Test Setup Failed
Push — master ( 1417dc...c04c22 )
by Stefan
06:40 queued 12s
created
config/ConfAssistant-template.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -90,7 +90,7 @@  discard block
 block discarded – undo
90 90
                     ], 
91 91
                 'condition' => TRUE],
92 92
             'OpenRoaming®' => [
93
-                'ssid' => [],     /* OpenRoaming has left SSIDs behind */
93
+                'ssid' => [], /* OpenRoaming has left SSIDs behind */
94 94
                 'oi' => [
95 95
                     '5A03BA0000', /* OpenRoaming/AllIdentities/SettlementFree/NoPersonalData/BaselineQoS */
96 96
                     '5A03BA0800', /* OpenRoaming/EduIdentities/SettlementFree/NoPersonalData/BaselineQoS */
@@ -150,7 +150,7 @@  discard block
 block discarded – undo
150 150
     const PATHS = [
151 151
         'makensis' => 'makensis',
152 152
         'trust-store-mozilla' => '/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem',
153
-        'trust-store-custom' => __DIR__ . "/known-roots.pem",
153
+        'trust-store-custom' => __DIR__."/known-roots.pem",
154 154
     ];
155 155
 
156 156
     /**
@@ -188,13 +188,13 @@  discard block
 block discarded – undo
188 188
             'db' => 'radacct',
189 189
             'user' => 'someuser',
190 190
             'pass' => 'somepass',
191
-            'readonly' => TRUE,],
191
+            'readonly' => TRUE, ],
192 192
         'RADIUS_2' => [
193 193
             'host' => 'auth-2.hosted.eduroam.org',
194 194
             'db' => 'radacct',
195 195
             'user' => 'someuser',
196 196
             'pass' => 'somepass',
197
-            'readonly' => TRUE,],
197
+            'readonly' => TRUE, ],
198 198
     ];
199 199
 
200 200
     /**
Please login to merge, or discard this patch.
utils/SP_consistency_check.php 1 patch
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -1,22 +1,22 @@  discard block
 block discarded – undo
1 1
 <?php
2
-require_once dirname(dirname(__FILE__)) . "/config/_config.php";
2
+require_once dirname(dirname(__FILE__))."/config/_config.php";
3 3
 /**
4 4
     * check if URL responds with 200
5 5
     *
6 6
     * @param string $srv server name
7 7
     * @return integer or NULL
8 8
 */
9
-function checkConfigRADIUSDaemon ($srv) {
9
+function checkConfigRADIUSDaemon($srv) {
10 10
     $ch = curl_init();
11 11
     if ($ch === FALSE) {
12 12
         return NULL;
13 13
     }
14 14
     $timeout = 10;
15
-    curl_setopt ( $ch, CURLOPT_URL, $srv );
16
-    curl_setopt ( $ch, CURLOPT_RETURNTRANSFER, 1 );
17
-    curl_setopt ( $ch, CURLOPT_TIMEOUT, $timeout );
15
+    curl_setopt($ch, CURLOPT_URL, $srv);
16
+    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
17
+    curl_setopt($ch, CURLOPT_TIMEOUT, $timeout);
18 18
     curl_exec($ch);
19
-    $http_code = curl_getinfo( $ch, CURLINFO_HTTP_CODE );
19
+    $http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
20 20
     curl_close($ch);
21 21
     if ($http_code == 200) {
22 22
         return 1;
@@ -53,8 +53,8 @@  discard block
 block discarded – undo
53 53
 }
54 54
 $siteStatus = array();
55 55
 foreach (array_keys($brokenDeployments) as $server_id) {
56
-    print "check $server_id " . $radiusSite[$server_id] . "\n";
57
-    $siteStatus[$server_id]  = checkConfigRADIUSDaemon('http://' . $radiusSite[$server_id]);
56
+    print "check $server_id ".$radiusSite[$server_id]."\n";
57
+    $siteStatus[$server_id] = checkConfigRADIUSDaemon('http://'.$radiusSite[$server_id]);
58 58
     if ($siteStatus[$server_id]) {
59 59
         echo "\ncheck radius\n";
60 60
         echo \config\Diagnostics::RADIUSSPTEST['port']."\n";
Please login to merge, or discard this patch.
core/diag/RADIUSTests.php 1 patch
Spacing   +58 added lines, -59 removed lines patch added patch discarded remove patch
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
             }
166 166
         }
167 167
 
