Completed
Pull Request — master (#14)
by Janusz
10:08 queued 04:29
created
web/admin/edit_idp.php 2 patches
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -137,10 +137,10 @@  discard block
 block discarded – undo
137 137
 <?php
138 138
 if ($wizard_style) {
139 139
     echo "<p>" .
140
-    sprintf(_("In this section, you define on which media %s should be configured on user devices."),Config::$CONSORTIUM['name']) . "</p>
140
+    sprintf(_("In this section, you define on which media %s should be configured on user devices."), Config::$CONSORTIUM['name']) . "</p>
141 141
           <ul>";
142 142
     echo "<li>";
143
-    echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>";
143
+    echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>";
144 144
     if (count(Config::$CONSORTIUM['ssid']) > 0) {
145 145
         $ssidlist = "";
146 146
         foreach (Config::$CONSORTIUM['ssid'] as $ssid)
@@ -157,7 +157,7 @@  discard block
 block discarded – undo
157 157
     echo "</li>";
158 158
 
159 159
     echo "<li>";
160
-    echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>";
160
+    echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>";
161 161
     if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) {
162 162
         $consortiumlist = "";
163 163
         foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi)
@@ -170,10 +170,10 @@  discard block
 block discarded – undo
170 170
         echo _("Please configure which Consortium OIs should be configured in the installers.");
171 171
     }   
172 172
     echo "</li>";
173
-    echo "<li><strong>"._("Support for wired IEEE 802.1X:")." </strong>"
174
-    . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).").
173
+    echo "<li><strong>" . _("Support for wired IEEE 802.1X:") . " </strong>"
174
+    . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).") .
175 175
             "</li>";
176
-    echo "<li><strong>"._("Removal of bootstrap/onboarding SSIDs:")." </strong>"
176
+    echo "<li><strong>" . _("Removal of bootstrap/onboarding SSIDs:") . " </strong>"
177 177
             . _("If you use a captive portal to distribute configurations, you may want to unconfigure/disable that SSID after the bootstrap process. With this option, the SSID will either be removed, or be defined as 'Only connect manually'.")
178 178
             . "</li>";
179 179
     echo "</ul>";
Please login to merge, or discard this patch.
Braces   +23 added lines, -14 removed lines patch added patch discarded remove patch
@@ -31,10 +31,11 @@  discard block
 block discarded – undo
31 31
 $idpoptions = $my_inst->getAttributes();
32 32
 $inst_name = $my_inst->name;
33 33
 
34
-if ($wizard_style)
34
+if ($wizard_style) {
35 35
     $cat = defaultPagePrelude(sprintf(_("%s: IdP enrollment wizard (step 2)"), Config::$APPEARANCE['productname']));
36
-else
36
+} else {
37 37
     $cat = defaultPagePrelude(sprintf(_("%s: Editing IdP '%s'"), Config::$APPEARANCE['productname'], $inst_name));
38
+}
38 39
 // let's check if the inst handle actually exists in the DB and user is authorised
39 40
 ?>
40 41
 <script src="js/option_expand.js" type="text/javascript"></script>
@@ -43,9 +44,10 @@  discard block
 block discarded – undo
43 44
 
44 45
 <?php
45 46
 $additional = FALSE;
46
-foreach ($idpoptions as $optionname => $optionvalue)
47
+foreach ($idpoptions as $optionname => $optionvalue) {
47 48
     if ($optionvalue['name'] == "general:geo_coordinates")
48 49
         $additional = TRUE;
50
+}
49 51
 geo_widget_head($my_inst->federation, $inst_name)
50 52
 ?>
51 53
 <script>
@@ -74,10 +76,11 @@  discard block
 block discarded – undo
74 76
 
75 77
     <h1>
76 78
 <?php
77
-if ($wizard_style)
79
+if ($wizard_style) {
78 80
     echo _("Step 2: General Information about your IdP");
79
-else
81
+} else {
80 82
     printf(_("Editing IdP information for '%s'"), $inst_name);
83
+}
81 84
 ?>
82 85
     </h1>
83 86
     <div class='infobox'>
@@ -98,9 +101,10 @@  discard block
 block discarded – undo
98 101
 echo "<form enctype='multipart/form-data' action='edit_idp_result.php?inst_id=$my_inst->identifier" . ($wizard_style ? "&wizard=true" : "") . "' method='post' accept-charset='UTF-8'>
99 102
               <input type='hidden' name='MAX_FILE_SIZE' value='" . Config::$MAX_UPLOAD_SIZE . "'>";
100 103
 
101
-if ($wizard_style)
104
+if ($wizard_style) {
102 105
     echo "<p>" .
103 106
     _("Hello, newcomer. Your institution is new to us. This wizard will ask you several questions about your IdP, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users.") . "</p>";
107
+}
104 108
 ?>
105 109
     <fieldset class="option_container">
106 110
         <legend><strong><?php echo _("General Information"); ?></strong></legend>
@@ -143,12 +147,14 @@  discard block
 block discarded – undo
143 147
     echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>";
144 148
     if (count(Config::$CONSORTIUM['ssid']) > 0) {
145 149
         $ssidlist = "";
146
-        foreach (Config::$CONSORTIUM['ssid'] as $ssid)
147
-            $ssidlist .= ", '<strong>" . $ssid . "</strong>'";
150
+        foreach (Config::$CONSORTIUM['ssid'] as $ssid) {
151
+                    $ssidlist .= ", '<strong>" . $ssid . "</strong>'";
152
+        }
148 153
         $ssidlist = substr($ssidlist, 2);
149 154
         echo sprintf(ngettext("We will always configure this SSID for WPA2/AES: %s.", "We will always configure these SSIDs for WPA2/AES: %s.", count(Config::$CONSORTIUM['ssid'])), $ssidlist);
150
-        if (Config::$CONSORTIUM['tkipsupport'])
151
-            echo " " . _("They will also be configured for WPA/TKIP if the device supports multiple encryption types.");
155
+        if (Config::$CONSORTIUM['tkipsupport']) {
156
+                    echo " " . _("They will also be configured for WPA/TKIP if the device supports multiple encryption types.");
157
+        }
152 158
         echo "<br/>" . sprintf(_("It is also possible to define custom additional SSIDs with the options '%s' and '%s' below."), display_name("media:SSID"), display_name("media:SSID_with_legacy"));
153 159
     } else {
154 160
         echo _("Please configure which SSIDs should be configured in the installers.");
@@ -160,8 +166,9 @@  discard block
 block discarded – undo
160 166
     echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>";
161 167
     if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) {
162 168
         $consortiumlist = "";
163
-        foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi)
164
-            $consortiumlist .= ", '<strong>" . $oi . "</strong>'";
169
+        foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) {
170
+                    $consortiumlist .= ", '<strong>" . $oi . "</strong>'";
171
+        }
165 172
         $consortiumlist = substr($consortiumlist, 2);
166 173
         echo sprintf(ngettext("We will always configure this Consortium OI: %s.", "We will always configure these Consortium OIs: %s.", count(Config::$CONSORTIUM['interworking-consortium-oi'])), $consortiumlist);
167 174
         
