| @@ -156,8 +156,8 @@ | ||
| 156 | 156 | // replace namespace separators with directory separators | 
| 157 | 157 | // in the relative class name, append with .php | 
| 158 | 158 | $file = $base_dir | 
| 159 | -                  . str_replace('\\', '/', $relative_class) | |
| 160 | - . '.php'; | |
| 159 | +                    . str_replace('\\', '/', $relative_class) | |
| 160 | + . '.php'; | |
| 161 | 161 | |
| 162 | 162 | // if the mapped file exists, require it | 
| 163 | 163 |              if ($this->requireFile($file)) { | 
| @@ -97,10 +97,10 @@ | ||
| 97 | 97 | public function addNamespace($prefix, $base_dir, $prepend = false) | 
| 98 | 98 |      { | 
| 99 | 99 | // normalize namespace prefix | 
| 100 | - $prefix = trim($prefix, '\\') . '\\'; | |
| 100 | + $prefix = trim($prefix, '\\').'\\'; | |
| 101 | 101 | |
| 102 | 102 | // normalize the base directory with a trailing separator | 
| 103 | - $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR) . '/'; | |
| 103 | + $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR).'/'; | |
| 104 | 104 | |
| 105 | 105 | // initialize the namespace prefix array | 
| 106 | 106 |          if (isset($this->prefixes[$prefix]) === false) { | 
| @@ -9,7 +9,7 @@ | ||
| 9 | 9 | */ | 
| 10 | 10 | ?> | 
| 11 | 11 | <h1>Example Skin (main user frontpage)</h1> | 
| 12 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","consortium_logo.png");?>"/> | |
| 12 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "consortium_logo.png"); ?>"/> | |
| 13 | 13 | <p>This skin is much more sober and less bloated than the default one. As it happens, it also doesn't do anything.</p> | 
| 14 | 14 | <p>But at least it goes to show that it's possible to include custom images/CSS/external software using findResourceUrl(..., $filename): | 
| 15 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","custom.png");?>"/> | |
| 15 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "custom.png"); ?>"/> | |
| @@ -246,11 +246,11 @@ discard block | ||
| 246 | 246 | } | 
| 247 | 247 | |
| 248 | 248 | /** | 
| 249 | - * This function parses a X.509 cert and returns all certificatePolicies OIDs | |
| 250 | - * | |
| 251 | - * @param array $cert (returned from openssl_x509_parse) | |
| 252 | - * @return array of OIDs | |
| 253 | - */ | |
| 249 | + * This function parses a X.509 cert and returns all certificatePolicies OIDs | |
| 250 | + * | |
| 251 | + * @param array $cert (returned from openssl_x509_parse) | |
| 252 | + * @return array of OIDs | |
| 253 | + */ | |
| 254 | 254 |      private function propertyCheckPolicy($cert) { | 
| 255 | 255 | $oids = []; | 
| 256 | 256 |          if ($cert['extensions']['certificatePolicies']) { | 
| @@ -263,11 +263,11 @@ discard block | ||
| 263 | 263 | return $oids; | 
| 264 | 264 | } | 
| 265 | 265 | /** | 
| 266 | - * This function parses a X.509 cert and returns the value of $field | |
| 267 | - * | |
| 268 | - * @param array $cert (returned from openssl_x509_parse) | |
| 269 | - * @return string value of the issuer field or '' | |
| 270 | - */ | |
| 266 | + * This function parses a X.509 cert and returns the value of $field | |
| 267 | + * | |
| 268 | + * @param array $cert (returned from openssl_x509_parse) | |
| 269 | + * @return string value of the issuer field or '' | |
| 270 | + */ | |
| 271 | 271 |      private function getCertificateIssuer($cert) { | 
| 272 | 272 | $issuer = ''; | 
| 273 | 273 |          foreach ($cert['issuer'] as $key => $val) { | 
| @@ -23,7 +23,7 @@ discard block | ||
| 23 | 23 | |
| 24 | 24 | use \Exception; | 
| 25 | 25 | |
| 26 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; | |
| 26 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; | |
| 27 | 27 | |
| 28 | 28 | /** | 
| 29 | 29 | * Test suite to verify that a given NAI realm has NAPTR records according to | 
