@@ -156,8 +156,8 @@ |
||
| 156 | 156 | // replace namespace separators with directory separators |
| 157 | 157 | // in the relative class name, append with .php |
| 158 | 158 | $file = $base_dir |
| 159 | - . str_replace('\\', '/', $relative_class) |
|
| 160 | - . '.php'; |
|
| 159 | + . str_replace('\\', '/', $relative_class) |
|
| 160 | + . '.php'; |
|
| 161 | 161 | |
| 162 | 162 | // if the mapped file exists, require it |
| 163 | 163 | if ($this->requireFile($file)) { |
@@ -97,10 +97,10 @@ |
||
| 97 | 97 | public function addNamespace($prefix, $base_dir, $prepend = false) |
| 98 | 98 | { |
| 99 | 99 | // normalize namespace prefix |
| 100 | - $prefix = trim($prefix, '\\') . '\\'; |
|
| 100 | + $prefix = trim($prefix, '\\').'\\'; |
|
| 101 | 101 | |
| 102 | 102 | // normalize the base directory with a trailing separator |
| 103 | - $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR) . '/'; |
|
| 103 | + $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR).'/'; |
|
| 104 | 104 | |
| 105 | 105 | // initialize the namespace prefix array |
| 106 | 106 | if (isset($this->prefixes[$prefix]) === false) { |
@@ -9,7 +9,7 @@ |
||
| 9 | 9 | */ |
| 10 | 10 | ?> |
| 11 | 11 | <h1>Example Skin (main user frontpage)</h1> |
| 12 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","consortium_logo.png");?>"/> |
|
| 12 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "consortium_logo.png"); ?>"/> |
|
| 13 | 13 | <p>This skin is much more sober and less bloated than the default one. As it happens, it also doesn't do anything.</p> |
| 14 | 14 | <p>But at least it goes to show that it's possible to include custom images/CSS/external software using findResourceUrl(..., $filename): |
| 15 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","custom.png");?>"/> |
|
| 15 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "custom.png"); ?>"/> |
|
@@ -246,11 +246,11 @@ discard block |
||
| 246 | 246 | } |
| 247 | 247 | |
| 248 | 248 | /** |
| 249 | - * This function parses a X.509 cert and returns all certificatePolicies OIDs |
|
| 250 | - * |
|
| 251 | - * @param array $cert (returned from openssl_x509_parse) |
|
| 252 | - * @return array of OIDs |
|
| 253 | - */ |
|
| 249 | + * This function parses a X.509 cert and returns all certificatePolicies OIDs |
|
| 250 | + * |
|
| 251 | + * @param array $cert (returned from openssl_x509_parse) |
|
| 252 | + * @return array of OIDs |
|
| 253 | + */ |
|
| 254 | 254 | private function propertyCheckPolicy($cert) { |
| 255 | 255 | $oids = []; |
| 256 | 256 | if ($cert['extensions']['certificatePolicies']) { |
@@ -263,11 +263,11 @@ discard block |
||
| 263 | 263 | return $oids; |
| 264 | 264 | } |
| 265 | 265 | /** |
| 266 | - * This function parses a X.509 cert and returns the value of $field |
|
| 267 | - * |
|
| 268 | - * @param array $cert (returned from openssl_x509_parse) |
|
| 269 | - * @return string value of the issuer field or '' |
|
| 270 | - */ |
|
| 266 | + * This function parses a X.509 cert and returns the value of $field |
|
| 267 | + * |
|
| 268 | + * @param array $cert (returned from openssl_x509_parse) |
|
| 269 | + * @return string value of the issuer field or '' |
|
| 270 | + */ |
|
| 271 | 271 | private function getCertificateIssuer($cert) { |
| 272 | 272 | $issuer = ''; |
| 273 | 273 | foreach ($cert['issuer'] as $key => $val) { |
@@ -23,7 +23,7 @@ discard block |
||
| 23 | 23 | |
