@@ -170,12 +170,12 @@ |
||
170 | 170 | 'db' => 'radacct', |
171 | 171 | 'user' => 'someuser', |
172 | 172 | 'pass' => 'somepass', |
173 | - 'readonly' => TRUE,], |
|
173 | + 'readonly' => TRUE, ], |
|
174 | 174 | 'RADIUS_2' => [ |
175 | 175 | 'host' => 'auth-2.hosted.eduroam.org', |
176 | 176 | 'db' => 'radacct', |
177 | 177 | 'user' => 'someuser', |
178 | 178 | 'pass' => 'somepass', |
179 | - 'readonly' => TRUE,], |
|
179 | + 'readonly' => TRUE, ], |
|
180 | 180 | ]; |
181 | 181 | } |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -72,7 +72,7 @@ discard block |
||
72 | 72 | // also send user back to the overview page |
73 | 73 | if (isset($_POST['requestcert']) && $_POST['requestcert'] == \web\lib\common\FormElements::BUTTON_SAVE) { |
74 | 74 | // basic sanity checks before we hand this over to openssl |
75 | - $sanitisedCsr = $validator->string($_POST['CSR'] ?? "" , TRUE); |
|
75 | + $sanitisedCsr = $validator->string($_POST['CSR'] ?? "", TRUE); |
|
76 | 76 | if (openssl_csr_get_public_key($sanitisedCsr) === FALSE) { |
77 | 77 | throw new Exception("Sorry: Unable to parse the submitted public key - no public key inside?"); |
78 | 78 | } |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | $fed = $validator->existingFederation($_POST['NRO-list']); |
87 | 87 | $country = strtoupper($fed->tld); |
88 | 88 | $DN[] = "C=$country"; |
89 | - $DN[] = "O=NRO of " . $cat->knownFederations[strtoupper($fed->tld)]; |
|
89 | + $DN[] = "O=NRO of ".$cat->knownFederations[strtoupper($fed->tld)]; |
|
90 | 90 | $DN[] = "CN=comes.from.eduroam.db"; |
91 | 91 | $policies[] = "eduroam IdP"; |
92 | 92 | $policies[] = "eduroam SP"; |
@@ -104,11 +104,11 @@ discard block |
||
104 | 104 | default: |
105 | 105 | throw new Exception("Sorry: Unknown level of issuance requested."); |
106 | 106 | } |
107 | - echo "<p>" . _("Requesting a certificate with the following properties"); |
|
107 | + echo "<p>"._("Requesting a certificate with the following properties"); |
|
108 | 108 | echo "<ul>"; |
109 | - echo "<li>" . _("Policy OIDs: ") . implode(", ", $policies) . "</li>"; |
|
110 | - echo "<li>" . _("Distinguished Name: ") . implode(", ", $DN) . "</li>"; |
|
111 | - echo "<li>" . _("Requester Contact Details: will come from eduroam DB (using stub 'Someone, <[email protected]>').") . "</li>"; |
|
109 | + echo "<li>"._("Policy OIDs: ").implode(", ", $policies)."</li>"; |
|
110 | + echo "<li>"._("Distinguished Name: ").implode(", ", $DN)."</li>"; |
|
111 | + echo "<li>"._("Requester Contact Details: will come from eduroam DB (using stub 'Someone, <[email protected]>').")."</li>"; |
|
112 | 112 | echo "</ul></p>"; |
113 | 113 | /* $ossl = proc_open("openssl req -subj '/".implode("/", $DN)."'", [ 0 => ["pipe", "r"], 1 => ["pipe", "w"], 2 => [ "file", "/tmp/voodoo-error", "a"] ], $pipes); |
114 | 114 | if (is_resource($ossl)) { |
@@ -121,13 +121,13 @@ discard block |
||
121 | 121 | throw new Exception("Calling openssl in a fancy way did not work."); |
122 | 122 | } |
123 | 123 | echo "<p>"._("This is the new CSR (return code was $retval)")."<pre>$newCsr</pre></p>"; */ |
124 | - $newCsrWithMeta = ["CSR" => /* $newCsr */ $_POST['CSR'], "USERNAME" => "Someone", "USERMAIL" => "[email protected]", "SUBJECT" => implode(",", $DN) ,"FED" => $country]; |
|
124 | + $newCsrWithMeta = ["CSR" => /* $newCsr */ $_POST['CSR'], "USERNAME" => "Someone", "USERMAIL" => "[email protected]", "SUBJECT" => implode(",", $DN), "FED" => $country]; |
|
125 | 125 | // our certs can be good for max 5 years |
126 | 126 | $fed->requestCertificate($newCsrWithMeta, 1825); |
127 | 127 | echo "<p>"._("The certificate was requested.")."</p>"; |
128 | 128 | ?> |
129 | 129 | <form action="overview_certificates.php" method="GET"> |
130 | - <button type="submit"><?php echo _("Back to Certificate Overview");?></button> |
|
130 | + <button type="submit"><?php echo _("Back to Certificate Overview"); ?></button> |
|
131 | 131 | </form> |
132 | 132 | <?php |
133 | 133 | echo $deco->footer(); |
@@ -136,14 +136,14 @@ discard block |
||
136 | 136 | |
137 | 137 | // if we did not get a SAVE button, display UI for a fresh request instead |
138 | 138 | ?> |
139 | - <h2><?php echo _("1. Certificate Holder Details");?></h2> |
|
139 | + <h2><?php echo _("1. Certificate Holder Details"); ?></h2> |
|
140 | 140 | <form action="action_req_certificate.php" method="POST"> |
141 | 141 | <input type="radio" name="LEVEL" id="NRO" value="NRO" checked><?php printf(_("Certificate for %s role"), $uiElements->nomenclatureFed); ?></input> |
142 | 142 | <?php |
143 | 143 | if (count($feds) == 1) { |
144 | 144 | $fedObject = new \core\Federation($feds[0]['value']); |
145 | - echo " <strong>" . $cat->knownFederations[$fedObject->tld] . "</strong>"; |
|
146 | - echo '<input type="hidden" name="NRO-list" id="NRO-list" value="' . $fedObject->tld . '"/>'; |
|
145 | + echo " <strong>".$cat->knownFederations[$fedObject->tld]."</strong>"; |
|
146 | + echo '<input type="hidden" name="NRO-list" id="NRO-list" value="'.$fedObject->tld.'"/>'; |
|
147 | 147 | } else { |
148 | 148 | ?> |
149 | 149 | <select name="NRO-list" id="NRO-list"> |
@@ -151,7 +151,7 @@ discard block |
||
151 | 151 | <?php |
152 | 152 | foreach ($feds as $oneFed) { |
153 | 153 | $fedObject = new \core\Federation($oneFed['value']); |
154 | - echo '<option value="' . strtoupper($fedObject->tld) . '">' . $cat->knownFederations[$fedObject->tld] . "</option>"; |
|
154 | + echo '<option value="'.strtoupper($fedObject->tld).'">'.$cat->knownFederations[$fedObject->tld]."</option>"; |
|
155 | 155 | } |
156 | 156 | ?> |
157 | 157 | </select> |
@@ -171,15 +171,15 @@ discard block |
||
171 | 171 | } |
172 | 172 | } |
173 | 173 | foreach ($allIdPs as $id => $name) { |
174 | - echo '<option value="' . $id . '">' . $name . "</option>"; |
|
174 | + echo '<option value="'.$id.'">'.$name."</option>"; |
|
175 | 175 | } |
176 | 176 | ?> |
177 | 177 | </select> |
178 | 178 | <br/> |
179 | - <h2><?php echo _("2. CSR generation");?></h2> |
|
180 | - <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:");?></p> |
|
179 | + <h2><?php echo _("2. CSR generation"); ?></h2> |
|
180 | + <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:"); ?></p> |
|