| @@ -144,7 +144,7 @@ discard block | ||
| 144 | 144 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['status'] = $cert['status']; | 
| 145 | 145 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['message'] = $this->TLS_certkeys[$cert['status']]; | 
| 146 | 146 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['expected'] = $cert['expected']; | 
| 147 | - $add = ' -cert ' . ROOT . '/config/cli-certs/' . $cert['public'] . ' -key ' . ROOT . '/config/cli-certs/' . $cert['private']; | |
| 147 | + $add = ' -cert '.ROOT.'/config/cli-certs/'.$cert['public'].' -key '.ROOT.'/config/cli-certs/'.$cert['private']; | |
| 148 | 148 |                  if (!isset($this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k])) { | 
| 149 | 149 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k] = []; | 
| 150 | 150 | } | 
| @@ -188,11 +188,11 @@ discard block | ||
| 188 | 188 | // but code analysers want this more explicit, so here is this extra | 
| 189 | 189 | // call to escapeshellarg() | 
| 190 | 190 | $escapedHost = escapeshellarg($host); | 
| 191 | - $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1\n"); | |
| 191 | + $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1\n"); | |
| 192 | 192 | $time_start = microtime(true); | 
| 193 | 193 | $opensslbabble = []; | 
| 194 | 194 | $result = 999; // likely to become zero by openssl; don't want to initialise to zero, could cover up exec failures | 
| 195 | - exec(CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); | |
| 195 | + exec(CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); | |
| 196 | 196 | $time_stop = microtime(true); | 
| 197 | 197 | $testresults['time_millisec'] = floor(($time_stop - $time_start) * 1000); | 
| 198 | 198 | $testresults['returncode'] = $result; | 
| @@ -52,7 +52,7 @@ | ||
| 52 | 52 | they are from the same user group. You are not allowed to share them to an unlimited | 
| 53 | 53 | audience (e.g. on a publicly accessible web server).</li> | 
| 54 | 54 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to | 
| 55 | -your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?>, on Welcome Package CDs or USB sticks, etc.</li> | |
| 55 | +your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?>, on Welcome Package CDs or USB sticks, etc.</li> | |
| 56 | 56 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on | 
| 57 | 57 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> | 
| 58 | 58 | </ul> | 
| @@ -88,7 +88,7 @@ | ||
| 88 | 88 | 'server_suffix' => '.hosted.eduroam.org', | 
| 89 | 89 | 'gracetime' => 90, | 
| 90 | 90 | 'CA' => ["type" => "embedded"], # OCSP URL needs to be configured in openssl.cnf | 
| 91 | - # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], | |
| 91 | + # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], | |
| 92 | 92 | |
| 93 | 93 | ], | 
| 94 | 94 | /** | 
| @@ -53,14 +53,14 @@ | ||
| 53 | 53 | } | 
| 54 | 54 | |
| 55 | 55 |  switch ($_GET['token']) { | 
| 56 | - case "SELF-REGISTER": | |
| 57 | - $token = "SELF-REGISTER"; | |
| 58 | - $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; | |
| 59 | - $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; | |
| 60 | - break; | |
| 61 | - default: | |
| 62 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); | |
| 63 | - $checkval = $usermgmt->checkTokenValidity($token); | |
| 56 | + case "SELF-REGISTER": | |
| 57 | + $token = "SELF-REGISTER"; | |
| 58 | + $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; | |
| 59 | + $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; | |
| 60 | + break; | |
| 61 | + default: | |
| 62 | + $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); | |
| 63 | + $checkval = $usermgmt->checkTokenValidity($token); | |
| 64 | 64 | } | 
| 65 | 65 | |
| 66 | 66 |  if ($checkval < 0) { | 
| @@ -30,7 +30,7 @@ discard block | ||
