == 1) {
436
-            $fcontents .= '!define VERIFY_USER_REALM_INPUT "' . $attr['internal:verify_userinput_suffix'][0] . '"
436
+            $fcontents .= '!define VERIFY_USER_REALM_INPUT "'.$attr['internal:verify_userinput_suffix'][0].'"
437 437
 ';
438 438
         }
439 439
         $fcontents .= $this->msInfoFile($attr);
@@ -454,7 +454,7 @@  discard block
 block discarded – undo
454 454
             $out .= '!define EXTERNAL_INFO "';
455 455
 //  $this->loggerInstance->debug(4,"Info file type ".$attr['support:info_file'][0]['mime']."\n");
456 456
             if ($attr['internal:info_file'][0]['mime'] == 'rtf') {
457
-                $out = '!define LICENSE_FILE "' . $attr['internal:info_file'][0]['name'];
457
+                $out = '!define LICENSE_FILE "'.$attr['internal:info_file'][0]['name'];
458 458
             } elseif ($attr['internal:info_file'][0]['mime'] == 'txt') {
459 459
                 $infoFile = file_get_contents($attr['internal:info_file'][0]['name']);
460 460
                 if ($infoFile === false) {
@@ -467,7 +467,7 @@  discard block
 block discarded – undo
467 467
                     $out = '!define LICENSE_FILE " info_f.txt';
468 468
                 }
469 469
             } else {
470
-                $out = '!define EXTERNAL_INFO "' . $attr['internal:info_file'][0]['name'];
470
+                $out = '!define EXTERNAL_INFO "'.$attr['internal:info_file'][0]['name'];
471 471
             }
472 472
 
473 473
             $out .= "\"\n";
Please login to merge, or discard this patch.
web/lib/admin/MapGoogle.php 1 patch
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -47,7 +47,7 @@  discard block
 block discarded – undo
47 47
     public function htmlHeadCode() {
48 48
         $cat = new \core\CAT();
49 49
         \core\common\Entity::intoThePotatoes();
50
-        $retval = "<script type='text/javascript' src='https://maps.googleapis.com/maps/api/js?key=" . \config\Master::APPEARANCE['google_maps_api_key'] . "'></script>
50
+        $retval = "<script type='text/javascript' src='https://maps.googleapis.com/maps/api/js?key=".\config\Master::APPEARANCE['google_maps_api_key']."'></script>
51 51
     <script type='text/javascript'>
52 52
         // some global variables;
53 53
         var center_lat=49.6114885608729;
@@ -103,19 +103,19 @@  discard block
 block discarded – undo
103 103
          *
104 104
          */
105 105
         function locator_magic() {
106
-            geocoder.geocode({'address':\"" . preg_replace("/\"/", "&quot;", $this->instName) . "\", 'region':\"" . strtolower($this->fedName) . "\"},
106
+            geocoder.geocode({'address':\"" . preg_replace("/\"/", "&quot;", $this->instName)."\", 'region':\"".strtolower($this->fedName)."\"},
107 107
             function(r,status) {
108 108
                 if(status != google.maps.GeocoderStatus.OK) {
109
-                    locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name'] . "\");
109
+                    locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name']."\");
110 110
                 } else {
111 111
                     var i;
112 112
                     for(i = 0; i < r.length; i++) {
113 113
                         Addr = getAddressElements(r[i].address_components);
114
-                        if(Addr.country == \"" . strtoupper($this->fedName) . "\")
114
+                        if(Addr.country == \"" . strtoupper($this->fedName)."\")
115 115
                         break;
116 116
                     }
117
-                    if(Addr.country != \"" . strtoupper($this->fedName) . "\")
118
-                    locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name'] . "\");
117
+                    if(Addr.country != \"" . strtoupper($this->fedName)."\")
118
+                    locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name']."\");
119 119
                     else {
120 120
                         addMarker(r[i].geometry.location,15,null);
121 121
                     }
@@ -128,7 +128,7 @@  discard block
 block discarded – undo
128 128
          */
129 129
         function markerClicked(m) {
130 130
             info_window.close();
131
-            var t = \"" . _("This is location ") . "\"+m.info;
131
+            var t = \"" . _("This is location ")."\"+m.info;
132 132
             info_window.setContent(t);
133 133
             info_window.setPosition(m.getPosition());
134 134
             info_window.open(map,m);
@@ -207,7 +207,7 @@  discard block
 block discarded – undo
207 207
         function getAddressLocation() {
208 208
             var city = $('#address').val();
209 209
             if(city == '') {
210
-                alert(\"" . _("nothing entered in the address field") . "\");
210
+                alert(\"" . _("nothing entered in the address field")."\");
211 211
                 return false;
212 212
             }
213 213
             geocoder.geocode( { 'address': city}, function(results, status) {
@@ -227,7 +227,7 @@  discard block
 block discarded – undo
227 227
          * trigger geolocation
228 228
          */
229 229
         function locateMe() {
230
-            $('#address').val(\"" . _("locating") . "\");
230
+            $('#address').val(\"" . _("locating")."\");
231 231
             navigator.geolocation.getCurrentPosition(locate_succes,locate_fail,{maximumAge:3600000, timeout:5000});
232 232
         }
233 233
 