181 | 181 | <p>openssl req -new -newkey rsa:4096 -out test.csr -keyout test.key -subj /DC=test/DC=test/DC=eduroam/C=XY/O=WillBeReplaced/CN=will.be.replaced</p> |
182 | - <h2><?php echo _("3. Submission");?></h2> |
|
182 | + <h2><?php echo _("3. Submission"); ?></h2> |
|
183 | 183 | <?php echo _("Please paste your CSR here:"); ?><br/><textarea name="CSR" id="CSR" rows="20" cols="85"/></textarea><br/> |
184 | 184 | <button type="submit" name="requestcert" id="requestcert" value="<?php echo \web\lib\common\FormElements::BUTTON_SAVE ?>"><?php echo _("Send request"); ?></button> |
185 | 185 | </form> |
@@ -131,7 +131,7 @@ discard block |
||
131 | 131 | return $this->counter; |
132 | 132 | } |
133 | 133 | |
134 | - $cachedNumber = @file_get_contents(ROOT . "/var/tmp/cachedSPNumber.serialised"); |
|
134 | + $cachedNumber = @file_get_contents(ROOT."/var/tmp/cachedSPNumber.serialised"); |
|
135 | 135 | if ($cachedNumber !== FALSE) { |
136 | 136 | $numberData = unserialize($cachedNumber); |
137 | 137 | $now = new \DateTime(); |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | } else { // data in cache is too old or doesn't exist. We really need to ask the database |
145 | 145 | $list = $this->listAllServiceProviders(); |
146 | 146 | $this->counter = count($list); |
147 | - file_put_contents(ROOT . "/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()])); |
|
147 | + file_put_contents(ROOT."/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()])); |
|
148 | 148 | return $this->counter; |
149 | 149 | } |
150 | 150 | } |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | $returnarray = []; |
176 | 176 | $query = "SELECT id_institution AS id, country, inst_realm as realmlist, name AS collapsed_name, contact AS collapsed_contact, type FROM view_active_institution WHERE country = ?"; |
177 | 177 | if ($eduroamDbType !== NULL) { |
178 | - $query .= " AND ( type = '" . ExternalEduroamDBData::TYPE_IDPSP . "' OR type = '" . $eduroamDbType . "')"; |
|
178 | + $query .= " AND ( type = '".ExternalEduroamDBData::TYPE_IDPSP."' OR type = '".$eduroamDbType."')"; |
|
179 | 179 | } |
180 | 180 | $externals = $this->db->exec($query, "s", $tld); |
181 | 181 | // was a SELECT query, so a resource and not a boolean |
@@ -290,7 +290,7 @@ discard block |
||
290 | 290 | <table><tr> |
291 | 291 | <td class='icon_td'>"; |
292 | 292 | $out[] = "<img src='".$this->stateIcons[$this->globalLevelStatic]."' id='main_static_ico' class='icon'></td><td id='main_static_result'>". |
293 | - $this->globalInfo[$this->globalLevelStatic].' '. _("See the appropriate tab for details.").'</td> |
|
293 | + $this->globalInfo[$this->globalLevelStatic].' '._("See the appropriate tab for details.").'</td> |
|
294 | 294 | </tr></table>'; |
295 | 295 | if ($this->naptr > 0) { |
296 | 296 | $out[] = "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
@@ -323,7 +323,7 @@ discard block |
||
323 | 323 | <td class='icon_td'><img src='".$this->stateIcons[$result->level]."' id='src".$hostindex."_img'></td> |
324 | 324 | <td id='src$hostindex' colspan=2> |
325 | 325 | "; |
326 | - $out[] = '<strong>'.($result->server ? $result->server : _("Connected to undetermined server")).'</strong><br/>'.sprintf (_("elapsed time: %sms."), $result->time_millisec).'<p>'.$result->message.'</p>'; |
|
326 | + $out[] = '<strong>'.($result->server ? $result->server : _("Connected to undetermined server")).'</strong><br/>'.sprintf(_("elapsed time: %sms."), $result->time_millisec).'<p>'.$result->message.'</p>'; |
|
327 | 327 | |
328 | 328 | if ($result->level > \core\common\Entity::L_OK && property_exists($result, 'cert_oddities')) { |
329 | 329 | foreach ($result->cert_oddities as $oddities) { |
@@ -408,7 +408,7 @@ discard block |
||
408 | 408 | } else { |
409 | 409 | $certdesc = '<br>'; |
410 | 410 | } |
411 | - $capathtest[] = '<div>'.($capath->message!='' ? $capath->message : _('Test failed')).'</div>'.$more; |
|
411 | + $capathtest[] = '<div>'.($capath->message != '' ? $capath->message : _('Test failed')).'</div>'.$more; |
|
412 | 412 | $capathtest[] = '</td> |
413 | 413 | </tr> |
414 | 414 | </table>'; |
@@ -434,7 +434,7 @@ discard block |
||
434 | 434 | $srefused = 0; |
435 | 435 | $cliinfo = ''; |
436 | 436 | $cliinfo .= '<li>'._('Client certificate').' <b>'.$ca->clientcertinfo->from. |
437 | - '</b>'.', '.$ca->clientcertinfo->message . |
|
437 | + '</b>'.', '.$ca->clientcertinfo->message. |
|
438 | 438 | '<br> (CA: '.$ca->clientcertinfo->issuer.')<ul>'; |
439 | 439 | foreach ($ca->certificate as $certificate) { |
440 | 440 | if ($certificate->returncode == \core\diag\RADIUSTests::RETVAL_CONNECTION_REFUSED) { |
@@ -494,7 +494,7 @@ discard block |
||
494 | 494 | } else { |
495 | 495 | $cliinfo = _('Test failed'); |
496 | 496 | $clientstest[] = "<table><tr><td class='icon_td' id='srcclient".$hostindex."_img'><img src='". |
497 | - $this->stateIcons[\core\common\Entity::L_WARN]."'></td>" . |
|
497 | + $this->stateIcons[\core\common\Entity::L_WARN]."'></td>". |
|
498 | 498 | "<td id='srcclient$hostindex'>$cliinfo</td></tr></table>"; |
499 | 499 | } |
500 | 500 | } else { |
@@ -179,15 +179,15 @@ discard block |
||
179 | 179 | <key>PayloadDescription</key> |
180 | 180 | <string>$tagline</string> |
181 | 181 | <key>PayloadDisplayName</key> |
182 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
182 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
183 | 183 | <key>PayloadIdentifier</key> |
184 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
184 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
185 | 185 | <key>PayloadOrganization</key> |
186 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
186 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
187 | 187 | <key>PayloadType</key> |
188 | 188 | <string>Configuration</string> |
189 | 189 | <key>PayloadUUID</key> |
190 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
190 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
191 | 191 | <key>PayloadVersion</key> |
192 | 192 | <integer>1</integer>"; |
193 | 193 | \core\common\Entity::outOfThePotatoes(); |
@@ -219,16 +219,16 @@ discard block |
||
219 | 219 | { |
220 | 220 | \core\common\Entity::intoThePotatoes(); |
221 | 221 | if (isset($this->attributes['support:info_file'])) { |
222 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
