@@ -27,7 +27,7 @@ discard block |
||
27 | 27 | */ |
28 | 28 | function my_nonce($optSalt = '') { |
29 | 29 | $remote = filter_input(INPUT_SERVER, 'REMOTE_ADDR'); |
30 | - return hash_hmac('sha256', session_id() . $optSalt, date("YmdG") . '1qaz2wsx3edc!QAZ@WSX#EDC' . $remote); |
|
30 | + return hash_hmac('sha256', session_id().$optSalt, date("YmdG").'1qaz2wsx3edc!QAZ@WSX#EDC'.$remote); |
|
31 | 31 | } |
32 | 32 | error_reporting(E_ALL | E_STRICT); |
33 | 33 | $Gui->defaultPagePrelude(); |
@@ -51,16 +51,16 @@ discard block |
||
51 | 51 | <?php |
52 | 52 | $admin = filter_input(INPUT_GET, 'admin', FILTER_VALIDATE_INT); |
53 | 53 | $profile_list_size = 1; |
54 | -require_once dirname(__DIR__) . '/Divs.php'; |
|
54 | +require_once dirname(__DIR__).'/Divs.php'; |
|
55 | 55 | $divs = new Divs($Gui); |
56 | 56 | $visibility = 'index'; |
57 | 57 | $operatingSystem = $Gui->detectOS(); |
58 | 58 | $Gui->loggerInstance->debug(4, $operatingSystem); |
59 | 59 | $uiElements = new web\lib\admin\UIElements(); |
60 | 60 | if ($operatingSystem) { |
61 | - print "recognisedOS = '" . $operatingSystem['device'] . "';\n"; |
|
61 | + print "recognisedOS = '".$operatingSystem['device']."';\n"; |
|
62 | 62 | } |
63 | -require dirname(__DIR__) . '/user/js/cat_js.php'; |
|
63 | +require dirname(__DIR__).'/user/js/cat_js.php'; |
|
64 | 64 | ?> |
65 | 65 | |
66 | 66 | </script> |
@@ -93,9 +93,9 @@ discard block |
||
93 | 93 | <?php echo $divs->div_pagetitle(_("Diagnostics site"), ""); ?> |
94 | 94 | <div id="user_info" style='padding-top: 10px;'> |
95 | 95 | <div id='diagnostic_choice'> |
96 | - <?php echo _("The diagnostics system will do its best to identify and resolve your problems!") . ' ' . _("Please help the system by answering the questions as precisely as possible.") . "<br/>" . _("Are you a") . ' '; ?> |
|
97 | - <input type='radio' name='diagnostic_usertype' value='0'><?php echo _("end-user") . ' ' . _("or"); ?> |
|
98 | - <input type='radio' name='diagnostic_usertype' value='1' <?php if ($admin == 1) { echo " checked"; } ?> > <?php echo _("eduroam administrator") .'?'; ?> |
|
96 | + <?php echo _("The diagnostics system will do its best to identify and resolve your problems!").' '._("Please help the system by answering the questions as precisely as possible.")."<br/>"._("Are you a").' '; ?> |
|
97 | + <input type='radio' name='diagnostic_usertype' value='0'><?php echo _("end-user").' '._("or"); ?> |
|
98 | + <input type='radio' name='diagnostic_usertype' value='1' <?php if ($admin == 1) { echo " checked"; } ?> > <?php echo _("eduroam administrator").'?'; ?> |
|
99 | 99 | </div> |
100 | 100 | <div id='diagnostic_enduser' style='display: none;'> |
101 | 101 | <h2><?php echo _("Tools for End Users"); ?></h2> |
@@ -105,24 +105,24 @@ discard block |
||
105 | 105 | ?> |
106 | 106 | </p> |
107 | 107 | <?php |
108 | - echo '<div id="before_stage_1"><h3>' . _("The system needs some information on your home institution - issuer of your account") . '</h3>'; |
|
108 | + echo '<div id="before_stage_1"><h3>'._("The system needs some information on your home institution - issuer of your account").'</h3>'; |
|
109 | 109 | echo _("What is the realm part of your user account (the part behind the @ of 'your.username@<b>realm.tld</b>):"); |
110 | 110 | ?> |
111 | 111 | <input type='text' name='user_realm' id='user_realm' value=''> |
112 | 112 | <?php |
113 | - echo '<div id="realm_by_select"><br/>' . _("alternatively") . '<br/>'; |
|
114 | - echo _("You can select your home institution from the following list") . '<br/>'; |
|
113 | + echo '<div id="realm_by_select"><br/>'._("alternatively").'<br/>'; |
|
114 | + echo _("You can select your home institution from the following list").'<br/>'; |
|
115 | 115 | echo '<div id="select_idp_country"><a href="" id="idp_countries_list">'; |
116 | - echo '<span id="realmselect">' . _("Click to select your country/region and organisation") . '</span></a></div>'; |
|
116 | + echo '<span id="realmselect">'._("Click to select your country/region and organisation").'</span></a></div>'; |
|
117 | 117 | ?> |
118 | 118 | <div id="select_idp_area" style="display:none;"> |
119 | 119 | </div> |
120 | 120 | </div> |
121 | 121 | <div id="position_info"> |
122 | 122 | <?php |
123 | - echo '<h3>' . _("Optionally, to improve tests, you can provide information on your current location") . '</h3>'; |
|
123 | + echo '<h3>'._("Optionally, to improve tests, you can provide information on your current location").'</h3>'; |
|
124 | 124 | echo '<div id="select_sp_country"><a href="" id="sp_countries_list">'; |
125 | - echo '<span id="spselect">' . _("Click to select a location in which you have an eduroam problem") . '</span></a></div>'; |
|
125 | + echo '<span id="spselect">'._("Click to select a location in which you have an eduroam problem").'</span></a></div>'; |
|
126 | 126 | ?> |
127 | 127 | <div id="select_sp_area" style="display:none;"> |
128 | 128 | </div> |
@@ -155,9 +155,9 @@ discard block |
||
155 | 155 | echo 'none'; |
156 | 156 | } |
157 | 157 | echo ";'>"; |
158 | - echo '<h3>' . _("Which problem are you reporting?") . '</h3>'; |
|
158 | + echo '<h3>'._("Which problem are you reporting?").'</h3>'; |
|
159 | 159 | echo '<input type="radio" name="problem_type" value="1">'; |
160 | - echo _("SP contacting IdP due to technical problems or abuse") . '<br>'; |
|
160 | + echo _("SP contacting IdP due to technical problems or abuse").'<br>'; |
|
161 | 161 | echo '<input type="radio" name="problem_type" value="2">'; |
162 | 162 | echo _("IdP contacting SP due to technical problems"); |
163 | 163 | echo "<div id='idp_contact_area'></div>"; |
@@ -166,9 +166,9 @@ discard block |
||
166 | 166 | echo "</div>"; |
167 | 167 | } else { |
168 | 168 | echo "0\">"; |
169 | - echo _("This service is for authenticated admins only.") . '<br>'; |
|
170 | - echo "<a href=\"diag.php?admin=1\">" . |
|
171 | - _("eduroam® admin access is needed") . "</a>"; |
|
169 | + echo _("This service is for authenticated admins only.").'<br>'; |
|
170 | + echo "<a href=\"diag.php?admin=1\">". |
|
171 | + _("eduroam® admin access is needed")."</a>"; |
|
172 | 172 | } |
173 | 173 | ?> |
174 | 174 | </div> |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | if (type === 'idp' || type === 'sp') { |
193 | 193 | shtml = '<table><tbody><tr id="row_'+type+'_country"></tr>'; |
194 | 194 | shtml = shtml + '<tr id="row_'+type+'_institution" style="visibility: collapse;">'; |
