@@ -137,10 +137,10 @@ discard block |
||
| 137 | 137 | <?php |
| 138 | 138 | if ($wizard_style) { |
| 139 | 139 | echo "<p>" . |
| 140 | - sprintf(_("In this section, you define on which media %s should be configured on user devices."),Config::$CONSORTIUM['name']) . "</p> |
|
| 140 | + sprintf(_("In this section, you define on which media %s should be configured on user devices."), Config::$CONSORTIUM['name']) . "</p> |
|
| 141 | 141 | <ul>"; |
| 142 | 142 | echo "<li>"; |
| 143 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
| 143 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
| 144 | 144 | if (count(Config::$CONSORTIUM['ssid']) > 0) { |
| 145 | 145 | $ssidlist = ""; |
| 146 | 146 | foreach (Config::$CONSORTIUM['ssid'] as $ssid) |
@@ -157,7 +157,7 @@ discard block |
||
| 157 | 157 | echo "</li>"; |
| 158 | 158 | |
| 159 | 159 | echo "<li>"; |
| 160 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
| 160 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
| 161 | 161 | if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) { |
| 162 | 162 | $consortiumlist = ""; |
| 163 | 163 | foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) |
@@ -170,10 +170,10 @@ discard block |
||
| 170 | 170 | echo _("Please configure which Consortium OIs should be configured in the installers."); |
| 171 | 171 | } |
| 172 | 172 | echo "</li>"; |
| 173 | - echo "<li><strong>"._("Support for wired IEEE 802.1X:")." </strong>" |
|
| 174 | - . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail)."). |
|
| 173 | + echo "<li><strong>" . _("Support for wired IEEE 802.1X:") . " </strong>" |
|
| 174 | + . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).") . |
|
| 175 | 175 | "</li>"; |
| 176 | - echo "<li><strong>"._("Removal of bootstrap/onboarding SSIDs:")." </strong>" |
|
| 176 | + echo "<li><strong>" . _("Removal of bootstrap/onboarding SSIDs:") . " </strong>" |
|
| 177 | 177 | . _("If you use a captive portal to distribute configurations, you may want to unconfigure/disable that SSID after the bootstrap process. With this option, the SSID will either be removed, or be defined as 'Only connect manually'.") |
| 178 | 178 | . "</li>"; |
| 179 | 179 | echo "</ul>"; |
@@ -31,10 +31,11 @@ discard block |
||
| 31 | 31 | $idpoptions = $my_inst->getAttributes(); |
| 32 | 32 | $inst_name = $my_inst->name; |
| 33 | 33 | |
| 34 | -if ($wizard_style) |
|
| 34 | +if ($wizard_style) { |
|
| 35 | 35 | $cat = defaultPagePrelude(sprintf(_("%s: IdP enrollment wizard (step 2)"), Config::$APPEARANCE['productname'])); |
| 36 | -else |
|
| 36 | +} else { |
|
| 37 | 37 | $cat = defaultPagePrelude(sprintf(_("%s: Editing IdP '%s'"), Config::$APPEARANCE['productname'], $inst_name)); |
| 38 | +} |
|
| 38 | 39 | // let's check if the inst handle actually exists in the DB and user is authorised |
| 39 | 40 | ?> |
| 40 | 41 | <script src="js/option_expand.js" type="text/javascript"></script> |
@@ -43,9 +44,10 @@ discard block |
||
| 43 | 44 | |
| 44 | 45 | <?php |
| 45 | 46 | $additional = FALSE; |
| 46 | -foreach ($idpoptions as $optionname => $optionvalue) |
|
| 47 | +foreach ($idpoptions as $optionname => $optionvalue) { |
|
| 47 | 48 | if ($optionvalue['name'] == "general:geo_coordinates") |
| 48 | 49 | $additional = TRUE; |
| 50 | +} |
|
| 49 | 51 | geo_widget_head($my_inst->federation, $inst_name) |
| 50 | 52 | ?> |
| 51 | 53 | <script> |
@@ -74,10 +76,11 @@ discard block |
||
| 74 | 76 | |
| 75 | 77 | <h1> |
| 76 | 78 | <?php |
| 77 | -if ($wizard_style) |
|
| 79 | +if ($wizard_style) { |
|
| 78 | 80 | echo _("Step 2: General Information about your IdP"); |
| 79 | -else |
|
| 81 | +} else { |
|
| 80 | 82 | printf(_("Editing IdP information for '%s'"), $inst_name); |
| 83 | +} |
|
| 81 | 84 | ?> |
| 82 | 85 | </h1> |
| 83 | 86 | <div class='infobox'> |
@@ -98,9 +101,10 @@ discard block |
||
| 98 | 101 | echo "<form enctype='multipart/form-data' action='edit_idp_result.php?inst_id=$my_inst->identifier" . ($wizard_style ? "&wizard=true" : "") . "' method='post' accept-charset='UTF-8'> |
| 99 | 102 | <input type='hidden' name='MAX_FILE_SIZE' value='" . Config::$MAX_UPLOAD_SIZE . "'>"; |
| 100 | 103 | |
| 101 | -if ($wizard_style) |
|
| 104 | +if ($wizard_style) { |
|
| 102 | 105 | echo "<p>" . |
| 103 | 106 | _("Hello, newcomer. Your institution is new to us. This wizard will ask you several questions about your IdP, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users.") . "</p>"; |
| 107 | +} |
|
| 104 | 108 | ?> |
| 105 | 109 | <fieldset class="option_container"> |
| 106 | 110 | <legend><strong><?php echo _("General Information"); ?></strong></legend> |
@@ -143,12 +147,14 @@ discard block |
||
| 143 | 147 | echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
| 144 | 148 | if (count(Config::$CONSORTIUM['ssid']) > 0) { |
| 145 | 149 | $ssidlist = ""; |
| 146 | - foreach (Config::$CONSORTIUM['ssid'] as $ssid) |
|
| 147 | - $ssidlist .= ", '<strong>" . $ssid . "</strong>'"; |
|
| 150 | + foreach (Config::$CONSORTIUM['ssid'] as $ssid) { |
|
| 151 | + $ssidlist .= ", '<strong>" . $ssid . "</strong>'"; |
|
| 152 | + } |
|
| 148 | 153 | $ssidlist = substr($ssidlist, 2); |
| 149 | 154 | echo sprintf(ngettext("We will always configure this SSID for WPA2/AES: %s.", "We will always configure these SSIDs for WPA2/AES: %s.", count(Config::$CONSORTIUM['ssid'])), $ssidlist); |
| 150 | - if (Config::$CONSORTIUM['tkipsupport']) |
|
| 151 | - echo " " . _("They will also be configured for WPA/TKIP if the device supports multiple encryption types."); |
|
| 155 | + if (Config::$CONSORTIUM['tkipsupport']) { |
|
| 156 | + echo " " . _("They will also be configured for WPA/TKIP if the device supports multiple encryption types."); |
|
| 157 | + } |
|
| 152 | 158 | echo "<br/>" . sprintf(_("It is also possible to define custom additional SSIDs with the options '%s' and '%s' below."), display_name("media:SSID"), display_name("media:SSID_with_legacy")); |
| 153 | 159 | } else { |
| 154 | 160 | echo _("Please configure which SSIDs should be configured in the installers."); |
@@ -160,8 +166,9 @@ discard block |
||
| 160 | 166 | echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
| 161 | 167 | if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) { |
| 162 | 168 | $consortiumlist = ""; |
| 163 | - foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) |
|
| 164 | - $consortiumlist .= ", '<strong>" . $oi . "</strong>'"; |
|
| 169 | + foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) { |
|
| 170 | + $consortiumlist .= ", '<strong>" . $oi . "</strong>'"; |
|
| 171 | + } |
|
| 165 | 172 | $consortiumlist = substr($consortiumlist, 2); |
| 166 | 173 | echo sprintf(ngettext("We will always configure this Consortium OI: %s.", "We will always configure these Consortium OIs: %s.", count(Config::$CONSORTIUM['interworking-consortium-oi'])), $consortiumlist); |