168
-        $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . /** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
168
+        $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, "./** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
169 169
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedServerNames, true));
170 170
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedCABundle, true));
171 171
 
@@ -252,7 +252,7 @@  discard block
 block discarded – undo
252 252
                 $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME;
253 253
                 continue; // otherwise we'd ALSO complain that it's not a real hostname
254 254
             }
255
-            if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
255
+            if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
256 256
                 $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME;
257 257
             }
258 258
         }
@@ -278,7 +278,7 @@  discard block
 block discarded – undo
278 278
             $probValue = RADIUSTests::CERTPROB_SHA1_SIGNATURE;
279 279
             $returnarray[] = $probValue;
280 280
         }
281
-        $this->loggerInstance->debug(4, "CERT IS: " . /** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
281
+        $this->loggerInstance->debug(4, "CERT IS: "./** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
282 282
         if ($intermediateCa['basicconstraints_set'] == 0) {
283 283
             $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS;
284 284
         }
@@ -326,7 +326,7 @@  discard block
 block discarded – undo
326 326
     public function udpReachability($probeindex, $opnameCheck = TRUE, $frag = TRUE) {
327 327
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
328 328
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
329
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
329
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
330 330
         if ($clientcert === FALSE) {
331 331
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
332 332
         }
@@ -335,7 +335,7 @@  discard block
 block discarded – undo
335 335
         if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) {
336 336
             return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert);
337 337
         }
338
-        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
338
+        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
339 339
     }
340 340
 
341 341
     /**
@@ -356,7 +356,7 @@  discard block
 block discarded – undo
356 356
             return RADIUSTests::CERTPROB_NO_CDP_HTTP;
357 357
         }
358 358
         // first and second sub-match is the full URL... check it
359
-        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2]));
359
+        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2]));
360 360
         if ($crlcontent === FALSE) {
361 361
             return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL;
362 362
         }
@@ -371,7 +371,7 @@  discard block
 block discarded – undo
371 371
         // $pem = chunk_split(base64_encode($crlcontent), 64, "\n");
372 372
         // inspired by https://stackoverflow.com/questions/2390604/how-to-pass-variables-as-stdin-into-command-line-from-php
373 373
 
374
-        $proc = \config\Master::PATHS['openssl'] . " crl -inform der";
374
+        $proc = \config\Master::PATHS['openssl']." crl -inform der";
375 375
         $descriptorspec = [
376 376
             0 => ["pipe", "r"],
377 377
             1 => ["pipe", "w"],
@@ -409,7 +409,7 @@  discard block
 block discarded – undo
409 409
         $origLength = strlen($hex);
410 410
         for ($i = 1; $i < $origLength; $i++) {
411 411
             if ($i % 2 == 1 && $i != strlen($hex)) {
412
-                $spaced .= $hex[$i] . " ";
412
+                $spaced .= $hex[$i]." ";
413 413
             } else {
414 414
                 $spaced .= $hex[$i];
415 415
             }
@@ -534,19 +534,19 @@  discard block
 block discarded – undo
534 534
         $eapText = \core\common\EAP::eapDisplayName($eaptype);
535 535
         $config = '
536 536
 network={
537
-  ssid="' . \config\Master::APPEARANCE['productname'] . ' testing"
537
+  ssid="' . \config\Master::APPEARANCE['productname'].' testing"
538 538
   key_mgmt=WPA-EAP
539 539
   proto=WPA2
540 540
   pairwise=CCMP
541 541
   group=CCMP
542 542
   ';
543 543
 // phase 1
544
-        $config .= 'eap=' . $eapText['OUTER'] . "\n";
544
+        $config .= 'eap='.$eapText['OUTER']."\n";
545 545
         $logConfig = $config;
546 546
 // phase 2 if applicable; all inner methods have passwords
547 547
         if (isset($eapText['INNER']) && $eapText['INNER'] != "") {
548
-            $config .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
549
-            $logConfig .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
548
+            $config .= '  phase2="auth='.$eapText['INNER']."\"\n";
549
+            $logConfig .= '  phase2="auth='.$eapText['INNER']."\"\n";
550 550
         }
551 551
 // all methods set a password, except EAP-TLS
552 552
         if ($eaptype != \core\common\EAP::EAPTYPE_TLS) {
@@ -562,11 +562,11 @@  discard block
 block discarded – undo
562 562
         }
563 563
 
