@@ -331,7 +331,7 @@ discard block |
||
331 | 331 | // for now (no OpenRoaming client certs available) only run server-side tests |
332 | 332 | foreach ($listOfIPs as $oneIP) { |
333 | 333 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
334 | - if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
334 | + if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
335 | 335 | $allHostsOkay = FALSE; |
336 | 336 | } else { |
337 | 337 | $oneHostOkay = TRUE; |
@@ -641,7 +641,7 @@ discard block |
||
641 | 641 | } |
642 | 642 | |
643 | 643 | $monthlyList = []; |
644 | - $monthly = $this->frontendHandle->exec("SELECT downloads_user,device_id FROM downloads_history WHERE profile_id=? AND stat_date=DATE_FORMAT(NOW(),'%Y-%m-01')", "i", $this->identifier); |
|
644 | + $monthly = $this->frontendHandle->exec("SELECT downloads_user,device_id FROM downloads_history WHERE profile_id=? AND stat_date=DATE_FORMAT(NOW(),'%Y-%m-01')", "i", $this->identifier); |
|
645 | 645 | while ($statsQuery = mysqli_fetch_object(/** @scrutinizer ignore-type */ $monthly)) { |
646 | 646 | $monthlyList[$statsQuery->device_id] = $statsQuery->downloads_user; |
647 | 647 | } |
@@ -653,7 +653,7 @@ discard block |
||
653 | 653 | } |
654 | 654 | |
655 | 655 | \core\common\Entity::intoThePotatoes(); |
656 | - ksort($finalarray, SORT_STRING|SORT_FLAG_CASE); |
|
656 | + ksort($finalarray, SORT_STRING | SORT_FLAG_CASE); |
|
657 | 657 | \core\common\Entity::outOfThePotatoes(); |
658 | 658 | return $finalarray; |
659 | 659 | } |
@@ -963,7 +963,7 @@ discard block |
||
963 | 963 | $profileStatus = self::CERT_STATUS_NONE; |
964 | 964 | foreach ($rows as $row) { |
965 | 965 | $encodedCert = $row[0]; |
966 | - $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t']- time(); |
|
966 | + $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t'] - time(); |
|
967 | 967 | if ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_critical']) { |
968 | 968 | $certStatus = self::CERT_STATUS_ERROR; |
969 | 969 | } elseif ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_warning']) { |