| 30 | 30 | ?> | 
| 31 | 31 | <?php | 
| 32 | 32 | |
| 33 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; | |
| 33 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; | |
| 34 | 34 | |
| 35 | 35 | $auth = new \web\lib\admin\Authentication(); | 
| 36 | 36 | $deco = new \web\lib\admin\PageDecoration(); | 
| @@ -70,22 +70,22 @@ discard block | ||
| 70 | 70 | $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; | 
| 71 | 71 | break; | 
| 72 | 72 | default: | 
| 73 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); | |
| 73 | + $token = $validator->token(filter_input(INPUT_GET, 'token', FILTER_SANITIZE_STRING)); | |
| 74 | 74 | $checkval = $usermgmt->checkTokenValidity($token); | 
| 75 | 75 | } | 
| 76 | 76 | |
| 77 | 77 |  if ($checkval < 0) { | 
| 78 | 78 |      echo $deco->pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP"); | 
| 79 | -    echo "<h1>" . _("Error creating new IdP binding!") . "</h1>"; | |
| 79 | +    echo "<h1>"._("Error creating new IdP binding!")."</h1>"; | |
| 80 | 80 |      switch ($checkval) { | 
| 81 | 81 | case \core\UserManagement::TOKENSTATUS_FAIL_ALREADYCONSUMED: | 
| 82 | -            echo "<p>" . sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst) . "</p>"; | |
| 82 | +            echo "<p>".sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst)."</p>"; | |
| 83 | 83 | break; | 
| 84 | 84 | case \core\UserManagement::TOKENSTATUS_FAIL_EXPIRED: | 
| 85 | -            echo "<p>" . sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed) . "</p>"; | |
| 85 | +            echo "<p>".sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed)."</p>"; | |
| 86 | 86 | break; | 
| 87 | 87 | default: | 
| 88 | -            echo "<p>" . _("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.") . "</p>"; | |
| 88 | +            echo "<p>"._("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.")."</p>"; | |
| 89 | 89 | } | 
| 90 | 90 | echo $deco->footer(); | 
| 91 | 91 |      throw new Exception("Terminating because something is wrong with the token we received."); | 
| @@ -100,12 +100,12 @@ discard block | ||
| 100 | 100 | case "SELF-REGISTER": | 
| 101 | 101 | $fed = new \core\Federation($federation); | 
| 102 | 102 | $newidp = new \core\IdP($fed->newIdP($user, "FED", "SELFSERVICE")); | 
| 103 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - selfservice registration"); | |
| 103 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - selfservice registration"); | |
| 104 | 104 | break; | 
| 105 | 105 | default: | 
| 106 | 106 | $newidp = $usermgmt->createIdPFromToken($token, $user); | 
| 107 | 107 | $usermgmt->invalidateToken($token); | 
| 108 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated"); | |
| 108 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - Token used and invalidated"); | |
| 109 | 109 | break; | 
| 110 | 110 | } | 
| 111 | 111 | |
| @@ -1019,12 +1019,12 @@ | ||
| 1019 | 1019 |          $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); | 
| 1020 | 1020 | $certUsernameLength = strlen($certUsernameLabel); | 
| 1021 | 1021 | $labelLength = max($certPasswordLength,$certUsernameLength); | 
| 1022 | - ?> | |
| 1022 | + ?> | |
| 1023 | 1023 |    ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" | 
| 1024 | 1024 | !else | 
| 1025 | 1025 |    <?php $certPasswordLabel = WindowsCommon::sprint_nsi(_("import password:")); | 
| 1026 | 1026 | $certPasswordLength = strlen($certPasswordLabel); | 
| 1027 | - ?> | |
| 1027 | + ?> | |
| 1028 | 1028 | !insertmacro debug_cat 4 "Unpacking SB_cert.p12" | 
| 1029 | 1029 | File "SB_cert.p12" | 
| 1030 | 1030 | nsArray::Set Delete_files "SB_cert.p12" | 
| @@ -135,10 +135,10 @@ discard block | ||
| 135 | 135 | !define MUI_HEADERIMAGE_BITMAP "cat_150.bmp" | 
| 136 | 136 | !define MUI_COMPONENTSPAGE_SMALLDESC | 
| 137 | 137 | |