@@ -190,11 +197,12 @@  discard block
 block discarded – undo
190 197
     <fieldset class="option_container">
191 198
         <legend><strong><?php echo _("Helpdesk Details for all users"); ?></strong></legend>
192 199
 <?php
193
-if ($wizard_style)
200
+if ($wizard_style) {
194 201
     echo "<p>" .
195 202
     _("If your IdP provides a helpdesk for its users, it would be nice if you would tell us the pointers to this helpdesk. Some site installers might be able to signal this information to the user if he gets stuck.") . "</p>
196 203
         <p>" .
197 204
     _("If you enter a value here, it will be added to the site installers for all your users, and will be displayed on the download page. If you operate separate helpdesks for different user groups (we call this 'profiles'), or operate no help desk at all (shame on you!), you can also leave any of these fields empty and optionally specify per-profile helpdesk information later in this wizard.") . "</p>";
205
+}
198 206
 ?>
199 207
 
200 208
         <table id="expandable_support_options">
@@ -206,9 +214,10 @@  discard block
 block discarded – undo
206 214
 <!--    <fieldset class="option_container">
207 215
         <legend><strong><?php echo _("EAP details for all users"); ?></strong></legend>
208 216
 <?php
209
-if ($wizard_style)
217
+if ($wizard_style) {
210 218
     echo "<p>" . _("Most EAP methods need server-side authentication details, like the CA certificate and/or server name(s) of your authentication servers. If all the EAP methods you support work with the same CA and or Common Names of servers, you can enter them here and they will be added as trust anchors in all profiles. If the details differ per profile or per EAP-type, you can also enter them in the individual profiles later.") . "</p>
211 219
         <p>" . sprintf(_("<strong>Note well: </strong>The server-side validation is a cornerstone of %s; without it, users are subject to man-in-the-middle attacks! We will not generate site installers without Trusted CA anchors and server names."), Config::$CONSORTIUM['name']) . "</p>";
220
+}
212 221
 ?>
213 222
         <table id="expandable_eapserver_options">
214 223
         <?php
Please login to merge, or discard this patch.
web/admin/logout_check.php 1 patch
Braces   +5 added lines, -4 removed lines patch added patch discarded remove patch
@@ -18,10 +18,11 @@
 block discarded – undo
18 18
 if ($ls['Code'] === 'urn:oasis:names:tc:SAML:2.0:status:Success' && !isset($ls['SubCode'])) {
19 19
     /* Successful logout. */
20 20
     $url = htmlspecialchars($_SERVER['HTTP_HOST']) . substr($_SERVER['PHP_SELF'], 0, strrpos($_SERVER['PHP_SELF'], "/admin/logout_check.php"));
21
-    if ($_SERVER['HTTPS'] == "on")
22
-        $url = "https://" . $url;
23
-    else
24
-        $url = "http://" . $url;
21
+    if ($_SERVER['HTTPS'] == "on") {
22
+            $url = "https://" . $url;
23
+    } else {
24
+            $url = "http://" . $url;
25
+    }
25 26
 
26 27
     header("Location: $url");
27 28
 } else {
Please login to merge, or discard this patch.
web/admin/edit_user_result.php 1 patch
Braces   +2 added lines, -1 removed lines patch added patch discarded remove patch
@@ -31,10 +31,11 @@
 block discarded – undo
31 31
 <?php
32 32
 $remaining_attribs = $user->beginflushAttributes();
33 33
 
34
-if (isset($_POST['option']))
34
+if (isset($_POST['option'])) {
35 35
     foreach ($_POST['option'] as $opt_id => $optname)
36 36
         if ($optname == "user:fedadmin") {
37 37
             echo "Security violation: user tried to make himself federation administrator!";
38
+}
38 39
             exit(1);
39 40
         }
40 41
 ?>
Please login to merge, or discard this patch.
web/admin/overview_federation.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -138,7 +138,7 @@  discard block
 block discarded – undo
138 138
         echo "</table></div>";
139 139
     }
140 140
     if (Config::$CONSORTIUM['name'] == 'eduroam')
141
-        $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>";
141
+        $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"), "https://wiki.geant.org/x/KQB_AQ") . "</h3>";
142 142
     else
143 143
         $helptext = "";
144 144
     echo $helptext;
@@ -186,7 +186,7 @@  discard block
 block discarded – undo
186 186
                 // deployment status; need to dive into profiles for this
187 187
                 // show happy eyeballs if at least one profile is configured/showtime                    
188 188
                 echo "<td>";
189
-                echo ($idp_instance->isOneProfileConfigured() ? "C" : "" ) . " " . ($idp_instance->isOneProfileShowtime() ? "V" : "" );
189
+                echo ($idp_instance->isOneProfileConfigured() ? "C" : "") . " " . ($idp_instance->isOneProfileShowtime() ? "V" : "");
190 190
                 echo "</td>";
191 191
                 // get the coarse status overview
192 192
                 $status = $idp_instance->getAllProfileStatusOverview();
Please login to merge, or discard this patch.
Braces   +21 added lines, -16 removed lines patch added patch discarded remove patch
@@ -128,19 +128,21 @@  discard block
 block discarded – undo
128 128
     if (isset($_GET['invitation'])) {
129 129
         echo "<div class='ca-summary' style='position:relative;'><table>";
130 130
 
131
-        if ($_GET['invitation'] == "SUCCESS")
132
-            echo UI_remark(_("The invitation email was sent successfully."), _("The invitation email was sent."));
133
-        else if ($_GET['invitation'] == "FAILURE")
134
-            echo UI_error(_("The invitation email could not be sent!"), _("The invitation email could not be sent!"));
135
-        else
136
-            echo UI_error(_("Error: unknown result code of invitation!?!"), _("Unknown result!"));
131
+        if ($_GET['invitation'] == "SUCCESS") {
132
+                    echo UI_remark(_("The invitation email was sent successfully."), _("The invitation email was sent."));
133
+        } else if ($_GET['invitation'] == "FAILURE") {
134
+                    echo UI_error(_("The invitation email could not be sent!"), _("The invitation email could not be sent!"));
135
+        } else {
136
+                    echo UI_error(_("Error: unknown result code of invitation!?!"), _("Unknown result!"));
137
+        }
137 138
 
138 139
         echo "</table></div>";
139 140
     }
140
-    if (Config::$CONSORTIUM['name'] == 'eduroam')
141
-        $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>";
142
-    else
143
-        $helptext = "";
141
+    if (Config::$CONSORTIUM['name'] == 'eduroam') {
142
+            $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>";
143
+    } else {
144
+            $helptext = "";
145
+    }
144 146
     echo $helptext;
145 147
 
146 148
     ?>
@@ -153,8 +155,9 @@  discard block
 block discarded – undo
153 155
             $feds = $user->getAttributes("user:fedadmin");
154 156
             $pending_invites = $mgmt->listPendingInvitations();
155 157
 