195 | - shtml = shtml + '<td>' + <?php echo '"' . _("Select institiution:") . '"'; ?> + '</td><td></td></tr>'; |
|
195 | + shtml = shtml + '<td>' + <?php echo '"'._("Select institiution:").'"'; ?> + '</td><td></td></tr>'; |
|
196 | 196 | if (type === 'idp') { |
197 | 197 | shtml = shtml + '<tr id="row_idp_realm"></tr>'; |
198 | 198 | } |
@@ -218,7 +218,7 @@ discard block |
||
218 | 218 | var options = ''; |
219 | 219 | var selecthead = ''; |
220 | 220 | if (type1 === 'sp' || type1 === 'idp') { |
221 | - selecthead = <?php echo '"<td>' . _("Select country or region:") . ' </td>"'; ?>; |
|
221 | + selecthead = <?php echo '"<td>'._("Select country or region:").' </td>"'; ?>; |
|
222 | 222 | selecthead = selecthead + '<td>\n'; |
223 | 223 | } |
224 | 224 | var select = '<select id="' + type1 + '_country" name="' + type1 + '_country" style="margin-left:0px; width:400px;">'; |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | options = ($('#'+type2+'_country').html()); |
227 | 227 | countryAddSelect(selecthead, select + options + '</select>', type1); |
228 | 228 | } else { |
229 | - var comment = <?php echo '"<br><br>' . _("Fetching country/region list") . '..."'; ?>; |
|
229 | + var comment = <?php echo '"<br><br>'._("Fetching country/region list").'..."'; ?>; |
|
230 | 230 | inProgress(1, comment); |
231 | 231 | $.ajax({ |
232 | 232 | url: "findRealm.php", |
@@ -260,7 +260,7 @@ discard block |
||
260 | 260 | return false; |
261 | 261 | } |
262 | 262 | function testSociopath(realm, answer) { |
263 | - var comment = <?php echo '"' . _("Testing realm") . '..."'; ?>; |
|
263 | + var comment = <?php echo '"'._("Testing realm").'..."'; ?>; |
|
264 | 264 | inProgress(1, comment); |
265 | 265 | if ($('#tested_realm').length == 0) { |
266 | 266 | $('<input>').attr({ |
@@ -285,9 +285,9 @@ discard block |
||
285 | 285 | query = '<input type="hidden" id="tested_realm" value="' + realm + '">'; |
286 | 286 | } |
287 | 287 | query = query + '<div id="current_query">'+data['TEXT']+'</div>'; |
288 | - query = query + '<div><button id="answer_yes">' + <?php echo '"' . _("Yes") . '"'; ?> + '</button>'; |
|
289 | - query = query + '<button style="margin-left:20px;" id="answer_no">' + <?php echo '"' . _("No") . '"'; ?> + '</button>'; |
|
290 | - query = query + '<button style="margin-left:20px;" id="answer_noidea">' + <?php echo '"' . _("I don't know") . '"'; ?> + '</button></div>'; |
|
288 | + query = query + '<div><button id="answer_yes">' + <?php echo '"'._("Yes").'"'; ?> + '</button>'; |
|
289 | + query = query + '<button style="margin-left:20px;" id="answer_no">' + <?php echo '"'._("No").'"'; ?> + '</button>'; |
|
290 | + query = query + '<button style="margin-left:20px;" id="answer_noidea">' + <?php echo '"'._("I don't know").'"'; ?> + '</button></div>'; |
|
291 | 291 | $('#sociopath_queries').html(query); |
292 | 292 | $('#sociopath_query_area').show(); |
293 | 293 | } |
@@ -318,55 +318,55 @@ discard block |
||
318 | 318 | }); |
319 | 319 | } |
320 | 320 | function finalVerdict(realm, verdict) { |
321 | - var title = <?php echo '"' . _("Diagnostic tests results for selected realm") . '"'; ?>; |
|
321 | + var title = <?php echo '"'._("Diagnostic tests results for selected realm").'"'; ?>; |
|
322 | 322 | result = '<div class="padding">'; |
323 | 323 | result = result + '<div><h3>'; |
324 | - result = result + <?php echo '"' . _("The result for tested realm:") . ' "'; ?> + realm; |
|
324 | + result = result + <?php echo '"'._("The result for tested realm:").' "'; ?> + realm; |
|
325 | 325 | result = result + '</h3></p><div style="padding: 5px;"><div style="padding: 0px;">'; |
326 | - result = result + <?php echo '"' . _("The system identified") . '" '; ?> + ' '; |
|
326 | + result = result + <?php echo '"'._("The system identified").'" '; ?> + ' '; |
|
327 | 327 | result = result + Object.keys(verdict).length + ' '; |
328 | - result = result + <?php echo '"' . _("suspected areas which potentially can cause a problem.") . '"'; ?> + '<br>'; |
|
329 | - result = result + <?php echo '"' . _("Next to the problem description we show a speculated probability of this event.") . '"'; ?>; |
|
328 | + result = result + <?php echo '"'._("suspected areas which potentially can cause a problem.").'"'; ?> + '<br>'; |
|
329 | + result = result + <?php echo '"'._("Next to the problem description we show a speculated probability of this event.").'"'; ?>; |
|
330 | 330 | result = result + '</div><div style="padding: 5px;"><table>'; |
331 | 331 | k = 1; |
332 | 332 | for (key in verdict) { |
333 | 333 | result = result + '<tr><td>' + k + '.</td>'; |
334 | 334 | k = k + 1; |
335 | 335 | if (key === 'INFRA_DEVICE') { |
336 | - result = result + '<td>' + <?php echo '"' . _("Your device configuration is broken") . '"'; ?> + '</td>'; |
|
336 | + result = result + '<td>' + <?php echo '"'._("Your device configuration is broken").'"'; ?> + '</td>'; |
|
337 | 337 | } |
338 | 338 | if (key === 'INFRA_SP_80211') { |
339 | - result = result + '<td>' + <?php echo '"' . _("The Wi-Fi network in your vicinity has quality issues") . '"'; ?> + '</td>'; |
|
339 | + result = result + '<td>' + <?php echo '"'._("The Wi-Fi network in your vicinity has quality issues").'"'; ?> + '</td>'; |
|
340 | 340 | } |
341 | 341 | if (key === 'INFRA_SP_LAN') { |
342 | - result = result + '<td>' + <?php echo '"' . _("The network environment around you is broken") . '"'; ?> + '</td>'; |
|
342 | + result = result + '<td>' + <?php echo '"'._("The network environment around you is broken").'"'; ?> + '</td>'; |
|
343 | 343 | } |
344 | 344 | if (key === 'INFRA_SP_RADIUS') { |
345 | - result = result + '<td>' + <?php echo '"' . _("The RADIUS server of your service provider is the source of the problem") . '"'; ?> + '</td>'; |
|
345 | + result = result + '<td>' + <?php echo '"'._("The RADIUS server of your service provider is the source of the problem").'"'; ?> + '</td>'; |
|
346 | 346 | } |
347 | 347 | if (key === 'INFRA_IDP_AUTHBACKEND') { |
348 | - result = result + '<td>' + <?php echo '"' . _("The RADIUS server in your home institution is currently unable to authenticate you") . '"'; ?> + '</td>'; |
|
348 | + result = result + '<td>' + <?php echo '"'._("The RADIUS server in your home institution is currently unable to authenticate you").'"'; ?> + '</td>'; |
|
349 | 349 | } |
350 | 350 | if (key === 'INFRA_NRO_SP') { |
351 | - result = result + '<td>' + <?php echo '"' . _("The national server in the country/region you are visiting is not functioning correctly") . '"'; ?> + '</td>'; |
|