| 138 | -!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" | |
| 139 | -!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi( _("Installation complete"))?>" | |
| 140 | -!define FAREWELL_TEXT	"<?php WindowsCommon::echo_nsi( _("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(  _("Your system is ready."))?>" | |
| 141 | -!define FAREWELL_FAIL	"<?php WindowsCommon::echo_nsi( _("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi( _("Please contact \${SUPPORT}."))?>" | |
| 138 | +!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" | |
| 139 | +!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi(_("Installation complete"))?>" | |
| 140 | +!define FAREWELL_TEXT	"<?php WindowsCommon::echo_nsi(_("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Your system is ready."))?>" | |
| 141 | +!define FAREWELL_FAIL	"<?php WindowsCommon::echo_nsi(_("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Please contact \${SUPPORT}."))?>" | |
| 142 | 142 | ;-------------------------------- | 
| 143 | 143 | ;Languages | 
| 144 | 144 |  !insertmacro MUI_LANGUAGE "${LANG}" | 
| @@ -146,14 +146,14 @@ discard block | ||
| 146 | 146 | ;-------------------------------- | 
| 147 | 147 | ; License file | 
| 148 | 148 | !ifdef LICENSE_FILE | 
| 149 | -LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi( _("Accept"))?>" | |
| 149 | +LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi(_("Accept"))?>" | |
| 150 | 150 |  LicenseText "<?php WindowsCommon::echo_nsi(_("If you accept the conditions then select Accept and then click Install to continue."))?>" | 
| 151 | 151 |  LicenseData ${LICENSE_FILE} | 
| 152 | 152 | !endif | 
| 153 | 153 | |
| 154 | 154 | ;----------------------------------- | 
| 155 | 155 | |
| 156 | -MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi( _("Finish"))?>" | |
| 156 | +MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi(_("Finish"))?>" | |
| 157 | 157 | ;---------------------------------- | 
| 158 | 158 | ; FUNCTIONS | 
| 159 | 159 | |
| @@ -186,7 +186,7 @@ discard block | ||
| 186 | 186 | |
| 187 | 187 | !macro install_ca_cert ca_file ca_fingerprint level | 
| 188 | 188 |     !insertmacro debug_cat 2 "locating certificate  SHA=${ca_fingerprint} Level=${level}" | 
| 189 | -   DetailPrint "<?php WindowsCommon::echo_nsi( _("searching for certificate"))?> ${ca_file}" | |
| 189 | +   DetailPrint "<?php WindowsCommon::echo_nsi(_("searching for certificate"))?> ${ca_file}" | |
| 190 | 190 |     File "${ca_file}" | 
| 191 | 191 |     nsArray::Set Delete_files "${ca_file}" | 
| 192 | 192 | !insertmacro debug_cat 2 "Testing machine store root" | 
| @@ -248,13 +248,13 @@ discard block | ||
| 248 | 248 |     ${EndIf} | 
| 249 | 249 |     !insertmacro debug_cat 2 "installing certificate $TEMP\${ca_file}" | 
| 250 | 250 |     !insertmacro debug_cat 3 "Execute: certutil -addstore -user ${level} $TEMP\${ca_file}" | 
| 251 | -   DetailPrint "<?php WindowsCommon::echo_nsi( _("installing certificate"))?> ${ca_file}" | |
| 251 | +   DetailPrint "<?php WindowsCommon::echo_nsi(_("installing certificate"))?> ${ca_file}" | |
| 252 | 252 |     nsExec::Exec '"certutil" -addstore -user ${level} "$TEMP"\${ca_file}' | 
| 253 | 253 | Pop $0 | 
| 254 | 254 | !insertmacro debug_cat 3 "certutil returned $0" | 
| 255 | 255 |     ${If} $0 != 0 | 
| 256 | 256 | IfSilent +2 | 
| 257 | -     MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("could not install certificate"))?>  ${ca_file}" | |
| 257 | +     MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("could not install certificate"))?>  ${ca_file}" | |
| 258 | 258 |       !insertmacro debug_cat 1 "could not install certificate ${ca_file}" | 
| 259 | 259 |     ${EndIf} | 
| 260 | 260 |  no_install_${ca_file}: | 
| @@ -461,26 +461,26 @@ discard block | ||
| 461 | 461 | pop $R0 | 
| 462 | 462 |    ${If} $tkip_count > 0 | 