222 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
223 | 223 | } |
224 | 224 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
225 | 225 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
226 | 226 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
227 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username must end with @%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
227 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username must end with @%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
228 | 228 | \core\common\Entity::outOfThePotatoes(); |
229 | 229 | return $retval; |
230 | 230 | } |
231 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
231 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
232 | 232 | \core\common\Entity::outOfThePotatoes(); |
233 | 233 | return $retval; |
234 | 234 | } |
@@ -251,7 +251,7 @@ discard block |
||
251 | 251 | // also escape htmlspecialchars |
252 | 252 | // not all names and profiles have a name, so be prepared |
253 | 253 | |
254 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
254 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
255 | 255 | |
256 | 256 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
257 | 257 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -293,7 +293,7 @@ discard block |
||
293 | 293 | |
294 | 294 | file_put_contents('installer_profile', $outputXml); |
295 | 295 | |
296 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
296 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
297 | 297 | |
298 | 298 | if (!$this->sign) { |
299 | 299 | rename("installer_profile", $fileName); |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | return $fileName; |
302 | 302 | } |
303 | 303 | // still here? Then we are signing. |
304 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
304 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
305 | 305 | if ($signing === FALSE) { |
306 | 306 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
307 | 307 | } |
@@ -320,19 +320,19 @@ discard block |
||
320 | 320 | \core\common\Entity::intoThePotatoes(); |
321 | 321 | $ssidCount = count($this->attributes['internal:SSID']); |
322 | 322 | $certCount = count($this->attributes['internal:CAs'][0]); |
323 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
323 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
324 | 324 | $out .= "<p>"; |
325 | 325 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
326 | 326 | $out .= "<ul>"; |
327 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
328 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
327 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
328 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
329 | 329 | if ($certCount > 1) { |
330 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
330 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
331 | 331 | } |
332 | 332 | $out .= "</li>"; |
333 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
333 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
334 | 334 | if ($ssidCount > 1) { |
335 | - $out .= " " . sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, \config\ConfAssistant::CONSORTIUM['display_name'], $ssidCount); |
|
335 | + $out .= " ".sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, \config\ConfAssistant::CONSORTIUM['display_name'], $ssidCount); |
|
336 | 336 | } |
337 | 337 | $out .= "</li>"; |
338 | 338 | $out .= "</ul>"; |
@@ -372,7 +372,7 @@ discard block |
||
372 | 372 | <key>ServiceProviderRoamingEnabled</key> |
373 | 373 | <true/> |
374 | 374 | <key>DisplayedOperatorName</key> |
375 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . " via Passpoint</string>"; |
|
375 | + <string>" . \config\ConfAssistant::CONSORTIUM['display_name']." via Passpoint</string>"; |
|
376 | 376 | // if we don't know the realm, omit the entire DomainName key |
377 | 377 | if (isset($this->attributes['internal:realm'])) { |
378 | 378 | $retval .= "<key>DomainName</key> |
@@ -384,7 +384,7 @@ discard block |
||
384 | 384 | $retval .= " <key>RoamingConsortiumOIs</key> |
385 | 385 | <array>"; |
386 | 386 | |
387 | - $retval .= "<string>" . strtoupper($consortiumOi) . "</string>"; |
|
387 | + $retval .= "<string>".strtoupper($consortiumOi)."</string>"; |
|
388 | 388 | |
389 | 389 | $retval .= "</array>"; |
390 | 390 | // this is an undocumented value found on the net. Does it do something useful? |
@@ -421,7 +421,7 @@ discard block |
||
421 | 421 | <dict> |
422 | 422 | <key>AcceptEAPTypes</key> |
423 | 423 | <array> |
424 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
424 | + <integer>" . $eapType['OUTER']."</integer> |
|
425 | 425 | </array> |
426 | 426 | <key>EAPFASTProvisionPAC</key> |
427 | 427 | <true /> |
@@ -434,7 +434,7 @@ discard block |
||
434 | 434 | "; |
435 | 435 | if ($realm !== NULL) { |
436 | 436 | $retval .= "<key>OuterIdentity</key> |
437 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
437 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
438 | 438 | "; |
439 | 439 | } |
440 | 440 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -458,11 +458,11 @@ discard block |
||
458 | 458 | $retval .= " |
459 | 459 | </array>"; |
460 | 460 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
461 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
461 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
462 | 462 | } |
463 | 463 | $retval .= " |
464 | 464 | <key>TTLSInnerAuthentication</key> |
465 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
465 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
466 | 466 | </dict>"; |
467 | 467 | return $retval; |
468 | 468 | } |
@@ -482,9 +482,9 @@ discard block |
||
482 | 482 | // characters are still reversed, invert on use! |
483 | 483 | $buffer .= "<string>Manual</string> |
484 | 484 | <key>ProxyServer</key> |
485 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
485 | + <string>" . strrev($serverAndPort[1])."</string> |
|
486 | 486 | <key>ProxyServerPort</key> |
487 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
487 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
488 | 488 | <key>ProxyPACFallbackAllowed</key> |
489 | 489 | <false/>"; |
490 | 490 | } else { |
@@ -513,7 +513,7 @@ discard block |
||
513 | 513 | throw new Exception("SSID must be a string!"); |