351 | + result = result + '<td>' + <?php echo '"'._("The national server in the country/region you are visiting is not functioning correctly").'"'; ?> + '</td>'; |
|
352 | 352 | } |
353 | 353 | if (key === 'INFRA_LINK_ETLR_NRO_SP') { |
354 | - result = result + '<td>' + <?php echo '"' . _("The link between the national server of the country/region you are visiting and the top-level server is broken") . '"'; ?> + '</td>'; |
|
354 | + result = result + '<td>' + <?php echo '"'._("The link between the national server of the country/region you are visiting and the top-level server is broken").'"'; ?> + '</td>'; |
|
355 | 355 | } |
356 | 356 | if (key === 'INFRA_LINK_ETLR_NRO_IdP') { |
357 | - result = result + '<td>' + <?php echo '"' . _("The link between the national server of your home country/region and the top-level server is broken") . '"'; ?> + '</td>'; |
|
357 | + result = result + '<td>' + <?php echo '"'._("The link between the national server of your home country/region and the top-level server is broken").'"'; ?> + '</td>'; |
|
358 | 358 | } |
359 | 359 | if (key === 'INFRA_ETLR') { |
360 | - result = result + '<td>' + <?php echo '"' . _("The communication to the top-level server is down") . '"'; ?> + '</td>'; |
|
360 | + result = result + '<td>' + <?php echo '"'._("The communication to the top-level server is down").'"'; ?> + '</td>'; |
|
361 | 361 | } |
362 | 362 | if (key === 'INFRA_NRO_IdP') { |
363 | - result = result + '<td>' + <?php echo '"' . _("The national server in your home country/region is not functioning properly.") . '"'; ?> + '</td>'; |
|
363 | + result = result + '<td>' + <?php echo '"'._("The national server in your home country/region is not functioning properly.").'"'; ?> + '</td>'; |
|
364 | 364 | } |
365 | 365 | if (key === 'INFRA_IdP_RADIUS') { |
366 | - result = result + '<td>' + <?php echo '"' . _("The RADIUS server of your home institution is the source of the problem") . '"'; ?> + '</td>'; |
|
366 | + result = result + '<td>' + <?php echo '"'._("The RADIUS server of your home institution is the source of the problem").'"'; ?> + '</td>'; |
|
367 | 367 | } |
368 | 368 | if (key === 'INFRA_NONEXISTENTREALM') { |
369 | - result = result + '<td>' + <?php echo '"' . _("This realm does not exist") . '"'; ?> + '</td>'; |
|
369 | + result = result + '<td>' + <?php echo '"'._("This realm does not exist").'"'; ?> + '</td>'; |
|
370 | 370 | } |
371 | 371 | result = result + '<td style="padding-left: 5px;">' + (verdict[key] * 100).toFixed(2) + "%</td></tr>"; |
372 | 372 | } |
@@ -478,7 +478,7 @@ discard block |
||
478 | 478 | return false; |
479 | 479 | }); |
480 | 480 | $(document).on('change', '#idp_country, #sp_country, #asp_country' , function() { |
481 | - var comment = <?php echo '"' . _("Fetching institutions list") . '..."'; ?>; |
|
481 | + var comment = <?php echo '"'._("Fetching institutions list").'..."'; ?>; |
|
482 | 482 | var id = $(this).attr('id'); |
483 | 483 | var k = id.indexOf('_'); |
484 | 484 | var type = id.substr(0,k); |
@@ -496,7 +496,7 @@ discard block |
||
496 | 496 | var shtml = ''; |
497 | 497 | var select = ''; |
498 | 498 | if (type !== 'asp') { |
499 | - shtml = <?php echo '"<td>' . _("Select institution:") . '</td><td>"'; ?>; |
|
499 | + shtml = <?php echo '"<td>'._("Select institution:").'</td><td>"'; ?>; |
|
500 | 500 | } |
501 | 501 | select = '<select id="' + type + '_inst" name="' + type + '_inst" style="margin-left:0px; width:400px;"><option value=""></option>'; |
502 | 502 | for (var i in institutions) { |
@@ -536,7 +536,7 @@ discard block |
||
536 | 536 | $('#start_test_area').hide(); |
537 | 537 | return false; |
538 | 538 | } |
539 | - var comment = <?php echo '"' . _("Fetching realms list") . '..."'; ?>; |
|
539 | + var comment = <?php echo '"'._("Fetching realms list").'..."'; ?>; |
|
540 | 540 | inProgress(1, comment); |
541 | 541 | $.ajax({ |
542 | 542 | url: "findRealm.php", |
@@ -548,7 +548,7 @@ discard block |
||
548 | 548 | var realms = data.realms; |
549 | 549 | var realmselect = ''; |
550 | 550 | if (realms.length > 1) { |
551 | - realmselect = <?php echo '"<td>' . _("Check realm(s):") . '</td>"'; ?>; |
|
551 | + realmselect = <?php echo '"<td>'._("Check realm(s):").'</td>"'; ?>; |
|
552 | 552 | realmselect = realmselect + '<td>' + "<span style='margin-left: 10px'>"; |
553 | 553 | for (var i in realms) { |
554 | 554 | realmselect = realmselect + '<input type="radio" name="realm" '; |
@@ -560,7 +560,7 @@ discard block |
||
560 | 560 | } |
561 | 561 | realmselect = realmselect + '</span></td>'; |
562 | 562 | } else { |
563 | - realmselect = <?php echo '"<td>' . _("Realm:") . '</td>"'; ?>; |
|
563 | + realmselect = <?php echo '"<td>'._("Realm:").'</td>"'; ?>; |
|
564 | 564 | realmselect = realmselect + '<td>' + "<span style='margin-left: 10px'>"; |
565 | 565 | realmselect = realmselect + realms[0] + '</span>'; |
566 | 566 | realmselect = realmselect + '<input type="hidden" name="realm" value="' + realms[0] + '">'; |
@@ -615,7 +615,7 @@ discard block |
||
615 | 615 | }); |
616 | 616 | t = 1; |
617 | 617 | } |
618 | - var comment = <?php echo '"' . _("Running realm tests") . '..."'; ?>; |
|
618 | + var comment = <?php echo '"'._("Running realm tests").'..."'; ?>; |
|
619 | 619 | inProgress(1, comment); |
620 | 620 | /*waiting(comment);*/ |
621 | 621 | $.ajax({ |
@@ -659,7 +659,7 @@ discard block |
||
659 | 659 | } |
660 | 660 | }); |
661 | 661 | $('#sp_questions > tbody').append('<tr class="error_row"><td>' + |
662 | - <?php echo '"' . _("Realm is not registered with the eduroam database:") . '"'; ?> + |
|
662 | + <?php echo '"'._("Realm is not registered with the eduroam database:").'"'; ?> + |
|
663 | 663 | '</td><td>' + realm + '</td></tr>'); |
664 | 664 | $('#admin_realm').val(''); |
665 | 665 | } |
@@ -683,7 +683,7 @@ discard block |
||
683 | 683 | testSociopath('', answer); |
684 | 684 | }); |
685 | 685 | $('#realmtest').click(function(event){ |
686 | - var comment = <?php echo '"<br><br>' . _("Running realm tests") . '..."'; ?>; |
|
686 | + var comment = <?php echo '"<br><br>'._("Running realm tests").'..."'; ?>; |
|
687 | 687 | inProgress(1, comment); |
688 | 688 | $('#start_test_area').hide(); |
689 | 689 | if ($('#select_sp_area').is(':hidden')) { |
@@ -727,13 +727,13 @@ discard block |
||
727 | 727 | reset_footer(); |
728 | 728 | testSociopath(realm, 0); |
729 | 729 | } else { |
730 | - var title = <?php echo '"' . _("Diagnostics results for selected realms") . '"'; ?>; |
|