| 24 | 24 | use \Exception; |
| 25 | 25 | |
| 26 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
| 26 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
| 27 | 27 | |
| 28 | 28 | /** |
| 29 | 29 | * Test suite to verify that a given NAI realm has NAPTR records according to |
@@ -144,7 +144,7 @@ discard block |
||
| 144 | 144 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['status'] = $cert['status']; |
| 145 | 145 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['message'] = $this->TLS_certkeys[$cert['status']]; |
| 146 | 146 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['expected'] = $cert['expected']; |
| 147 | - $add = ' -cert ' . ROOT . '/config/cli-certs/' . $cert['public'] . ' -key ' . ROOT . '/config/cli-certs/' . $cert['private']; |
|
| 147 | + $add = ' -cert '.ROOT.'/config/cli-certs/'.$cert['public'].' -key '.ROOT.'/config/cli-certs/'.$cert['private']; |
|
| 148 | 148 | if (!isset($this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k])) { |
| 149 | 149 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k] = []; |
| 150 | 150 | } |
@@ -188,11 +188,11 @@ discard block |
||
| 188 | 188 | // but code analysers want this more explicit, so here is this extra |
| 189 | 189 | // call to escapeshellarg() |
| 190 | 190 | $escapedHost = escapeshellarg($host); |
| 191 | - $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1\n"); |
|
| 191 | + $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1\n"); |
|
| 192 | 192 | $time_start = microtime(true); |
| 193 | 193 | $opensslbabble = []; |
| 194 | 194 | $result = 999; // likely to become zero by openssl; don't want to initialise to zero, could cover up exec failures |
| 195 | - exec(CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); |
|
| 195 | + exec(CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); |
|
| 196 | 196 | $time_stop = microtime(true); |
| 197 | 197 | $testresults['time_millisec'] = floor(($time_stop - $time_start) * 1000); |
| 198 | 198 | $testresults['returncode'] = $result; |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | they are from the same user group. You are not allowed to share them to an unlimited |
| 53 | 53 | audience (e.g. on a publicly accessible web server).</li> |
| 54 | 54 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to |
| 55 | -your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
| 55 | +your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
| 56 | 56 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on |
| 57 | 57 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> |
| 58 | 58 | </ul> |
@@ -88,7 +88,7 @@ |
||
| 88 | 88 | 'server_suffix' => '.hosted.eduroam.org', |
| 89 | 89 | 'gracetime' => 90, |
| 90 | 90 | 'CA' => ["type" => "embedded"], # OCSP URL needs to be configured in openssl.cnf |
| 91 | - # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], |
|
| 91 | + # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], |
|
| 92 | 92 | |
| 93 | 93 | ], |
| 94 | 94 | /** |
@@ -53,14 +53,14 @@ |
||
| 53 | 53 | } |
| 54 | 54 | |
| 55 | 55 | switch ($_GET['token']) { |
| 56 | - case "SELF-REGISTER": |
|
| 57 | - $token = "SELF-REGISTER"; |
|
| 58 | - $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
| 59 | - $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
| 60 | - break; |
|
| 61 | - default: |
|