564 564
 // inner identity
565
-        $config .= '  identity="' . $inner . "\"\n";
566
-        $logConfig .= '  identity="' . $inner . "\"\n";
565
+        $config .= '  identity="'.$inner."\"\n";
566
+        $logConfig .= '  identity="'.$inner."\"\n";
567 567
 // outer identity, may be equal
568
-        $config .= '  anonymous_identity="' . $outer . "\"\n";
569
-        $logConfig .= '  anonymous_identity="' . $outer . "\"\n";
568
+        $config .= '  anonymous_identity="'.$outer."\"\n";
569
+        $logConfig .= '  anonymous_identity="'.$outer."\"\n";
570 570
 // done
571 571
         $config .= "}";
572 572
         $logConfig .= "}";
@@ -627,13 +627,13 @@  discard block
 block discarded – undo
627 627
      * @return string the command-line for eapol_test
628 628
      */
629 629
     private function eapolTestConfig($probeindex, $opName, $frag) {
630
-        $cmdline = \config\Diagnostics::PATHS['eapol_test'] .
631
-                " -a " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'] .
632
-                " -s " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'] .
633
-                " -o serverchain.pem" .
634
-                " -c ./udp_login_test.conf" .
635
-                " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " .
636
-                " -t " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout'] . " ";
630
+        $cmdline = \config\Diagnostics::PATHS['eapol_test'].
631
+                " -a ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'].
632
+                " -s ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'].
633
+                " -o serverchain.pem".
634
+                " -c ./udp_login_test.conf".
635
+                " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ".
636
+                " -t ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout']." ";
637 637
         if ($opName) {
638 638
             $cmdline .= '-N126:s:"1cat.eduroam.org" ';
639 639
         }
@@ -662,10 +662,10 @@  discard block
 block discarded – undo
662 662
      * @throws Exception
663 663
      */
664 664
     private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs) {
665
-        if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) {
665
+        if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) {
666 666
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n");
667 667
         }
668
-        if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) {
668
+        if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) {
669 669
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n");
670 670
         }
671 671
 // make a copy of the EAP-received chain and add the configured intermediates, if any
@@ -679,15 +679,15 @@  discard block
 block discarded – undo
679 679
             }
680 680
             if ($decoded['ca'] == 1) {
681 681
                 if ($decoded['root'] == 1) { // save CAT roots to the root directory
682
-                    file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
683
-                    file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
682
+                    file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']);
683
+                    file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']);
684 684
                     $catRoots[] = $decoded['pem'];
685 685
                 } else { // save the intermediates to allcerts directory
686
-                    file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']);
686
+                    file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']);
687 687
                     $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded));
688 688
                     if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) {
689 689
                         $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
690
-                        file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]);
690
+                        file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]);
691 691
                     }
692 692
                     $catIntermediates[] = $decoded['pem'];
693 693
                 }
@@ -696,26 +696,26 @@  discard block
 block discarded – undo
696 696
         // save all intermediate certificates and CRLs to separate files in 
697 697
         // both root-ca directories
698 698
         foreach ($eapIntermediates as $index => $onePem) {
699
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem);
700
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem);
699
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem);
700
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem);
701 701
         }
702 702
         foreach ($eapIntermediateCRLs as $index => $onePem) {
703
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
703
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
705 705
         }
706 706
 
707 707
         $checkstring = "";
708 708
         if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) {
709 709
             $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
710 710
             $checkstring = "-crl_check_all";
711
-            file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
-            file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
711
+            file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
+            file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
713 713
         }
714 714
 
715 715
 
716 716
 // now c_rehash the root CA directory ...
717
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null");
718
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null");
717
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null");
718
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null");
719 719
         return $checkstring;
720 720
     }
721 721
 