731 | - result = '<div class="padding"><h3>' + <?php echo '"' . _("An unknown problem occured") . '"'; ?>; |
|
730 | + var title = <?php echo '"'._("Diagnostics results for selected realms").'"'; ?>; |
|
731 | + result = '<div class="padding"><h3>' + <?php echo '"'._("An unknown problem occured").'"'; ?>; |
|
732 | 732 | result = result + '</h3>' |
733 | 733 | if (r.length == 1) { |
734 | - result = result + <?php echo '"' . _("This test includes checking of the following realm") . '"'; ?>; |
|
734 | + result = result + <?php echo '"'._("This test includes checking of the following realm").'"'; ?>; |
|
735 | 735 | } else { |
736 | - result = result + <?php echo '"' . _("This test includes checking of the following realms") . '"'; ?>; |
|
736 | + result = result + <?php echo '"'._("This test includes checking of the following realms").'"'; ?>; |
|
737 | 737 | } |
738 | 738 | result = result + ': ' |
739 | 739 | for (var i=0; i < r.length; i++) { |
@@ -743,7 +743,7 @@ discard block |
||
743 | 743 | result = result + r[i]; |
744 | 744 | } |
745 | 745 | result = result + '.<br>'; |
746 | - result = result + <?php echo '"' . _("You should report this to") . '"'; ?> + ' <a href="mailto:[email protected]">[email protected]</a>'; |
|
746 | + result = result + <?php echo '"'._("You should report this to").'"'; ?> + ' <a href="mailto:[email protected]">[email protected]</a>'; |
|
747 | 747 | result = result + '</div>'; |
748 | 748 | $('#after_stage_1').hide(); |
749 | 749 | $('#before_stage_1').show(); |
@@ -796,7 +796,7 @@ discard block |
||
796 | 796 | }); |
797 | 797 | }); |
798 | 798 | }); |
799 | - var comment = <?php echo '"' . _("Running realm tests") . '..."'; ?>; |
|
799 | + var comment = <?php echo '"'._("Running realm tests").'..."'; ?>; |
|
800 | 800 | inProgress(1, comment); |
801 | 801 | $.ajax({ |
802 | 802 | url: "findRealm.php", |
@@ -867,29 +867,29 @@ discard block |
||
867 | 867 | success:function(data) { |
868 | 868 | if (data.status === 1) { |
869 | 869 | var result = ''; |
870 | - var title = <?php echo '"' . _("eduroam admin report submission") . '"'; ?>; |
|
870 | + var title = <?php echo '"'._("eduroam admin report submission").'"'; ?>; |
|
871 | 871 | result = '<div class="padding">'; |
872 | 872 | if (type == 'idp_send') { |
873 | - result = result + '<h3>'+ <?php echo '"' . _("SP contacting IdP due to technical problems or abuse") . '"'; ?> + '</h3>'; |
|
873 | + result = result + '<h3>'+ <?php echo '"'._("SP contacting IdP due to technical problems or abuse").'"'; ?> + '</h3>'; |
|
874 | 874 | result = result + '<table>'; |
875 | - result = result + '<tr><td>' + <?php echo '"' . _("Reason") . '"'; ?> + '</td><td>' + data.reason + '</td></tr>'; |
|
876 | - result = result + '<tr><td>' + <?php echo '"' . _("SP email") . '"'; ?> + '</td><td>' + data.email + '</td></tr>'; |
|
877 | - result = result + '<tr><td>' + <?php echo '"' . _("IdP email(s)") . '"'; ?> + '</td><td>' + data.idpcontact + '</td></tr>'; |
|
878 | - result = result + '<tr><td>' + <?php echo '"' . _("Event's timestamp") . '"'; ?> + '</td><td>' + data.timestamp + '</td></tr>'; |
|
879 | - result = result + '<tr><td>' + <?php echo '"' . _("Calling-Station-Id") . '"'; ?> + '</td><td>' + data.mac + '</td></tr>'; |
|
880 | - result = result + '<tr><td>' + <?php echo '"' . _("Additional description") . '"'; ?> +'</td><td>' + data.freetext + '</td></tr>'; |
|
875 | + result = result + '<tr><td>' + <?php echo '"'._("Reason").'"'; ?> + '</td><td>' + data.reason + '</td></tr>'; |
|
876 | + result = result + '<tr><td>' + <?php echo '"'._("SP email").'"'; ?> + '</td><td>' + data.email + '</td></tr>'; |
|
877 | + result = result + '<tr><td>' + <?php echo '"'._("IdP email(s)").'"'; ?> + '</td><td>' + data.idpcontact + '</td></tr>'; |
|
878 | + result = result + '<tr><td>' + <?php echo '"'._("Event's timestamp").'"'; ?> + '</td><td>' + data.timestamp + '</td></tr>'; |
|
879 | + result = result + '<tr><td>' + <?php echo '"'._("Calling-Station-Id").'"'; ?> + '</td><td>' + data.mac + '</td></tr>'; |
|
880 | + result = result + '<tr><td>' + <?php echo '"'._("Additional description").'"'; ?> +'</td><td>' + data.freetext + '</td></tr>'; |
|
881 | 881 | } |
882 | 882 | if (type == 'sp_send') { |
883 | - result = result + '<h3>'+ <?php echo '"' . _("IdP contacting SP due to technical problems or abuse") . '"'; ?> + '</h3>'; |
|
883 | + result = result + '<h3>'+ <?php echo '"'._("IdP contacting SP due to technical problems or abuse").'"'; ?> + '</h3>'; |
|
884 | 884 | result = result + '<table>'; |
885 | - result = result + '<tr><td>' + <?php echo '"' . _("Reason") . '"'; ?> + '</td><td>' + data.reason + '</td></tr>'; |
|
886 | - result = result + '<tr><td>' + <?php echo '"' . _("SP's Operator-Name") . '"'; ?> + '</td><td>' + data.opname + '</td></tr>'; |
|
887 | - result = result + '<tr><td>' + <?php echo '"' . _("User's outer ID") . '"'; ?> + '</td><td>' + data.outerid + '</td></tr>'; |
|
888 | - result = result + '<tr><td>' + <?php echo '"' . _("IdP email") . '"'; ?> + '</td><td>' + data.email + '</td></tr>'; |
|
889 | - result = result + '<tr><td>' + <?php echo '"' . _("Event's timestamp") . '"'; ?> + '</td><td>' + data.timestamp + '</td></tr>'; |
|
890 | - result = result + '<tr><td>' + <?php echo '"' . _("Calling-Station-Id") . '"'; ?> + '</td><td>' + data.mac + '</td></tr>'; |
|
891 | - result = result + '<tr><td>' + <?php echo '"' . _("Additional description") . '"'; ?> +'</td><td>' + data.freetext + '</td></tr>'; |
|
892 | - result = result + '<tr><td>' + <?php echo '"' . _("How to contact the user") . '"'; ?> +'</td><td>' + data.cdetails + '</td></tr>'; |
|
885 | + result = result + '<tr><td>' + <?php echo '"'._("Reason").'"'; ?> + '</td><td>' + data.reason + '</td></tr>'; |
|
886 | + result = result + '<tr><td>' + <?php echo '"'._("SP's Operator-Name").'"'; ?> + '</td><td>' + data.opname + '</td></tr>'; |
|
887 | + result = result + '<tr><td>' + <?php echo '"'._("User's outer ID").'"'; ?> + '</td><td>' + data.outerid + '</td></tr>'; |
|
888 | + result = result + '<tr><td>' + <?php echo '"'._("IdP email").'"'; ?> + '</td><td>' + data.email + '</td></tr>'; |
|
889 | + result = result + '<tr><td>' + <?php echo '"'._("Event's timestamp").'"'; ?> + '</td><td>' + data.timestamp + '</td></tr>'; |
|
890 | + result = result + '<tr><td>' + <?php echo '"'._("Calling-Station-Id").'"'; ?> + '</td><td>' + data.mac + '</td></tr>'; |
|
891 | + result = result + '<tr><td>' + <?php echo '"'._("Additional description").'"'; ?> +'</td><td>' + data.freetext + '</td></tr>'; |