| 463 | 463 |      ${If} $aes_count > 1 | 
| 464 | -      StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" | |
| 464 | +      StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" | |
| 465 | 465 |      ${Else} | 
| 466 | -     StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profile is preferred. Always use it if you have a choice."))?>" | |
| 466 | +     StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profile is preferred. Always use it if you have a choice."))?>" | |
| 467 | 467 |      ${EndIf} | 
| 468 | 468 |    ${Else} | 
| 469 | 469 | StrCpy $R1 "" | 
| 470 | 470 |    ${EndIf} | 
| 471 | 471 |    ${If} $profile_count > 0 | 
| 472 | -    StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ | |
| 473 | -<?php WindowsCommon::echo_nsi( _("The installer will create the following wireless profiles:"))?>$\r$\n\ | |
| 472 | +    StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ | |
| 473 | +<?php WindowsCommon::echo_nsi(_("The installer will create the following wireless profiles:"))?>$\r$\n\ | |
| 474 | 474 | $R0.\ | 
| 475 | 475 | $R1$\r$\n$\n\ | 
| 476 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ | |
| 476 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ | |
| 477 | 477 |     EMAIL: ${SUPPORT}$\r$\n\ | 
| 478 | 478 |     WWW: ${URL}" | 
| 479 | 479 |  ${Else} | 
| 480 | -StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ | |
| 481 | -<?php WindowsCommon::echo_nsi( _("The installer will create the wireless profile:"))?> $R0.\ | |
| 480 | +StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ | |
| 481 | +<?php WindowsCommon::echo_nsi(_("The installer will create the wireless profile:"))?> $R0.\ | |
| 482 | 482 | $R1$\r$\n$\n\ | 
| 483 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ | |
| 483 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ | |
| 484 | 484 |     EMAIL: ${SUPPORT}$\r$\n\ | 
| 485 | 485 |     WWW: ${URL}" | 
| 486 | 486 |  ${EndIf} | 
| @@ -506,7 +506,7 @@ discard block | ||
| 506 | 506 |    SendMessage $HEADLINE ${WM_SETFONT} $HEADLINE_FONT 0 | 
| 507 | 507 | ;TRANSLATION | 
| 508 | 508 |    nsDialogs::CreateControl STATIC ${WS_VISIBLE}|${WS_CHILD}|${WS_CLIPSIBLINGS} 0 120u 46u -130u -32u "$welcome_message\ | 
| 509 | -$\r$\n$\r$\n<?php WindowsCommon::echo_nsi( _("Installer created with software from the GEANT project."))?>" | |
| 509 | +$\r$\n$\r$\n<?php WindowsCommon::echo_nsi(_("Installer created with software from the GEANT project."))?>" | |
| 510 | 510 | Pop $TEXT | 
| 511 | 511 | |
| 512 | 512 | SetCtlColors $DIALOG "" 0xffffff | 
| @@ -619,18 +619,18 @@ discard block | ||
| 619 | 619 |      ${If} $wireless_result == 1 | 
| 620 | 620 | !insertmacro debug_cat 1 "wlan_test.exe did not find wireless configuration service" | 
| 621 | 621 | IfSilent +2 | 
| 622 | -      MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" | |
| 622 | +      MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" | |
| 623 | 623 | Call Cleanup | 
| 624 | 624 |      ${EndIf} | 
| 625 | 625 |      ${If} $wireless_result == 2 | 
| 626 | 626 | IfSilent +2 | 
| 627 | -      MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. The installer cannot continue."))?>" | |
| 627 | +      MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. The installer cannot continue."))?>" | |
| 628 | 628 | Call Cleanup | 
| 629 | 629 |      ${EndIf} | 
| 630 | 630 |    ${Else} | 
| 631 | 631 |      ${If} $wireless_result > 0 | 
| 632 | 632 | IfSilent +3 | 
| 633 | -       MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes | |
| 633 | +       MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes | |
| 634 | 634 | Call Cleanup | 
| 635 | 635 | wired_yes: | 
| 636 | 636 | Push 1 | 
| @@ -646,7 +646,7 @@ discard block | ||
| 646 | 646 |      ${If} $wired == 1 | 