156
-            if (Config::$DB['enforce-external-sync'])
157
-                echo "<th>" . sprintf(_("%s Database Sync Status"), Config::$CONSORTIUM['name']) . "</th>";
158
+            if (Config::$DB['enforce-external-sync']) {
159
+                            echo "<th>" . sprintf(_("%s Database Sync Status"), Config::$CONSORTIUM['name']) . "</th>";
160
+            }
158 161
             ?>
159 162
             <th><?php echo _("Administrator Management"); ?></th>
160 163
         </tr>
@@ -165,10 +168,11 @@  discard block
 block discarded – undo
165 168
 
166 169
             // extract only pending invitations for *this* fed
167 170
             $display_pendings = FALSE;
168
-            foreach ($pending_invites as $oneinvite)
169
-                if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) {
171
+            foreach ($pending_invites as $oneinvite) {
172
+                            if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) {
170 173
                     // echo "PENDINGS!";
171 174
                     $display_pendings = TRUE;
175
+            }
172 176
                 }
173 177
 
174 178
             $idps = $thefed->listIdentityProviders();
@@ -253,8 +257,8 @@  discard block
 block discarded – undo
253 257
                                </strong>
254 258
                             </td>
255 259
                          </tr>";
256
-                foreach ($pending_invites as $oneinvite)
257
-                    if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) {
260
+                foreach ($pending_invites as $oneinvite) {
261
+                                    if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) {
258 262
                         echo "<tr>
259 263
                                     <td>" .
260 264
                         $oneinvite['name'] . "
@@ -263,6 +267,7 @@  discard block
 block discarded – undo
263 267
                         $oneinvite['mail'] . "
264 268
                                     </td>
265 269
                                     <td colspan=2>";
270
+                }
266 271
                         echo "<form method='post' action='overview_federation.php' accept-charset='UTF-8'>
267 272
                                 <input type='hidden' name='invitation_id' value='" . $oneinvite['token'] . "'/>
268 273
                                 <button class='delete' type='submit' name='submitbutton' value='" . BUTTON_DELETE . "'>" . _("Revoke Invitation") . "</button>
Please login to merge, or discard this patch.
web/admin/radius_tests.php 2 patches
Spacing   +29 added lines, -29 removed lines patch added patch discarded remove patch
@@ -18,7 +18,7 @@  discard block
 block discarded – undo
18 18
 $Cat = new CAT();
19 19
 $Cat->set_locale("web_admin");
20 20
 
21
-$additional_message =  [
21
+$additional_message = [
22 22
    L_OK => '',
23 23
    L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."),
24 24
    L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."),
@@ -28,20 +28,20 @@  discard block
 block discarded – undo
28 28
 
29 29
 function disp_name($eap) {
30 30
     $D = EAP::eapDisplayName($eap);
31
-    return $D['OUTER'] . ( $D['INNER'] != '' ? '-' . $D['INNER'] : '');
31
+    return $D['OUTER'] . ($D['INNER'] != '' ? '-' . $D['INNER'] : '');
32 32
 }
33 33
 
34 34
 function printDN($dn) {
35 35
   $out = '';
36 36
   foreach (array_reverse($dn) as $k => $v) {
37
-      if(is_array ($v)) {
37
+      if (is_array($v)) {
38 38
          foreach ($v as $V) {
39
-            if($out) 
39
+            if ($out) 
40 40
                $out .= ',';
41 41
             $out .= "$k=$V";
42 42
          }
43 43
       } else {
44
-         if($out) 
44
+         if ($out) 
45 45
             $out .= ',';
46 46
          $out .= "$k=$v";
47 47
       }
@@ -50,32 +50,32 @@  discard block
 block discarded – undo
50 50
 }
51 51
 
52 52
 function printTm($tm) {
53
-  return(gmdate(DateTime::COOKIE,$tm));
53
+  return(gmdate(DateTime::COOKIE, $tm));
54 54
 }
55 55
 
56 56
 
57 57
 
58
-function process_result($testsuite,$host) {
58
+function process_result($testsuite, $host) {
59 59
     $ret = [];
60 60
     $server_info = [];
61 61
     $udp_result = $testsuite->UDP_reachability_result[$host];
62
-    if(isset($udp_result['certdata']) && count($udp_result['certdata'])) {
62
+    if (isset($udp_result['certdata']) && count($udp_result['certdata'])) {
63 63
        foreach ($udp_result['certdata'] as $certdata) {
64
-          if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' )
64
+          if ($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned')
65 65
              continue;
66
-          $server_cert =  [
66
+          $server_cert = [
67 67
              'subject' => printDN($certdata['subject']),
68 68
              'issuer' => printDN($certdata['issuer']),
69 69
              'validFrom' => printTm($certdata['validFrom_time_t']),
70 70
              'validTo' => printTm($certdata['validTo_time_t']),
71
-             'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']),
71
+             'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']),
72 72
              'sha1' => $certdata['sha1'],
73 73
              'extensions' => $certdata['extensions']
74 74
           ];
75 75
        }
76 76
     }
77 77
     $ret['server_cert'] = $server_cert;
78
-    if(isset($udp_result['incoming_server_names'][0]) ) {
78
+    if (isset($udp_result['incoming_server_names'][0])) {
79 79
         $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]);
80 80
     }
81 81
     else
@@ -119,7 +119,7 @@  discard block
 block discarded – undo
119 119
    exit;
120 120
 */
121 121
 $hostindex = $_REQUEST['hostindex']; 
122
-if(!is_numeric($hostindex))
122
+if (!is_numeric($hostindex))
123 123
   exit;
124 124
 
125 125
 
@@ -140,14 +140,14 @@  discard block
 block discarded – undo
140 140
                 if ($_FILES['cert']['error'] == UPLOAD_ERR_OK) {
141 141
                     $clientcertdata = file_get_contents($_FILES['cert']['tmp_name']);
142 142
                     $privkey_pass = isset($_REQUEST['privkey_pass']) && $_REQUEST['privkey_pass'] ? $_REQUEST['privkey_pass'] : ""; //!!
143
-                    if(isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) {
143
+                    if (isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) {
144 144
                         $tls_username = valid_user($_REQUEST['tls_username']);
145 145
                     } else {
146
-                        if(openssl_pkcs12_read($clientcertdata,$certs,$privkey_pass)) {
146
+                        if (openssl_pkcs12_read($clientcertdata, $certs, $privkey_pass)) {
147 147
                             $mydetails = openssl_x509_parse($certs['cert']);
148
-                            if(isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) {
149
-                                $tls_username=$mydetails['subject']['CN'];
150
-                                debug(4,"PKCS12-CN=$tls_username\n");
148
+                            if (isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) {
149
+                                $tls_username = $mydetails['subject']['CN'];
150
+                                debug(4, "PKCS12-CN=$tls_username\n");
151 151
                             } else {
152 152
                                 $testresult = RETVAL_INCOMPLETE_DATA;
153 153
                                 $run_test = FALSE;
@@ -161,14 +161,14 @@  discard block
 block discarded – undo
161 161
                     $testresult = RETVAL_INCOMPLETE_DATA;
162 162
                     $run_test = FALSE;
163 163
                 }
164
-                    if($run_test) {
165
-                        debug(4,"TLS-USERNAME=$tls_username\n");
166
-                        $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass,'', TRUE, TRUE, $clientcertdata);
164
+                    if ($run_test) {
165
+                        debug(4, "TLS-USERNAME=$tls_username\n");
166
+                        $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass, '', TRUE, TRUE, $clientcertdata);
167 167
                     }
168 168
             } else {
169
-                $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password,$outer_user_name);
169
+                $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password, $outer_user_name);
170 170
             }
171
-        $returnarray['result'][$i] = process_result($testsuite,$hostindex);
171
+        $returnarray['result'][$i] = process_result($testsuite, $hostindex);
172 172
         $returnarray['result'][$i]['eap'] = display_name($eap);
173 173
         $returnarray['returncode'][$i] = $testresult;
174 174
 