@@ -345,7 +345,7 @@  discard block
 block discarded – undo
345 345
         if ($this->readOnly) {
346 346
             return "<div id='map' class='googlemap'></div>";
347 347
         } else {
348
-            return $this->htmlPreEdit($wizard, $additional) . $this->findLocationHtml() . "<div id='map' class='googlemap'></div>" . $this->htmlPostEdit(FALSE);
348
+            return $this->htmlPreEdit($wizard, $additional).$this->findLocationHtml()."<div id='map' class='googlemap'></div>".$this->htmlPostEdit(FALSE);
349 349
         }
350 350
     }
351 351
 
@@ -358,11 +358,11 @@  discard block
 block discarded – undo
358 358
      */
359 359
     public static function optionListDisplayCode($coords, $number) {
360 360
         // quiesce warnings about unused variable
361
-        if (strlen(sprintf("%s", $coords)) <0) {
361
+        if (strlen(sprintf("%s", $coords)) < 0) {
362 362
             throw new \Exception("A miracle! A string with negative length!");
363 363
         };
364 364
         \core\common\Entity::intoThePotatoes();
365
-        $retval = "<button id='location_b_" . $number . "' class='location_button'>" . _("Click to see location") . " $number</button>";
365
+        $retval = "<button id='location_b_".$number."' class='location_button'>"._("Click to see location")." $number</button>";
366 366
         \core\common\Entity::outOfThePotatoes();
367 367
         return $retval;
368 368
     }
@@ -373,7 +373,7 @@  discard block
 block discarded – undo
373 373
      * @return string
374 374
      */
375 375
     public function bodyTagCode() {
376
-        return "onload='load(" . ($this->readOnly ? "0" : "1") . ")'";
376
+        return "onload='load(".($this->readOnly ? "0" : "1").")'";
377 377
     }
378 378
 
379 379
     /**
@@ -383,7 +383,7 @@  discard block
 block discarded – undo
383 383
      */
384 384
     private function findLocationHtml() {
385 385
         \core\common\Entity::intoThePotatoes();
386
-        $retval = "<p>" . _("Address:") . " <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>" . _("Find address") . "</button> <button type='button' onclick='locateMe()'>" . _("Locate Me!") . "</button></p>";
386
+        $retval = "<p>"._("Address:")." <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>"._("Find address")."</button> <button type='button' onclick='locateMe()'>"._("Locate Me!")."</button></p>";
387 387
         \core\common\Entity::outOfThePotatoes();
388 388
         return $retval;
389 389
     }
Please login to merge, or discard this patch.
web/lib/admin/MapOpenLayers.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -83,7 +83,7 @@  discard block
 block discarded – undo
83 83
         
84 84
 // use HTML5 geolocation
85 85
         function locateMe() {
86
-            $('#address').val(\"" . _("locating") . "\");
86
+            $('#address').val(\"" . _("locating")."\");
87 87
             navigator.geolocation.getCurrentPosition(locate_succes,locate_fail,{maximumAge:3600000, timeout:5000});
88 88
         }
89 89
         
@@ -205,7 +205,7 @@  discard block
 block discarded – undo
205 205
                 view.fit(extent, {padding: [10, 0, 10, 0]});
206 206
             } else {
207 207
                 view.setCenter([0,0]);
208
-                locate_country('" . $cat->knownFederations[strtoupper($this->fedName)]['name'] . "'); // use the federation code to locate the country
208
+                locate_country('" . $cat->knownFederations[strtoupper($this->fedName)]['name']."'); // use the federation code to locate the country
209 209
                 map.setView(view);
210 210
             }
211 211
             view.setMaxZoom(20);
@@ -227,14 +227,14 @@  discard block
 block discarded – undo
227 227
         function getAddressLocation() {
228 228
             var city = $('#address').val();
229 229
             if(city == '') {
230
-                alert(\"" . _("nothing entered in the address field") . "\");
230
+                alert(\"" . _("nothing entered in the address field")."\");
231 231
                 return false;
232 232
             }
233 233
             city = city.replace(/\s*,\s*/g,',+');
234 234
             city = city.replace(/ +/,'+');
235 235
             $.get(addressService+'?format=json&addressdetails=0&q='+city, '',  function(data) {
236 236
                 if (data[0] === undefined) {
237
-                    alert('" . _("Address not found, perhaps try another form, like putting the street number to the front.") . "');
237
+                    alert('" . _("Address not found, perhaps try another form, like putting the street number to the front.")."');
238 238
                     return;
239 239
                 }
240 240
                 showTmpPointer(data[0].lon, data[0].lat);
@@ -285,7 +285,7 @@  discard block
 block discarded – undo
285 285
         if ($this->readOnly) {
286 286
             return "<div id='map' class='locationmap'></div><script>generateMap('map')</script>";
287 287
         } else {
288
-            return $this->htmlPreEdit($wizard, $additional) . $this->findLocationHtml() . "<span id='location-prompt'>You can drag the pointer to the final location before you save the results.</span><div id='map' class='locationmap'></div><script>generateMap('map')</script>" . $this->htmlPostEdit(FALSE);
288
+            return $this->htmlPreEdit($wizard, $additional).$this->findLocationHtml()."<span id='location-prompt'>You can drag the pointer to the final location before you save the results.</span><div id='map' class='locationmap'></div><script>generateMap('map')</script>".$this->htmlPostEdit(FALSE);
289 289
         }
290 290
     }
291 291
 
