Passed
Push — master ( 88d8fc...0abd1f )
by Maja
08:25
created
core/diag/Sociopath.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -108,7 +108,7 @@  discard block
 block discarded – undo
108 108
                 "TXT" => _("If you use more than one device: do your other devices still work?"),
109 109
                 "FACTOR_YES" => 0.33, // seems that all is okay with the account as such
110 110
                 "FACTOR_NO" => 3, // now that is suspicious indeed
111
-                "VERDICTLECTURE" => _("If all devices stopped working simultaneously, there may be a problem with your account as such. Maybe your account expired, or you were forced to change the password? These questions are best answered by your Identity Provider [MGW: display contact info]"),],
111
+                "VERDICTLECTURE" => _("If all devices stopped working simultaneously, there may be a problem with your account as such. Maybe your account expired, or you were forced to change the password? These questions are best answered by your Identity Provider [MGW: display contact info]"), ],
112 112
             6 => ["AREA" => AbstractTest::INFRA_SP_80211,
113 113
                 "TXT" => _("Is the place you are currently at heavily crowded, or is a network-intensive workload going on?"),
114 114
                 "FACTOR_YES" => 3,
@@ -144,11 +144,11 @@  discard block
 block discarded – undo
144 144
         $questionDetails = $this->qaArray[$questionNumber];
145 145
         if ($answer === TRUE) {
146 146
             $this->possibleFailureReasons[$questionDetails['AREA']] = $this->possibleFailureReasons[$questionDetails['AREA']] * $questionDetails["FACTOR_YES"];
147
-            $this->loggerInstance->debug(3, "Adjusting " . $questionDetails['AREA'] . " by " . $questionDetails["FACTOR_YES"] . "\n");
147
+            $this->loggerInstance->debug(3, "Adjusting ".$questionDetails['AREA']." by ".$questionDetails["FACTOR_YES"]."\n");
148 148
             $factor = $questionDetails["FACTOR_YES"];
149 149
         } elseif ($answer === FALSE) {
150 150
             $this->possibleFailureReasons[$questionDetails['AREA']] = $this->possibleFailureReasons[$questionDetails['AREA']] * $questionDetails["FACTOR_NO"];
151
-            $this->loggerInstance->debug(3, "Adjusting " . $questionDetails['AREA'] . " by " . $questionDetails["FACTOR_NO"] . "\n");
151
+            $this->loggerInstance->debug(3, "Adjusting ".$questionDetails['AREA']." by ".$questionDetails["FACTOR_NO"]."\n");
152 152
             $factor = $questionDetails["FACTOR_NO"];
153 153
         } else {
154 154
             $factor = 1;
@@ -183,7 +183,7 @@  discard block
 block discarded – undo
183 183
         // if both are identical, take any of the questions in the pool of both
184 184
         foreach ($this->qaArray as $questionNumber => $questionDetails) {
185 185
             // if we find a question we didn't ask before AND it is related to our currently high-scoring problem area, ask it
186
-            if (!array_key_exists($questionNumber, $this->previousQuestions) && ( $questionDetails["AREA"] == $highestCategory || $questionDetails["AREA"] == $nextCategory)) {
186
+            if (!array_key_exists($questionNumber, $this->previousQuestions) && ($questionDetails["AREA"] == $highestCategory || $questionDetails["AREA"] == $nextCategory)) {
187 187
                 return json_encode(["NEXTEXISTS" => TRUE, "NUMBER" => $questionNumber, "TEXT" => $questionDetails["TXT"]]);
188 188
             }
189 189
         }
@@ -211,7 +211,7 @@  discard block
 block discarded – undo
211 211
         $text = $this->genericVerdictTexts[$area];
212 212
         foreach ($this->previousQuestions as $number => $factor) {
213 213
             if ($this->qaArray[$number]["AREA"] == $area && $factor > 1) {
214
-                $text .= "\n\n" . $this->qaArray[$number]["VERDICTLECTURE"];
214
+                $text .= "\n\n".$this->qaArray[$number]["VERDICTLECTURE"];
215 215
             }
216 216
         }
217 217
         return $text;
Please login to merge, or discard this patch.
core/diag/RADIUSTests.php 1 patch
Spacing   +53 added lines, -53 removed lines patch added patch discarded remove patch
@@ -167,7 +167,7 @@  discard block
 block discarded – undo
167 167
             }
168 168
         }
169 169
 
170
-        $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . print_r($supportedEapTypes, true));
170
+        $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, ".print_r($supportedEapTypes, true));
171 171
         $this->loggerInstance->debug(4, print_r($expectedServerNames, true));
172 172
         $this->loggerInstance->debug(4, print_r($expectedCABundle, true));
173 173
 
@@ -257,7 +257,7 @@  discard block
 block discarded – undo
257 257
                 $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME;
258 258
                 continue; // otherwise we'd ALSO complain that it's not a real hostname
259 259
             }
260
-            if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
260
+            if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
261 261
                 $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME;
262 262
             }
263 263
         }
@@ -284,7 +284,7 @@  discard block
 block discarded – undo
284 284
             $probValue = RADIUSTests::CERTPROB_SHA1_SIGNATURE;
285 285
             $returnarray[] = $probValue;
286 286
         }
287
-        $this->loggerInstance->debug(4, "CERT IS: " . print_r($intermediateCa, TRUE));
287
+        $this->loggerInstance->debug(4, "CERT IS: ".print_r($intermediateCa, TRUE));
288 288
         if ($intermediateCa['basicconstraints_set'] == 0) {
289 289
             $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS;
290 290
         }
@@ -334,7 +334,7 @@  discard block
 block discarded – undo
334 334
     {
335 335
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
336 336
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
337
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
337
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
338 338
         if ($clientcert === FALSE) {
339 339
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
340 340
         }
@@ -343,7 +343,7 @@  discard block
 block discarded – undo
343 343
         if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) {
344 344
             return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert);
345 345
         }
346
-        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
346
+        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
347 347
     }
348 348
 
349 349
     /**
@@ -365,7 +365,7 @@  discard block
 block discarded – undo
365 365
             return RADIUSTests::CERTPROB_NO_CDP_HTTP;
366 366
         }
367 367
         // first and second sub-match is the full URL... check it
368
-        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2]));
368
+        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2]));
369 369
         if ($crlcontent === FALSE) {
370 370
             return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL;
371 371
         }
@@ -380,7 +380,7 @@  discard block
 block discarded – undo
380 380
         // $pem = chunk_split(base64_encode($crlcontent), 64, "\n");
381 381
         // inspired by https://stackoverflow.com/questions/2390604/how-to-pass-variables-as-stdin-into-command-line-from-php
382 382
 