@@ -176,7 +176,7 @@  discard block
 block discarded – undo
176 176
             switch ($testresult) {
177 177
                 case RETVAL_OK :
178 178
                     $level = $returnarray['result'][$i]['level'];
179
-                    switch($level) {
179
+                    switch ($level) {
180 180
                          case L_OK :
181 181
                              $message = _("<strong>Test successful.</strong>");
182 182
                              break;
@@ -228,21 +228,21 @@  discard block
 block discarded – undo
228 228
         $i = 0;
229 229
         $returnarray['hostindex'] = $hostindex;
230 230
         $testresult = $testsuite->UDP_reachability($hostindex);
231
-        $returnarray['result'][$i] = process_result($testsuite,$hostindex);
231
+        $returnarray['result'][$i] = process_result($testsuite, $hostindex);
232 232
         $returnarray['result'][$i]['eap'] = 'ALL';
233 233
         $returnarray['returncode'][$i] = $testresult;
234 234
         // a failed check may not have gotten any certificate, be prepared for that
235 235
         switch ($testresult) {
236 236
             case RETVAL_CONVERSATION_REJECT:
237 237
                 $level = $returnarray['result'][$i]['level'];
238
-                if($level > L_OK)
238
+                if ($level > L_OK)
239 239
                     $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level];
240 240
                 else
241 241
                     $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.");
242 242
                 break;
243 243
             case RETVAL_IMMEDIATE_REJECT:
244 244
                 $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable.");
245
-                $level= L_WARN;
245
+                $level = L_WARN;
246 246
                 break;
247 247
             case RETVAL_NO_RESPONSE:
248 248
                     $returnarray['result'][$i]['server'] = 0;
@@ -255,10 +255,10 @@  discard block
 block discarded – undo
255 255
                 break;
256 256
             default:
257 257
                 $message = _("unhandled error");
258
-                $level= L_ERROR;
258
+                $level = L_ERROR;
259 259
                 break;
260 260
         }
261
-debug(4,"SERVER=".$returnarray['result'][$i]['server']."\n");
261
+debug(4, "SERVER=" . $returnarray['result'][$i]['server'] . "\n");
262 262
         $returnarray['result'][$i]['level'] = $level;
263 263
         $returnarray['result'][$i]['message'] = $message;
264 264
         break;
Please login to merge, or discard this patch.
Braces   +43 added lines, -30 removed lines patch added patch discarded remove patch
@@ -36,13 +36,15 @@  discard block
 block discarded – undo
36 36
   foreach (array_reverse($dn) as $k => $v) {
37 37
       if(is_array ($v)) {
38 38
          foreach ($v as $V) {
39
-            if($out) 
40
-               $out .= ',';
39
+            if($out) {
40
+                           $out .= ',';
41
+            }
41 42
             $out .= "$k=$V";
42 43
          }
43 44
       } else {
44
-         if($out) 
45
-            $out .= ',';
45
+         if($out) {
46
+                     $out .= ',';
47
+         }
46 48
          $out .= "$k=$v";
47 49
       }
48 50
   }
@@ -61,8 +63,9 @@  discard block
 block discarded – undo
61 63
     $udp_result = $testsuite->UDP_reachability_result[$host];
62 64
     if(isset($udp_result['certdata']) && count($udp_result['certdata'])) {
63 65
        foreach ($udp_result['certdata'] as $certdata) {
64
-          if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' )
65
-             continue;
66
+          if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) {
67
+                       continue;
68
+          }
66 69
           $server_cert =  [
67 70
              'subject' => printDN($certdata['subject']),
68 71
              'issuer' => printDN($certdata['issuer']),
@@ -77,9 +80,9 @@  discard block
 block discarded – undo
77 80
     $ret['server_cert'] = $server_cert;
78 81
     if(isset($udp_result['incoming_server_names'][0]) ) {
79 82
         $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]);
83
+    } else {
84
+            $ret['server'] = 0;
80 85
     }
81
-    else
82
-        $ret['server'] = 0;
83 86
     $ret['level'] = L_OK;
84 87
     $ret['time_millisec'] = sprintf("%d", $udp_result['time_millisec']);
85 88
     if (isset($udp_result['cert_oddities']) && count($udp_result['cert_oddities']) > 0) {
@@ -100,8 +103,9 @@  discard block
 block discarded – undo
100 103
     return $ret;
101 104
 }
102 105
 
103
-if (!isset($_REQUEST['test_type']) || !$_REQUEST['test_type'])
106
+if (!isset($_REQUEST['test_type']) || !$_REQUEST['test_type']) {
104 107
     exit;
108
+}
105 109
 
106 110
 $test_type = $_REQUEST['test_type']; 
107 111
 $check_realm = valid_Realm($_REQUEST['realm']); 
@@ -119,8 +123,9 @@  discard block
 block discarded – undo
119 123
    exit;
120 124
 */
121 125
 $hostindex = $_REQUEST['hostindex']; 
122
-if(!is_numeric($hostindex))
126
+if(!is_numeric($hostindex)) {
123 127
   exit;
128
+}
124 129
 