| 167 | 174 | |
@@ -190,11 +197,12 @@ discard block |
||
| 190 | 197 | <fieldset class="option_container"> |
| 191 | 198 | <legend><strong><?php echo _("Helpdesk Details for all users"); ?></strong></legend> |
| 192 | 199 | <?php |
| 193 | -if ($wizard_style) |
|
| 200 | +if ($wizard_style) { |
|
| 194 | 201 | echo "<p>" . |
| 195 | 202 | _("If your IdP provides a helpdesk for its users, it would be nice if you would tell us the pointers to this helpdesk. Some site installers might be able to signal this information to the user if he gets stuck.") . "</p> |
| 196 | 203 | <p>" . |
| 197 | 204 | _("If you enter a value here, it will be added to the site installers for all your users, and will be displayed on the download page. If you operate separate helpdesks for different user groups (we call this 'profiles'), or operate no help desk at all (shame on you!), you can also leave any of these fields empty and optionally specify per-profile helpdesk information later in this wizard.") . "</p>"; |
| 205 | +} |
|
| 198 | 206 | ?> |
| 199 | 207 | |
| 200 | 208 | <table id="expandable_support_options"> |
@@ -206,9 +214,10 @@ discard block |
||
| 206 | 214 | <!-- <fieldset class="option_container"> |
| 207 | 215 | <legend><strong><?php echo _("EAP details for all users"); ?></strong></legend> |
| 208 | 216 | <?php |
| 209 | -if ($wizard_style) |
|
| 217 | +if ($wizard_style) { |
|
| 210 | 218 | echo "<p>" . _("Most EAP methods need server-side authentication details, like the CA certificate and/or server name(s) of your authentication servers. If all the EAP methods you support work with the same CA and or Common Names of servers, you can enter them here and they will be added as trust anchors in all profiles. If the details differ per profile or per EAP-type, you can also enter them in the individual profiles later.") . "</p> |
| 211 | 219 | <p>" . sprintf(_("<strong>Note well: </strong>The server-side validation is a cornerstone of %s; without it, users are subject to man-in-the-middle attacks! We will not generate site installers without Trusted CA anchors and server names."), Config::$CONSORTIUM['name']) . "</p>"; |
| 220 | +} |
|
| 212 | 221 | ?> |
| 213 | 222 | <table id="expandable_eapserver_options"> |
| 214 | 223 | <?php |
@@ -18,10 +18,11 @@ |
||
| 18 | 18 | if ($ls['Code'] === 'urn:oasis:names:tc:SAML:2.0:status:Success' && !isset($ls['SubCode'])) { |
| 19 | 19 | /* Successful logout. */ |
| 20 | 20 | $url = htmlspecialchars($_SERVER['HTTP_HOST']) . substr($_SERVER['PHP_SELF'], 0, strrpos($_SERVER['PHP_SELF'], "/admin/logout_check.php")); |
| 21 | - if ($_SERVER['HTTPS'] == "on") |
|
| 22 | - $url = "https://" . $url; |
|
| 23 | - else |
|
| 24 | - $url = "http://" . $url; |
|
| 21 | + if ($_SERVER['HTTPS'] == "on") { |
|
| 22 | + $url = "https://" . $url; |
|
| 23 | + } else { |
|
| 24 | + $url = "http://" . $url; |
|
| 25 | + } |
|
| 25 | 26 | |
| 26 | 27 | header("Location: $url"); |
| 27 | 28 | } else { |
@@ -31,10 +31,11 @@ |
||
| 31 | 31 | <?php |
| 32 | 32 | $remaining_attribs = $user->beginflushAttributes(); |
| 33 | 33 | |
| 34 | -if (isset($_POST['option'])) |
|
| 34 | +if (isset($_POST['option'])) { |
|
| 35 | 35 | foreach ($_POST['option'] as $opt_id => $optname) |
| 36 | 36 | if ($optname == "user:fedadmin") { |
| 37 | 37 | echo "Security violation: user tried to make himself federation administrator!"; |
| 38 | +} |
|
| 38 | 39 | exit(1); |
| 39 | 40 | } |
| 40 | 41 | ?> |
@@ -138,7 +138,7 @@ discard block |
||
| 138 | 138 | echo "</table></div>"; |
| 139 | 139 | } |
| 140 | 140 | if (Config::$CONSORTIUM['name'] == 'eduroam') |
| 141 | - $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>"; |
|
| 141 | + $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"), "https://wiki.geant.org/x/KQB_AQ") . "</h3>"; |
|
| 142 | 142 | else |
| 143 | 143 | $helptext = ""; |
| 144 | 144 | echo $helptext; |
@@ -186,7 +186,7 @@ discard block |
||
| 186 | 186 | // deployment status; need to dive into profiles for this |
| 187 | 187 | // show happy eyeballs if at least one profile is configured/showtime |
| 188 | 188 | echo "<td>"; |
| 189 | - echo ($idp_instance->isOneProfileConfigured() ? "C" : "" ) . " " . ($idp_instance->isOneProfileShowtime() ? "V" : "" ); |
|
| 189 | + echo ($idp_instance->isOneProfileConfigured() ? "C" : "") . " " . ($idp_instance->isOneProfileShowtime() ? "V" : ""); |
|
| 190 | 190 | echo "</td>"; |
| 191 | 191 | // get the coarse status overview |
| 192 | 192 | $status = $idp_instance->getAllProfileStatusOverview(); |
@@ -128,19 +128,21 @@ discard block |
||
| 128 | 128 | if (isset($_GET['invitation'])) { |
| 129 | 129 | echo "<div class='ca-summary' style='position:relative;'><table>"; |
| 130 | 130 | |
| 131 | - if ($_GET['invitation'] == "SUCCESS") |
|
| 132 | - echo UI_remark(_("The invitation email was sent successfully."), _("The invitation email was sent.")); |
|
| 133 | - else if ($_GET['invitation'] == "FAILURE") |
|
| 134 | - echo UI_error(_("The invitation email could not be sent!"), _("The invitation email could not be sent!")); |
|
| 135 | - else |
|
| 136 | - echo UI_error(_("Error: unknown result code of invitation!?!"), _("Unknown result!")); |
|
| 131 | + if ($_GET['invitation'] == "SUCCESS") { |
|
| 132 | + echo UI_remark(_("The invitation email was sent successfully."), _("The invitation email was sent.")); |
|
| 133 | + } else if ($_GET['invitation'] == "FAILURE") { |
|
| 134 | + echo UI_error(_("The invitation email could not be sent!"), _("The invitation email could not be sent!")); |
|
| 135 | + } else { |
|
| 136 | + echo UI_error(_("Error: unknown result code of invitation!?!"), _("Unknown result!")); |
|
| 137 | + } |
|
| 137 | 138 | |
| 138 | 139 | echo "</table></div>"; |
| 139 | 140 | } |
| 140 | - if (Config::$CONSORTIUM['name'] == 'eduroam') |
|
| 141 | - $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>"; |
|
| 142 | - else |
|
| 143 | - $helptext = ""; |
|
| 141 | + if (Config::$CONSORTIUM['name'] == 'eduroam') { |
|
| 142 | + $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>"; |
|
| 143 | + } else { |
|
| 144 | + $helptext = ""; |
|
| 145 | + } |
|
| 144 | 146 | echo $helptext; |
| 145 | 147 | |
| 146 | 148 | ?> |
@@ -153,8 +155,9 @@ discard block |
||
| 153 | 155 | $feds = $user->getAttributes("user:fedadmin"); |
| 154 | 156 | $pending_invites = $mgmt->listPendingInvitations(); |
| 155 | 157 | |
| 156 | - if (Config::$DB['enforce-external-sync']) |
|
| 157 | - echo "<th>" . sprintf(_("%s Database Sync Status"), Config::$CONSORTIUM['name']) . "</th>"; |
|
| 158 | + if (Config::$DB['enforce-external-sync']) { |
|
| 159 | + echo "<th>" . sprintf(_("%s Database Sync Status"), Config::$CONSORTIUM['name']) . "</th>"; |
|
| 160 | + } |
|
| 158 | 161 | ?> |