514 | 514 | } |
515 | 515 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
516 | - $payloadIdentifier = "wifi." . $this->serial; |
|
516 | + $payloadIdentifier = "wifi.".$this->serial; |
|
517 | 517 | $payloadShortName = sprintf(_("SSID %s"), $escapedSSID); |
518 | 518 | $payloadName = sprintf(_("%s configuration for network name %s"), \config\ConfAssistant::CONSORTIUM['display_name'], $escapedSSID); |
519 | 519 | $encryptionTypeString = "WPA"; |
@@ -543,7 +543,7 @@ discard block |
||
543 | 543 | $payloadIdentifier = "hs20.$toBeConfigured"; |
544 | 544 | $knownOiName = array_search($toBeConfigured, \config\ConfAssistant::CONSORTIUM['interworking-consortium-oi']); |
545 | 545 | if ($knownOiName === FALSE) { // a custom RCOI as set by the IdP admin; do not use the term "eduroam" in that one! |
546 | - $knownOiName = $this->instName . " "._("Roaming Partner"); |
|
546 | + $knownOiName = $this->instName." "._("Roaming Partner"); |
|
547 | 547 | } |
548 | 548 | $payloadShortName = $knownOiName; |
549 | 549 | $payloadName = _("Passpoint roaming configuration ($knownOiName)"); |
@@ -565,11 +565,11 @@ discard block |
||
565 | 565 | <key>PayloadDisplayName</key> |
566 | 566 | <string>$payloadShortName</string> |
567 | 567 | <key>PayloadIdentifier</key> |
568 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
568 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
569 | 569 | <key>PayloadOrganization</key> |
570 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
570 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
571 | 571 | <key>PayloadType</key> |
572 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
572 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
573 | 573 | $retval .= $this->proxySettings(); |
574 | 574 | $retval .= $setupModesString; |
575 | 575 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -581,7 +581,7 @@ discard block |
||
581 | 581 | } |
582 | 582 | $retval .= " |
583 | 583 | <key>PayloadUUID</key> |
584 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
584 | + <string>" . \core\common\Entity::uuid()."</string> |
|
585 | 585 | <key>PayloadVersion</key> |
586 | 586 | <integer>1</integer> |
587 | 587 | $wifiNetworkIdentification</dict>"; |
@@ -611,15 +611,15 @@ discard block |
||
611 | 611 | <key>IsHotspot</key> |
612 | 612 | <false/> |
613 | 613 | <key>PayloadDescription</key> |
614 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
614 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
615 | 615 | <key>PayloadDisplayName</key> |
616 | - <string>" . _("Disabled WiFi network") . "</string> |
|
616 | + <string>" . _("Disabled WiFi network")."</string> |
|
617 | 617 | <key>PayloadIdentifier</key> |
618 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
618 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
619 | 619 | <key>PayloadType</key> |
620 | 620 | <string>com.apple.wifi.managed</string> |
621 | 621 | <key>PayloadUUID</key> |
622 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
622 | + <string>".\core\common\Entity::uuid()."</string> |
|
623 | 623 | <key>PayloadVersion</key> |
624 | 624 | <real>1</real>"; |
625 | 625 | $retval .= $this->proxySettings(); |
@@ -698,12 +698,12 @@ discard block |
||
698 | 698 | $mimeBlob = base64_encode($binaryBlob); |
699 | 699 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
700 | 700 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
701 | - $retArray = ["block" => "<dict>" . |
|
701 | + $retArray = ["block" => "<dict>". |
|
702 | 702 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
703 | 703 | // <key>Password</key> |
704 | 704 | // <string>" . $this->clientCert['password'] . "</string> |
705 | 705 | "<key>PayloadCertificateFileName</key> |
706 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
706 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
707 | 707 | <key>PayloadContent</key> |
708 | 708 | <data> |
709 | 709 | $mimeFormatted |
@@ -711,7 +711,7 @@ discard block |
||
711 | 711 | <key>PayloadDescription</key> |
712 | 712 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
713 | 713 | <key>PayloadDisplayName</key> |
714 | - <string>" . _("eduroam user certificate") . "</string> |
|
714 | + <string>"._("eduroam user certificate")."</string> |
|
715 | 715 | <key>PayloadIdentifier</key> |
716 | 716 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
717 | 717 | <key>PayloadType</key> |
@@ -721,7 +721,7 @@ discard block |
||
721 | 721 | <key>PayloadVersion</key> |
722 | 722 | <integer>1</integer> |
723 | 723 | </dict>", |
724 | - "UUID" => $payloadUUID,]; |
|
724 | + "UUID" => $payloadUUID, ]; |
|
725 | 725 | \core\common\Entity::outOfThePotatoes(); |
726 | 726 | return $retArray; |
727 | 727 | } |
@@ -739,7 +739,7 @@ discard block |
||
739 | 739 | } |
740 | 740 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
741 | 741 | return "<key>RemovalDate</key> |
742 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
742 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
743 | 743 | } |
744 | 744 | |
745 | 745 | /** |
@@ -761,27 +761,27 @@ discard block |
||
761 | 761 | $stream = " |
762 | 762 | <dict> |
763 | 763 | <key>PayloadCertificateFileName</key> |
764 | - <string>" . $ca['uuid'] . ".der</string> |
|
764 | + <string>" . $ca['uuid'].".der</string> |
|
765 | 765 | <key>PayloadContent</key> |
766 | 766 | <data> |
767 | -" . $trimmedPem . "</data> |
|
767 | +" . $trimmedPem."</data> |
|
768 | 768 | <key>PayloadDescription</key> |
769 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst) . "</string> |
|
769 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst)."</string> |
|
770 | 770 | <key>PayloadDisplayName</key> |
771 | 771 | <string>" . |
772 | 772 | /// example: "Identity Provider CA #1 (Root)" |
773 | - sprintf(_("%s CA #%d (%s)" ), |
|
773 | + sprintf(_("%s CA #%d (%s)"), |
|
774 | 774 | \core\common\Entity::$nomenclature_inst, |
775 | - count($this->CAsAccountedFor)+1, |
|
776 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
775 | + count($this->CAsAccountedFor) + 1, |
|
776 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
777 | 777 | "</string> |
778 | 778 | <key>PayloadIdentifier</key> |
779 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
779 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