125 130
 
126 131
 $returnarray = [];
@@ -235,10 +240,11 @@  discard block
 block discarded – undo
235 240
         switch ($testresult) {
236 241
             case RETVAL_CONVERSATION_REJECT:
237 242
                 $level = $returnarray['result'][$i]['level'];
238
-                if($level > L_OK)
239
-                    $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level];
240
-                else
241
-                    $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.");
243
+                if($level > L_OK) {
244
+                                    $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level];
245
+                } else {
246
+                                    $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.");
247
+                }
242 248
                 break;
243 249
             case RETVAL_IMMEDIATE_REJECT:
244 250
                 $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable.");
@@ -276,23 +282,28 @@  discard block
 block discarded – undo
276 282
             } else {
277 283
                 $returnarray['message'] = $testsuite->return_codes[$testsuite->TLS_CA_checks_result[$host]['status']]["message"];
278 284
                 $returnarray['level'] = L_OK;
279
-                if ($testsuite->TLS_CA_checks_result[$host]['status'] != RETVAL_CONNECTION_REFUSED)
280
-                    $returnarray['message'] .= ' (' . sprintf(_("elapsed time: %d"), $testsuite->TLS_CA_checks_result[$host]['time_millisec']) . '&nbsp;ms)';
281
-                else
282
-                    $returnarray['level'] = L_ERROR;
285
+                if ($testsuite->TLS_CA_checks_result[$host]['status'] != RETVAL_CONNECTION_REFUSED) {
286
+                                    $returnarray['message'] .= ' (' . sprintf(_("elapsed time: %d"), $testsuite->TLS_CA_checks_result[$host]['time_millisec']) . '&nbsp;ms)';
287
+                } else {
288
+                                    $returnarray['level'] = L_ERROR;
289
+                }
283 290
                 if ($testsuite->TLS_CA_checks_result[$host]['status'] == RETVAL_OK) {
284 291
                     $returnarray['certdata'] = [];
285 292
                     $returnarray['certdata']['subject'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['subject'];
286 293
                     $returnarray['certdata']['issuer'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['issuer'];
287 294
                     $returnarray['certdata']['extensions'] = [];
288
-                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']))
289
-                        $returnarray['certdata']['extensions']['subjectaltname'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'];
290
-                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid']))
291
-                        $returnarray['certdata']['extensions']['policies'] = join(' ', $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid']);
292
-                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint']))
293
-                        $returnarray['certdata']['extensions']['crldistributionpoints'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint'];
294
-                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess']))
295
-                        $returnarray['certdata']['extensions']['authorityinfoaccess'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess'];
295
+                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'])) {
296
+                                            $returnarray['certdata']['extensions']['subjectaltname'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'];
297
+                    }
298
+                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid'])) {
299
+                                            $returnarray['certdata']['extensions']['policies'] = join(' ', $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid']);
300
+                    }
301
+                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint'])) {
302
+                                            $returnarray['certdata']['extensions']['crldistributionpoints'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint'];
303
+                    }
304
+                    if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess'])) {
305
+                                            $returnarray['certdata']['extensions']['authorityinfoaccess'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess'];
306
+                    }
296 307
                 }
297 308
                 $returnarray['cert_oddities'] = [];
298 309
             }
@@ -306,10 +317,11 @@  discard block
 block discarded – undo
306 317
         $k = 0;
307 318
         // the host member of the array may not exist if RETVAL_SKIPPED came out
308 319
         // (e.g. no client cert to test with). Be prepared for that
309
-        if (isset($testsuite->TLS_clients_checks_result[$host]))
310
-            foreach ($testsuite->TLS_clients_checks_result[$host]['ca'] as $type => $cli) {
320
+        if (isset($testsuite->TLS_clients_checks_result[$host])) {
321
+                    foreach ($testsuite->TLS_clients_checks_result[$host]['ca'] as $type => $cli) {
311 322
                 foreach ($cli as $key => $val) {
312 323
                     $returnarray['ca'][$k][$key] = $val;
324
+        }
313 325
                 }
314 326
                 $k++;
315 327
             }
@@ -347,8 +359,9 @@  discard block
 block discarded – undo
347 359
             $oids = check_policy($data);
348 360
             if (!empty($oids)) {
349 361
                 $printedres .= '<li>' . _("Certificate policies") . ':';
350
-                foreach ($oids as $k => $o)
351
-                    $printedres .= " $o ($k)";
362
+                foreach ($oids as $k => $o) {
363
+                                    $printedres .= " $o ($k)";
364
+                }
352 365
             }
353 366
             if (($crl = certificate_get_field($data, 'crlDistributionPoints'))) {
354 367
                 $printedres .= '<li>' . _("crlDistributionPoints") . ': ' . $crl;
Please login to merge, or discard this patch.
web/admin/sanity_tests.php 1 patch
Spacing   +11 added lines, -11 removed lines patch added patch discarded remove patch
@@ -37,7 +37,7 @@  discard block
 block discarded – undo
37 37
 
38 38
 function print_test_results($t) {
39 39
    $out = '';
40
-   switch($t->test_result['global']) {
40
+   switch ($t->test_result['global']) {
41 41
        case L_OK:
42 42
          $message = "Your configuration appears to be fine.";
43 43
          break;
@@ -51,10 +51,10 @@  discard block
 block discarded – undo
51 51
          $message = "Your configuration appears to be fine.";
52 52
          break;
53 53
    }
54
-   $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>");
55
-   foreach ($t->out as $test => $test_val)  {
56
-   foreach ($test_val as $o)  {
57
-       $out .= UI_message($o['level'],$o['message']);
54
+   $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>");
55
+   foreach ($t->out as $test => $test_val) {
56
+   foreach ($test_val as $o) {
57
+       $out .= UI_message($o['level'], $o['message']);
58 58
    }
59 59
    }
60 60
    return($out);
@@ -62,7 +62,7 @@  discard block
 block discarded – undo
62 62
 
63 63
 function return_test_results($t) {
64 64
    $out = '';
65
-   switch($t->test_result['global']) {
65
+   switch ($t->test_result['global']) {
66 66
        case L_OK:
67 67
          $message = "Your configuration appears to be fine.";
68 68
          break;
@@ -76,10 +76,10 @@  discard block
 block discarded – undo
76 76
          $message = "Your configuration appears to be fine.";
77 77
          break;
78 78
    }
79
-   $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>");
80
-   foreach ($t->out as $test => $test_val)  {
81
-   foreach ($test_val as $o)  {
82
-       $out .= UI_message($o['level'],$o['message']);
79
+   $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>");
80
+   foreach ($t->out as $test => $test_val) {
81
+   foreach ($test_val as $o) {
82
+       $out .= UI_message($o['level'], $o['message']);
83 83
    }
84 84
    }
85 85
    return($out);
@@ -100,7 +100,7 @@  discard block
 block discarded – undo
100 100
 }
101 101
 $test = new SanityTest();
102 102
 $test->run_tests($Tests);
103
-$format =  empty($_REQUEST['format']) ? 'include' : $_REQUEST['format'];
103
+$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format'];
104 104
 switch ($format) {
105 105
     case 'include':
106 106
         $o = print_test_results($test);
Please login to merge, or discard this patch.
web/admin/action_realmcheck.php 2 patches
Spacing   +41 added lines, -41 removed lines patch added patch discarded remove patch
@@ -20,7 +20,7 @@  discard block
 block discarded – undo
20 20
 
21 21
 $cat = defaultPagePrelude(_("Sanity check for dynamic discovery of realms"));
22 22
 $check_thorough = FALSE;
23
-$error_message ='';
23
+$error_message = '';
24 24
 $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']);
25 25
 