383
-        $proc = \config\Master::PATHS['openssl'] . " crl -inform der";
383
+        $proc = \config\Master::PATHS['openssl']." crl -inform der";
384 384
         $descriptorspec = [
385 385
             0 => ["pipe", "r"],
386 386
             1 => ["pipe", "w"],
@@ -419,7 +419,7 @@  discard block
 block discarded – undo
419 419
         $origLength = strlen($hex);
420 420
         for ($i = 1; $i < $origLength; $i++) {
421 421
             if ($i % 2 == 1 && $i != strlen($hex)) {
422
-                $spaced .= $hex[$i] . " ";
422
+                $spaced .= $hex[$i]." ";
423 423
             } else {
424 424
                 $spaced .= $hex[$i];
425 425
             }
@@ -547,19 +547,19 @@  discard block
 block discarded – undo
547 547
         $eapText = \core\common\EAP::eapDisplayName($eaptype);
548 548
         $config = '
549 549
 network={
550
-  ssid="' . \config\Master::APPEARANCE['productname'] . ' testing"
550
+  ssid="' . \config\Master::APPEARANCE['productname'].' testing"
551 551
   key_mgmt=WPA-EAP
552 552
   proto=WPA2
553 553
   pairwise=CCMP
554 554
   group=CCMP
555 555
   ';
556 556
 // phase 1
557
-        $config .= 'eap=' . $eapText['OUTER'] . "\n";
557
+        $config .= 'eap='.$eapText['OUTER']."\n";
558 558
         $logConfig = $config;
559 559
 // phase 2 if applicable; all inner methods have passwords
560 560
         if (isset($eapText['INNER']) && $eapText['INNER'] != "") {
561
-            $config .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
562
-            $logConfig .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
561
+            $config .= '  phase2="auth='.$eapText['INNER']."\"\n";
562
+            $logConfig .= '  phase2="auth='.$eapText['INNER']."\"\n";
563 563
         }
564 564
 // all methods set a password, except EAP-TLS
565 565
         if ($eaptype != \core\common\EAP::EAPTYPE_TLS) {
@@ -575,11 +575,11 @@  discard block
 block discarded – undo
575 575
         }
576 576
 
577 577
 // inner identity
578
-        $config .= '  identity="' . $inner . "\"\n";
579
-        $logConfig .= '  identity="' . $inner . "\"\n";
578
+        $config .= '  identity="'.$inner."\"\n";
579
+        $logConfig .= '  identity="'.$inner."\"\n";
580 580
 // outer identity, may be equal
581
-        $config .= '  anonymous_identity="' . $outer . "\"\n";
582
-        $logConfig .= '  anonymous_identity="' . $outer . "\"\n";
581
+        $config .= '  anonymous_identity="'.$outer."\"\n";
582
+        $logConfig .= '  anonymous_identity="'.$outer."\"\n";
583 583
 // done
584 584
         $config .= "}";
585 585
         $logConfig .= "}";
@@ -642,13 +642,13 @@  discard block
 block discarded – undo
642 642
      */
643 643
     private function eapolTestConfig($probeindex, $opName, $frag)
644 644
     {
645
-        $cmdline = \config\Diagnostics::PATHS['eapol_test'] .
646
-                " -a " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'] .
647
-                " -s " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'] .
648
-                " -o serverchain.pem" .
649
-                " -c ./udp_login_test.conf" .
650
-                " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " .
651
-                " -t " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout'] . " ";
645
+        $cmdline = \config\Diagnostics::PATHS['eapol_test'].
646
+                " -a ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'].
647
+                " -s ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'].
648
+                " -o serverchain.pem".
649
+                " -c ./udp_login_test.conf".
650
+                " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ".
651
+                " -t ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout']." ";
652 652
         if ($opName) {
653 653
             $cmdline .= '-N126:s:"1cat.eduroam.org" ';
654 654
         }
@@ -678,10 +678,10 @@  discard block
 block discarded – undo
678 678
      */
679 679
     private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs)
680 680
     {
681
-        if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) {
681
+        if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) {
682 682
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n");
683 683
         }
684
-        if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) {
684
+        if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) {
685 685
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n");
686 686
         }
687 687
 // make a copy of the EAP-received chain and add the configured intermediates, if any
@@ -695,15 +695,15 @@  discard block
 block discarded – undo
695 695
             }
696 696
             if ($decoded['ca'] == 1) {
697 697
                 if ($decoded['root'] == 1) { // save CAT roots to the root directory
698
-                    file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
699
-                    file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
698
+                    file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']);
699
+                    file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']);
700 700
                     $catRoots[] = $decoded['pem'];
701 701
                 } else { // save the intermediates to allcerts directory
702
-                    file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']);
702
+                    file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']);
703 703
                     $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded));
704 704
                     if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) {
705 705
                         $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
706
-                        file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]);
706
+                        file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]);
707 707
                     }
708 708
                     $catIntermediates[] = $decoded['pem'];
709 709
                 }
@@ -712,26 +712,26 @@  discard block
 block discarded – undo
712 712
         // save all intermediate certificates and CRLs to separate files in 
713 713
         // both root-ca directories
714 714
         foreach ($eapIntermediates as $index => $onePem) {
715
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem);
716
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem);
715
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem);
716
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem);
717 717
         }
718 718
         foreach ($eapIntermediateCRLs as $index => $onePem) {
719
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
720
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
719
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
720
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
721 721
         }
722 722
 
723 723
         $checkstring = "";
724 724
         if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) {
725 725
             $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
726 726
             $checkstring = "-crl_check_all";
727
-            file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
728
-            file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
727
+            file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
728
+            file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
729 729
         }
730 730
 
731 731
 
732 732
 // now c_rehash the root CA directory ...
733
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null");
734
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null");
733
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null");
734
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null");
735 735
         return $checkstring;
736 736
     }
737 737
 