| 62 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 63 | - $checkval = $usermgmt->checkTokenValidity($token); |
|
| 56 | + case "SELF-REGISTER": |
|
| 57 | + $token = "SELF-REGISTER"; |
|
| 58 | + $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
| 59 | + $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
| 60 | + break; |
|
| 61 | + default: |
|
| 62 | + $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 63 | + $checkval = $usermgmt->checkTokenValidity($token); |
|
| 64 | 64 | } |
| 65 | 65 | |
| 66 | 66 | if ($checkval < 0) { |
@@ -30,7 +30,7 @@ discard block |
||
| 30 | 30 | ?> |
| 31 | 31 | <?php |
| 32 | 32 | |
| 33 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 33 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 34 | 34 | |
| 35 | 35 | $auth = new \web\lib\admin\Authentication(); |
| 36 | 36 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -70,22 +70,22 @@ discard block |
||
| 70 | 70 | $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
| 71 | 71 | break; |
| 72 | 72 | default: |
| 73 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 73 | + $token = $validator->token(filter_input(INPUT_GET, 'token', FILTER_SANITIZE_STRING)); |
|
| 74 | 74 | $checkval = $usermgmt->checkTokenValidity($token); |
| 75 | 75 | } |
| 76 | 76 | |
| 77 | 77 | if ($checkval < 0) { |
| 78 | 78 | echo $deco->pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP"); |
| 79 | - echo "<h1>" . _("Error creating new IdP binding!") . "</h1>"; |
|
| 79 | + echo "<h1>"._("Error creating new IdP binding!")."</h1>"; |
|
| 80 | 80 | switch ($checkval) { |
| 81 | 81 | case \core\UserManagement::TOKENSTATUS_FAIL_ALREADYCONSUMED: |
| 82 | - echo "<p>" . sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst) . "</p>"; |
|
| 82 | + echo "<p>".sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst)."</p>"; |
|
| 83 | 83 | break; |
| 84 | 84 | case \core\UserManagement::TOKENSTATUS_FAIL_EXPIRED: |
| 85 | - echo "<p>" . sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed) . "</p>"; |
|
| 85 | + echo "<p>".sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed)."</p>"; |
|
| 86 | 86 | break; |
| 87 | 87 | default: |
| 88 | - echo "<p>" . _("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.") . "</p>"; |
|
| 88 | + echo "<p>"._("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.")."</p>"; |
|
| 89 | 89 | } |
| 90 | 90 | echo $deco->footer(); |
| 91 | 91 | throw new Exception("Terminating because something is wrong with the token we received."); |
@@ -100,12 +100,12 @@ discard block |
||
| 100 | 100 | case "SELF-REGISTER": |
| 101 | 101 | $fed = new \core\Federation($federation); |
| 102 | 102 | $newidp = new \core\IdP($fed->newIdP($user, "FED", "SELFSERVICE")); |
| 103 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - selfservice registration"); |
|
| 103 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - selfservice registration"); |
|
| 104 | 104 | break; |
| 105 | 105 | default: |
| 106 | 106 | $newidp = $usermgmt->createIdPFromToken($token, $user); |
| 107 | 107 | $usermgmt->invalidateToken($token); |
| 108 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated"); |
|
| 108 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - Token used and invalidated"); |
|
| 109 | 109 | break; |
| 110 | 110 | } |
| 111 | 111 | |
@@ -1019,12 +1019,12 @@ |
||
| 1019 | 1019 | $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); |