@@ -310,7 +310,7 @@  discard block
 block discarded – undo
310 310
         // we don't need this parameter in this subclass
311 311
         unset($coords);
312 312
         \core\common\Entity::intoThePotatoes();
313
-        $retval = "<button id='location_b_" . $number . "' class='location_button'>" . _("Click to see location") . " $number</button>";
313
+        $retval = "<button id='location_b_".$number."' class='location_button'>"._("Click to see location")." $number</button>";
314 314
         \core\common\Entity::outOfThePotatoes();
315 315
         return $retval;
316 316
     }
@@ -322,7 +322,7 @@  discard block
 block discarded – undo
322 322
      */
323 323
     private function findLocationHtml() {
324 324
         \core\common\Entity::intoThePotatoes();
325
-        $retval = "<p>" . _("Address:") . " <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>" . _("Find address") . "</button> <button type='button' onclick='locateMe()'>" . _("Locate Me!") . "</button></p>";
325
+        $retval = "<p>"._("Address:")." <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>"._("Find address")."</button> <button type='button' onclick='locateMe()'>"._("Locate Me!")."</button></p>";
326 326
         \core\common\Entity::outOfThePotatoes();
327 327
         return $retval;
328 328
     }
Please login to merge, or discard this patch.
web/admin/edit_participant.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -19,7 +19,7 @@  discard block
 block discarded – undo
19 19
  *          <base_url>/copyright.php after deploying the software
20 20
  */
21 21
 
22
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
22
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
23 23
 
24 24
 $auth = new \web\lib\admin\Authentication();
25 25
 $deco = new \web\lib\admin\PageDecoration();
@@ -116,12 +116,12 @@  discard block
 block discarded – undo
116 116
         </table>
117 117
     </div>
118 118
     <?php
119
-    echo "<form enctype='multipart/form-data' action='edit_participant_result.php?inst_id=$my_inst->identifier" . ($wizardStyle ? "&wizard=true" : "") . "' method='post' accept-charset='UTF-8'>
120
-              <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>";
119
+    echo "<form enctype='multipart/form-data' action='edit_participant_result.php?inst_id=$my_inst->identifier".($wizardStyle ? "&wizard=true" : "")."' method='post' accept-charset='UTF-8'>
120
+              <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE."'>";
121 121
 
122 122
     if ($wizardStyle) {
123
-        echo "<p>" .
124
-        sprintf(_("Hello, newcomer. The %s is new to us. This wizard will ask you several questions about it, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users."), $uiElements->nomenclatureParticipant) . "</p>";
123
+        echo "<p>".
124
+        sprintf(_("Hello, newcomer. The %s is new to us. This wizard will ask you several questions about it, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users."), $uiElements->nomenclatureParticipant)."</p>";
125 125
     }
126 126
     $optionDisplay = new web\lib\admin\OptionDisplay($idpoptions, \core\Options::LEVEL_IDP);
127 127
     ?>
@@ -163,9 +163,9 @@  discard block
 block discarded – undo
163 163
         $discardLabel = _("Discard changes");
164 164
     }
165 165
     if ($wizardStyle) {
166
-        echo "<p>" . sprintf(_("When you are sure that everything is correct, please click on %sContinue ...%s"), "<button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CONTINUE . "'>", "</button>") . "</p></form>";
166
+        echo "<p>".sprintf(_("When you are sure that everything is correct, please click on %sContinue ...%s"), "<button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CONTINUE."'>", "</button>")."</p></form>";
167 167
     } else {
168
-        echo "<div><button type='submit' id='submitbutton' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button> <button type='button' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>".$discardLabel."</button></div></form>";
168
+        echo "<div><button type='submit' id='submitbutton' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button> <button type='button' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>".$discardLabel."</button></div></form>";
169 169
     }
170 170
     echo $deco->footer();
171 171
     
172 172
\ No newline at end of file
Please login to merge, or discard this patch.