@@ -763,12 +763,12 @@  discard block
 block discarded – undo
763 763
 // the error log will complain if we run this test against an empty file of certs
764 764
 // so test if there's something PEMy in the file at all
765 765
         if (filesize("$tmpDir/serverchain.pem") > 10) {
766
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
767
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
768
-            $this->loggerInstance->debug(4, "Chain verify pass 1: " . print_r($verifyResultEaponly, TRUE) . "\n");
769
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
770
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
771
-            $this->loggerInstance->debug(4, "Chain verify pass 2: " . print_r($verifyResultAllcerts, TRUE) . "\n");
766
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
767
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
768
+            $this->loggerInstance->debug(4, "Chain verify pass 1: ".print_r($verifyResultEaponly, TRUE)."\n");
769
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
770
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
771
+            $this->loggerInstance->debug(4, "Chain verify pass 2: ".print_r($verifyResultAllcerts, TRUE)."\n");
772 772
         }
773 773
 
774 774
 
@@ -835,7 +835,7 @@  discard block
 block discarded – undo
835 835
         // we are UNHAPPY if no names match!
836 836
         $happiness = "UNHAPPY";
837 837
         foreach ($this->expectedServerNames as $expectedName) {
838
-            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . print_r($servercert['CN'], TRUE) . print_r($servercert['sAN_DNS'], TRUE));
838
+            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: ".print_r($servercert['CN'], TRUE).print_r($servercert['sAN_DNS'], TRUE));
839 839
             if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) {
840 840
                 $this->loggerInstance->debug(4, "Totally happy!");
841 841
                 $happiness = "TOTALLY";
@@ -880,11 +880,11 @@  discard block
 block discarded – undo
880 880
         $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password);
881 881
         // the config intentionally does not include CA checking. We do this
882 882
         // ourselves after getting the chain with -o.
883
-        file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]);
883
+        file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]);
884 884
 
885 885
         $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag);
886 886
         $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n");
887
-        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n");
887
+        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n");
888 888
         $time_start = microtime(true);
889 889
         $pflow = [];
890 890
         exec($cmdline, $pflow);
@@ -928,7 +928,7 @@  discard block
 block discarded – undo
928 928
         if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) {
929 929
             array_pop($packetflow);
930 930
         }
931
-        $this->loggerInstance->debug(5, "Packetflow: " . print_r($packetflow, TRUE));
931
+        $this->loggerInstance->debug(5, "Packetflow: ".print_r($packetflow, TRUE));
932 932
         $packetcount = array_count_values($packetflow);
933 933
         $testresults['packetcount'] = $packetcount;
934 934
         $testresults['packetflow'] = $packetflow;
@@ -970,7 +970,7 @@  discard block
 block discarded – undo
970 970
     private function wasModernTlsNegotiated(&$testresults, $packetflow_orig)
971 971
     {
972 972
         $negotiatedTlsVersion = $this->checkLineparse($packetflow_orig, self::LINEPARSE_TLSVERSION);
973
-        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion" . "\n");
973
+        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion"."\n");
974 974
         if ($negotiatedTlsVersion === FALSE) {
975 975
             $testresults['cert_oddities'][] = RADIUSTests::TLSPROB_UNKNOWN_TLS_VERSION;
976 976
         } elseif ($negotiatedTlsVersion != self::TLS_VERSION_1_2 && $negotiatedTlsVersion != self::TLS_VERSION_1_3) {
@@ -1030,7 +1030,7 @@  discard block
 block discarded – undo
1030 1030
 
1031 1031
         $x509 = new \core\common\X509();
1032 1032
 // $eap_certarray holds all certs received in EAP conversation
1033
-        $incomingData = file_get_contents($tmpDir . "/serverchain.pem");
1033
+        $incomingData = file_get_contents($tmpDir."/serverchain.pem");
1034 1034
         if ($incomingData !== FALSE && strlen($incomingData) > 0) {
1035 1035
             $eapCertArray = $x509->splitCertificate($incomingData);
1036 1036
         } else {
@@ -1060,10 +1060,10 @@  discard block
 block discarded – undo
1060 1060
                 case RADIUSTests::SERVER_CA_SELFSIGNED:
1061 1061
                     $servercert[] = $cert;
1062 1062
                     if (count($servercert) == 1) {
1063
-                        if (file_put_contents($tmpDir . "/incomingserver.pem", $cert['pem'] . "\n") === FALSE) {
1063
+                        if (file_put_contents($tmpDir."/incomingserver.pem", $cert['pem']."\n") === FALSE) {
1064 1064
                             $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n");
1065 1065
                         }
1066
-                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . print_r($servercert[0], true));
1066
+                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: ".print_r($servercert[0], true));
1067 1067
                     } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) {
1068 1068
                         $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS;
1069 1069
                     }
@@ -1144,7 +1144,7 @@  discard block
 block discarded – undo
1144 1144
         chdir($tmpDir);
1145 1145
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1146 1146
         if ($clientcertdata !== NULL) {
1147
-            file_put_contents($tmpDir . "/client.p12", $clientcertdata);
1147
+            file_put_contents($tmpDir."/client.p12", $clientcertdata);
1148 1148
         }
1149 1149
         $testresults = [];
1150 1150
         // initialise the sub-array for cleaner parsing
@@ -1245,7 +1245,7 @@  discard block
 block discarded – undo
1245 1245
                     'issuer' => $this->printDN($certdata['issuer']),
1246 1246
                     'validFrom' => $this->printTm($certdata['validFrom_time_t']),
1247 1247
                     'validTo' => $this->printTm($certdata['validTo_time_t']),
1248
-                    'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']),
1248
+                    'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']),
1249 1249
                     'sha1' => $certdata['sha1'],
1250 1250
                     'extensions' => $certdata['extensions']
1251 1251
                 ];
Please login to merge, or discard this patch.
core/diag/Telepath.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -113,7 +113,7 @@  discard block
 block discarded – undo
113 113
         if ($this->idPFederation === NULL && preg_match("/\.(..)$/", $realm, $matches)) {
114 114
             $this->idPFederation = strtoupper($matches[1]);
115 115
         }
116
-        $this->loggerInstance->debug(4, "XYZ: IdP-side NRO is " . $this->idPFederation . "\n");
116
+        $this->loggerInstance->debug(4, "XYZ: IdP-side NRO is ".$this->idPFederation."\n");
117 117
     }
118 118
     /* The eduroam OT monitoring has the following return codes:
119 119
      * 
@@ -443,12 +443,12 @@  discard block
 block discarded – undo
443 443
                     break;
444 444
                 case \core\AbstractProfile::READINESS_LEVEL_NOTREADY:
445 445
                     $this->additionalFindings[AbstractTest::INFRA_IDP_RADIUS][] = ["Profile" => "UNCONCLUSIVE"];
446
-                    $this->testsuite = new RADIUSTests($this->realm, "anonymous@" . $this->realm);
446
+                    $this->testsuite = new RADIUSTests($this->realm, "anonymous@".$this->realm);
447 447
                     break;
448 448
                 default:
449 449
             }
450 450
         } else {
451
-            $this->testsuite = new RADIUSTests($this->realm, "anonymous@" . $this->realm);
451
+            $this->testsuite = new RADIUSTests($this->realm, "anonymous@".$this->realm);
452 452
         }
453 453
     }
454 454
 