| 1020 | 1020 | $certUsernameLength = strlen($certUsernameLabel); |
| 1021 | 1021 | $labelLength = max($certPasswordLength,$certUsernameLength); |
| 1022 | - ?> |
|
| 1022 | + ?> |
|
| 1023 | 1023 | ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" |
| 1024 | 1024 | !else |
| 1025 | 1025 | <?php $certPasswordLabel = WindowsCommon::sprint_nsi(_("import password:")); |
| 1026 | 1026 | $certPasswordLength = strlen($certPasswordLabel); |
| 1027 | - ?> |
|
| 1027 | + ?> |
|
| 1028 | 1028 | !insertmacro debug_cat 4 "Unpacking SB_cert.p12" |
| 1029 | 1029 | File "SB_cert.p12" |
| 1030 | 1030 | nsArray::Set Delete_files "SB_cert.p12" |
@@ -135,10 +135,10 @@ discard block |
||
| 135 | 135 | !define MUI_HEADERIMAGE_BITMAP "cat_150.bmp" |
| 136 | 136 | !define MUI_COMPONENTSPAGE_SMALLDESC |
| 137 | 137 | |
| 138 | -!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" |
|
| 139 | -!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi( _("Installation complete"))?>" |
|
| 140 | -!define FAREWELL_TEXT "<?php WindowsCommon::echo_nsi( _("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi( _("Your system is ready."))?>" |
|
| 141 | -!define FAREWELL_FAIL "<?php WindowsCommon::echo_nsi( _("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi( _("Please contact \${SUPPORT}."))?>" |
|
| 138 | +!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" |
|
| 139 | +!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi(_("Installation complete"))?>" |
|
| 140 | +!define FAREWELL_TEXT "<?php WindowsCommon::echo_nsi(_("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Your system is ready."))?>" |
|
| 141 | +!define FAREWELL_FAIL "<?php WindowsCommon::echo_nsi(_("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Please contact \${SUPPORT}."))?>" |
|
| 142 | 142 | ;-------------------------------- |
| 143 | 143 | ;Languages |
| 144 | 144 | !insertmacro MUI_LANGUAGE "${LANG}" |
@@ -146,14 +146,14 @@ discard block |
||
| 146 | 146 | ;-------------------------------- |
| 147 | 147 | ; License file |
| 148 | 148 | !ifdef LICENSE_FILE |
| 149 | -LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi( _("Accept"))?>" |
|
| 149 | +LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi(_("Accept"))?>" |
|
| 150 | 150 | LicenseText "<?php WindowsCommon::echo_nsi(_("If you accept the conditions then select Accept and then click Install to continue."))?>" |
| 151 | 151 | LicenseData ${LICENSE_FILE} |
| 152 | 152 | !endif |
| 153 | 153 | |
| 154 | 154 | ;----------------------------------- |
| 155 | 155 | |
| 156 | -MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi( _("Finish"))?>" |
|
| 156 | +MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi(_("Finish"))?>" |
|
| 157 | 157 | ;---------------------------------- |
| 158 | 158 | ; FUNCTIONS |
| 159 | 159 | |
@@ -186,7 +186,7 @@ discard block |
||
| 186 | 186 | |
| 187 | 187 | !macro install_ca_cert ca_file ca_fingerprint level |
| 188 | 188 | !insertmacro debug_cat 2 "locating certificate SHA=${ca_fingerprint} Level=${level}" |
| 189 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("searching for certificate"))?> ${ca_file}" |
|
| 189 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("searching for certificate"))?> ${ca_file}" |
|
| 190 | 190 | File "${ca_file}" |
| 191 | 191 | nsArray::Set Delete_files "${ca_file}" |
| 192 | 192 | !insertmacro debug_cat 2 "Testing machine store root" |
@@ -248,13 +248,13 @@ discard block |