| 159 | 162 | <th><?php echo _("Administrator Management"); ?></th> |
| 160 | 163 | </tr> |
@@ -165,10 +168,11 @@ discard block |
||
| 165 | 168 | |
| 166 | 169 | // extract only pending invitations for *this* fed |
| 167 | 170 | $display_pendings = FALSE; |
| 168 | - foreach ($pending_invites as $oneinvite) |
|
| 169 | - if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) { |
|
| 171 | + foreach ($pending_invites as $oneinvite) { |
|
| 172 | + if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) { |
|
| 170 | 173 | // echo "PENDINGS!"; |
| 171 | 174 | $display_pendings = TRUE; |
| 175 | + } |
|
| 172 | 176 | } |
| 173 | 177 | |
| 174 | 178 | $idps = $thefed->listIdentityProviders(); |
@@ -253,8 +257,8 @@ discard block |
||
| 253 | 257 | </strong> |
| 254 | 258 | </td> |
| 255 | 259 | </tr>"; |
| 256 | - foreach ($pending_invites as $oneinvite) |
|
| 257 | - if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) { |
|
| 260 | + foreach ($pending_invites as $oneinvite) { |
|
| 261 | + if (strtoupper($oneinvite['country']) == strtoupper($thefed->name)) { |
|
| 258 | 262 | echo "<tr> |
| 259 | 263 | <td>" . |
| 260 | 264 | $oneinvite['name'] . " |
@@ -263,6 +267,7 @@ discard block |
||
| 263 | 267 | $oneinvite['mail'] . " |
| 264 | 268 | </td> |
| 265 | 269 | <td colspan=2>"; |
| 270 | + } |
|
| 266 | 271 | echo "<form method='post' action='overview_federation.php' accept-charset='UTF-8'> |
| 267 | 272 | <input type='hidden' name='invitation_id' value='" . $oneinvite['token'] . "'/> |
| 268 | 273 | <button class='delete' type='submit' name='submitbutton' value='" . BUTTON_DELETE . "'>" . _("Revoke Invitation") . "</button> |
@@ -18,7 +18,7 @@ discard block |
||
| 18 | 18 | $Cat = new CAT(); |
| 19 | 19 | $Cat->set_locale("web_admin"); |
| 20 | 20 | |
| 21 | -$additional_message = [ |
|
| 21 | +$additional_message = [ |
|
| 22 | 22 | L_OK => '', |
| 23 | 23 | L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
| 24 | 24 | L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
@@ -28,20 +28,20 @@ discard block |
||
| 28 | 28 | |
| 29 | 29 | function disp_name($eap) { |
| 30 | 30 | $D = EAP::eapDisplayName($eap); |
| 31 | - return $D['OUTER'] . ( $D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
| 31 | + return $D['OUTER'] . ($D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
| 32 | 32 | } |
| 33 | 33 | |
| 34 | 34 | function printDN($dn) { |
| 35 | 35 | $out = ''; |
| 36 | 36 | foreach (array_reverse($dn) as $k => $v) { |
| 37 | - if(is_array ($v)) { |
|
| 37 | + if (is_array($v)) { |
|
| 38 | 38 | foreach ($v as $V) { |
| 39 | - if($out) |
|
| 39 | + if ($out) |
|
| 40 | 40 | $out .= ','; |
| 41 | 41 | $out .= "$k=$V"; |
| 42 | 42 | } |
| 43 | 43 | } else { |
| 44 | - if($out) |
|
| 44 | + if ($out) |
|
| 45 | 45 | $out .= ','; |
| 46 | 46 | $out .= "$k=$v"; |
| 47 | 47 | } |
@@ -50,32 +50,32 @@ discard block |
||
| 50 | 50 | } |
| 51 | 51 | |
| 52 | 52 | function printTm($tm) { |
| 53 | - return(gmdate(DateTime::COOKIE,$tm)); |
|
| 53 | + return(gmdate(DateTime::COOKIE, $tm)); |
|
| 54 | 54 | } |
| 55 | 55 | |
| 56 | 56 | |
| 57 | 57 | |
| 58 | -function process_result($testsuite,$host) { |
|
| 58 | +function process_result($testsuite, $host) { |
|
| 59 | 59 | $ret = []; |
| 60 | 60 | $server_info = []; |
| 61 | 61 | $udp_result = $testsuite->UDP_reachability_result[$host]; |
| 62 | - if(isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
| 62 | + if (isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
| 63 | 63 | foreach ($udp_result['certdata'] as $certdata) { |
| 64 | - if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
| 64 | + if ($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned') |
|
| 65 | 65 | continue; |
| 66 | - $server_cert = [ |
|
| 66 | + $server_cert = [ |
|
| 67 | 67 | 'subject' => printDN($certdata['subject']), |
| 68 | 68 | 'issuer' => printDN($certdata['issuer']), |
| 69 | 69 | 'validFrom' => printTm($certdata['validFrom_time_t']), |
| 70 | 70 | 'validTo' => printTm($certdata['validTo_time_t']), |
| 71 | - 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']), |
|
| 71 | + 'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']), |
|
| 72 | 72 | 'sha1' => $certdata['sha1'], |
| 73 | 73 | 'extensions' => $certdata['extensions'] |
| 74 | 74 | ]; |
| 75 | 75 | } |
| 76 | 76 | } |
| 77 | 77 | $ret['server_cert'] = $server_cert; |
| 78 | - if(isset($udp_result['incoming_server_names'][0]) ) { |
|
| 78 | + if (isset($udp_result['incoming_server_names'][0])) { |
|
| 79 | 79 | $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]); |
| 80 | 80 | } |
| 81 | 81 | else |
@@ -119,7 +119,7 @@ discard block |
||
| 119 | 119 | exit; |
| 120 | 120 | */ |
| 121 | 121 | $hostindex = $_REQUEST['hostindex']; |
| 122 | -if(!is_numeric($hostindex)) |
|
| 122 | +if (!is_numeric($hostindex)) |
|
| 123 | 123 | exit; |
| 124 | 124 | |
| 125 | 125 | |
@@ -140,14 +140,14 @@ discard block |
||
| 140 | 140 | if ($_FILES['cert']['error'] == UPLOAD_ERR_OK) { |
| 141 | 141 | $clientcertdata = file_get_contents($_FILES['cert']['tmp_name']); |
| 142 | 142 | $privkey_pass = isset($_REQUEST['privkey_pass']) && $_REQUEST['privkey_pass'] ? $_REQUEST['privkey_pass'] : ""; //!! |
| 143 | - if(isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
| 143 | + if (isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
| 144 | 144 | $tls_username = valid_user($_REQUEST['tls_username']); |
| 145 | 145 | } else { |
| 146 | - if(openssl_pkcs12_read($clientcertdata,$certs,$privkey_pass)) { |
|
| 146 | + if (openssl_pkcs12_read($clientcertdata, $certs, $privkey_pass)) { |
|
| 147 | 147 | $mydetails = openssl_x509_parse($certs['cert']); |
| 148 | - if(isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
| 149 | - $tls_username=$mydetails['subject']['CN']; |
|
| 150 | - debug(4,"PKCS12-CN=$tls_username\n"); |
|
| 148 | + if (isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
| 149 | + $tls_username = $mydetails['subject']['CN']; |
|
| 150 | + debug(4, "PKCS12-CN=$tls_username\n"); |
|
| 151 | 151 | } else { |
| 152 | 152 | $testresult = RETVAL_INCOMPLETE_DATA; |
| 153 | 153 | $run_test = FALSE; |
@@ -161,14 +161,14 @@ discard block |
||
| 161 | 161 | $testresult = RETVAL_INCOMPLETE_DATA; |
| 162 | 162 | $run_test = FALSE; |
| 163 | 163 | } |
| 164 | - if($run_test) { |
|
| 165 | - debug(4,"TLS-USERNAME=$tls_username\n"); |
|
| 166 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass,'', TRUE, TRUE, $clientcertdata); |
|
| 164 | + if ($run_test) { |
|
| 165 | + debug(4, "TLS-USERNAME=$tls_username\n"); |
|
| 166 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass, '', TRUE, TRUE, $clientcertdata); |
|
| 167 | 167 | } |
| 168 | 168 | } else { |
| 169 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password,$outer_user_name); |
|