26 26
 if (isset($_GET['profile_id']))
@@ -38,17 +38,17 @@  discard block
 block discarded – undo
38 38
       $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>";
39 39
    }
40 40
 } else { // someone else's realm... only shallow checks
41
-   if(!empty($_REQUEST['realm'])) {
42
-      if($check_realm = valid_Realm($_REQUEST['realm'])) {
41
+   if (!empty($_REQUEST['realm'])) {
42
+      if ($check_realm = valid_Realm($_REQUEST['realm'])) {
43 43
          $_SESSION['check_realm'] = $check_realm;
44 44
       }
45 45
    } else {
46
-      if(!empty($_SESSION['check_realm']))
46
+      if (!empty($_SESSION['check_realm']))
47 47
          $check_realm = $_SESSION['check_realm'];
48 48
       else
49 49
          $check_realm = FALSE;
50 50
    }
51
-   if($check_realm)
51
+   if ($check_realm)
52 52
       $testsuite = new RADIUSTests($check_realm);
53 53
    else
54 54
       $error_message = _("No valid realm name given, cannot execute any checks!");
@@ -226,7 +226,7 @@  discard block
 block discarded – undo
226 226
      }
227 227
  }
228 228
  cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] +'" style="width: 24px;"></td><td>' + state;
229
- cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."),"'+data.ca[key].certificate[c].time_millisec+'&nbsp;").")"; ?>' + add + '</td></tr>';
229
+ cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+'&nbsp;") . ")"; ?>' + add + '</td></tr>';
230 230
  cliinfo = cliinfo + '</tbody></table></ul></li>';
231 231
  if (data.ca[key].certificate[c].finalerror==1) {
232 232
      cliinfo = cliinfo + '<li>' + restskipped + '</li>';
@@ -316,7 +316,7 @@  discard block
 block discarded – undo
316 316
    var v = data.result[0];
317 317
    $("#src"+data.hostindex+"_img").attr('src',icons[v.level]);
318 318
    if(v.server != 0 ) {
319
-      $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+'&nbsp;") ?><p>'+v.message+'</p>');
319
+      $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+'&nbsp;") ?><p>'+v.message+'</p>');
320 320
       var cert_data = "<tr class='server_cert'><td>&nbsp;</td><td colspan=2><div><dl class='server_cert_list'>";
321 321
       $.each(server_cert, function(l,s) {
322 322
          cert_data = cert_data + "<dt>" + s + "</dt><dd>"+ v.server_cert[l] + "</dd>";
@@ -339,7 +339,7 @@  discard block
 block discarded – undo
339 339
       }
340 340
       $("#src"+data.hostindex).append(cert_data);
341 341
    } else {
342
-       $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+'&nbsp;") ?><p>'+v.message+'</p>');
342
+       $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+'&nbsp;") ?><p>'+v.message+'</p>');
343 343
    }
344 344
       global_level_udp = Math.max(global_level_udp,v.level);  
345 345
       $(".server_cert").show();
@@ -391,7 +391,7 @@  discard block
 block discarded – undo
391 391
          });
392 392
       }
393 393
       o = o +  cert_data+'</table>';
394
-      $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' &ndash; <?php printf(_("elapsed time: %sms."),"'+v.time_millisec+'&nbsp;") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>');
394
+      $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' &ndash; <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+'&nbsp;") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>');
395 395
    });
396 396
 }
397 397
 
@@ -402,8 +402,8 @@  discard block
 block discarded – undo
402 402
 <?php
403 403
 foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
404 404
    print "
405
-$(\"#live_src".$hostindex."_img\").attr('src',icon_loading);
406
-$(\"#live_src".$hostindex."_img\").show();
405
+$(\"#live_src".$hostindex . "_img\").attr('src',icon_loading);
406
+$(\"#live_src".$hostindex . "_img\").show();
407 407
     $.ajax({
408 408
         url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm,
409 409
         type: 'POST',
@@ -434,15 +434,15 @@  discard block
 block discarded – undo
434 434
 <?php
435 435
 foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
436 436
     if ($check_thorough)
437
-        $extraarg = "profile_id: ".$my_profile->identifier.", ";
437
+        $extraarg = "profile_id: " . $my_profile->identifier . ", ";
438 438
     else
439 439
         $extraarg = "";
440 440
     
441 441
    print "
442
-$(\"#src".$hostindex."_img\").attr('src',icon_loading);
442
+$(\"#src".$hostindex . "_img\").attr('src',icon_loading);
443 443
 $(\"#src$hostindex\").html('');
444 444
 running_ajax_stat++;
445
-$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".CAT::get_lang()."', hostindex: '$hostindex'  }, udp, 'json');
445
+$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . CAT::get_lang() . "', hostindex: '$hostindex'  }, udp, 'json');
446 446
 
447 447
 ";
448 448
 }
@@ -461,8 +461,8 @@  discard block
 block discarded – undo
461 461
 </script>
462 462
    <?php
463 463
     productheader("ADMIN", CAT::get_lang());
464
-    print "<h1>".sprintf(_("Realm testing for: %s"),$check_realm)."</h1>\n";
465
-    if($error_message) {
464
+    print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n";
465
+    if ($error_message) {
466 466
         print "<p>$error_message</p>";
467 467
     } else {
468 468
 ?>
@@ -481,7 +481,7 @@  discard block
 block discarded – undo
481 481
    </legend>
482 482
       <?php
483 483
       // NAPTR existence check
484
-      echo "<strong>"._("DNS chekcs")."</strong><div>";
484
+      echo "<strong>" . _("DNS chekcs") . "</strong><div>";
485 485
       $naptr = $testsuite->NAPTR();
486 486
       if ($naptr != RETVAL_NOTCONFIGURED) {
487 487
            echo "<table>";
@@ -551,10 +551,10 @@  discard block
 block discarded – undo
551 551
 
552 552
             echo "</table><table>";
553 553
               if (count($testsuite->listerrors()) == 0) {
554
-                echo UI_message(L_OK,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!"));
554
+                echo UI_message(L_OK, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!"));
555 555
                 echo "</table>";
556 556
               } else {
557
-                echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."));
557
+                echo UI_message(L_ERROR, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."));
558 558
                 echo "</table><div class='notacceptable'><table>";
559 559
                 foreach ($testsuite->listerrors() as $details)
560 560
                    echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>";
@@ -581,9 +581,9 @@  discard block
 block discarded – undo
581 581
    continue;*/
582 582
                       print "
583 583
                             running_ajax_dyn++;
584
-                            $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); 
584
+                            $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); 
585 585
                             running_ajax_dyn++;
586
-                            $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); 
586
+                            $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); 
587 587
                        ";
588 588
                    }
589 589
               echo "}
@@ -592,12 +592,12 @@  discard block
 block discarded – undo
592 592
          } else {
593 593
           echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>";
594 594
          }
595
-         echo "<strong>"._("Static connectivity tests")."</strong>
595
+         echo "<strong>" . _("Static connectivity tests") . "</strong>
596 596
          <table><tr>
597 597
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'>&nbsp;</td>
598 598
          </tr></table>";
599
-         if($naptr > 0) {
600
-             echo "<hr><strong>"._("Dynamic connectivity tests")."</strong>
599
+         if ($naptr > 0) {
600
+             echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong>
601 601
          <table><tr>
602 602
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'>&nbsp;</td>
603 603
          </tr></table>";
@@ -611,19 +611,19 @@  discard block
 block discarded – undo
611 611
      <button id="run_s_tests" onclick="run_udp()"><?php echo _("Repeat static connectivity tests") ?></button>
612 612
      <p>
613 613
      <fieldset class="option_container" id="static_tests">
614
-     <legend><strong> <?php echo _("STATIC connectivity tests");?> </strong> </legend>
614
+     <legend><strong> <?php echo _("STATIC connectivity tests"); ?> </strong> </legend>
615 615
 <?php
616 616
      echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']);
617 617
 print "<p>";
618 618
 