780 | 780 | <key>PayloadOrganization</key> |
781 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
781 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
782 | 782 | <key>PayloadType</key> |
783 | 783 | <string>com.apple.security.root</string> |
784 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
784 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
785 | 785 | <key>PayloadVersion</key> |
786 | 786 | <integer>1</integer> |
787 | 787 | </dict>"; |
@@ -146,12 +146,12 @@ discard block |
||
146 | 146 | $this->marshalObject($root, $eapIdp); |
147 | 147 | $dom = dom_import_simplexml($root)->ownerDocument; |
148 | 148 | //TODO schema validation makes sense so probably should be used |
149 | - if ($dom->schemaValidate(ROOT . '/devices/xml/eap-metadata.xsd') === FALSE) { |
|
149 | + if ($dom->schemaValidate(ROOT.'/devices/xml/eap-metadata.xsd') === FALSE) { |
|
150 | 150 | throw new Exception("Schema validation failed for eap-metadata"); |
151 | 151 | } |
152 | 152 | $dom->formatOutput = true; |
153 | - file_put_contents($this->installerBasename . '.eap-config', $dom->saveXML()); |
|
154 | - return($this->installerBasename . '.eap-config'); |
|
153 | + file_put_contents($this->installerBasename.'.eap-config', $dom->saveXML()); |
|
154 | + return($this->installerBasename.'.eap-config'); |
|
155 | 155 | } |
156 | 156 | |
157 | 157 | private const ATTRIBUTENAMES = [ |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | $this->loggerInstance->debug(4, "Missing class definition for $attrName\n"); |
178 | 178 | return([]); |
179 | 179 | } |
180 | - $className = "\devices\xml\\" . self::ATTRIBUTENAMES[$attrName]; |
|
180 | + $className = "\devices\xml\\".self::ATTRIBUTENAMES[$attrName]; |
|
181 | 181 | $objs = []; |
182 | 182 | if ($this->langScope === 'global') { |
183 | 183 | foreach ($attributeList['langs'] as $language => $value) { |
@@ -215,7 +215,7 @@ discard block |
||
215 | 215 | $displayname = new DisplayName(); |
216 | 216 | if (isset($profileNameLangs)) { |
217 | 217 | $langOrC = isset($profileNameLangs[$language]) ? $profileNameLangs[$language] : $profileNameLangs['C']; |
218 | - $value .= ' - ' . $langOrC; |
|
218 | + $value .= ' - '.$langOrC; |
|
219 | 219 | } |
220 | 220 | $displayname->setValue($value); |
221 | 221 | $displayname->setAttributes(['lang' => $language]); |
@@ -225,7 +225,7 @@ discard block |
||
225 | 225 | $displayname = new DisplayName(); |
226 | 226 | $value = $attr['general:instname'][0]; |
227 | 227 | if ($attr['internal:profile_count'][0] > 1) { |
228 | - $value .= ' - ' . $attr['profile:name'][0]; |
|
228 | + $value .= ' - '.$attr['profile:name'][0]; |
|
229 | 229 | } |
230 | 230 | $displayname->setValue($value); |
231 | 231 | $objs[] = $displayname; |
@@ -242,7 +242,7 @@ discard block |
||
242 | 242 | $attr = $this->attributes; |
243 | 243 | if (isset($attr['general:logo_file'][0])) { |
244 | 244 | $logoString = base64_encode($attr['general:logo_file'][0]); |
245 | - $logoMime = 'image/' . $attr['internal:logo_file'][0]['mime']; |
|
245 | + $logoMime = 'image/'.$attr['internal:logo_file'][0]['mime']; |
|
246 | 246 | $providerlogo = new ProviderLogo(); |
247 | 247 | $providerlogo->setAttributes(['mime' => $logoMime, 'encoding' => 'base64']); |
248 | 248 | $providerlogo->setValue($logoString); |
@@ -347,7 +347,7 @@ discard block |
||
347 | 347 | |
348 | 348 | if (isset($inner["METHOD"]) && $inner["METHOD"]) { |
349 | 349 | $innerauthmethod = new InnerAuthenticationMethod(); |
350 | - $typeOfInner = "\devices\xml\\" . ($inner["EAP"] ? 'EAPMethod' : 'NonEAPAuthMethod'); |
|
350 | + $typeOfInner = "\devices\xml\\".($inner["EAP"] ? 'EAPMethod' : 'NonEAPAuthMethod'); |
|
351 | 351 | $eapmethod = new $typeOfInner(); |
352 | 352 | $eaptype = new Type(); |
353 | 353 | $eaptype->setValue(abs($inner['METHOD'])); |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $loggerInstance = new \core\common\Logging(); |
25 | 25 | |
@@ -65,13 +65,13 @@ discard block |
||
65 | 65 | $testsuite = new \core\diag\RADIUSTests($check_realm, $testedProfile->getRealmCheckOuterUsername(), $testedProfile->getEapMethodsinOrderOfPreference(1), $testedProfile->getCollapsedAttributes()['eap:server_name'], $testedProfile->getCollapsedAttributes()["eap:ca_file"]); |
66 | 66 | $rfc7585suite = new \core\diag\RFC7585Tests($check_realm); |
67 | 67 | } else { |
68 | - $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
|
68 | + $error_message = _("You asked for a realm check, but we don't know the realm for this profile!")."</p>"; |
|
69 | 69 | } |
70 | 70 | } else { // someone else's realm, and we don't know anything about it... only shallow checks |
71 | 71 | $check_realm = $validator->realm($realm ?? $_SESSION['check_realm'] ?? ""); |
72 | 72 | if ($check_realm !== FALSE) { |
73 | 73 | $_SESSION['check_realm'] = $check_realm; |
74 | - $testsuite = new \core\diag\RADIUSTests($check_realm, "@" . $check_realm); |
|
74 | + $testsuite = new \core\diag\RADIUSTests($check_realm, "@".$check_realm); |
|
75 | 75 | $rfc7585suite = new \core\diag\RFC7585Tests($check_realm); |
76 | 76 | } else { |
77 | 77 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | var listofcas = "<?php echo _("You should update your list of accredited CAs") ?>"; |
120 | 120 | var getitfrom = "<?php echo _("Get it from here.") ?>"; |
121 | 121 | var listsource = "<?php echo \config\Diagnostics::RADIUSTESTS['accreditedCAsURL'] ?>"; |
122 | - var moretext = "<?php echo _("more") . "»" ?>"; |
|
122 | + var moretext = "<?php echo _("more")."»" ?>"; |
|
123 | 123 | var lesstext = "<?php echo "«" ?>"; |
124 | 124 | var morealltext = "<?php echo _("Show detailed information for all tests") ?>"; |
125 | 125 | var unknownca_code = "<?php echo \core\diag\RADIUSTests::CERTPROB_UNKNOWN_CA ?>"; |
@@ -256,7 +256,7 @@ discard block |
||
256 | 256 | } |
257 | 257 | } |
258 | 258 | cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] + '" style="width: 24px;"></td><td>' + state; |
259 | - cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
259 | + cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
260 | 260 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
261 | 261 | if (data.ca[key].certificate[c].finalerror === 1) { |
262 | 262 | cliinfo = cliinfo + '<li>' + restskipped + '</li>'; |