| 169 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password, $outer_user_name); |
|
| 170 | 170 | } |
| 171 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
| 171 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
| 172 | 172 | $returnarray['result'][$i]['eap'] = display_name($eap); |
| 173 | 173 | $returnarray['returncode'][$i] = $testresult; |
| 174 | 174 | |
@@ -176,7 +176,7 @@ discard block |
||
| 176 | 176 | switch ($testresult) { |
| 177 | 177 | case RETVAL_OK : |
| 178 | 178 | $level = $returnarray['result'][$i]['level']; |
| 179 | - switch($level) { |
|
| 179 | + switch ($level) { |
|
| 180 | 180 | case L_OK : |
| 181 | 181 | $message = _("<strong>Test successful.</strong>"); |
| 182 | 182 | break; |
@@ -228,21 +228,21 @@ discard block |
||
| 228 | 228 | $i = 0; |
| 229 | 229 | $returnarray['hostindex'] = $hostindex; |
| 230 | 230 | $testresult = $testsuite->UDP_reachability($hostindex); |
| 231 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
| 231 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
| 232 | 232 | $returnarray['result'][$i]['eap'] = 'ALL'; |
| 233 | 233 | $returnarray['returncode'][$i] = $testresult; |
| 234 | 234 | // a failed check may not have gotten any certificate, be prepared for that |
| 235 | 235 | switch ($testresult) { |
| 236 | 236 | case RETVAL_CONVERSATION_REJECT: |
| 237 | 237 | $level = $returnarray['result'][$i]['level']; |
| 238 | - if($level > L_OK) |
|
| 238 | + if ($level > L_OK) |
|
| 239 | 239 | $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level]; |
| 240 | 240 | else |
| 241 | 241 | $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned."); |
| 242 | 242 | break; |
| 243 | 243 | case RETVAL_IMMEDIATE_REJECT: |
| 244 | 244 | $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable."); |
| 245 | - $level= L_WARN; |
|
| 245 | + $level = L_WARN; |
|
| 246 | 246 | break; |
| 247 | 247 | case RETVAL_NO_RESPONSE: |
| 248 | 248 | $returnarray['result'][$i]['server'] = 0; |
@@ -255,10 +255,10 @@ discard block |
||
| 255 | 255 | break; |
| 256 | 256 | default: |
| 257 | 257 | $message = _("unhandled error"); |
| 258 | - $level= L_ERROR; |
|
| 258 | + $level = L_ERROR; |
|
| 259 | 259 | break; |
| 260 | 260 | } |
| 261 | -debug(4,"SERVER=".$returnarray['result'][$i]['server']."\n"); |
|
| 261 | +debug(4, "SERVER=" . $returnarray['result'][$i]['server'] . "\n"); |
|
| 262 | 262 | $returnarray['result'][$i]['level'] = $level; |
| 263 | 263 | $returnarray['result'][$i]['message'] = $message; |
| 264 | 264 | break; |
@@ -36,13 +36,15 @@ discard block |
||
| 36 | 36 | foreach (array_reverse($dn) as $k => $v) { |
| 37 | 37 | if(is_array ($v)) { |
| 38 | 38 | foreach ($v as $V) { |
| 39 | - if($out) |
|
| 40 | - $out .= ','; |
|
| 39 | + if($out) { |
|
| 40 | + $out .= ','; |
|
| 41 | + } |
|
| 41 | 42 | $out .= "$k=$V"; |
| 42 | 43 | } |
| 43 | 44 | } else { |
| 44 | - if($out) |
|
| 45 | - $out .= ','; |
|
| 45 | + if($out) { |
|
| 46 | + $out .= ','; |
|
| 47 | + } |
|
| 46 | 48 | $out .= "$k=$v"; |
| 47 | 49 | } |
| 48 | 50 | } |
@@ -61,8 +63,9 @@ discard block |
||
| 61 | 63 | $udp_result = $testsuite->UDP_reachability_result[$host]; |
| 62 | 64 | if(isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
| 63 | 65 | foreach ($udp_result['certdata'] as $certdata) { |
| 64 | - if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
| 65 | - continue; |
|
| 66 | + if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) { |
|
| 67 | + continue; |
|
| 68 | + } |
|
| 66 | 69 | $server_cert = [ |
| 67 | 70 | 'subject' => printDN($certdata['subject']), |
| 68 | 71 | 'issuer' => printDN($certdata['issuer']), |
@@ -77,9 +80,9 @@ discard block |
||
| 77 | 80 | $ret['server_cert'] = $server_cert; |
| 78 | 81 | if(isset($udp_result['incoming_server_names'][0]) ) { |
| 79 | 82 | $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]); |
| 83 | + } else { |
|
| 84 | + $ret['server'] = 0; |
|
| 80 | 85 | } |
| 81 | - else |
|
| 82 | - $ret['server'] = 0; |
|
| 83 | 86 | $ret['level'] = L_OK; |
| 84 | 87 | $ret['time_millisec'] = sprintf("%d", $udp_result['time_millisec']); |
| 85 | 88 | if (isset($udp_result['cert_oddities']) && count($udp_result['cert_oddities']) > 0) { |
@@ -100,8 +103,9 @@ discard block |
||
| 100 | 103 | return $ret; |
| 101 | 104 | } |
| 102 | 105 | |
| 103 | -if (!isset($_REQUEST['test_type']) || !$_REQUEST['test_type']) |
|
| 106 | +if (!isset($_REQUEST['test_type']) || !$_REQUEST['test_type']) { |
|
| 104 | 107 | exit; |
| 108 | +} |
|
| 105 | 109 | |
| 106 | 110 | $test_type = $_REQUEST['test_type']; |
| 107 | 111 | $check_realm = valid_Realm($_REQUEST['realm']); |
@@ -119,8 +123,9 @@ discard block |
||
| 119 | 123 | exit; |
| 120 | 124 | */ |
| 121 | 125 | $hostindex = $_REQUEST['hostindex']; |
| 122 | -if(!is_numeric($hostindex)) |
|
| 126 | +if(!is_numeric($hostindex)) { |
|
| 123 | 127 | exit; |
| 128 | +} |
|
| 124 | 129 | |
| 125 | 130 | |
| 126 | 131 | $returnarray = []; |
@@ -235,10 +240,11 @@ discard block |
||
| 235 | 240 | switch ($testresult) { |
| 236 | 241 | case RETVAL_CONVERSATION_REJECT: |
| 237 | 242 | $level = $returnarray['result'][$i]['level']; |
| 238 | - if($level > L_OK) |
|
| 239 | - $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level]; |
|
| 240 | - else |
|
| 241 | - $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned."); |
|
| 243 | + if($level > L_OK) { |
|
| 244 | + $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level]; |
|
| 245 | + } else { |
|
| 246 | + $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned."); |
|
| 247 | + } |
|
| 242 | 248 | break; |
| 243 | 249 | case RETVAL_IMMEDIATE_REJECT: |
| 244 | 250 | $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable."); |
@@ -276,23 +282,28 @@ discard block |
||
| 276 | 282 | } else { |
| 277 | 283 | $returnarray['message'] = $testsuite->return_codes[$testsuite->TLS_CA_checks_result[$host]['status']]["message"]; |
| 278 | 284 | $returnarray['level'] = L_OK; |
| 279 | - if ($testsuite->TLS_CA_checks_result[$host]['status'] != RETVAL_CONNECTION_REFUSED) |
|
| 280 | - $returnarray['message'] .= ' (' . sprintf(_("elapsed time: %d"), $testsuite->TLS_CA_checks_result[$host]['time_millisec']) . ' ms)'; |
|
| 281 | - else |
|
| 282 | - $returnarray['level'] = L_ERROR; |
|
| 285 | + if ($testsuite->TLS_CA_checks_result[$host]['status'] != RETVAL_CONNECTION_REFUSED) { |
|
| 286 | + $returnarray['message'] .= ' (' . sprintf(_("elapsed time: %d"), $testsuite->TLS_CA_checks_result[$host]['time_millisec']) . ' ms)'; |
|
| 287 | + } else { |
|
| 288 | + $returnarray['level'] = L_ERROR; |
|
| 289 | + } |
|
| 283 | 290 | if ($testsuite->TLS_CA_checks_result[$host]['status'] == RETVAL_OK) { |
| 284 | 291 | $returnarray['certdata'] = []; |
| 285 | 292 | $returnarray['certdata']['subject'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['subject']; |