@@ -747,12 +747,12 @@  discard block
 block discarded – undo
747 747
 // so test if there's something PEMy in the file at all
748 748
 // serverchain.pem is the output from eapol_test; incomingserver.pem is written by extractIncomingCertsfromEAP() if there was at least one server cert.
749 749
         if (filesize("$tmpDir/serverchain.pem") > 10 && filesize("$tmpDir/incomingserver.pem") > 10) {
750
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
751
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
752
-            $this->loggerInstance->debug(4, "Chain verify pass 1: " . /** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE) . "\n");
753
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
754
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
755
-            $this->loggerInstance->debug(4, "Chain verify pass 2: " . /** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE) . "\n");
750
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
751
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
752
+            $this->loggerInstance->debug(4, "Chain verify pass 1: "./** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE)."\n");
753
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
754
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
755
+            $this->loggerInstance->debug(4, "Chain verify pass 2: "./** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE)."\n");
756 756
         }
757 757
 
758 758
 // now we do certificate verification against the collected parents
@@ -817,7 +817,7 @@  discard block
 block discarded – undo
817 817
         // we are UNHAPPY if no names match!
818 818
         $happiness = "UNHAPPY";
819 819
         foreach ($this->expectedServerNames as $expectedName) {
820
-            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . /** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE) . /** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
820
+            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: "./** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE)./** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
821 821
             if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) {
822 822
                 $this->loggerInstance->debug(4, "Totally happy!");
823 823
                 $happiness = "TOTALLY";
@@ -861,11 +861,11 @@  discard block
 block discarded – undo
861 861
         $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password);
862 862
         // the config intentionally does not include CA checking. We do this
863 863
         // ourselves after getting the chain with -o.
864
-        file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]);
864
+        file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]);
865 865
 
866 866
         $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag);
867 867
         $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n");
868
-        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n");
868
+        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n");
869 869
         $time_start = microtime(true);
870 870
         $pflow = [];
871 871
         exec($cmdline, $pflow);
@@ -874,7 +874,7 @@  discard block
 block discarded – undo
874 874
         }
875 875
         $time_stop = microtime(true);
876 876
         $output = print_r($this->redact($password, $pflow), TRUE);
877
-        file_put_contents($tmpDir . "/eapol_test_output_redacted_$probeindex.txt", $output);
877
+        file_put_contents($tmpDir."/eapol_test_output_redacted_$probeindex.txt", $output);
878 878
         $this->loggerInstance->debug(5, "eapol_test output saved to eapol_test_output_redacted_$probeindex.txt\n");
879 879
         return [
880 880
             "time" => ($time_stop - $time_start) * 1000,
@@ -910,7 +910,7 @@  discard block
 block discarded – undo
910 910
         if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) {
911 911
             array_pop($packetflow);
912 912
         }
913
-        $this->loggerInstance->debug(5, "Packetflow: " . /** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
913
+        $this->loggerInstance->debug(5, "Packetflow: "./** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
914 914
         $packetcount = array_count_values($packetflow);
915 915
         $testresults['packetcount'] = $packetcount;
916 916
         $testresults['packetflow'] = $packetflow;
@@ -950,7 +950,7 @@  discard block
 block discarded – undo
950 950
      */
951 951
     private function wasModernTlsNegotiated(&$testresults, $packetflow_orig) {
952 952
         $negotiatedTlsVersion = $this->checkLineparse($packetflow_orig, self::LINEPARSE_TLSVERSION);
953
-        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion" . "\n");
953
+        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion"."\n");
954 954
         if ($negotiatedTlsVersion === FALSE) {
955 955
             $testresults['cert_oddities'][] = RADIUSTests::TLSPROB_UNKNOWN_TLS_VERSION;
956 956
         } elseif ($negotiatedTlsVersion != self::TLS_VERSION_1_2 && $negotiatedTlsVersion != self::TLS_VERSION_1_3) {
@@ -1008,7 +1008,7 @@  discard block
 block discarded – undo
1008 1008
 