||
| 248 | 248 | ${EndIf} |
| 249 | 249 | !insertmacro debug_cat 2 "installing certificate $TEMP\${ca_file}" |
| 250 | 250 | !insertmacro debug_cat 3 "Execute: certutil -addstore -user ${level} $TEMP\${ca_file}" |
| 251 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("installing certificate"))?> ${ca_file}" |
|
| 251 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("installing certificate"))?> ${ca_file}" |
|
| 252 | 252 | nsExec::Exec '"certutil" -addstore -user ${level} "$TEMP"\${ca_file}' |
| 253 | 253 | Pop $0 |
| 254 | 254 | !insertmacro debug_cat 3 "certutil returned $0" |
| 255 | 255 | ${If} $0 != 0 |
| 256 | 256 | IfSilent +2 |
| 257 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("could not install certificate"))?> ${ca_file}" |
|
| 257 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("could not install certificate"))?> ${ca_file}" |
|
| 258 | 258 | !insertmacro debug_cat 1 "could not install certificate ${ca_file}" |
| 259 | 259 | ${EndIf} |
| 260 | 260 | no_install_${ca_file}: |
@@ -461,26 +461,26 @@ discard block |
||
| 461 | 461 | pop $R0 |
| 462 | 462 | ${If} $tkip_count > 0 |
| 463 | 463 | ${If} $aes_count > 1 |
| 464 | - StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" |
|
| 464 | + StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" |
|
| 465 | 465 | ${Else} |
| 466 | - StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profile is preferred. Always use it if you have a choice."))?>" |
|
| 466 | + StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profile is preferred. Always use it if you have a choice."))?>" |
|
| 467 | 467 | ${EndIf} |
| 468 | 468 | ${Else} |
| 469 | 469 | StrCpy $R1 "" |
| 470 | 470 | ${EndIf} |
| 471 | 471 | ${If} $profile_count > 0 |
| 472 | - StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
| 473 | -<?php WindowsCommon::echo_nsi( _("The installer will create the following wireless profiles:"))?>$\r$\n\ |
|
| 472 | + StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
| 473 | +<?php WindowsCommon::echo_nsi(_("The installer will create the following wireless profiles:"))?>$\r$\n\ |
|
| 474 | 474 | $R0.\ |
| 475 | 475 | $R1$\r$\n$\n\ |
| 476 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ |
|
| 476 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ |
|
| 477 | 477 | EMAIL: ${SUPPORT}$\r$\n\ |
| 478 | 478 | WWW: ${URL}" |
| 479 | 479 | ${Else} |
| 480 | -StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
| 481 | -<?php WindowsCommon::echo_nsi( _("The installer will create the wireless profile:"))?> $R0.\ |
|
| 480 | +StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
| 481 | +<?php WindowsCommon::echo_nsi(_("The installer will create the wireless profile:"))?> $R0.\ |
|
| 482 | 482 | $R1$\r$\n$\n\ |
| 483 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ |
|
| 483 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ |
|
| 484 | 484 | EMAIL: ${SUPPORT}$\r$\n\ |
| 485 | 485 | WWW: ${URL}" |
| 486 | 486 | ${EndIf} |
@@ -506,7 +506,7 @@ discard block |
||
| 506 | 506 | SendMessage $HEADLINE ${WM_SETFONT} $HEADLINE_FONT 0 |
| 507 | 507 | ;TRANSLATION |
| 508 | 508 | nsDialogs::CreateControl STATIC ${WS_VISIBLE}|${WS_CHILD}|${WS_CLIPSIBLINGS} 0 120u 46u -130u -32u "$welcome_message\ |
| 509 | -$\r$\n$\r$\n<?php WindowsCommon::echo_nsi( _("Installer created with software from the GEANT project."))?>" |
|