@@ -425,8 +425,8 @@ discard block |
||
425 | 425 | <?php |
426 | 426 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
427 | 427 | print " |
428 | -$(\"#live_src" . $hostindex . "_img\").attr('src',icon_loading); |
|
429 | -$(\"#live_src" . $hostindex . "_img\").show(); |
|
428 | +$(\"#live_src" . $hostindex."_img\").attr('src',icon_loading); |
|
429 | +$(\"#live_src" . $hostindex."_img\").show(); |
|
430 | 430 | $.ajax({ |
431 | 431 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
432 | 432 | type: 'POST', |
@@ -456,15 +456,15 @@ discard block |
||
456 | 456 | <?php |
457 | 457 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
458 | 458 | if ($testedProfile !== NULL) { |
459 | - $extraarg = "profile_id: " . $testedProfile->identifier . ", "; |
|
459 | + $extraarg = "profile_id: ".$testedProfile->identifier.", "; |
|
460 | 460 | } else { |
461 | 461 | $extraarg = ""; |
462 | 462 | } |
463 | 463 | print " |
464 | -$(\"#src" . $hostindex . "_img\").attr('src',icon_loading); |
|
464 | +$(\"#src" . $hostindex."_img\").attr('src',icon_loading); |
|
465 | 465 | $(\"#src$hostindex\").html(''); |
466 | 466 | running_ajax_stat++; |
467 | -$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex' }, udp, 'json'); |
|
467 | +$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex' }, udp, 'json'); |
|
468 | 468 | |
469 | 469 | "; |
470 | 470 | } |
@@ -491,7 +491,7 @@ discard block |
||
491 | 491 | if ($check_realm === FALSE) { |
492 | 492 | print "<p>$error_message</p>"; |
493 | 493 | } else { |
494 | - print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
494 | + print "<h1>".sprintf(_("Realm testing for: %s"), $check_realm)."</h1>\n"; |
|
495 | 495 | ?> |
496 | 496 | <div id="debug_out" style="display: none"></div> |
497 | 497 | <div id="tabs" style="min-width: 600px; max-width:800px"> |
@@ -508,12 +508,12 @@ discard block |
||
508 | 508 | </legend> |
509 | 509 | <?php |
510 | 510 | // NAPTR existence check |
511 | - echo "<strong>" . _("DNS chekcs") . "</strong><div>"; |
|
511 | + echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
512 | 512 | $naptr = $rfc7585suite->relevantNAPTR(); |
513 | 513 | if ($naptr != \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
514 | 514 | echo "<table>"; |
515 | 515 | // output in friendly words |
516 | - echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>"; |
|
516 | + echo "<tr><td>"._("Checking NAPTR existence:")."</td><td>"; |
|
517 | 517 | switch ($naptr) { |
518 | 518 | case \core\diag\RFC7585Tests::RETVAL_NONAPTR: |
519 | 519 | echo _("This realm has no NAPTR records."); |
@@ -528,7 +528,7 @@ discard block |
||
528 | 528 | |
529 | 529 | // compliance checks for NAPTRs |
530 | 530 | if ($naptr > 0) { |
531 | - echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>"; |
|
531 | + echo "<tr><td>"._("Checking NAPTR compliance (flag = S and regex = {empty}):")."</td><td>"; |
|
532 | 532 | $naptr_valid = $rfc7585suite->relevantNAPTRcompliance(); |
533 | 533 | switch ($naptr_valid) { |
534 | 534 | case \core\diag\RADIUSTests::RETVAL_OK: |
@@ -545,7 +545,7 @@ discard block |
||
545 | 545 | |
546 | 546 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK) { |
547 | 547 | $srv = $rfc7585suite->relevantNAPTRsrvResolution(); |
548 | - echo "<tr><td>" . _("Checking SRVs:") . "</td><td>"; |
|
548 | + echo "<tr><td>"._("Checking SRVs:")."</td><td>"; |
|
549 | 549 | switch ($srv) { |
550 | 550 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
551 | 551 | echo _("This check was skipped."); |
@@ -561,7 +561,7 @@ discard block |
||
561 | 561 | // IP addresses for the hosts |
562 | 562 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK && $srv > 0) { |
563 | 563 | $hosts = $rfc7585suite->relevantNAPTRhostnameResolution(); |
564 | - echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>"; |
|
564 | + echo "<tr><td>"._("Checking IP address resolution:")."</td><td>"; |
|
565 | 565 | switch ($srv) { |
566 | 566 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
567 | 567 | echo _("This check was skipped."); |
@@ -577,12 +577,12 @@ discard block |
||
577 | 577 | |
578 | 578 | echo "</table><br/><br/>"; |
579 | 579 | if (count($testsuite->listerrors()) == 0) { |
580 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!"); |
|
580 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("with no DNS errors encountered. Congratulations!"); |
|
581 | 581 | } else { |
582 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
582 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("but there were DNS errors! Check them!")." "._("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
583 | 583 | echo "<div class='notacceptable'><table>"; |
584 | 584 | foreach ($testsuite->listerrors() as $details) { |
585 | - echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
585 | + echo "<tr><td>".$details['TYPE']."</td><td>".$details['TARGET']."</td></tr>"; |
|
586 | 586 | } |
587 | 587 | echo "</table></div>"; |
588 | 588 | } |
@@ -598,26 +598,26 @@ discard block |
||
598 | 598 | $("#dynamic_tests").show(); |
599 | 599 | '; |
600 | 600 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
601 | - $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port']; |
|
601 | + $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port']; |
|
602 | 602 | $expectedName = $addr['hostname']; |
603 | 603 | print " |
604 | 604 | running_ajax_dyn++; |
605 | - $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
605 | + $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
606 | 606 | running_ajax_dyn++; |
607 | - $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
607 | + $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
608 | 608 | "; |
609 | 609 | } |
610 | 610 | echo "} |
611 | 611 | </script><hr>"; |
612 | 612 | } else { |
613 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
613 | + echo "<tr><td>"._("Dynamic discovery test is not configured")."</td><td>"; |
|
614 | 614 | } |
615 | - echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
615 | + echo "<strong>"._("Static connectivity tests")."</strong> |
|
616 | 616 | <table><tr> |
617 | 617 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
618 | 618 | </tr></table>"; |
619 | 619 | if ($naptr > 0) { |
620 | - echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