| 647 | 647 |        ${If} $force_wired == 0 | 
| 648 | 648 | IfSilent wired | 
| 649 | -        MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("Do you want to enable access on wired interfaces?"))?>" IDYES wired | |
| 649 | +        MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("Do you want to enable access on wired interfaces?"))?>" IDYES wired | |
| 650 | 650 | Push 0 | 
| 651 | 651 | Pop $wired | 
| 652 | 652 |        ${EndIf} | 
| @@ -687,7 +687,7 @@ discard block | ||
| 687 | 687 | ;================================ | 
| 688 | 688 | |
| 689 | 689 | Function ShowInstfiles | 
| 690 | -  !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Profiles installation"))?>" " " | |
| 690 | +  !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Profiles installation"))?>" " " | |
| 691 | 691 | FunctionEnd | 
| 692 | 692 | ;================================ | 
| 693 | 693 | ; Check if a wireless profile exist and put it on delete list | 
| @@ -706,7 +706,7 @@ discard block | ||
| 706 | 706 | |
| 707 | 707 | Function FindProfile | 
| 708 | 708 | Pop $R8 | 
| 709 | -  DetailPrint "<?php WindowsCommon::echo_nsi( _("Checking for profile \$R8"))?>" | |
| 709 | +  DetailPrint "<?php WindowsCommon::echo_nsi(_("Checking for profile \$R8"))?>" | |
| 710 | 710 | !insertmacro debug_cat 2 "Checking for profile $R8" | 
| 711 | 711 | !insertmacro debug_cat 3 "Exec: $Netsh wlan show profiles $R8" | 
| 712 | 712 | nsExec::Exec '"$Netsh" wlan show profiles "$R8"' | 
| @@ -714,7 +714,7 @@ discard block | ||
| 714 | 714 | !insertmacro debug_cat 4 "netsh returned $0" | 
| 715 | 715 |    ${If} $0 == 0 | 
| 716 | 716 | !insertmacro debug_cat 1 "found profile $R8" | 
| 717 | -    DetailPrint "<?php WindowsCommon::echo_nsi( _("found profile \$R8"))?>" | |
| 717 | +    DetailPrint "<?php WindowsCommon::echo_nsi(_("found profile \$R8"))?>" | |
| 718 | 718 | Push 0 | 
| 719 | 719 |    ${Else} | 
| 720 | 720 | !insertmacro debug_cat 1 "profile $R8 not found" | 
| @@ -809,7 +809,7 @@ discard block | ||
| 809 | 809 |      ${If} $Symantec_installed  != 0 | 
| 810 | 810 | !insertmacro debug_cat 3 "Symantec problem" | 
| 811 | 811 | IfSilent +2 | 
| 812 | -     MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" | |
| 812 | +     MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" | |
| 813 | 813 | Exec '"explorer" /select,"$EXEDIR\inst_cat.cmd"' | 
| 814 | 814 | Quit | 
| 815 | 815 | |
| @@ -1097,7 +1097,7 @@ discard block | ||
| 1097 | 1097 | Function PFXCertificateSelect | 
| 1098 | 1098 | !ifndef SILVERBULLET | 
| 1099 | 1099 | ;TRANSLATION | 
| 1100 | -!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" | |
| 1100 | +!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" | |
| 1101 | 1101 | ;TRANSLATION | 
| 1102 | 1102 | IfSilent +2 | 
| 1103 | 1103 |    MessageBox MB_OK "<?php WindowsCommon::echo_nsi(_("Preparing to install personal certificate."))?>$\r$\n<?php WindowsCommon::echo_nsi(_("Click OK to continue"))?> " | 
| @@ -1113,7 +1113,7 @@ discard block | ||
| 1113 | 1113 | $certPasswordLength = strlen($certPasswordLabel); | 
| 1114 | 1114 |          $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); | 
| 1115 | 1115 | $certUsernameLength = strlen($certUsernameLabel); | 
| 1116 | - $labelLength = max($certPasswordLength,$certUsernameLength); | |
| 1116 | + $labelLength = max($certPasswordLength, $certUsernameLength); | |
| 1117 | 1117 | ?> | 
| 1118 | 1118 |    ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" | 
| 1119 | 1119 | !else | 
| @@ -1130,11 +1130,11 @@ discard block | ||
| 1130 | 1130 | !insertmacro debug_cat 3 "Vista level (Vista without Service pack): $VistaNoSP"; | 
| 1131 | 1131 |    ${If} $VistaNoSP == 0 | 
| 1132 | 1132 | !ifdef PFX_USERNAME | 
| 1133 | - !define LABEL_LENGTH "<?php echo($labelLength*3.5)?>u" | |
| 1134 | - !define TEXT_START "<?php echo($labelLength*3.5 +5)?>u" | |