Please login to merge, or discard this patch.
core/diag/RFC6614Tests.php 1 patch
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -148,27 +148,27 @@  discard block
 block discarded – undo
148 148
     {
149 149
         // it could match CN or sAN:DNS, we don't care which
150 150
         if (isset($this->TLS_CA_checks_result[$host]['certdata']['subject'])) {
151
-            $this->loggerInstance->debug(4, "Checking expected server name " . $this->expectedName . " against Subject: ");
151
+            $this->loggerInstance->debug(4, "Checking expected server name ".$this->expectedName." against Subject: ");
152 152
             $this->loggerInstance->debug(4, $this->TLS_CA_checks_result[$host]['certdata']['subject']);
153 153
             // we are checking against accidental misconfig, not attacks, so loosely checking against end of string is appropriate
154
-            if (preg_match("/CN=" . $this->expectedName . "/", $this->TLS_CA_checks_result[$host]['certdata']['subject']) === 1) {
154
+            if (preg_match("/CN=".$this->expectedName."/", $this->TLS_CA_checks_result[$host]['certdata']['subject']) === 1) {
155 155
                 return TRUE;
156 156
             }
157 157
         }
158 158
         if (isset($this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'])) {
159
-            $this->loggerInstance->debug(4, "Checking expected server name " . $this->expectedName . " against sANs: ");
159
+            $this->loggerInstance->debug(4, "Checking expected server name ".$this->expectedName." against sANs: ");
160 160
             $this->loggerInstance->debug(4, $this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']);
161 161
             $testNames = $this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'];
162 162
             if (!is_array($testNames)) {
163 163
                 $testNames = [$testNames];
164 164
             }
165 165
             foreach ($testNames as $oneName) {
166
-                if (preg_match("/" . $this->expectedName . "/", $oneName) === 1) {
166
+                if (preg_match("/".$this->expectedName."/", $oneName) === 1) {
167 167
                     return TRUE;
168 168
                 }
169 169
             }
170 170
         }
171
-        $this->loggerInstance->debug(3, "Tried to check expected server name " . $this->expectedName . " but neither CN nor sANs matched.");
171
+        $this->loggerInstance->debug(3, "Tried to check expected server name ".$this->expectedName." but neither CN nor sANs matched.");
172 172
 
173 173
         $this->TLS_CA_checks_result[$host]['cert_oddity'] = RADIUSTests::CERTPROB_DYN_SERVER_NAME_MISMATCH;
174 174
         return FALSE;
@@ -198,7 +198,7 @@  discard block
 block discarded – undo
198 198
                 $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['status'] = $cert['status'];
199 199
                 $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['message'] = $this->TLS_certkeys[$cert['status']];
200 200
                 $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['expected'] = $cert['expected'];
201
-                $add = ' -cert ' . ROOT . '/config/cli-certs/' . $cert['public'] . ' -key ' . ROOT . '/config/cli-certs/' . $cert['private'];
201
+                $add = ' -cert '.ROOT.'/config/cli-certs/'.$cert['public'].' -key '.ROOT.'/config/cli-certs/'.$cert['private'];
202 202
                 if (!isset($this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k])) {
203 203
                     $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k] = [];
204 204
                 }
@@ -243,11 +243,11 @@  discard block
 block discarded – undo
243 243
 // but code analysers want this more explicit, so here is this extra
244 244
 // call to escapeshellarg()
245 245
         $escapedHost = escapeshellarg($host);
246
-        $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1\n");
246
+        $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1\n");
247 247
         $time_start = microtime(true);
248 248
         $opensslbabble = [];
249 249
         $result = 999; // likely to become zero by openssl; don't want to initialise to zero, could cover up exec failures
250
-        exec(\config\Master::PATHS['openssl'] . " s_client -connect " . $escapedHost . " -no_ssl3 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1", $opensslbabble, $result);
250
+        exec(\config\Master::PATHS['openssl']." s_client -connect ".$escapedHost." -no_ssl3 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1", $opensslbabble, $result);
251 251
         $time_stop = microtime(true);
252 252
         $testresults['time_millisec'] = floor(($time_stop - $time_start) * 1000);
253 253
         $testresults['returncode'] = $result;
Please login to merge, or discard this patch.
core/CertificationAuthorityEduPki.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "User SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -72,19 +72,19 @@  discard block
 block discarded – undo
72 72
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
73 73
         try {
74 74
             $altArray = [# Array mit den Subject Alternative Names
75
-                "email:" . $csr["USERNAME"]
75
+                "email:".$csr["USERNAME"]
76 76
             ];
77 77
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
78 78
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
79
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n");
80
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR"] . "\n");
79
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n");
80
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR"]."\n");
81 81
             $this->loggerInstance->debug(5, "PARAM_3: ");
82 82
             $this->loggerInstance->debug(5, $altArray);
83
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n");
84
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
85
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
86
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n");
87
-            $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n");
83
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n");
84
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
85
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
86
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n");
87
+            $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n");
88 88
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
89 89
             $soapNewRequest = $soapPub->newRequest(
90 90
                     CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID
@@ -106,11 +106,11 @@  discard block
 block discarded – undo
106 106
         } catch (Exception $e) {
107 107
             // PHP 7.1 can do this much better
108 108
             if (is_soap_fault($e)) {
109
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
109
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
110 110
                     $e->faultstring
111 111
                 }\n");
112 112
             }
113
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
113
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
114 114
         }
115 115
         try {
116 116
             $soap = $this->initEduPKISoapSession("RA");
@@ -122,8 +122,8 @@  discard block
 block discarded – undo
122 122
                     $soapReqnum, [
123 123
                 "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID,
124 124
                 "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE,
125
-                "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'],
126
-                "SubjectAltNames" => ["email:" . $csr["USERNAME"]],
125
+                "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'],
126
+                "SubjectAltNames" => ["email:".$csr["USERNAME"]],
127 127
                 "NotBefore" => (new \DateTime())->format('c'),
128 128
                 "NotAfter" => $expiry->format('c'),
129 129
                     ]
@@ -142,7 +142,7 @@  discard block
 block discarded – undo
142 142
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
143 143
             // rather than just using the string. Grr.
144 144
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
145
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
145
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
146 146
             // retrieve our RA cert from filesystem                    
147 147
             // the RA certificates are not needed right now because we
148 148
             // have resorted to S/MIME signatures with openssl command-line
@@ -154,7 +154,7 @@  discard block
 block discarded – undo
154 154
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
155 155
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
156 156
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
157
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
157
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
158 158
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
159 159
             $output = [];
160 160
             $return = 999;
@@ -163,14 +163,14 @@  discard block
 block discarded – undo
163 163
                 throw new Exception("Non-zero return value from openssl smime!");
164 164
             }
165 165
             // and get the signature blob back from the filesystem
166
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
166
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
167 167
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
168
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
169
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
170
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
168
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
169
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
170
+            $this->loggerInstance->debug(5, $detachedSig."\n");
171 171
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
172
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
173
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
172
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
173
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
174 174
             if ($soapIssueCert === FALSE) {
175 175
                 throw new Exception("The locally approved request was NOT processed by the CA.");
176 176
             }
@@ -207,9 +207,9 @@  discard block
 block discarded – undo
207 207
                 throw new Exception("CAInfo has no root certificate for us!");
208 208
             }
209 209
         } catch (SoapFault $e) {
210
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
210
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
211 211
         } catch (Exception $e) {
212
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
212
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
213 213
         }
214 214
         return [
215 215
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -242,12 +242,12 @@  discard block
 block discarded – undo
242 242
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
243 243
             // rather than just using the string. Grr.
244 244
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
245
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
245
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
246 246
             // retrieve our RA cert from filesystem
247 247
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
248 248
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
249 249
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
250
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT;
250
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT;
251 251
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
252 252
             $output = [];
253 253
             $return = 999;
@@ -256,7 +256,7 @@  discard block
 block discarded – undo
256 256
                 throw new Exception("Non-zero return value from openssl smime!");
257 257
             }
258 258
             // and get the signature blob back from the filesystem
259
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
259
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
260 260
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
261 261
             if ($soapIssueRev === FALSE) {
262 262
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -264,9 +264,9 @@  discard block
 block discarded – undo
264 264
         } catch (Exception $e) {
265 265
             // PHP 7.1 can do this much better
266 266
             if (is_soap_fault($e)) {
267
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
267
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
268 268
             }
269
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
269
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
270 270
         }
271 271
     }
272 272
 