620 | + echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
621 | 621 | <table><tr> |
622 | 622 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
623 | 623 | </tr></table>"; |
@@ -637,12 +637,12 @@ discard block |
||
637 | 637 | print "<p>"; |
638 | 638 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
639 | 639 | print "<hr>"; |
640 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
640 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
641 | 641 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
642 | 642 | <tr> |
643 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
643 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
644 | 644 | <td id='src$hostindex' colspan=2> |
645 | -" . _("testing...") . " |
|
645 | +"._("testing...")." |
|
646 | 646 | </td> |
647 | 647 | </tr> |
648 | 648 | </table>"; |
@@ -661,21 +661,21 @@ discard block |
||
661 | 661 | |
662 | 662 | <?php |
663 | 663 | echo "<div id='dynamic_tests'><fieldset class='option_container'> |
664 | - <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>"; |
|
664 | + <legend><strong>" . _("DYNAMIC connectivity tests")."</strong></legend>"; |
|
665 | 665 | |
666 | 666 | $resultstoprint = []; |
667 | 667 | if (count($rfc7585suite->NAPTR_hostname_records) > 0) { |
668 | - $resultstoprint[] = '<div style="align:right; display: none;" id="dynamic_result_fail">' . _("Some errors were found during the tests, see below") . '</div><div style="align:right; display: none;" id="dynamic_result_pass">' . _("All tests passed, congratulations!") . '</div>'; |
|
669 | - $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
|
668 | + $resultstoprint[] = '<div style="align:right; display: none;" id="dynamic_result_fail">'._("Some errors were found during the tests, see below").'</div><div style="align:right; display: none;" id="dynamic_result_pass">'._("All tests passed, congratulations!").'</div>'; |
|
669 | + $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">'._('Show detailed information for all tests').'</a></div>'.'<p><strong>'._("Checking server handshake...")."</strong><p>"; |
|
670 | 670 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
671 | - $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]); |
|
672 | - $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong>'; |
|
671 | + $bracketaddr = ($addr["family"] == "IPv6" ? "[".$addr["IP"]."]" : $addr["IP"]); |
|
672 | + $resultstoprint[] = '<p><strong>'.$bracketaddr.' TCP/'.$addr['port'].'</strong>'; |
|
673 | 673 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
674 | 674 | $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
675 | 675 | <tr> |
676 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca" . $hostindex . "_img'></td> |
|
676 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td> |
|
677 | 677 | <td id='srcca$hostindex'> |
678 | -" . _("testing...") . " |
|
678 | +"._("testing...")." |
|
679 | 679 | </td> |
680 | 680 | </tr> |
681 | 681 | </table>"; |
@@ -683,12 +683,12 @@ discard block |
||
683 | 683 | } |
684 | 684 | $clientstest = []; |
685 | 685 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
686 | - $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
|
686 | + $clientstest[] = '<p><strong>'.$addr['IP'].' TCP/'.$addr['port'].'</strong></p><ol>'; |
|
687 | 687 | $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
688 | 688 | <tr> |
689 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient" . $hostindex . "_img'></td> |
|
689 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td> |
|
690 | 690 | <td id='srcclient$hostindex'> |
691 | -" . _("testing...") . " |
|
691 | +"._("testing...")." |
|
692 | 692 | </td> |
693 | 693 | </tr> |
694 | 694 | </table></span>"; |
@@ -696,7 +696,7 @@ discard block |
||
696 | 696 | } |
697 | 697 | echo '<div style="align:right;">'; |
698 | 698 | echo join('', $resultstoprint); |
699 | - echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
699 | + echo '<span id="clientstest" style="display: none;"><p><hr><b>'._('Checking if certificates from CAs are accepted...').'</b><p>'._('A few client certificates will be tested to check if servers are resistant to some certificate problems.').'<p>'; |
|
700 | 700 | print join('', $clientstest); |
701 | 701 | echo '</span>'; |
702 | 702 | echo '</div>'; |
@@ -710,7 +710,7 @@ discard block |
||
710 | 710 | // check if truncates/dies on Operator-Name |
711 | 711 | if ($my_profile !== NULL) { |
712 | 712 | echo "<div id='tabs-4'><fieldset class='option_container'> |
713 | - <legend><strong>" . _("Live login test") . "</strong></legend>"; |
|
713 | + <legend><strong>" . _("Live login test")."</strong></legend>"; |
|
714 | 714 | $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1); |
715 | 715 | if (count($prof_compl) > 0) { |
716 | 716 | $passwordReqired = FALSE; |
@@ -723,34 +723,34 @@ discard block |
||
723 | 723 | $clientCertRequired = TRUE; |
724 | 724 | } |
725 | 725 | } |
726 | - echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p> |
|
727 | - <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.") . "</p> |
|
728 | - <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
|
726 | + echo "<div id='disposable_credential_container'><p>"._("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.")."</p> |
|
727 | + <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.")."</p> |
|
728 | + <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!")."</p></div> |
|
729 | 729 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
730 | 730 | <input type='hidden' name='test_type' value='udp_login'> |
731 | - <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang() . "'> |
|
732 | - <input type='hidden' name='profile_id' value='" . $my_profile->identifier . "'> |
|
731 | + <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang()."'> |
|
732 | + <input type='hidden' name='profile_id' value='" . $my_profile->identifier."'> |
|
733 | 733 | <table id='live_tests'>"; |
734 | 734 | // if any password based EAP methods are available enable this section |
735 | 735 | if ($passwordReqired) { |
736 | - echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr> |
|
737 | - <tr><td>" . _("Real (inner) username:") . "</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