| 509 | +$\r$\n$\r$\n<?php WindowsCommon::echo_nsi(_("Installer created with software from the GEANT project."))?>" |
|
| 510 | 510 | Pop $TEXT |
| 511 | 511 | |
| 512 | 512 | SetCtlColors $DIALOG "" 0xffffff |
@@ -619,18 +619,18 @@ discard block |
||
| 619 | 619 | ${If} $wireless_result == 1 |
| 620 | 620 | !insertmacro debug_cat 1 "wlan_test.exe did not find wireless configuration service" |
| 621 | 621 | IfSilent +2 |
| 622 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" |
|
| 622 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" |
|
| 623 | 623 | Call Cleanup |
| 624 | 624 | ${EndIf} |
| 625 | 625 | ${If} $wireless_result == 2 |
| 626 | 626 | IfSilent +2 |
| 627 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. The installer cannot continue."))?>" |
|
| 627 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. The installer cannot continue."))?>" |
|
| 628 | 628 | Call Cleanup |
| 629 | 629 | ${EndIf} |
| 630 | 630 | ${Else} |
| 631 | 631 | ${If} $wireless_result > 0 |
| 632 | 632 | IfSilent +3 |
| 633 | - MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes |
|
| 633 | + MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes |
|
| 634 | 634 | Call Cleanup |
| 635 | 635 | wired_yes: |
| 636 | 636 | Push 1 |
@@ -646,7 +646,7 @@ discard block |
||
| 646 | 646 | ${If} $wired == 1 |
| 647 | 647 | ${If} $force_wired == 0 |
| 648 | 648 | IfSilent wired |
| 649 | - MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("Do you want to enable access on wired interfaces?"))?>" IDYES wired |
|
| 649 | + MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("Do you want to enable access on wired interfaces?"))?>" IDYES wired |
|
| 650 | 650 | Push 0 |
| 651 | 651 | Pop $wired |
| 652 | 652 | ${EndIf} |
@@ -687,7 +687,7 @@ discard block |
||
| 687 | 687 | ;================================ |
| 688 | 688 | |
| 689 | 689 | Function ShowInstfiles |
| 690 | - !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Profiles installation"))?>" " " |
|
| 690 | + !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Profiles installation"))?>" " " |
|
| 691 | 691 | FunctionEnd |
| 692 | 692 | ;================================ |
| 693 | 693 | ; Check if a wireless profile exist and put it on delete list |
@@ -706,7 +706,7 @@ discard block |
||
| 706 | 706 | |
| 707 | 707 | Function FindProfile |
| 708 | 708 | Pop $R8 |
| 709 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("Checking for profile \$R8"))?>" |
|
| 709 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("Checking for profile \$R8"))?>" |
|
| 710 | 710 | !insertmacro debug_cat 2 "Checking for profile $R8" |
| 711 | 711 | !insertmacro debug_cat 3 "Exec: $Netsh wlan show profiles $R8" |
| 712 | 712 | nsExec::Exec '"$Netsh" wlan show profiles "$R8"' |
@@ -714,7 +714,7 @@ discard block |
||
| 714 | 714 | !insertmacro debug_cat 4 "netsh returned $0" |
| 715 | 715 | ${If} $0 == 0 |
| 716 | 716 | !insertmacro debug_cat 1 "found profile $R8" |
| 717 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("found profile \$R8"))?>" |
|
| 717 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("found profile \$R8"))?>" |
|
| 718 | 718 | Push 0 |
| 719 | 719 | ${Else} |
| 720 | 720 | !insertmacro debug_cat 1 "profile $R8 not found" |
@@ -809,7 +809,7 @@ discard block |
||
| 809 | 809 | ${If} $Symantec_installed != 0 |
| 810 | 810 | !insertmacro debug_cat 3 "Symantec problem" |