@@ -366,9 +366,9 @@  discard block
 block discarded – undo
366 366
      */
367 367
     public function soapToXmlInteger($x)
368 368
     {
369
-        return '<' . $x[0] . '>'
369
+        return '<'.$x[0].'>'
370 370
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
371
-                . '</' . $x[0] . '>';
371
+                . '</'.$x[0].'>';
372 372
     }
373 373
 
374 374
     /**
@@ -387,9 +387,9 @@  discard block
 block discarded – undo
387 387
         // dump private key into directory
388 388
         $outstring = "";
389 389
         openssl_pkey_export($privateKey, $outstring);
390
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
390
+        file_put_contents($tempdir."/pkey.pem", $outstring);
391 391
         // PHP can only do one DC in the Subject. But we need three.
392
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
392
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
393 393
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
394 394
         $output = [];
395 395
         $return = 999;
Please login to merge, or discard this patch.
core/CertificationAuthorityEmbeddedECDSA.php 1 patch
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@  discard block
 block discarded – undo
16 16
 class CertificationAuthorityEmbeddedECDSA extends EntityWithDBProperties implements CertificationAuthorityInterface
17 17
 {
18 18
 
19
-    private const LOCATION_ROOT_CA = ROOT . "/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
-    private const LOCATION_ISSUING_CA = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.pem";
21
-    private const LOCATION_ISSUING_KEY = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.key";
22
-    private const LOCATION_CONFIG = ROOT . "/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
19
+    private const LOCATION_ROOT_CA = ROOT."/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
+    private const LOCATION_ISSUING_CA = ROOT."/config/SilverbulletClientCerts/real-ECDSA.pem";
21
+    private const LOCATION_ISSUING_KEY = ROOT."/config/SilverbulletClientCerts/real-ECDSA.key";
22
+    private const LOCATION_CONFIG = ROOT."/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
23 23
 
24 24
     /**
25 25
      * string with the PEM variant of the root CA
@@ -66,11 +66,11 @@  discard block
 block discarded – undo
66 66
         parent::__construct();
67 67
         $this->rootPem = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
68 68
         if ($this->rootPem === FALSE) {
69
-            throw new Exception("Root CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
69
+            throw new Exception("Root CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
70 70
         }
71 71
         $this->issuingCertRaw = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
72 72
         if ($this->issuingCertRaw === FALSE) {
73
-            throw new Exception("Issuing CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
73
+            throw new Exception("Issuing CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
74 74
         }
75 75
         $rootParsed = openssl_x509_read($this->rootPem);
76 76
         $this->issuingCert = openssl_x509_read($this->issuingCertRaw);
@@ -78,15 +78,15 @@  discard block
 block discarded – undo
78 78
             throw new Exception("At least one CA PEM file did not parse correctly!");
79 79
         }
80 80
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY) === FALSE) {
81
-            throw new Exception("Private key not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
81
+            throw new Exception("Private key not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
82 82
         }
83
-        $issuingKeyTemp = openssl_pkey_get_private("file://" . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
83
+        $issuingKeyTemp = openssl_pkey_get_private("file://".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
84 84
         if ($issuingKeyTemp === FALSE) {
85 85
             throw new Exception("The private key did not parse correctly!");
86 86
         }
87 87
         $this->issuingKey = $issuingKeyTemp;
88 88
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG) === FALSE) {
89
-            throw new Exception("openssl configuration not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
89
+            throw new Exception("openssl configuration not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
90 90
         }
91 91
         $this->conffile = CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG;
92 92
     }
@@ -129,27 +129,27 @@  discard block
 block discarded – undo
129 129
         // generate stub index.txt file
130 130
         $tempdirArray = \core\common\Entity::createTemporaryDirectory("test");
131 131
         $tempdir = $tempdirArray['dir'];
132
-        $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
133
-        $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
132
+        $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
133
+        $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
134 134
         // serials for our CA are always integers
135 135
         $serialHex = strtoupper(dechex((int) $cert->serial));
136 136
         if (strlen($serialHex) % 2 == 1) {
137
-            $serialHex = "0" . $serialHex;
137
+            $serialHex = "0".$serialHex;
138 138
         }
139 139
 