| 286 | 293 | $returnarray['certdata']['issuer'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['issuer']; |
| 287 | 294 | $returnarray['certdata']['extensions'] = []; |
| 288 | - if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'])) |
|
| 289 | - $returnarray['certdata']['extensions']['subjectaltname'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']; |
|
| 290 | - if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid'])) |
|
| 291 | - $returnarray['certdata']['extensions']['policies'] = join(' ', $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid']); |
|
| 292 | - if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint'])) |
|
| 293 | - $returnarray['certdata']['extensions']['crldistributionpoints'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint']; |
|
| 294 | - if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess'])) |
|
| 295 | - $returnarray['certdata']['extensions']['authorityinfoaccess'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess']; |
|
| 295 | + if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'])) { |
|
| 296 | + $returnarray['certdata']['extensions']['subjectaltname'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']; |
|
| 297 | + } |
|
| 298 | + if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid'])) { |
|
| 299 | + $returnarray['certdata']['extensions']['policies'] = join(' ', $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['policyoid']); |
|
| 300 | + } |
|
| 301 | + if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint'])) { |
|
| 302 | + $returnarray['certdata']['extensions']['crldistributionpoints'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['crlDistributionPoint']; |
|
| 303 | + } |
|
| 304 | + if (isset($testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess'])) { |
|
| 305 | + $returnarray['certdata']['extensions']['authorityinfoaccess'] = $testsuite->TLS_CA_checks_result[$host]['certdata']['extensions']['authorityInfoAccess']; |
|
| 306 | + } |
|
| 296 | 307 | } |
| 297 | 308 | $returnarray['cert_oddities'] = []; |
| 298 | 309 | } |
@@ -306,10 +317,11 @@ discard block |
||
| 306 | 317 | $k = 0; |
| 307 | 318 | // the host member of the array may not exist if RETVAL_SKIPPED came out |
| 308 | 319 | // (e.g. no client cert to test with). Be prepared for that |
| 309 | - if (isset($testsuite->TLS_clients_checks_result[$host])) |
|
| 310 | - foreach ($testsuite->TLS_clients_checks_result[$host]['ca'] as $type => $cli) { |
|
| 320 | + if (isset($testsuite->TLS_clients_checks_result[$host])) { |
|
| 321 | + foreach ($testsuite->TLS_clients_checks_result[$host]['ca'] as $type => $cli) { |
|
| 311 | 322 | foreach ($cli as $key => $val) { |
| 312 | 323 | $returnarray['ca'][$k][$key] = $val; |
| 324 | + } |
|
| 313 | 325 | } |
| 314 | 326 | $k++; |
| 315 | 327 | } |
@@ -347,8 +359,9 @@ discard block |
||
| 347 | 359 | $oids = check_policy($data); |
| 348 | 360 | if (!empty($oids)) { |
| 349 | 361 | $printedres .= '<li>' . _("Certificate policies") . ':'; |
| 350 | - foreach ($oids as $k => $o) |
|
| 351 | - $printedres .= " $o ($k)"; |
|
| 362 | + foreach ($oids as $k => $o) { |
|
| 363 | + $printedres .= " $o ($k)"; |
|
| 364 | + } |
|
| 352 | 365 | } |
| 353 | 366 | if (($crl = certificate_get_field($data, 'crlDistributionPoints'))) { |
| 354 | 367 | $printedres .= '<li>' . _("crlDistributionPoints") . ': ' . $crl; |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | |
| 38 | 38 | function print_test_results($t) { |
| 39 | 39 | $out = ''; |
| 40 | - switch($t->test_result['global']) { |
|
| 40 | + switch ($t->test_result['global']) { |
|
| 41 | 41 | case L_OK: |
| 42 | 42 | $message = "Your configuration appears to be fine."; |
| 43 | 43 | break; |
@@ -51,10 +51,10 @@ discard block |
||
| 51 | 51 | $message = "Your configuration appears to be fine."; |
| 52 | 52 | break; |
| 53 | 53 | } |
| 54 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
| 55 | - foreach ($t->out as $test => $test_val) { |
|
| 56 | - foreach ($test_val as $o) { |
|
| 57 | - $out .= UI_message($o['level'],$o['message']); |
|
| 54 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
| 55 | + foreach ($t->out as $test => $test_val) { |
|
| 56 | + foreach ($test_val as $o) { |
|
| 57 | + $out .= UI_message($o['level'], $o['message']); |
|
| 58 | 58 | } |
| 59 | 59 | } |
| 60 | 60 | return($out); |
@@ -62,7 +62,7 @@ discard block |
||
| 62 | 62 | |
| 63 | 63 | function return_test_results($t) { |
| 64 | 64 | $out = ''; |
| 65 | - switch($t->test_result['global']) { |
|
| 65 | + switch ($t->test_result['global']) { |
|
| 66 | 66 | case L_OK: |
| 67 | 67 | $message = "Your configuration appears to be fine."; |
| 68 | 68 | break; |
@@ -76,10 +76,10 @@ discard block |
||
| 76 | 76 | $message = "Your configuration appears to be fine."; |
| 77 | 77 | break; |
| 78 | 78 | } |
| 79 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
| 80 | - foreach ($t->out as $test => $test_val) { |
|
| 81 | - foreach ($test_val as $o) { |
|
| 82 | - $out .= UI_message($o['level'],$o['message']); |
|
| 79 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
| 80 | + foreach ($t->out as $test => $test_val) { |
|
| 81 | + foreach ($test_val as $o) { |
|
| 82 | + $out .= UI_message($o['level'], $o['message']); |
|
| 83 | 83 | } |
| 84 | 84 | } |
| 85 | 85 | return($out); |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | } |
| 101 | 101 | $test = new SanityTest(); |
| 102 | 102 | $test->run_tests($Tests); |
| 103 | -$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
| 103 | +$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
| 104 | 104 | switch ($format) { |
| 105 | 105 | case 'include': |
| 106 | 106 | $o = print_test_results($test); |
@@ -20,7 +20,7 @@ discard block |
||
| 20 | 20 | |
| 21 | 21 | $cat = defaultPagePrelude(_("Sanity check for dynamic discovery of realms")); |
| 22 | 22 | $check_thorough = FALSE; |
| 23 | -$error_message =''; |
|
| 23 | +$error_message = ''; |
|
| 24 | 24 | $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']); |
| 25 | 25 | |
| 26 | 26 | if (isset($_GET['profile_id'])) |
@@ -38,17 +38,17 @@ discard block |
||
| 38 | 38 | $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
| 39 | 39 | } |
| 40 | 40 | } else { // someone else's realm... only shallow checks |
| 41 | - if(!empty($_REQUEST['realm'])) { |
|
| 42 | - if($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
| 41 | + if (!empty($_REQUEST['realm'])) { |
|
| 42 | + if ($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
| 43 | 43 | $_SESSION['check_realm'] = $check_realm; |
| 44 | 44 | } |
| 45 | 45 | } else { |
| 46 | - if(!empty($_SESSION['check_realm'])) |
|
| 46 | + if (!empty($_SESSION['check_realm'])) |
|
| 47 | 47 | $check_realm = $_SESSION['check_realm']; |