|
892 | + result = result + '<tr><td>' + <?php echo '"'._("How to contact the user").'"'; ?> +'</td><td>' + data.cdetails + '</td></tr>'; |
|
893 | 893 | } |
894 | 894 | result = result + '</div>'; |
895 | 895 | showInfo(result, title); |
@@ -906,7 +906,7 @@ discard block |
||
906 | 906 | if ($('#mac').val().length > 0) { |
907 | 907 | if ($('#mac').val().length != 17) { |
908 | 908 | $('#mac').addClass('error_input'); |
909 | - $('#mac').attr('title', <?php echo '"' . _("MAC address is incomplete") . '"'; ?>); |
|
909 | + $('#mac').attr('title', <?php echo '"'._("MAC address is incomplete").'"'; ?>); |
|
910 | 910 | } else { |
911 | 911 | $('#mac').removeClass('error_input'); |
912 | 912 | $('#mac').attr('title', ''); |
@@ -915,7 +915,7 @@ discard block |
||
915 | 915 | if ($(this).attr('id') == 'email' && $(this).val().length > 0) { |
916 | 916 | if (!isEmail($(this).val())) { |
917 | 917 | $('#email').addClass('error_input'); |
918 | - $('#email').attr('title', <?php echo '"' . _("Wrong format of email") . '"'; ?>); |
|
918 | + $('#email').attr('title', <?php echo '"'._("Wrong format of email").'"'; ?>); |
|
919 | 919 | } else { |
920 | 920 | $('#email').removeClass('error_input'); |
921 | 921 | $('#email').attr('title', ''); |
@@ -924,7 +924,7 @@ discard block |
||
924 | 924 | if ($(this).attr('id') == 'outer_id' && $(this).val().length > 0) { |
925 | 925 | if (!isEmail($(this).val(), true)) { |
926 | 926 | $('#outer_id').addClass('error_input'); |
927 | - $('#outer_id').attr('title', <?php echo '"' . _("Wrong format of outer ID") . '"'; ?>); |
|
927 | + $('#outer_id').attr('title', <?php echo '"'._("Wrong format of outer ID").'"'; ?>); |
|
928 | 928 | } else { |
929 | 929 | $('#outer_id').removeClass('error_input'); |
930 | 930 | $('#outer_id').attr('title', ''); |
@@ -933,7 +933,7 @@ discard block |
||
933 | 933 | if ($(this).attr('id') == 'opname' && $('#opname').val().length > 0) { |
934 | 934 | if (!isOperatorName($(this).val())) { |
935 | 935 | $('#opname').addClass('error_input'); |
936 | - $('#opname').attr('title', <?php echo '"' . _("Wrong string given as OperatorName") . '"'; ?>); |
|
936 | + $('#opname').attr('title', <?php echo '"'._("Wrong string given as OperatorName").'"'; ?>); |
|
937 | 937 | $('#spmanually').show(); |
938 | 938 | } else { |
939 | 939 | $('#opname').removeClass('error_input'); |
@@ -32,7 +32,7 @@ discard block |
||
32 | 32 | |
33 | 33 | use \Exception; |
34 | 34 | |
35 | -require_once dirname(__DIR__) . "/config/_config.php"; |
|
35 | +require_once dirname(__DIR__)."/config/_config.php"; |
|
36 | 36 | |
37 | 37 | /** |
38 | 38 | * This class is a singleton for establishing a connection to the database |
@@ -60,14 +60,14 @@ discard block |
||
60 | 60 | case "EXTERNAL": |
61 | 61 | case "FRONTEND": |
62 | 62 | case "DIAGNOSTICS": |
63 | - if (!isset(self::${"instance" . $theDb})) { |
|
63 | + if (!isset(self::${"instance".$theDb})) { |
|
64 | 64 | $class = __CLASS__; |
65 | - self::${"instance" . $theDb} = new $class($database); |
|
66 | - DBConnection::${"instance" . $theDb}->databaseInstance = $theDb; |
|
65 | + self::${"instance".$theDb} = new $class($database); |
|
66 | + DBConnection::${"instance".$theDb}->databaseInstance = $theDb; |
|
67 | 67 | } |
68 | - return self::${"instance" . $theDb}; |
|
68 | + return self::${"instance".$theDb}; |
|
69 | 69 | default: |
70 | - throw new Exception("This type of database (" . strtoupper($database) . ") is not known!"); |
|
70 | + throw new Exception("This type of database (".strtoupper($database).") is not known!"); |
|
71 | 71 | } |
72 | 72 | } |
73 | 73 | |
@@ -106,18 +106,18 @@ discard block |
||
106 | 106 | } |
107 | 107 | } |
108 | 108 | // log exact query to debug log, if log level is at 5 |
109 | - $this->loggerInstance->debug(5, "DB ATTEMPT: " . $querystring . "\n"); |
|
109 | + $this->loggerInstance->debug(5, "DB ATTEMPT: ".$querystring."\n"); |
|
110 | 110 | if ($types !== NULL) { |
111 | - $this->loggerInstance->debug(5, "Argument type sequence: $types, parameters are: " . print_r($arguments, true)); |
|
111 | + $this->loggerInstance->debug(5, "Argument type sequence: $types, parameters are: ".print_r($arguments, true)); |
|
112 | 112 | } |
113 | 113 | |
114 | 114 | if ($this->connection->connect_error) { |
115 | - throw new Exception("ERROR: Cannot send query to $this->databaseInstance database (no connection, error number" . $this->connection->connect_error . ")!"); |
|
115 | + throw new Exception("ERROR: Cannot send query to $this->databaseInstance database (no connection, error number".$this->connection->connect_error.")!"); |
|
116 | 116 | } |
117 | 117 | if ($types === NULL) { |
118 | 118 | $result = $this->connection->query($querystring); |
119 | 119 | if ($result === FALSE) { |
120 | - throw new Exception("DB: Unable to execute simple statement! Error was --> " . $this->connection->error . " <--"); |
|
120 | + throw new Exception("DB: Unable to execute simple statement! Error was --> ".$this->connection->error." <--"); |
|
121 | 121 | } |
122 | 122 | } else { |
123 | 123 | // fancy! prepared statement with dedicated argument list |
@@ -130,7 +130,7 @@ discard block |
||
130 | 130 | } |
131 | 131 | $prepResult = $statementObject->prepare($querystring); |
132 | 132 | if ($prepResult === FALSE) { |
133 | - throw new Exception("DB: Unable to prepare statement! Statement was --> $querystring <--, error was --> " . $statementObject->error . " <--."); |
|
133 | + throw new Exception("DB: Unable to prepare statement! Statement was --> $querystring <--, error was --> ".$statementObject->error." <--."); |
|
134 | 134 | } |
135 | 135 | |
136 | 136 | // we have a variable number of arguments packed into the ... array |
@@ -142,11 +142,11 @@ discard block |
||
142 | 142 | array_unshift($localArray, $types); |
143 | 143 | $retval = call_user_func_array([$statementObject, "bind_param"], $localArray); |
144 | 144 | if ($retval === FALSE) { |
145 | - throw new Exception("DB: Unable to bind parameters to prepared statement! Argument array was --> " . var_export($localArray, TRUE) . " <--. Error was --> " . $statementObject->error . " <--"); |
|
145 | + throw new Exception("DB: Unable to bind parameters to prepared statement! Argument array was --> ".var_export($localArray, TRUE)." <--. Error was --> ".$statementObject->error." <--"); |
|
146 | 146 | } |
147 | 147 | $result = $statementObject->execute(); |
148 | 148 | if ($result === FALSE) { |