1009 1009
         $x509 = new \core\common\X509();
1010 1010
 // $eap_certarray holds all certs received in EAP conversation
1011
-        $incomingData = file_get_contents($tmpDir . "/serverchain.pem");
1011
+        $incomingData = file_get_contents($tmpDir."/serverchain.pem");
1012 1012
         if ($incomingData !== FALSE && strlen($incomingData) > 0) {
1013 1013
             $eapCertArray = $x509->splitCertificate($incomingData);
1014 1014
         } else {
@@ -1039,10 +1039,10 @@  discard block
 block discarded – undo
1039 1039
                 case RADIUSTests::SERVER_CA_SELFSIGNED:
1040 1040
                     $servercert[] = $cert;
1041 1041
                     if (count($servercert) == 1) {
1042
-                        if (file_put_contents($tmpDir . "/incomingserver.pem", $cert['pem'] . "\n") === FALSE) {
1042
+                        if (file_put_contents($tmpDir."/incomingserver.pem", $cert['pem']."\n") === FALSE) {
1043 1043
                             $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n");
1044 1044
                         }
1045
-                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . /** @scrutinizer ignore-type */ print_r($servercert[0], true));
1045
+                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: "./** @scrutinizer ignore-type */ print_r($servercert[0], true));
1046 1046
                     } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) {
1047 1047
                         $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS;
1048 1048
                     }
@@ -1112,7 +1112,7 @@  discard block
 block discarded – undo
1112 1112
     public function autodetectCAWithProbe($outerId) {
1113 1113
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
1114 1114
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
1115
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
1115
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
1116 1116
         if ($clientcert === FALSE) {
1117 1117
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
1118 1118
         }
@@ -1127,7 +1127,7 @@  discard block
 block discarded – undo
1127 1127
         $tmpDir = $temporary['dir'];
1128 1128
         chdir($tmpDir);
1129 1129
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1130
-        file_put_contents($tmpDir . "/client.p12", $clientcert);
1130
+        file_put_contents($tmpDir."/client.p12", $clientcert);
1131 1131
         $testresults = ['cert_oddities' => []];
1132 1132
         $runtime_results = $this->executeEapolTest($tmpDir, $probeindex, \core\common\EAP::EAPTYPE_ANY, $outerId, $outerId, "eaplab", FALSE, FALSE);
1133 1133
         $packetflow_orig = $runtime_results['output'];
@@ -1143,8 +1143,7 @@  discard block
 block discarded – undo
1143 1143
         // that's not the case if we do EAP-pwd or could not negotiate an EAP method at
1144 1144
         // all
1145 1145
         // in that case: no server CA guess possible
1146
-        if (!
1147
-                ($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1146
+        if (!($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1148 1147
         ) {
1149 1148
             return RADIUSTests::RETVAL_INVALID;
1150 1149
         }
@@ -1183,7 +1182,7 @@  discard block
 block discarded – undo
1183 1182
         // trust, and custom ones we may have configured
1184 1183
         $ourRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-custom']);
1185 1184
         $mozillaRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-mozilla']);
1186
-        $allRoots = $x509->splitCertificate($ourRoots . "\n" . $mozillaRoots);
1185
+        $allRoots = $x509->splitCertificate($ourRoots."\n".$mozillaRoots);
1187 1186
         foreach ($allRoots as $oneRoot) {
1188 1187
             $processedRoot = $x509->processCertificate($oneRoot);
1189 1188
             if ($processedRoot['full_details']['subject'] == $currentHighestKnownIssuer) {
@@ -1225,7 +1224,7 @@  discard block
 block discarded – undo
1225 1224
         chdir($tmpDir);
1226 1225
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1227 1226
         if ($clientcertdata !== NULL) {
1228
-            file_put_contents($tmpDir . "/client.p12", $clientcertdata);
1227
+            file_put_contents($tmpDir."/client.p12", $clientcertdata);
1229 1228
         }
1230 1229
         $testresults = [];
1231 1230
         // initialise the sub-array for cleaner parsing
@@ -1330,7 +1329,7 @@  discard block
 block discarded – undo
1330 1329
                     'issuer' => $this->printDN($certdata['issuer']),
1331 1330
                     'validFrom' => $this->printTm($certdata['validFrom_time_t']),
1332 1331
                     'validTo' => $this->printTm($certdata['validTo_time_t']),
1333
-                    'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']),
1332
+                    'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']),
1334 1333
                     'sha1' => $certdata['sha1'],
1335 1334
                     'extensions' => $certdata['extensions']
1336 1335
                 ];
Please login to merge, or discard this patch.