140
-        $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$federation/CN=$cert->username\n";
140
+        $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$federation/CN=$cert->username\n";
141 141
         $this->loggerInstance->debug(4, "index.txt contents-to-be: $indexStatement");
142
-        if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
142
+        if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
143 143
             $this->loggerInstance->debug(1, "Unable to write openssl index.txt file for revocation handling!");
144 144
         }
145 145
         // index.txt.attr is dull but needs to exist
146
-        file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
146
+        file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
147 147
         // call "openssl ocsp" to manufacture our own OCSP statement
148 148
         // adding "-rmd sha1" to the following command-line makes the
149 149
         // choice of signature algorithm for the response explicit
150 150
         // but it's only available from openssl-1.1.0 (which we do not
151 151
         // want to require just for that one thing).
152
-        $execCmd = \config\Master::PATHS['openssl'] . " ocsp -issuer " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rsigner " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rkey " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY . " -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
152
+        $execCmd = \config\Master::PATHS['openssl']." ocsp -issuer ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rsigner ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rkey ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY." -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
153 153
         $this->loggerInstance->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
154 154
         $output = [];
155 155
         $return = 999;
@@ -157,11 +157,11 @@  discard block
 block discarded – undo
157 157
         if ($return !== 0) {
158 158
             throw new Exception("Non-zero return value from openssl ocsp!");
159 159
         }
160
-        $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
160
+        $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
161 161
         // remove the temp dir!
162
-        unlink($tempdir . "/$serialHex.response.der");
163
-        unlink($tempdir . "/index.txt.attr");
164
-        unlink($tempdir . "/index.txt");
162
+        unlink($tempdir."/$serialHex.response.der");
163
+        unlink($tempdir."/index.txt.attr");
164
+        unlink($tempdir."/index.txt");
165 165
         rmdir($tempdir);
166 166
         $this->databaseHandle->exec("UPDATE silverbullet_certificate SET OCSP = ?, OCSP_timestamp = NOW() WHERE serial_number = ?", "si", $ocsp, $cert->serial);
167 167
         return $ocsp;
Please login to merge, or discard this patch.
core/EntityWithDBProperties.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -139,7 +139,7 @@  discard block
 block discarded – undo
139 139
             case "core\User":
140 140
                 return $this->userName;
141 141
             default:
142
-                throw new Exception("Operating on a class where we don't know the relevant identifier in the DB - " . get_class($this) . "!");
142
+                throw new Exception("Operating on a class where we don't know the relevant identifier in the DB - ".get_class($this)."!");
143 143
         }
144 144
     }
145 145
 
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
      */
178 178
     public function beginFlushAttributes($extracondition = "")
179 179
     {
180
-        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "") . $this->getRelevantIdentifier() . (!is_int($this->getRelevantIdentifier()) ? "\"" : "");
180
+        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "").$this->getRelevantIdentifier().(!is_int($this->getRelevantIdentifier()) ? "\"" : "");
181 181
         $this->databaseHandle->exec("DELETE FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier AND option_name NOT LIKE '%_file' $extracondition");
182 182
         $this->updateFreshness();
183 183
         $execFlush = $this->databaseHandle->exec("SELECT row FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier $extracondition");
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
      */
198 198
     public function commitFlushAttributes(array $tobedeleted)
199 199
     {
200
-        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "") . $this->getRelevantIdentifier() . (!is_int($this->getRelevantIdentifier()) ? "\"" : "");
200
+        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "").$this->getRelevantIdentifier().(!is_int($this->getRelevantIdentifier()) ? "\"" : "");
201 201
         foreach (array_keys($tobedeleted) as $row) {
202 202
             $this->databaseHandle->exec("DELETE FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier AND row = $row");
203 203
             $this->updateFreshness();
@@ -226,7 +226,7 @@  discard block
 block discarded – undo
226 226
     {
227 227
         $relevantId = $this->getRelevantIdentifier();
228 228
         $identifierType = (is_int($relevantId) ? "i" : "s");
229
-        $this->databaseHandle->exec("INSERT INTO $this->entityOptionTable ($this->entityIdColumn, option_name, option_lang, option_value) VALUES(?,?,?,?)", $identifierType . "sss", $relevantId, $attrName, $attrLang, $attrValue);
229
+        $this->databaseHandle->exec("INSERT INTO $this->entityOptionTable ($this->entityIdColumn, option_name, option_lang, option_value) VALUES(?,?,?,?)", $identifierType."sss", $relevantId, $attrName, $attrLang, $attrValue);
230 230
         $this->updateFreshness();
231 231
     }
232 232
 
Please login to merge, or discard this patch.
core/DeviceConfig.php 2 patches
Indentation   -1 removed lines patch added patch discarded remove patch
@@ -109,7 +109,6 @@
 block discarded – undo
109 109
      * ["my.server.name"] => "my.server.name"
110 110
      * ["foo.bar.de", "baz.bar.ge"] => "e"
111 111
      * ["server1.example.com", "server2.example.com", "serverN.example.com"] => ".example.com"
112
-
113 112
      * @return string
114 113
      */
115 114
     public function longestNameSuffix()
Please login to merge, or discard this patch.
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -85,7 +85,7 @@  discard block
 block discarded – undo
85 85
     protected function setSupportedEapMethods($eapArray)
86 86
     {
87 87
         $this->supportedEapMethods = $eapArray;
88
-        $this->loggerInstance->debug(4, "This device (" . __CLASS__ . ") supports the following EAP methods: ");
88
+        $this->loggerInstance->debug(4, "This device (".__CLASS__.") supports the following EAP methods: ");
89 89
         $this->loggerInstance->debug(4, $this->supportedEapMethods);
90 90
     }
91 91
 