| 48 | 48 | else |
| 49 | 49 | $check_realm = FALSE; |
| 50 | 50 | } |
| 51 | - if($check_realm) |
|
| 51 | + if ($check_realm) |
|
| 52 | 52 | $testsuite = new RADIUSTests($check_realm); |
| 53 | 53 | else |
| 54 | 54 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -226,7 +226,7 @@ discard block |
||
| 226 | 226 | } |
| 227 | 227 | } |
| 228 | 228 | cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] +'" style="width: 24px;"></td><td>' + state; |
| 229 | - cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."),"'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
| 229 | + cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
| 230 | 230 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
| 231 | 231 | if (data.ca[key].certificate[c].finalerror==1) { |
| 232 | 232 | cliinfo = cliinfo + '<li>' + restskipped + '</li>'; |
@@ -316,7 +316,7 @@ discard block |
||
| 316 | 316 | var v = data.result[0]; |
| 317 | 317 | $("#src"+data.hostindex+"_img").attr('src',icons[v.level]); |
| 318 | 318 | if(v.server != 0 ) { |
| 319 | - $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
| 319 | + $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
| 320 | 320 | var cert_data = "<tr class='server_cert'><td> </td><td colspan=2><div><dl class='server_cert_list'>"; |
| 321 | 321 | $.each(server_cert, function(l,s) { |
| 322 | 322 | cert_data = cert_data + "<dt>" + s + "</dt><dd>"+ v.server_cert[l] + "</dd>"; |
@@ -339,7 +339,7 @@ discard block |
||
| 339 | 339 | } |
| 340 | 340 | $("#src"+data.hostindex).append(cert_data); |
| 341 | 341 | } else { |
| 342 | - $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
| 342 | + $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
| 343 | 343 | } |
| 344 | 344 | global_level_udp = Math.max(global_level_udp,v.level); |
| 345 | 345 | $(".server_cert").show(); |
@@ -391,7 +391,7 @@ discard block |
||
| 391 | 391 | }); |
| 392 | 392 | } |
| 393 | 393 | o = o + cert_data+'</table>'; |
| 394 | - $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
| 394 | + $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
| 395 | 395 | }); |
| 396 | 396 | } |
| 397 | 397 | |
@@ -402,8 +402,8 @@ discard block |
||
| 402 | 402 | <?php |
| 403 | 403 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
| 404 | 404 | print " |
| 405 | -$(\"#live_src".$hostindex."_img\").attr('src',icon_loading); |
|
| 406 | -$(\"#live_src".$hostindex."_img\").show(); |
|
| 405 | +$(\"#live_src".$hostindex . "_img\").attr('src',icon_loading); |
|
| 406 | +$(\"#live_src".$hostindex . "_img\").show(); |
|
| 407 | 407 | $.ajax({ |
| 408 | 408 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
| 409 | 409 | type: 'POST', |
@@ -434,15 +434,15 @@ discard block |
||
| 434 | 434 | <?php |
| 435 | 435 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
| 436 | 436 | if ($check_thorough) |
| 437 | - $extraarg = "profile_id: ".$my_profile->identifier.", "; |
|
| 437 | + $extraarg = "profile_id: " . $my_profile->identifier . ", "; |
|
| 438 | 438 | else |
| 439 | 439 | $extraarg = ""; |
| 440 | 440 | |
| 441 | 441 | print " |
| 442 | -$(\"#src".$hostindex."_img\").attr('src',icon_loading); |
|
| 442 | +$(\"#src".$hostindex . "_img\").attr('src',icon_loading); |
|
| 443 | 443 | $(\"#src$hostindex\").html(''); |
| 444 | 444 | running_ajax_stat++; |
| 445 | -$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, udp, 'json'); |
|
| 445 | +$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, udp, 'json'); |
|
| 446 | 446 | |
| 447 | 447 | "; |
| 448 | 448 | } |
@@ -461,8 +461,8 @@ discard block |
||
| 461 | 461 | </script> |
| 462 | 462 | <?php |
| 463 | 463 | productheader("ADMIN", CAT::get_lang()); |
| 464 | - print "<h1>".sprintf(_("Realm testing for: %s"),$check_realm)."</h1>\n"; |
|
| 465 | - if($error_message) { |
|
| 464 | + print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
| 465 | + if ($error_message) { |
|
| 466 | 466 | print "<p>$error_message</p>"; |
| 467 | 467 | } else { |
| 468 | 468 | ?> |
@@ -481,7 +481,7 @@ discard block |
||
| 481 | 481 | </legend> |
| 482 | 482 | <?php |
| 483 | 483 | // NAPTR existence check |
| 484 | - echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
| 484 | + echo "<strong>" . _("DNS chekcs") . "</strong><div>"; |
|
| 485 | 485 | $naptr = $testsuite->NAPTR(); |
| 486 | 486 | if ($naptr != RETVAL_NOTCONFIGURED) { |
| 487 | 487 | echo "<table>"; |
@@ -551,10 +551,10 @@ discard block |
||
| 551 | 551 | |
| 552 | 552 | echo "</table><table>"; |
| 553 | 553 | if (count($testsuite->listerrors()) == 0) { |
| 554 | - echo UI_message(L_OK,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
| 554 | + echo UI_message(L_OK, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
| 555 | 555 | echo "</table>"; |
| 556 | 556 | } else { |
| 557 | - echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
| 557 | + echo UI_message(L_ERROR, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
| 558 | 558 | echo "</table><div class='notacceptable'><table>"; |
| 559 | 559 | foreach ($testsuite->listerrors() as $details) |
| 560 | 560 | echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
@@ -581,9 +581,9 @@ discard block |
||
| 581 | 581 | continue;*/ |
| 582 | 582 | print " |
| 583 | 583 | running_ajax_dyn++; |
| 584 | - $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
| 584 | + $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
| 585 | 585 | running_ajax_dyn++; |
| 586 | - $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
| 586 | + $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
| 587 | 587 | "; |
| 588 | 588 | } |
| 589 | 589 | echo "} |
@@ -592,12 +592,12 @@ discard block |
||
| 592 | 592 | } else { |
| 593 | 593 | echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
| 594 | 594 | } |
| 595 | - echo "<strong>"._("Static connectivity tests")."</strong> |
|
| 595 | + echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
| 596 | 596 | <table><tr> |
| 597 | 597 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
| 598 | 598 | </tr></table>"; |
| 599 | - if($naptr > 0) { |
|
| 600 | - echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
| 599 | + if ($naptr > 0) { |
|
| 600 | + echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
| 601 | 601 | <table><tr> |
| 602 | 602 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
| 603 | 603 | </tr></table>"; |
@@ -611,19 +611,19 @@ discard block |
||
| 611 | 611 | <button id="run_s_tests" onclick="run_udp()"><?php echo _("Repeat static connectivity tests") ?></button> |
| 612 | 612 | <p> |
| 613 | 613 | <fieldset class="option_container" id="static_tests"> |
| 614 | - <legend><strong> <?php echo _("STATIC connectivity tests");?> </strong> </legend> |
|
| 614 | + <legend><strong> <?php echo _("STATIC connectivity tests"); ?> </strong> </legend> |