619 619
 foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
620 620
   print "<hr>";
621
-printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>");
621
+printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>");
622 622
 print "<table id='results$hostindex'  style='width:100%' class='udp_results'>
623 623
 <tr>
624
-<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td>
624
+<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td>
625 625
 <td id='src$hostindex' colspan=2>
626
-"._("testing...")."
626
+" . _("testing...") . "
627 627
 </td>
628 628
 </tr>" .
629 629
 //server_cert('udp-'.$hostindex) .
@@ -647,8 +647,8 @@  discard block
 block discarded – undo
647 647
                 <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>";
648 648
 
649 649
                   $resultstoprint = [];
650
-                  if (count($testsuite->NAPTR_hostname_records)>0) {
651
-                      $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' .  UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>';
650
+                  if (count($testsuite->NAPTR_hostname_records) > 0) {
651
+                      $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR, _("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK, _("All tests passed, congratulations!")) . '</table>';
652 652
                       $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>";
653 653
                       foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) {
654 654
 /*                          if ($addr['family'] == "IPv6") {
@@ -660,9 +660,9 @@  discard block
 block discarded – undo
660 660
                           $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>';
661 661
                           $resultstoprint[] = "<table id='caresults$hostindex'  style='width:100%'>
662 662
 <tr>
663
-<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td>
663
+<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca" . $hostindex . "_img'></td>
664 664
 <td id='srcca$hostindex'>
665
-"._("testing...")."
665
+" . _("testing...") . "
666 666
 </td>
667 667
 </tr>
668 668
 </table>";
@@ -678,18 +678,18 @@  discard block
 block discarded – undo
678 678
                           $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>';
679 679
                           $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'>
680 680
 <tr>
681
-<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td>
681
+<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient" . $hostindex . "_img'></td>
682 682
 <td id='srcclient$hostindex'>
683
-"._("testing...")."
683
+" . _("testing...") . "
684 684
 </td>
685 685
 </tr>
686 686
 </table></span>";
687 687
                           $clientstest[] = '</ol>';
688 688
                       }
689 689
                       echo '<div style="align:right;">';
690
-                      echo join('',$resultstoprint);
691
-                      echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from  CAs are accepted...') . '</b><p>' .  _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>';
692
-                      print join('',$clientstest);
690
+                      echo join('', $resultstoprint);
691
+                      echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from  CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>';
692
+                      print join('', $clientstest);
693 693
                       echo '</span>';
694 694
                       echo '</div>';
695 695
                   }
@@ -711,8 +711,8 @@  discard block
 block discarded – undo
711 711
                     <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div>
712 712
                     <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'>
713 713
                     <input type='hidden' name='test_type' value='udp_login'>
714
-                    <input type='hidden' name='lang' value='".CAT::get_lang()."'>
715
-                    <input type='hidden' name='profile_id' value='".$my_profile->identifier."'>
714
+                    <input type='hidden' name='lang' value='".CAT::get_lang() . "'>
715
+                    <input type='hidden' name='profile_id' value='".$my_profile->identifier . "'>
716 716
                     <table id='live_tests'>";
717 717
 // if any password based EAP methods are available enable this section
718 718
               if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) ||
@@ -737,8 +737,8 @@  discard block
 block discarded – undo
737 737
                       echo "<div id='live_login_results' style='display:none'>";
738 738
                       foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
739 739
                         print "<hr>";
740
-                      printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>");
741
-                      print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>";
740
+                      printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>");
741
+                      print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>";
742 742
 print "<div id='eap_test$hostindex' class='eap_test_results'></div>";
743 743
 }
744 744
                       echo "</div>";
Please login to merge, or discard this patch.
Braces   +40 added lines, -28 removed lines patch added patch discarded remove patch
@@ -23,10 +23,11 @@  discard block
 block discarded – undo
23 23
 $error_message ='';
24 24
 $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']);
25 25
 
26
-if (isset($_GET['profile_id']))
26
+if (isset($_GET['profile_id'])) {
27 27
     $my_profile = valid_Profile($_GET['profile_id'], $my_inst->identifier);
28
-else
28
+} else {
29 29
     $my_profile = NULL;
30
+}
30 31
 if ($my_profile != NULL) {
31 32
    $cr = $my_profile->getAttributes("internal:realm");
32 33
    if ($cr) {
@@ -43,16 +44,18 @@  discard block
 block discarded – undo
43 44
          $_SESSION['check_realm'] = $check_realm;
44 45
       }
45 46
    } else {
46
-      if(!empty($_SESSION['check_realm']))
47
-         $check_realm = $_SESSION['check_realm'];
48
-      else
49
-         $check_realm = FALSE;
47
+      if(!empty($_SESSION['check_realm'])) {
48
+               $check_realm = $_SESSION['check_realm'];
49
+      } else {
50
+               $check_realm = FALSE;
51
+      }
52
+   }
53
+   if($check_realm) {
54
+         $testsuite = new RADIUSTests($check_realm);
55
+   } else {
56
+         $error_message = _("No valid realm name given, cannot execute any checks!");
57
+   }
50 58
    }
51
-   if($check_realm)
52
-      $testsuite = new RADIUSTests($check_realm);
53
-   else
54
-      $error_message = _("No valid realm name given, cannot execute any checks!");
55
-}
56 59
 
57 60
 $translate = _("STATIC");
58 61
 $translate = _("DYNAMIC");
@@ -433,10 +436,11 @@  discard block
 block discarded – undo
433 436
    $(".server_cert").hide();
434 437
 <?php
435 438
 foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
436
-    if ($check_thorough)
437
-        $extraarg = "profile_id: ".$my_profile->identifier.", ";
438
-    else
439
-        $extraarg = "";
439
+    if ($check_thorough) {
440
+            $extraarg = "profile_id: ".$my_profile->identifier.", ";
441
+    } else {
442
+            $extraarg = "";
443
+    }
440 444
     