@@ -137,7 +137,7 @@  discard block
 block discarded – undo
137 137
                     break 2;
138 138
                 }
139 139
             }
140
-            $longestSuffix = $candidate . $longestSuffix;
140
+            $longestSuffix = $candidate.$longestSuffix;
141 141
         }
142 142
         return $longestSuffix;
143 143
     }
@@ -175,7 +175,7 @@  discard block
 block discarded – undo
175 175
             throw new Exception("No EAP type available.");
176 176
         }
177 177
         $this->attributes = $this->getProfileAttributes($profile);
178
-        $this->deviceUUID = common\Entity::uuid('', 'CAT' . $profile->institution . "-" . $profile->identifier . "-" . $this->device_id);
178
+        $this->deviceUUID = common\Entity::uuid('', 'CAT'.$profile->institution."-".$profile->identifier."-".$this->device_id);
179 179
 
180 180
 
181 181
         // if we are instantiating a Silverbullet profile AND have been given
@@ -199,8 +199,8 @@  discard block
 block discarded – undo
199 199
         // create temporary directory, its full path will be saved in $this->FPATH;
200 200
         $tempDir = \core\common\Entity::createTemporaryDirectory($purpose);
201 201
         $this->FPATH = $tempDir['dir'];
202
-        mkdir($tempDir['dir'] . '/tmp');
203
-        chdir($tempDir['dir'] . '/tmp');
202
+        mkdir($tempDir['dir'].'/tmp');
203
+        chdir($tempDir['dir'].'/tmp');
204 204
         $caList = [];
205 205
         $x509 = new \core\common\X509();
206 206
         if (isset($this->attributes['eap:ca_file'])) {
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
         $this->support_url_substitute = sprintf(_("your local %s support page"), \config\ConfAssistant::CONSORTIUM['display_name']);
237 237
 
238 238
         if ($this->signer && $this->options['sign']) {
239
-            $this->sign = ROOT . '/signer/' . $this->signer;
239
+            $this->sign = ROOT.'/signer/'.$this->signer;
240 240
         }
241 241
         $this->installerBasename = $this->getInstallerBasename();
242 242
         common\Entity::outOfThePotatoes();
@@ -296,10 +296,10 @@  discard block
 block discarded – undo
296 296
      */
297 297
     protected function findSourceFile($file)
298 298
     {
299
-        if (is_file($this->module_path . '/Files/' . $this->device_id . '/' . $file)) {
300
-            return $this->module_path . '/Files/' . $this->device_id . '/' . $file;
301
-        } elseif (is_file($this->module_path . '/Files/' . $file)) {
302
-            return $this->module_path . '/Files/' . $file;
299
+        if (is_file($this->module_path.'/Files/'.$this->device_id.'/'.$file)) {
300
+            return $this->module_path.'/Files/'.$this->device_id.'/'.$file;
301
+        } elseif (is_file($this->module_path.'/Files/'.$file)) {
302
+            return $this->module_path.'/Files/'.$file;
303 303
         } else {
304 304
             $this->loggerInstance->debug(2, "requested file $file does not exist\n");
305 305
             return FALSE;
@@ -423,17 +423,17 @@  discard block
 block discarded – undo
423 423
      */
424 424
     private function getInstallerBasename()
425 425
     {
426
-        $baseName = $this->customTranslit(\config\ConfAssistant::CONSORTIUM['name']) . "-" . $this->getDeviceId();
426
+        $baseName = $this->customTranslit(\config\ConfAssistant::CONSORTIUM['name'])."-".$this->getDeviceId();
427 427
         if (isset($this->attributes['profile:customsuffix'][1])) {
428 428
             // this string will end up as a filename on a filesystem, so always
429 429
             // take a latin-based language variant if available
430 430
             // and then scrub non-ASCII just in case
431
-            return $baseName . $this->customTranslit($this->attributes['profile:customsuffix'][1]);
431
+            return $baseName.$this->customTranslit($this->attributes['profile:customsuffix'][1]);
432 432
         }
433 433
         // Okay, no custom suffix. 
434 434
         // Use the configured inst name and apply shortening heuristics
435 435
         $lang_pointer = \config\Master::LANGUAGES[$this->languageInstance->getLang()]['latin_based'] == TRUE ? 0 : 1;
436
-        $this->loggerInstance->debug(5, "getInstallerBasename1:" . $this->attributes['general:instname'][$lang_pointer] . "\n");
436
+        $this->loggerInstance->debug(5, "getInstallerBasename1:".$this->attributes['general:instname'][$lang_pointer]."\n");
437 437
         $inst = $this->customTranslit($this->attributes['general:instname'][$lang_pointer]);
438 438
         $this->loggerInstance->debug(4, "getInstallerBasename2:$inst\n");
439 439
         $Inst_a = explode('_', $inst);
@@ -448,10 +448,10 @@  discard block
 block discarded – undo
448 448
             if (!empty($this->attributes['profile:name']) && !empty($this->attributes['profile:name'][$lang_pointer])) {
449 449
                 $profTemp = $this->customTranslit($this->attributes['profile:name'][$lang_pointer]);
450 450
                 $prof = preg_replace('/_+$/', '', $profTemp);
451
-                return $baseName . $inst . '-' . $prof;
451
+                return $baseName.$inst.'-'.$prof;
452 452
             }
453 453
         }
454
-        return $baseName . $inst;
454
+        return $baseName.$inst;
455 455
     }
456 456
 
457 457
     /**
@@ -569,7 +569,7 @@  discard block
 block discarded – undo
569 569
                 $ext = 'unsupported';
570 570
             }
571 571
             $this->loggerInstance->debug(5, "saveLogoFile: $mime : $ext\n");
572
-            $fileName = 'logo-' . $type . $iterator . '.' . $ext;
572
+            $fileName = 'logo-'.$type.$iterator.'.'.$ext;
573 573
             $fileHandle = fopen($fileName, "w");
574 574
             if (!$fileHandle) {
575 575
                 $this->loggerInstance->debug(2, "saveLogoFile failed for: $fileName\n");
@@ -596,13 +596,13 @@  discard block
 block discarded – undo
596 596
         $mime = $finfo->buffer($blob);
597 597
         $ext = isset($this->mime_extensions[$mime]) ? $this->mime_extensions[$mime] : 'usupported';
598 598
         $this->loggerInstance->debug(5, "saveInfoFile: $mime : $ext\n");
599
-        $fileHandle = fopen('local-info.' . $ext, "w");
599
+        $fileHandle = fopen('local-info.'.$ext, "w");
600 600
         if ($fileHandle === FALSE) {
601 601
             throw new Exception("problem opening the file");
602 602
         }
603 603
         fwrite($fileHandle, $blob);
604 604
         fclose($fileHandle);
605
-        return(['name' => 'local-info.' . $ext, 'mime' => $ext]);
605
+        return(['name' => 'local-info.'.$ext, 'mime' => $ext]);
606 606
     }
607 607
 