| 811 | 811 | IfSilent +2 |
| 812 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" |
|
| 812 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" |
|
| 813 | 813 | Exec '"explorer" /select,"$EXEDIR\inst_cat.cmd"' |
| 814 | 814 | Quit |
| 815 | 815 | |
@@ -1097,7 +1097,7 @@ discard block |
||
| 1097 | 1097 | Function PFXCertificateSelect |
| 1098 | 1098 | !ifndef SILVERBULLET |
| 1099 | 1099 | ;TRANSLATION |
| 1100 | -!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" |
|
| 1100 | +!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" |
|
| 1101 | 1101 | ;TRANSLATION |
| 1102 | 1102 | IfSilent +2 |
| 1103 | 1103 | MessageBox MB_OK "<?php WindowsCommon::echo_nsi(_("Preparing to install personal certificate."))?>$\r$\n<?php WindowsCommon::echo_nsi(_("Click OK to continue"))?> " |
@@ -1113,7 +1113,7 @@ discard block |
||
| 1113 | 1113 | $certPasswordLength = strlen($certPasswordLabel); |
| 1114 | 1114 | $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); |
| 1115 | 1115 | $certUsernameLength = strlen($certUsernameLabel); |
| 1116 | - $labelLength = max($certPasswordLength,$certUsernameLength); |
|
| 1116 | + $labelLength = max($certPasswordLength, $certUsernameLength); |
|
| 1117 | 1117 | ?> |
| 1118 | 1118 | ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" |
| 1119 | 1119 | !else |
@@ -1130,11 +1130,11 @@ discard block |
||
| 1130 | 1130 | !insertmacro debug_cat 3 "Vista level (Vista without Service pack): $VistaNoSP"; |
| 1131 | 1131 | ${If} $VistaNoSP == 0 |
| 1132 | 1132 | !ifdef PFX_USERNAME |
| 1133 | - !define LABEL_LENGTH "<?php echo($labelLength*3.5)?>u" |
|
| 1134 | - !define TEXT_START "<?php echo($labelLength*3.5 +5)?>u" |
|
| 1133 | + !define LABEL_LENGTH "<?php echo($labelLength * 3.5)?>u" |
|
| 1134 | + !define TEXT_START "<?php echo($labelLength * 3.5 + 5)?>u" |
|
| 1135 | 1135 | !else |
| 1136 | - !define LABEL_LENGTH "<?php echo($certPasswordLength*3.5)?>u" |
|
| 1137 | - !define TEXT_START "<?php echo($certPasswordLength*3.5 +5)?>u" |
|
| 1136 | + !define LABEL_LENGTH "<?php echo($certPasswordLength * 3.5)?>u" |
|
| 1137 | + !define TEXT_START "<?php echo($certPasswordLength * 3.5 + 5)?>u" |
|
| 1138 | 1138 | !endif |
| 1139 | 1139 | ${NSD_CreateLabel} 0 35u ${LABEL_LENGTH} 12u "<?php echo $certPasswordLabel?>" |
| 1140 | 1140 | ${NSD_CreatePassword} ${TEXT_START} 34.5u 120u 12u "" |
@@ -1496,7 +1496,7 @@ discard block |
||
| 1496 | 1496 | Section "-start" |
| 1497 | 1497 | SectionIn RO |
| 1498 | 1498 | |
| 1499 | -!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Installation"))?>" "<?php WindowsCommon::echo_nsi( _("Checking for existing wireless profiles"))?>" |
|
| 1499 | +!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Installation"))?>" "<?php WindowsCommon::echo_nsi(_("Checking for existing wireless profiles"))?>" |
|
| 1500 | 1500 | !ifndef PWD |
| 1501 | 1501 | !include "certs.nsh" |
| 1502 | 1502 | !endif |
@@ -185,7 +185,6 @@ |
||
| 185 | 185 | * - RETVAL_NOTCONFIGURED; needs CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-discoverytag'] |
| 186 | 186 | * - RETVAL_INVALID (at least one format error) |
| 187 | 187 | * - RETVAL_OK (all fine) |
| 188 | - |
|
| 189 | 188 | * @return int one of two RETVALs above |
| 190 | 189 | */ |
| 191 | 190 | public function relevantNAPTRcompliance() { |
@@ -21,7 +21,7 @@ discard block |
||
| 21 | 21 | |
| 22 | 22 | namespace core\diag; |