441 445
    print "
442 446
 $(\"#src".$hostindex."_img\").attr('src',icon_loading);
@@ -556,8 +560,9 @@  discard block
 block discarded – undo
556 560
               } else {
557 561
                 echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."));
558 562
                 echo "</table><div class='notacceptable'><table>";
559
-                foreach ($testsuite->listerrors() as $details)
560
-                   echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>";
563
+                foreach ($testsuite->listerrors() as $details) {
564
+                                   echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>";
565
+                }
561 566
                 echo "</table></div>";
562 567
               }
563 568
               echo '</div>';
@@ -573,9 +578,13 @@  discard block
 block discarded – undo
573 578
               ';
574 579
                   foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) {
575 580
                       $host = '';
576
-                      if ($addr['family'] == "IPv6") $host .= '[';
581
+                      if ($addr['family'] == "IPv6") {
582
+                          $host .= '[';
583
+                      }
577 584
                       $host .= $addr['IP'];
578
-                      if ($addr['family'] == "IPv6") $host .= ']';
585
+                      if ($addr['family'] == "IPv6") {
586
+                          $host .= ']';
587
+                      }
579 588
                       $host .= ':' . $addr['port'];
580 589
 /*if($addr['family'] == "IPv6")
581 590
    continue;*/
@@ -728,11 +737,12 @@  discard block
 block discarded – undo
728 737
                           echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>";
729 738
                }
730 739
                       // ask for cert + privkey if TLS-based method is active
731
-                      if (in_array(EAP::$TLS, $prof_compl))
732
-                          echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr>
740
+                      if (in_array(EAP::$TLS, $prof_compl)) {
741
+                                                echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr>
733 742
                         <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr>
734 743
                         <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr>
735 744
                         <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>";
745
+                      }
736 746
                       echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>";
737 747
                       echo "<div id='live_login_results' style='display:none'>";
738 748
                       foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
@@ -762,13 +772,15 @@  discard block
 block discarded – undo
762 772
     var realm = '<?php echo $check_realm; ?>';
763 773
     run_udp();
764 774
 <?php
765
-    if ($naptr > 0) 
766
-       echo "run_dynamic();";
767
-    else
768
-       echo '$("#tabs-d-li").hide();';
769
-    if (!$check_thorough) 
770
-       echo '$("#tabs-through").hide();';
771
-?>
775
+    if ($naptr > 0) {
776
+           echo "run_dynamic();";
777
+    } else {
778
+           echo '$("#tabs-d-li").hide();';
779
+    }
780
+    if (!$check_thorough) {
781
+           echo '$("#tabs-through").hide();';
782
+    }
783
+    ?>
772 784
 </script>
773 785
     <?php footer() ?>
774 786
 
Please login to merge, or discard this patch.
web/admin/edit_idp_result.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -89,7 +89,7 @@
 block discarded – undo
89 89
 
90 90
 if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0)
91 91
     foreach (Config::$CONSORTIUM['ssid'] as $ssidname)
92
-        $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)") );
92
+        $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)"));
93 93
 
94 94
 $custom_ssids_wpa2 = $my_inst->getAttributes("media:SSID");
95 95
 $custom_ssids_wpa = $my_inst->getAttributes("media:SSID_with_legacy");
Please login to merge, or discard this patch.
Braces   +11 added lines, -6 removed lines patch added patch discarded remove patch
@@ -74,8 +74,9 @@  discard block
 block discarded – undo
74 74
 $my_inst->commitFlushAttributes($killlist);
75 75
 // delete cached logo, if present
76 76
 $logofile = dirname(dirname(__FILE__)) . "/downloads/logos/" . $my_inst->identifier . ".png";
77
-if (is_file($logofile))
77
+if (is_file($logofile)) {
78 78
     unlink($logofile);
79
+}
79 80
 
80 81
 CAT::writeAudit($_SESSION['user'], "MOD", "IdP " . $my_inst->identifier . " - attributes changed");
81 82
 
@@ -87,27 +88,31 @@  discard block
 block discarded – undo
87 88
 
88 89
 $ssids = [];
89 90
 
90
-if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0)
91
+if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0) {
91 92
     foreach (Config::$CONSORTIUM['ssid'] as $ssidname)
92 93
         $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)") );
94
+}
93 95
 
94 96
 $custom_ssids_wpa2 = $my_inst->getAttributes("media:SSID");
95 97
 $custom_ssids_wpa = $my_inst->getAttributes("media:SSID_with_legacy");
96 98
 $wired_support = $my_inst->getAttributes("media:wired");
97 99
 
98
-if (count($custom_ssids_wpa) > 0)
100
+if (count($custom_ssids_wpa) > 0) {
99 101
     foreach ($custom_ssids_wpa as $ssidname)
100 102
         $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES and WPA/TKIP)");
103
+}
101 104
 
102
-if (count($custom_ssids_wpa2) > 0)
105
+if (count($custom_ssids_wpa2) > 0) {
103 106
     foreach ($custom_ssids_wpa2 as $ssidname)
104 107
         $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES)");
108
+}
105 109
 
106 110
 echo "<table>";
107 111
 if (count($ssids) > 0) {
108 112
     $printedlist = "";
109
-    foreach ($ssids as $names)
110
-        $printedlist = $printedlist . "$names ";
113
+    foreach ($ssids as $names) {
114
+            $printedlist = $printedlist . "$names ";
115
+    }
111 116
     echo UI_okay(sprintf(_("Your installers will configure the following SSIDs: <strong>%s</strong>"), $printedlist), _("SSIDs configured"));
112 117
 };
113 118
 if (count($wired_support) > 0) {
Please login to merge, or discard this patch.
web/admin/action_enrollment.php 2 patches
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -30,9 +30,9 @@
 block discarded – undo
30 30
     $checkval = "OK-NEW";
31 31
 }
32 32
 
33
-if (!isset($_GET['token']) || ( $checkval != "OK-NEW" && $checkval != "OK-EXISTING")) {
33
+if (!isset($_GET['token']) || ($checkval != "OK-NEW" && $checkval != "OK-EXISTING")) {
34 34
     pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP");
35
-    echo "<h1>"._("Error creating new IdP binding!")."</h1>";
35
+    echo "<h1>" . _("Error creating new IdP binding!") . "</h1>";
36 36
     if ($checkval == "FAIL-ALREADYCONSUMED") {
37 37
         echo "<p>" . _("Sorry... this token has already been used to create an institution. If you got it from a mailing list, probably someone else used it before you.") . "</p>";
38 38
     } elseif ($checkval == "FAIL-EXPIRED") {
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -54,7 +54,8 @@
 block discarded – undo
54 54
         CAT::writeAudit($_SESSION['user'], "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated");
55 55
     };
56 56
 }
57
-if ($checkval == "OK-EXISTING")
57
+if ($checkval == "OK-EXISTING") {
58 58
     header("Location: overview_user.php");
59
-else
59
+} else {
60 60
     header("Location: edit_idp.php?inst_id=$newidp->identifier&wizard=true");
61
+}
Please login to merge, or discard this patch.