738 | - echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
739 | - echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
736 | + echo "<tr><td colspan='2'><strong>"._("Password-based EAP types")."</strong></td></tr> |
|
737 | + <tr><td>" . _("Real (inner) username:")."</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
738 | + echo "<tr><td>"._("Anonymous outer ID (optional):")."</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
739 | + echo "<tr><td>"._("Password:")."</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
740 | 740 | } |
741 | 741 | // ask for cert + privkey if TLS-based method is active |
742 | 742 | if ($clientCertRequired) { |
743 | - echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
744 | - <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
745 | - <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
746 | - <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
743 | + echo "<tr><td colspan='2'><strong>"._("Certificate-based EAP types")."</strong></td></tr> |
|
744 | + <tr><td>" . _("Certificate file (.p12 or .pfx):")."</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
745 | + <tr><td>" . _("Certificate password, if any:")."</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
746 | + <tr><td>" . _("Username, if different from certificate Subject:")."</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
747 | 747 | } |
748 | - echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
|
748 | + echo "<tr><td colspan='2'><button id='submit_credentials'>"._("Submit credentials")."</button></td></tr></table></form>"; |
|
749 | 749 | echo "<div id='live_login_results' style='display:none'>"; |
750 | 750 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
751 | 751 | print "<hr>"; |
752 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
753 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
752 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
753 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
754 | 754 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
755 | 755 | } |
756 | 756 | echo "</div>"; |
@@ -765,9 +765,9 @@ discard block |
||
765 | 765 | } |
766 | 766 | |
767 | 767 | if (isset($_POST['comefrom'])) { |
768 | - $return = htmlspecialchars_decode($_POST['comefrom']) . ( $inst_id ? "?inst_id=" . $inst_id : "" ); |
|
768 | + $return = htmlspecialchars_decode($_POST['comefrom']).($inst_id ? "?inst_id=".$inst_id : ""); |
|
769 | 769 | echo "<form method='post' action='$return' accept-charset='UTF-8'> |
770 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CLOSE . "'>" . sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_inst) . "</button>" |
|
770 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CLOSE."'>".sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_inst)."</button>" |
|
771 | 771 | . "</form>"; |
772 | 772 | } |
773 | 773 | if ($check_realm !== FALSE) { |
@@ -6,9 +6,9 @@ |
||
6 | 6 | function cat_socket($obj) { |
7 | 7 | $sock = socket_create(AF_UNIX, SOCK_STREAM, 0); |
8 | 8 | $conn = socket_connect($sock, SOCKET); |
9 | - if ( $conn ) { |
|
10 | - socket_write ($sock, $obj, strlen($obj)); |
|
11 | - $out = socket_read ($sock, 2048); |
|
9 | + if ($conn) { |
|
10 | + socket_write($sock, $obj, strlen($obj)); |
|
11 | + $out = socket_read($sock, 2048); |
|
12 | 12 | return $out; |
13 | 13 | } |
14 | 14 | return 'FAILURE'; |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $auth = new \web\lib\admin\Authentication(); |
25 | 25 | $loggerInstance = new \core\common\Logging(); |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | $remaining_attribs = $my_profile->beginFlushMethodLevelAttributes($eaptype->getIntegerRep(), NULL); |
86 | 86 | $optionParser->processSubmittedFields($my_profile, $_POST, $_FILES, $eaptype->getIntegerRep(), NULL); |
87 | 87 | } |
88 | - $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile " . $my_profile->identifier . " - device/EAP-Type settings changed"); |
|
88 | + $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile ".$my_profile->identifier." - device/EAP-Type settings changed"); |
|
89 | 89 | header("Location: ../overview_installers.php?inst_id=$my_inst->identifier&profile_id=$my_profile->identifier"); |
90 | 90 | exit; |
91 | 91 | } |
@@ -99,7 +99,7 @@ discard block |
||
99 | 99 | } |
100 | 100 | $captiontext = sprintf(_("device <strong>%s</strong>"), $device['display']); |
101 | 101 | $keyword = "device-specific"; |
102 | - $extrainput = "<input type='hidden' name='device' value='" . $device_key . "'/>"; |
|
102 | + $extrainput = "<input type='hidden' name='device' value='".$device_key."'/>"; |
|
103 | 103 | } elseif ($eaptype !== NULL) { |
104 | 104 | foreach ($my_profile->getAttributes() as $attrib) { |
105 | 105 | if (isset($attrib['eapmethod']) && $attrib['eapmethod'] == $eaptype->getArrayRep()) { |
@@ -109,12 +109,12 @@ discard block |
||
109 | 109 | |
110 | 110 | $captiontext = sprintf(_("EAP-Type <strong>%s</strong>"), $eaptype->getPrintableRep()); |
111 | 111 | $keyword = "eap-specific"; |
112 | - $extrainput = "<input type='hidden' name='eaptype' value='" . $eaptype->getIntegerRep() . "'>"; |
|
112 | + $extrainput = "<input type='hidden' name='eaptype' value='".$eaptype->getIntegerRep()."'>"; |
|
113 | 113 | } else { |
114 | 114 | throw new Exception("previous type checks make it impossible to reach this code path."); |
115 | 115 | } |
116 | 116 | ?> |
117 | -<p><?php echo _("Fine-tuning options for ") . $captiontext; ?></p> |
|
117 | +<p><?php echo _("Fine-tuning options for ").$captiontext; ?></p> |
|
118 | 118 | <hr/> |
119 | 119 | |
120 | 120 | <form action='inc/toggleRedirect.inc.php?inst_id=<?php echo $my_inst->identifier; ?>&profile_id=<?php echo $my_profile->identifier; ?>' method='post' accept-charset='UTF-8'><?php echo $extrainput; ?> |
@@ -123,7 +123,7 @@ discard block |
||
123 | 123 | $interesting_attribs = []; |
124 | 124 | |
125 | 125 | foreach ($attribs as $attrib) { |
126 | - if ($attrib['level'] == \core\Options::LEVEL_METHOD && preg_match('/^' . $keyword . ':/', $attrib['name'])) { |
|
126 | + if ($attrib['level'] == \core\Options::LEVEL_METHOD && preg_match('/^'.$keyword.':/', $attrib['name'])) { |
|
127 | 127 | $interesting_attribs[] = $attrib; |
128 | 128 | } |
129 | 129 | } |