|
| 615 | 615 | <?php |
| 616 | 616 | echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']); |
| 617 | 617 | print "<p>"; |
| 618 | 618 | |
| 619 | 619 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
| 620 | 620 | print "<hr>"; |
| 621 | -printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
| 621 | +printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
| 622 | 622 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
| 623 | 623 | <tr> |
| 624 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
| 624 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
| 625 | 625 | <td id='src$hostindex' colspan=2> |
| 626 | -"._("testing...")." |
|
| 626 | +" . _("testing...") . " |
|
| 627 | 627 | </td> |
| 628 | 628 | </tr>" . |
| 629 | 629 | //server_cert('udp-'.$hostindex) . |
@@ -647,8 +647,8 @@ discard block |
||
| 647 | 647 | <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>"; |
| 648 | 648 | |
| 649 | 649 | $resultstoprint = []; |
| 650 | - if (count($testsuite->NAPTR_hostname_records)>0) { |
|
| 651 | - $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>'; |
|
| 650 | + if (count($testsuite->NAPTR_hostname_records) > 0) { |
|
| 651 | + $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR, _("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK, _("All tests passed, congratulations!")) . '</table>'; |
|
| 652 | 652 | $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
| 653 | 653 | foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
| 654 | 654 | /* if ($addr['family'] == "IPv6") { |
@@ -660,9 +660,9 @@ discard block |
||
| 660 | 660 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
| 661 | 661 | $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
| 662 | 662 | <tr> |
| 663 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td> |
|
| 663 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca" . $hostindex . "_img'></td> |
|
| 664 | 664 | <td id='srcca$hostindex'> |
| 665 | -"._("testing...")." |
|
| 665 | +" . _("testing...") . " |
|
| 666 | 666 | </td> |
| 667 | 667 | </tr> |
| 668 | 668 | </table>"; |
@@ -678,18 +678,18 @@ discard block |
||
| 678 | 678 | $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
| 679 | 679 | $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
| 680 | 680 | <tr> |
| 681 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td> |
|
| 681 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient" . $hostindex . "_img'></td> |
|
| 682 | 682 | <td id='srcclient$hostindex'> |
| 683 | -"._("testing...")." |
|
| 683 | +" . _("testing...") . " |
|
| 684 | 684 | </td> |
| 685 | 685 | </tr> |
| 686 | 686 | </table></span>"; |
| 687 | 687 | $clientstest[] = '</ol>'; |
| 688 | 688 | } |
| 689 | 689 | echo '<div style="align:right;">'; |
| 690 | - echo join('',$resultstoprint); |
|
| 691 | - echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
| 692 | - print join('',$clientstest); |
|
| 690 | + echo join('', $resultstoprint); |
|
| 691 | + echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
| 692 | + print join('', $clientstest); |
|
| 693 | 693 | echo '</span>'; |
| 694 | 694 | echo '</div>'; |
| 695 | 695 | } |
@@ -711,8 +711,8 @@ discard block |
||
| 711 | 711 | <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
| 712 | 712 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
| 713 | 713 | <input type='hidden' name='test_type' value='udp_login'> |
| 714 | - <input type='hidden' name='lang' value='".CAT::get_lang()."'> |
|
| 715 | - <input type='hidden' name='profile_id' value='".$my_profile->identifier."'> |
|
| 714 | + <input type='hidden' name='lang' value='".CAT::get_lang() . "'> |
|
| 715 | + <input type='hidden' name='profile_id' value='".$my_profile->identifier . "'> |
|
| 716 | 716 | <table id='live_tests'>"; |
| 717 | 717 | // if any password based EAP methods are available enable this section |
| 718 | 718 | if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) || |
@@ -737,8 +737,8 @@ discard block |
||
| 737 | 737 | echo "<div id='live_login_results' style='display:none'>"; |
| 738 | 738 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
| 739 | 739 | print "<hr>"; |
| 740 | - printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
| 741 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
| 740 | + printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
| 741 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
| 742 | 742 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
| 743 | 743 | } |
| 744 | 744 | echo "</div>"; |
@@ -23,10 +23,11 @@ discard block |
||
| 23 | 23 | $error_message =''; |
| 24 | 24 | $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']); |
| 25 | 25 | |
| 26 | -if (isset($_GET['profile_id'])) |
|
| 26 | +if (isset($_GET['profile_id'])) { |
|
| 27 | 27 | $my_profile = valid_Profile($_GET['profile_id'], $my_inst->identifier); |
| 28 | -else |
|
| 28 | +} else { |
|
| 29 | 29 | $my_profile = NULL; |
| 30 | +} |
|
| 30 | 31 | if ($my_profile != NULL) { |
| 31 | 32 | $cr = $my_profile->getAttributes("internal:realm"); |
| 32 | 33 | if ($cr) { |
@@ -43,16 +44,18 @@ discard block |
||
| 43 | 44 | $_SESSION['check_realm'] = $check_realm; |
| 44 | 45 | } |
| 45 | 46 | } else { |
| 46 | - if(!empty($_SESSION['check_realm'])) |
|
| 47 | - $check_realm = $_SESSION['check_realm']; |
|
| 48 | - else |
|
| 49 | - $check_realm = FALSE; |
|
| 47 | + if(!empty($_SESSION['check_realm'])) { |
|
| 48 | + $check_realm = $_SESSION['check_realm']; |
|
| 49 | + } else { |
|
| 50 | + $check_realm = FALSE; |
|
| 51 | + } |
|
| 52 | + } |
|
| 53 | + if($check_realm) { |
|
| 54 | + $testsuite = new RADIUSTests($check_realm); |
|
| 55 | + } else { |
|
| 56 | + $error_message = _("No valid realm name given, cannot execute any checks!"); |
|
| 57 | + } |
|
| 50 | 58 | } |
| 51 | - if($check_realm) |
|
| 52 | - $testsuite = new RADIUSTests($check_realm); |
|
| 53 | - else |
|
| 54 | - $error_message = _("No valid realm name given, cannot execute any checks!"); |
|
| 55 | -} |
|
| 56 | 59 | |
| 57 | 60 | $translate = _("STATIC"); |
| 58 | 61 | $translate = _("DYNAMIC"); |
@@ -433,10 +436,11 @@ discard block |
||
| 433 | 436 | $(".server_cert").hide(); |
| 434 | 437 | <?php |
| 435 | 438 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
| 436 | - if ($check_thorough) |
|
| 437 | - $extraarg = "profile_id: ".$my_profile->identifier.", "; |
|
| 438 | - else |
|
| 439 | - $extraarg = ""; |
|
| 439 | + if ($check_thorough) { |
|
| 440 | + $extraarg = "profile_id: ".$my_profile->identifier.", "; |
|
| 441 | + } else { |
|
| 442 | + $extraarg = ""; |
|
| 443 | + } |
|
| 440 | 444 | |
| 441 | 445 | print " |
| 442 | 446 | $(\"#src".$hostindex."_img\").attr('src',icon_loading); |
@@ -556,8 +560,9 @@ discard block |
||
| 556 | 560 | } else { |