608 608
     /**
@@ -656,9 +656,9 @@  discard block
 block discarded – undo
656 656
     {
657 657
         $outerId = NULL;
658 658
         if (isset($this->attributes['internal:use_anon_outer']) && $this->attributes['internal:use_anon_outer'][0] == "1" && isset($this->attributes['internal:realm'])) {
659
-            $outerId = "@" . $this->attributes['internal:realm'][0];
659
+            $outerId = "@".$this->attributes['internal:realm'][0];
660 660
             if (isset($this->attributes['internal:anon_local_value'])) {
661
-                $outerId = $this->attributes['internal:anon_local_value'][0] . $outerId;
661
+                $outerId = $this->attributes['internal:anon_local_value'][0].$outerId;
662 662
             }
663 663
         }
664 664
         return $outerId;
Please login to merge, or discard this patch.
core/AbstractProfile.php 1 patch
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -134,7 +134,7 @@  discard block
 block discarded – undo
134 134
     protected function saveDownloadDetails($idpIdentifier, $profileId, $deviceId, $area, $lang, $eapType)
135 135
     {
136 136
         if (\config\Master::PATHS['logdir']) {
137
-            $file = fopen(\config\Master::PATHS['logdir'] . "/download_details.log", "a");
137
+            $file = fopen(\config\Master::PATHS['logdir']."/download_details.log", "a");
138 138
             if ($file === FALSE) {
139 139
                 throw new Exception("Unable to open file for append: $file");
140 140
             }
@@ -169,9 +169,9 @@  discard block
 block discarded – undo
169 169
             }
170 170
             // check if a CA with identical DN was added - alert NRO if so
171 171
             if (array_search($ca['subject'], $baselineCA) !== FALSE) {
172
-                $retval[AbstractProfile::CA_CLASH_ADDED] .= "#SHA1 for CA with DN '" . print_r($ca['subject'], TRUE) . "' has SHA1 fingerprints (pre-existing) " . /** @scrutinizer ignore-type */ array_search($ca['subject'], $baselineCA) . " and (added) " . $ca['sha1'];
172
+                $retval[AbstractProfile::CA_CLASH_ADDED] .= "#SHA1 for CA with DN '".print_r($ca['subject'], TRUE)."' has SHA1 fingerprints (pre-existing) "./** @scrutinizer ignore-type */ array_search($ca['subject'], $baselineCA)." and (added) ".$ca['sha1'];
173 173
             } else {
174
-                $retval[AbstractProfile::CA_ADDED] .= "#CA with DN '" . print_r($ca['subject'], TRUE) . "' and SHA1 fingerprint " . $ca['sha1'] . " was added as trust anchor";
174
+                $retval[AbstractProfile::CA_ADDED] .= "#CA with DN '".print_r($ca['subject'], TRUE)."' and SHA1 fingerprint ".$ca['sha1']." was added as trust anchor";
175 175
             }
176 176
         }
177 177
         // check if a servername was added
@@ -181,7 +181,7 @@  discard block
 block discarded – undo
181 181
         }
182 182
         foreach ($new->getAttributes("eap:server_name") as $newName) {
183 183
             if (!in_array($newName['value'], $baselineNames)) {
184
-                $retval[AbstractProfile::SERVERNAME_ADDED] .= "#New server name '" . $newName['value'] . "' added";
184
+                $retval[AbstractProfile::SERVERNAME_ADDED] .= "#New server name '".$newName['value']."' added";
185 185
             }
186 186
         }
187 187
         return $retval;
@@ -205,7 +205,7 @@  discard block
 block discarded – undo
205 205
             $eaptype = new common\EAP($eapQuery->eap_method_id);
206 206
             $eapTypeArray[] = $eaptype;
207 207
         }
208
-        $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n" . print_r($eapTypeArray, true));
208
+        $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n".print_r($eapTypeArray, true));
209 209
         return $eapTypeArray;
210 210
     }
211 211
 
@@ -287,16 +287,16 @@  discard block
 block discarded – undo
287 287
         if (count($this->getAttributes("internal:checkuser_outer")) > 0) {
288 288
             // we are supposed to use a specific outer username for checks, 
289 289
             // which is different from the outer username we put into installers
290
-            return $this->getAttributes("internal:checkuser_value")[0]['value'] . "@" . $realm;
290
+            return $this->getAttributes("internal:checkuser_value")[0]['value']."@".$realm;
291 291
         }
292 292
         if (count($this->getAttributes("internal:use_anon_outer")) > 0) {
293 293
             // no special check username, but there is an anon outer ID for
294 294
             // installers - so let's use that one
295
-            return $this->getAttributes("internal:anon_local_value")[0]['value'] . "@" . $realm;
295
+            return $this->getAttributes("internal:anon_local_value")[0]['value']."@".$realm;
296 296
         }
297 297
         // okay, no guidance on outer IDs at all - but we need *something* to
298 298
         // test with for the RealmChecks. So:
299
-        return "@" . $realm;
299
+        return "@".$realm;
300 300
     }
301 301
 
302 302
     /**
@@ -744,7 +744,7 @@  discard block
 block discarded – undo
744 744
     public function prepShowtime()
745 745
     {
746 746
         $properConfig = $this->readyForShowtime();
747
-        $this->databaseHandle->exec("UPDATE profile SET sufficient_config = " . ($properConfig ? "TRUE" : "FALSE") . " WHERE profile_id = " . $this->identifier);
747
+        $this->databaseHandle->exec("UPDATE profile SET sufficient_config = ".($properConfig ? "TRUE" : "FALSE")." WHERE profile_id = ".$this->identifier);
748 748
 
749 749
         $attribs = $this->getCollapsedAttributes();
750 750
         // if not enough info to go live, set FALSE
Please login to merge, or discard this patch.