| 23 | 23 | |
| 24 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
| 24 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
| 25 | 25 | |
| 26 | 26 | /** |
| 27 | 27 | * Test suite to verify that a given NAI realm has NAPTR records according to |
@@ -169,7 +169,7 @@ discard block |
||
| 169 | 169 | $this->NAPTR_executed = RADIUSTests::RETVAL_NOTCONFIGURED; |
| 170 | 170 | return RADIUSTests::RETVAL_NOTCONFIGURED; |
| 171 | 171 | } |
| 172 | - $NAPTRs = dns_get_record($this->realm . ".", DNS_NAPTR); |
|
| 172 | + $NAPTRs = dns_get_record($this->realm.".", DNS_NAPTR); |
|
| 173 | 173 | if ($NAPTRs === FALSE || count($NAPTRs) == 0) { |
| 174 | 174 | $this->NAPTR_executed = RFC7585Tests::RETVAL_NONAPTR; |
| 175 | 175 | return RFC7585Tests::RETVAL_NONAPTR; |
@@ -59,12 +59,12 @@ discard block |
||
| 59 | 59 | */ |
| 60 | 60 | |
| 61 | 61 | /** |
| 62 | - * Various paths. |
|
| 63 | - * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. |
|
| 64 | - * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. |
|
| 65 | - * See also NSIS_VERSION further down |
|
| 66 | - * @var array |
|
| 67 | - */ |
|
| 62 | + * Various paths. |
|
| 63 | + * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. |
|
| 64 | + * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. |
|
| 65 | + * See also NSIS_VERSION further down |
|
| 66 | + * @var array |
|
| 67 | + */ |
|
| 68 | 68 | 'PATHS' => [ |
| 69 | 69 | 'c_rehash' => 'c_rehash', |
| 70 | 70 | 'eapol_test' => 'eapol_test', |
@@ -101,45 +101,45 @@ discard block |
||
| 101 | 101 | ], |
| 102 | 102 | |
| 103 | 103 | 'TLS-clientcerts' => [ |
| 104 | - 'CA1' => [ |
|
| 104 | + 'CA1' => [ |
|
| 105 | 105 | 'status' => 'ACCREDITED', |
| 106 | 106 | 'issuerCA' => '/DC=org/DC=pki1/CN=PKI 1', |
| 107 | 107 | 'certificates' => [ |
| 108 | - [ |
|
| 108 | + [ |
|
| 109 | 109 | 'status' => 'CORRECT', |
| 110 | 110 | 'public' => 'ca1-client-cert.pem', |
| 111 | 111 | 'private' => 'ca1-client-key.pem', |
| 112 | 112 | 'expected' => 'PASS'], |
| 113 | - [ |
|
| 113 | + [ |
|
| 114 | 114 | 'status' => 'WRONGPOLICY', |
| 115 | 115 | 'public' => 'ca1-nopolicy-cert.pem', |
| 116 | 116 | 'private' => 'ca1-nopolicy-key.key', |
| 117 | 117 | 'expected' => 'FAIL'], |
| 118 | - [ |
|
| 118 | + [ |
|
| 119 | 119 | 'status' => 'EXPIRED', |
| 120 | 120 | 'public' => 'ca1-exp.pem', |
| 121 | 121 | 'private' => 'ca1-exp.key', |
| 122 | 122 | 'expected' => 'FAIL'], |
| 123 | - [ |
|
| 123 | + [ |
|
| 124 | 124 | 'status' => 'REVOKED', |
| 125 | 125 | 'public' => 'ca1-revoked.pem', |
| 126 | 126 | 'private' => 'ca1-revoked.key', |
| 127 | 127 | 'expected' => 'FAIL'], |
| 128 | 128 | ] |
| 129 | - ], |
|
| 130 | - 'CA-N' => [ |
|
| 129 | + ], |
|
| 130 | + 'CA-N' => [ |
|
| 131 | 131 | 'status' => 'NONACCREDITED', |
| 132 | 132 | 'issuerCA' => '/DC=org/DC=pkiN/CN=PKI N', |
| 133 | 133 | 'certificates' => [ |
| 134 | - [ |
|
| 134 | + [ |
|
| 135 | 135 | 'status' => 'CORRECT', |
| 136 | 136 | 'public' => 'caN-client-cert.pem', |
| 137 | 137 | 'private' => 'caN-client-cert.key', |
| 138 | 138 | 'expected' => 'FAIL'], |
| 139 | - ] |
|
| 140 | - ] |
|
| 141 | - ], |
|
| 142 | - 'accreditedCAsURL' => '', |
|
| 139 | + ] |
|
| 140 | + ] |
|
| 141 | + ], |
|
| 142 | + 'accreditedCAsURL' => '', |
|
| 143 | 143 | ], |
| 144 | 144 | 'eduGainResolver' => [ |
| 145 | 145 | 'url' => 'https://technical.edugain.org/api.php', |