149 | - throw new Exception("DB: Unable to execute prepared statement! Error was --> " . $statementObject->error . " <--"); |
|
149 | + throw new Exception("DB: Unable to execute prepared statement! Error was --> ".$statementObject->error." <--"); |
|
150 | 150 | } |
151 | 151 | $selectResult = $statementObject->get_result(); |
152 | 152 | if ($selectResult !== FALSE) { |
@@ -158,14 +158,14 @@ discard block |
||
158 | 158 | |
159 | 159 | // all cases where $result could be FALSE have been caught earlier |
160 | 160 | if ($this->connection->errno) { |
161 | - throw new Exception("ERROR: Cannot execute query in $this->databaseInstance database - (hopefully escaped) query was '$querystring', errno was " . $this->connection->errno . "!"); |
|
161 | + throw new Exception("ERROR: Cannot execute query in $this->databaseInstance database - (hopefully escaped) query was '$querystring', errno was ".$this->connection->errno."!"); |
|
162 | 162 | } |
163 | 163 | |
164 | 164 | |
165 | 165 | if ($isMoreThanSelect) { |
166 | - $this->loggerInstance->writeSQLAudit("[DB: " . strtoupper($this->databaseInstance) . "] " . $querystring); |
|
166 | + $this->loggerInstance->writeSQLAudit("[DB: ".strtoupper($this->databaseInstance)."] ".$querystring); |
|
167 | 167 | if ($types !== NULL) { |
168 | - $this->loggerInstance->writeSQLAudit("Argument type sequence: $types, parameters are: " . print_r($arguments, true)); |
|
168 | + $this->loggerInstance->writeSQLAudit("Argument type sequence: $types, parameters are: ".print_r($arguments, true)); |
|
169 | 169 | } |
170 | 170 | } |
171 | 171 | return $result; |
@@ -249,7 +249,7 @@ discard block |
||
249 | 249 | $databaseCapitalised = strtoupper($database); |
250 | 250 | $this->connection = new \mysqli(CONFIG['DB'][$databaseCapitalised]['host'], CONFIG['DB'][$databaseCapitalised]['user'], CONFIG['DB'][$databaseCapitalised]['pass'], CONFIG['DB'][$databaseCapitalised]['db']); |
251 | 251 | if ($this->connection->connect_error) { |
252 | - throw new Exception("ERROR: Unable to connect to $database database! This is a fatal error, giving up (error number " . $this->connection->connect_errno . ")."); |
|
252 | + throw new Exception("ERROR: Unable to connect to $database database! This is a fatal error, giving up (error number ".$this->connection->connect_errno.")."); |
|
253 | 253 | } |
254 | 254 | |
255 | 255 | if ($databaseCapitalised == "EXTERNAL" && CONFIG_CONFASSISTANT['CONSORTIUM']['name'] == "eduroam" && isset(CONFIG_CONFASSISTANT['CONSORTIUM']['deployment-voodoo']) && CONFIG_CONFASSISTANT['CONSORTIUM']['deployment-voodoo'] == "Operations Team") { |
@@ -34,7 +34,7 @@ discard block |
||
34 | 34 | |
35 | 35 | use \Exception; |
36 | 36 | |
37 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
37 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
38 | 38 | |
39 | 39 | /** |
40 | 40 | * Test suite to verify that an EAP setup is actually working as advertised in |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | } |
166 | 166 | } |
167 | 167 | |
168 | - $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . print_r($supportedEapTypes, true)); |
|
168 | + $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, ".print_r($supportedEapTypes, true)); |
|
169 | 169 | $this->loggerInstance->debug(4, print_r($expectedServerNames, true)); |
170 | 170 | $this->loggerInstance->debug(4, print_r($expectedCABundle, true)); |
171 | 171 | |
@@ -252,7 +252,7 @@ discard block |
||
252 | 252 | $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME; |
253 | 253 | continue; // otherwise we'd ALSO complain that it's not a real hostname |
254 | 254 | } |
255 | - if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) { |
|
255 | + if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) { |
|
256 | 256 | $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME; |
257 | 257 | } |
258 | 258 | } |
@@ -277,7 +277,7 @@ discard block |
||
277 | 277 | if (preg_match("/sha1/i", $intermediateCa['full_details']['signatureTypeSN'])) { |
278 | 278 | $returnarray[] = RADIUSTests::CERTPROB_SHA1_SIGNATURE; |
279 | 279 | } |
280 | - $this->loggerInstance->debug(4, "CERT IS: " . print_r($intermediateCa, TRUE)); |
|
280 | + $this->loggerInstance->debug(4, "CERT IS: ".print_r($intermediateCa, TRUE)); |
|
281 | 281 | if ($intermediateCa['basicconstraints_set'] == 0) { |
282 | 282 | $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS; |
283 | 283 | } |
@@ -324,7 +324,7 @@ discard block |
||
324 | 324 | public function udpReachability($probeindex, $opnameCheck = TRUE, $frag = TRUE) { |
325 | 325 | // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy |
326 | 326 | // the following PEM data is one of the SENSE EAPLab client certs (not secret at all) |
327 | - $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12"); |
|
327 | + $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12"); |
|
328 | 328 | if ($clientcert === FALSE) { |
329 | 329 | throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!"); |
330 | 330 | } |
@@ -333,7 +333,7 @@ discard block |
||
333 | 333 | if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) { |
334 | 334 | return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert); |
335 | 335 | } |
336 | - return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert); |
|
336 | + return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert); |
|
337 | 337 | } |
338 | 338 | |
339 | 339 | /** |
@@ -353,7 +353,7 @@ discard block |
||
353 | 353 | return RADIUSTests::CERTPROB_NO_CDP_HTTP; |
354 | 354 | } |
355 | 355 | // first and second sub-match is the full URL... check it |
356 | - $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2])); |
|
356 | + $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2])); |
|
357 | 357 | if ($crlcontent === FALSE) { |
358 | 358 | return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL; |
359 | 359 | } |
@@ -384,7 +384,7 @@ discard block |
||
384 | 384 | fclose($pipes[1]); |
385 | 385 | fclose($pipes[2]); |
386 | 386 | $retval = proc_close($process); |
387 | - if ($retval != 0 || !preg_match("/BEGIN X509 CRL/",$pem)) { |
|
387 | + if ($retval != 0 || !preg_match("/BEGIN X509 CRL/", $pem)) { |
|
388 | 388 | // this was not a real CRL |
389 | 389 | return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL; |
390 | 390 | } |
@@ -406,7 +406,7 @@ discard block |
||
406 | 406 | $origLength = strlen($hex); |
407 | 407 | for ($i = 1; $i < $origLength; $i++) { |
408 | 408 | if ($i % 2 == 1 && $i != strlen($hex)) { |
409 | - $spaced .= $hex[$i] . " "; |