| 557 | 561 | echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
| 558 | 562 | echo "</table><div class='notacceptable'><table>"; |
| 559 | - foreach ($testsuite->listerrors() as $details) |
|
| 560 | - echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
| 563 | + foreach ($testsuite->listerrors() as $details) { |
|
| 564 | + echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
| 565 | + } |
|
| 561 | 566 | echo "</table></div>"; |
| 562 | 567 | } |
| 563 | 568 | echo '</div>'; |
@@ -573,9 +578,13 @@ discard block |
||
| 573 | 578 | '; |
| 574 | 579 | foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
| 575 | 580 | $host = ''; |
| 576 | - if ($addr['family'] == "IPv6") $host .= '['; |
|
| 581 | + if ($addr['family'] == "IPv6") { |
|
| 582 | + $host .= '['; |
|
| 583 | + } |
|
| 577 | 584 | $host .= $addr['IP']; |
| 578 | - if ($addr['family'] == "IPv6") $host .= ']'; |
|
| 585 | + if ($addr['family'] == "IPv6") { |
|
| 586 | + $host .= ']'; |
|
| 587 | + } |
|
| 579 | 588 | $host .= ':' . $addr['port']; |
| 580 | 589 | /*if($addr['family'] == "IPv6") |
| 581 | 590 | continue;*/ |
@@ -728,11 +737,12 @@ discard block |
||
| 728 | 737 | echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
| 729 | 738 | } |
| 730 | 739 | // ask for cert + privkey if TLS-based method is active |
| 731 | - if (in_array(EAP::$TLS, $prof_compl)) |
|
| 732 | - echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
| 740 | + if (in_array(EAP::$TLS, $prof_compl)) { |
|
| 741 | + echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
| 733 | 742 | <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
| 734 | 743 | <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
| 735 | 744 | <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
| 745 | + } |
|
| 736 | 746 | echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
| 737 | 747 | echo "<div id='live_login_results' style='display:none'>"; |
| 738 | 748 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
@@ -762,13 +772,15 @@ discard block |
||
| 762 | 772 | var realm = '<?php echo $check_realm; ?>'; |
| 763 | 773 | run_udp(); |
| 764 | 774 | <?php |
| 765 | - if ($naptr > 0) |
|
| 766 | - echo "run_dynamic();"; |
|
| 767 | - else |
|
| 768 | - echo '$("#tabs-d-li").hide();'; |
|
| 769 | - if (!$check_thorough) |
|
| 770 | - echo '$("#tabs-through").hide();'; |
|
| 771 | -?> |
|
| 775 | + if ($naptr > 0) { |
|
| 776 | + echo "run_dynamic();"; |
|
| 777 | + } else { |
|
| 778 | + echo '$("#tabs-d-li").hide();'; |
|
| 779 | + } |
|
| 780 | + if (!$check_thorough) { |
|
| 781 | + echo '$("#tabs-through").hide();'; |
|
| 782 | + } |
|
| 783 | + ?> |
|
| 772 | 784 | </script> |
| 773 | 785 | <?php footer() ?> |
| 774 | 786 | |
@@ -89,7 +89,7 @@ |
||
| 89 | 89 | |
| 90 | 90 | if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0) |
| 91 | 91 | foreach (Config::$CONSORTIUM['ssid'] as $ssidname) |
| 92 | - $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)") ); |
|
| 92 | + $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)")); |
|
| 93 | 93 | |
| 94 | 94 | $custom_ssids_wpa2 = $my_inst->getAttributes("media:SSID"); |
| 95 | 95 | $custom_ssids_wpa = $my_inst->getAttributes("media:SSID_with_legacy"); |
@@ -74,8 +74,9 @@ discard block |
||
| 74 | 74 | $my_inst->commitFlushAttributes($killlist); |
| 75 | 75 | // delete cached logo, if present |
| 76 | 76 | $logofile = dirname(dirname(__FILE__)) . "/downloads/logos/" . $my_inst->identifier . ".png"; |
| 77 | -if (is_file($logofile)) |
|
| 77 | +if (is_file($logofile)) { |
|
| 78 | 78 | unlink($logofile); |
| 79 | +} |
|
| 79 | 80 | |
| 80 | 81 | CAT::writeAudit($_SESSION['user'], "MOD", "IdP " . $my_inst->identifier . " - attributes changed"); |
| 81 | 82 | |
@@ -87,27 +88,31 @@ discard block |
||
| 87 | 88 | |
| 88 | 89 | $ssids = []; |
| 89 | 90 | |
| 90 | -if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0) |
|
| 91 | +if (isset(Config::$CONSORTIUM['ssid']) && count(Config::$CONSORTIUM['ssid']) > 0) { |
|
| 91 | 92 | foreach (Config::$CONSORTIUM['ssid'] as $ssidname) |
| 92 | 93 | $ssids[] = $ssidname . " " . (isset(Config::$CONSORTIUM['tkipsupport']) && Config::$CONSORTIUM['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)") ); |
| 94 | +} |
|
| 93 | 95 | |
| 94 | 96 | $custom_ssids_wpa2 = $my_inst->getAttributes("media:SSID"); |
| 95 | 97 | $custom_ssids_wpa = $my_inst->getAttributes("media:SSID_with_legacy"); |
| 96 | 98 | $wired_support = $my_inst->getAttributes("media:wired"); |
| 97 | 99 | |
| 98 | -if (count($custom_ssids_wpa) > 0) |
|
| 100 | +if (count($custom_ssids_wpa) > 0) { |
|
| 99 | 101 | foreach ($custom_ssids_wpa as $ssidname) |
| 100 | 102 | $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES and WPA/TKIP)"); |
| 103 | +} |
|
| 101 | 104 | |
| 102 | -if (count($custom_ssids_wpa2) > 0) |
|
| 105 | +if (count($custom_ssids_wpa2) > 0) { |
|
| 103 | 106 | foreach ($custom_ssids_wpa2 as $ssidname) |
| 104 | 107 | $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES)"); |
| 108 | +} |
|
| 105 | 109 | |
| 106 | 110 | echo "<table>"; |
| 107 | 111 | if (count($ssids) > 0) { |
| 108 | 112 | $printedlist = ""; |
| 109 | - foreach ($ssids as $names) |
|
| 110 | - $printedlist = $printedlist . "$names "; |
|
| 113 | + foreach ($ssids as $names) { |
|
| 114 | + $printedlist = $printedlist . "$names "; |
|
| 115 | + } |
|
| 111 | 116 | echo UI_okay(sprintf(_("Your installers will configure the following SSIDs: <strong>%s</strong>"), $printedlist), _("SSIDs configured")); |
| 112 | 117 | }; |
| 113 | 118 | if (count($wired_support) > 0) { |
@@ -30,9 +30,9 @@ |
||
| 30 | 30 | $checkval = "OK-NEW"; |
| 31 | 31 | } |
| 32 | 32 | |
| 33 | -if (!isset($_GET['token']) || ( $checkval != "OK-NEW" && $checkval != "OK-EXISTING")) { |
|
| 33 | +if (!isset($_GET['token']) || ($checkval != "OK-NEW" && $checkval != "OK-EXISTING")) { |
|
| 34 | 34 | pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP"); |
| 35 | - echo "<h1>"._("Error creating new IdP binding!")."</h1>"; |
|
| 35 | + echo "<h1>" . _("Error creating new IdP binding!") . "</h1>"; |
|
| 36 | 36 | if ($checkval == "FAIL-ALREADYCONSUMED") { |
| 37 | 37 | echo "<p>" . _("Sorry... this token has already been used to create an institution. If you got it from a mailing list, probably someone else used it before you.") . "</p>"; |
| 38 | 38 | } elseif ($checkval == "FAIL-EXPIRED") { |
@@ -54,7 +54,8 @@ |
||
| 54 | 54 | CAT::writeAudit($_SESSION['user'], "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated"); |
| 55 | 55 | }; |
| 56 | 56 | } |
| 57 | -if ($checkval == "OK-EXISTING") |
|
| 57 | +if ($checkval == "OK-EXISTING") { |
|
| 58 | 58 | header("Location: overview_user.php"); |
| 59 | -else |
|
| 59 | +} else { |
|
| 60 | 60 | header("Location: edit_idp.php?inst_id=$newidp->identifier&wizard=true"); |
| 61 | +} |
|