|
409 | + $spaced .= $hex[$i]." "; |
|
410 | 410 | } else { |
411 | 411 | $spaced .= $hex[$i]; |
412 | 412 | } |
@@ -489,19 +489,19 @@ discard block |
||
489 | 489 | $eapText = \core\common\EAP::eapDisplayName($eaptype); |
490 | 490 | $config = ' |
491 | 491 | network={ |
492 | - ssid="' . CONFIG['APPEARANCE']['productname'] . ' testing" |
|
492 | + ssid="' . CONFIG['APPEARANCE']['productname'].' testing" |
|
493 | 493 | key_mgmt=WPA-EAP |
494 | 494 | proto=WPA2 |
495 | 495 | pairwise=CCMP |
496 | 496 | group=CCMP |
497 | 497 | '; |
498 | 498 | // phase 1 |
499 | - $config .= 'eap=' . $eapText['OUTER'] . "\n"; |
|
499 | + $config .= 'eap='.$eapText['OUTER']."\n"; |
|
500 | 500 | $logConfig = $config; |
501 | 501 | // phase 2 if applicable; all inner methods have passwords |
502 | 502 | if (isset($eapText['INNER']) && $eapText['INNER'] != "") { |
503 | - $config .= ' phase2="auth=' . $eapText['INNER'] . "\"\n"; |
|
504 | - $logConfig .= ' phase2="auth=' . $eapText['INNER'] . "\"\n"; |
|
503 | + $config .= ' phase2="auth='.$eapText['INNER']."\"\n"; |
|
504 | + $logConfig .= ' phase2="auth='.$eapText['INNER']."\"\n"; |
|
505 | 505 | } |
506 | 506 | // all methods set a password, except EAP-TLS |
507 | 507 | if ($eaptype != \core\common\EAP::EAPTYPE_TLS) { |
@@ -517,11 +517,11 @@ discard block |
||
517 | 517 | } |
518 | 518 | |
519 | 519 | // inner identity |
520 | - $config .= ' identity="' . $inner . "\"\n"; |
|
521 | - $logConfig .= ' identity="' . $inner . "\"\n"; |
|
520 | + $config .= ' identity="'.$inner."\"\n"; |
|
521 | + $logConfig .= ' identity="'.$inner."\"\n"; |
|
522 | 522 | // outer identity, may be equal |
523 | - $config .= ' anonymous_identity="' . $outer . "\"\n"; |
|
524 | - $logConfig .= ' anonymous_identity="' . $outer . "\"\n"; |
|
523 | + $config .= ' anonymous_identity="'.$outer."\"\n"; |
|
524 | + $logConfig .= ' anonymous_identity="'.$outer."\"\n"; |
|
525 | 525 | // done |
526 | 526 | $config .= "}"; |
527 | 527 | $logConfig .= "}"; |
@@ -582,13 +582,13 @@ discard block |
||
582 | 582 | * @return string the command-line for eapol_test |
583 | 583 | */ |
584 | 584 | private function eapolTestConfig($probeindex, $opName, $frag) { |
585 | - $cmdline = CONFIG_DIAGNOSTICS['PATHS']['eapol_test'] . |
|
586 | - " -a " . CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['ip'] . |
|
587 | - " -s " . CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['secret'] . |
|
588 | - " -o serverchain.pem" . |
|
589 | - " -c ./udp_login_test.conf" . |
|
590 | - " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " . |
|
591 | - " -t " . CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['timeout'] . " "; |
|
585 | + $cmdline = CONFIG_DIAGNOSTICS['PATHS']['eapol_test']. |
|
586 | + " -a ".CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['ip']. |
|
587 | + " -s ".CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['secret']. |
|
588 | + " -o serverchain.pem". |
|
589 | + " -c ./udp_login_test.conf". |
|
590 | + " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ". |
|
591 | + " -t ".CONFIG_DIAGNOSTICS['RADIUSTESTS']['UDP-hosts'][$probeindex]['timeout']." "; |
|
592 | 592 | if ($opName) { |
593 | 593 | $cmdline .= '-N126:s:"1cat.eduroam.org" '; |
594 | 594 | } |
@@ -617,10 +617,10 @@ discard block |
||
617 | 617 | * @throws Exception |
618 | 618 | */ |
619 | 619 | private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs) { |
620 | - if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) { |
|
620 | + if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) { |
|
621 | 621 | throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n"); |
622 | 622 | } |
623 | - if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) { |
|
623 | + if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) { |
|
624 | 624 | throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n"); |
625 | 625 | } |
626 | 626 | // make a copy of the EAP-received chain and add the configured intermediates, if any |
@@ -634,15 +634,15 @@ discard block |
||
634 | 634 | } |
635 | 635 | if ($decoded['ca'] == 1) { |
636 | 636 | if ($decoded['root'] == 1) { // save CAT roots to the root directory |
637 | - file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']); |
|
638 | - file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']); |
|
637 | + file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']); |
|
638 | + file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']); |
|
639 | 639 | $catRoots[] = $decoded['pem']; |
640 | 640 | } else { // save the intermediates to allcerts directory |
641 | - file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']); |
|
641 | + file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']); |
|
642 | 642 | $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded)); |
643 | 643 | if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) { |
644 | 644 | $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain"); |
645 | - file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]); |
|
645 | + file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]); |
|
646 | 646 | } |
647 | 647 | $catIntermediates[] = $decoded['pem']; |
648 | 648 | } |
@@ -651,26 +651,26 @@ discard block |
||
651 | 651 | // save all intermediate certificates and CRLs to separate files in |
652 | 652 | // both root-ca directories |
653 | 653 | foreach ($eapIntermediates as $index => $onePem) { |
654 | - file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem); |
|
655 | - file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem); |
|
654 | + file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem); |
|
655 | + file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem); |
|
656 | 656 | } |
657 | 657 | foreach ($eapIntermediateCRLs as $index => $onePem) { |
658 | - file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem); |
|
659 | - file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem); |
|
658 | + file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem); |
|
659 | + file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem); |
|
660 | 660 | } |
661 | 661 | |
662 | 662 | $checkstring = ""; |
663 | 663 | if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) { |
664 | 664 | $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain"); |
665 | 665 | $checkstring = "-crl_check_all"; |
666 | - file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]); |
|
667 | - file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]); |
|
666 | + file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]); |
|
667 | + file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]); |
|
668 | 668 | } |
669 | 669 | |
670 | 670 | |
671 | 671 | // now c_rehash the root CA directory ... |
672 | - system(CONFIG_DIAGNOSTICS['PATHS']['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null"); |
|
673 | - system(CONFIG_DIAGNOSTICS['PATHS']['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null"); |
|
672 | + system(CONFIG_DIAGNOSTICS['PATHS']['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null"); |
|
673 | + system(CONFIG_DIAGNOSTICS['PATHS']['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null"); |
|
674 | 674 | return $checkstring; |
675 | 675 | } |
676 | 676 | |
@@ -701,12 +701,12 @@ discard block |
||
701 | 701 | // the error log will complain if we run this test against an empty file of certs |
702 | 702 | // so test if there's something PEMy in the file at all |
703 | 703 | if (filesize("$tmpDir/serverchain.pem") > 10) { |
704 | - exec(CONFIG['PATHS']['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly); |
|
705 | - $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n"); |
|
706 | - $this->loggerInstance->debug(4, "Chain verify pass 1: " . print_r($verifyResultEaponly, TRUE) . "\n"); |
|
707 | - exec(CONFIG['PATHS']['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts); |
|
708 | - $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n"); |
|
709 | - $this->loggerInstance->debug(4, "Chain verify pass 2: " . print_r($verifyResultAllcerts, TRUE) . "\n"); |
|
704 | + exec(CONFIG['PATHS']['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly); |
|
705 | + $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n"); |
|
706 | + $this->loggerInstance->debug(4, "Chain verify pass 1: ".print_r($verifyResultEaponly, TRUE)."\n"); |
|
707 | + exec(CONFIG['PATHS']['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts); |
|
708 | + $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n"); |
|
709 | + $this->loggerInstance->debug(4, "Chain verify pass 2: ".print_r($verifyResultAllcerts, TRUE)."\n"); |
|
710 | 710 | } |
711 | 711 | |
712 | 712 | |
@@ -772,7 +772,7 @@ discard block |
||
772 | 772 | // we are UNHAPPY if no names match! |
773 | 773 | $happiness = "UNHAPPY"; |
774 | 774 | foreach ($this->expectedServerNames as $expectedName) { |
775 | - $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . print_r($servercert['CN'], TRUE) . print_r($servercert['sAN_DNS'], TRUE)); |
|
775 | + $this->loggerInstance->debug(4, "Managing expectations for $expectedName: ".print_r($servercert['CN'], TRUE).print_r($servercert['sAN_DNS'], TRUE)); |
|
776 | 776 | if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) { |
777 | 777 | $this->loggerInstance->debug(4, "Totally happy!"); |
778 | 778 | $happiness = "TOTALLY"; |
@@ -816,11 +816,11 @@ discard block |
||
816 | 816 | $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password); |
817 | 817 | // the config intentionally does not include CA checking. We do this |
818 | 818 | // ourselves after getting the chain with -o. |
819 | - file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]); |
|
819 | + file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]); |
|
820 | 820 | |
821 | 821 | $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag); |
822 | 822 | $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n"); |
823 | - $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n"); |
|
823 | + $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n"); |
|
824 | 824 | $time_start = microtime(true); |
825 | 825 | $pflow = []; |
826 | 826 | exec($cmdline, $pflow); |
@@ -863,7 +863,7 @@ discard block |
||
863 | 863 | if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) { |
864 | 864 | array_pop($packetflow); |
865 | 865 | } |
866 | - $this->loggerInstance->debug(5, "Packetflow: " . print_r($packetflow, TRUE)); |
|
866 | + $this->loggerInstance->debug(5, "Packetflow: ".print_r($packetflow, TRUE)); |
|
867 | 867 | $packetcount = array_count_values($packetflow); |
868 | 868 | $testresults['packetcount'] = $packetcount; |
869 | 869 | $testresults['packetflow'] = $packetflow; |
@@ -941,7 +941,7 @@ discard block |
||
941 | 941 | $x509 = new \core\common\X509(); |
942 | 942 | $eapCertArray = []; |
943 | 943 | // $eap_certarray holds all certs received in EAP conversation |
944 | - $incomingData = file_get_contents($tmpDir . "/serverchain.pem"); |
|
944 | + $incomingData = file_get_contents($tmpDir."/serverchain.pem"); |
|
945 | 945 | if ($incomingData !== FALSE && strlen($incomingData) > 0) { |
946 | 946 | $eapCertArray = $x509->splitCertificate($incomingData); |
947 | 947 | } else { |
@@ -971,10 +971,10 @@ discard block |
||
971 | 971 | case RADIUSTests::SERVER_CA_SELFSIGNED: |
972 | 972 | $servercert[] = $cert; |
973 | 973 | if (count($servercert) == 1) { |
974 | - if (file_put_contents($tmpDir . "/incomingserver.pem", $certPem . "\n") === FALSE) { |
|
974 | + if (file_put_contents($tmpDir."/incomingserver.pem", $certPem."\n") === FALSE) { |
|
975 | 975 | $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n"); |
976 | 976 | } |
977 | - $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . print_r($servercert[0], true)); |
|
977 | + $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: ".print_r($servercert[0], true)); |
|
978 | 978 | } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) { |
979 | 979 | $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS; |
980 | 980 | } |
@@ -1054,7 +1054,7 @@ discard block |
||
1054 | 1054 | chdir($tmpDir); |
1055 | 1055 | $this->loggerInstance->debug(4, "temp dir: $tmpDir\n"); |
1056 | 1056 | if ($clientcertdata !== NULL) { |
1057 | - file_put_contents($tmpDir . "/client.p12", $clientcertdata); |
|
1057 | + file_put_contents($tmpDir."/client.p12", $clientcertdata); |
|
1058 | 1058 | } |
1059 | 1059 | $testresults = []; |
1060 | 1060 | // initialise the sub-array for cleaner parsing |
@@ -1150,7 +1150,7 @@ discard block |
||
1150 | 1150 | 'issuer' => $this->printDN($certdata['issuer']), |
1151 | 1151 | 'validFrom' => $this->printTm($certdata['validFrom_time_t']), |
1152 | 1152 | 'validTo' => $this->printTm($certdata['validTo_time_t']), |
1153 | - 'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']), |
|
1153 | + 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']), |
|
1154 | 1154 | 'sha1' => $certdata['sha1'], |
1155 | 1155 | 'extensions' => $certdata['extensions'] |
1156 | 1156 | ]; |