| 1133 | + !define LABEL_LENGTH "<?php echo($labelLength * 3.5)?>u" | |
| 1134 | + !define TEXT_START "<?php echo($labelLength * 3.5 + 5)?>u" | |
| 1135 | 1135 | !else | 
| 1136 | - !define LABEL_LENGTH "<?php echo($certPasswordLength*3.5)?>u" | |
| 1137 | - !define TEXT_START "<?php echo($certPasswordLength*3.5 +5)?>u" | |
| 1136 | + !define LABEL_LENGTH "<?php echo($certPasswordLength * 3.5)?>u" | |
| 1137 | + !define TEXT_START "<?php echo($certPasswordLength * 3.5 + 5)?>u" | |
| 1138 | 1138 | !endif | 
| 1139 | 1139 |      ${NSD_CreateLabel} 0 35u ${LABEL_LENGTH} 12u "<?php echo $certPasswordLabel?>" | 
| 1140 | 1140 |      ${NSD_CreatePassword} ${TEXT_START} 34.5u 120u 12u "" | 
| @@ -1496,7 +1496,7 @@ discard block | ||
| 1496 | 1496 | Section "-start" | 
| 1497 | 1497 | SectionIn RO | 
| 1498 | 1498 | |
| 1499 | -!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Installation"))?>" "<?php WindowsCommon::echo_nsi( _("Checking for existing wireless profiles"))?>" | |
| 1499 | +!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Installation"))?>" "<?php WindowsCommon::echo_nsi(_("Checking for existing wireless profiles"))?>" | |
| 1500 | 1500 | !ifndef PWD | 
| 1501 | 1501 | !include "certs.nsh" | 
| 1502 | 1502 | !endif | 
| @@ -185,7 +185,6 @@ | ||
| 185 | 185 | * - RETVAL_NOTCONFIGURED; needs CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-discoverytag'] | 
| 186 | 186 | * - RETVAL_INVALID (at least one format error) | 
| 187 | 187 | * - RETVAL_OK (all fine) | 
| 188 | - | |
| 189 | 188 | * @return int one of two RETVALs above | 
| 190 | 189 | */ | 
| 191 | 190 |      public function relevantNAPTRcompliance() { | 
| @@ -21,7 +21,7 @@ discard block | ||
| 21 | 21 | |
| 22 | 22 | namespace core\diag; | 
| 23 | 23 | |
| 24 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; | |
| 24 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; | |
| 25 | 25 | |
| 26 | 26 | /** | 
| 27 | 27 | * Test suite to verify that a given NAI realm has NAPTR records according to | 
| @@ -169,7 +169,7 @@ discard block | ||
| 169 | 169 | $this->NAPTR_executed = RADIUSTests::RETVAL_NOTCONFIGURED; | 
| 170 | 170 | return RADIUSTests::RETVAL_NOTCONFIGURED; | 
| 171 | 171 | } | 
| 172 | - $NAPTRs = dns_get_record($this->realm . ".", DNS_NAPTR); | |
| 172 | + $NAPTRs = dns_get_record($this->realm.".", DNS_NAPTR); | |
| 173 | 173 |          if ($NAPTRs === FALSE || count($NAPTRs) == 0) { | 
| 174 | 174 | $this->NAPTR_executed = RFC7585Tests::RETVAL_NONAPTR; | 
| 175 | 175 | return RFC7585Tests::RETVAL_NONAPTR; | 
| @@ -59,12 +59,12 @@ discard block | ||
| 59 | 59 | */ | 
| 60 | 60 | |
| 61 | 61 | /** | 
| 62 | - * Various paths. | |
| 63 | - * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. | |
| 64 | - * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. | |
| 65 | - * See also NSIS_VERSION further down | |
| 66 | - * @var array | |
| 67 | - */ | |
| 62 | + * Various paths. | |
| 63 | + * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. | |
| 64 | + * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. | |
| 65 | + * See also NSIS_VERSION further down | |
| 66 | + * @var array | |
| 67 | + */ | |
| 68 | 68 | 'PATHS' => [ | 
| 69 | 69 | 'c_rehash' => 'c_rehash', | 
| 70 | 70 | 'eapol_test' => 'eapol_test', | 
| @@ -101,45 +101,45 @@ discard block | ||
| 101 | 101 | ], | 
| 102 | 102 | |
| 103 | 103 | 'TLS-clientcerts' => [ | 
| 104 | - 'CA1' => [ | |
| 104 | + 'CA1' => [ | |
| 105 | 105 | 'status' => 'ACCREDITED', | 
| 106 | 106 | 'issuerCA' => '/DC=org/DC=pki1/CN=PKI 1', | 
| 107 | 107 | 'certificates' => [ | 
| 108 | - [ | |
| 108 | + [ | |
| 109 | 109 | 'status' => 'CORRECT', | 
| 110 | 110 | 'public' => 'ca1-client-cert.pem', | 
| 111 | 111 | 'private' => 'ca1-client-key.pem', | 
| 112 | 112 | 'expected' => 'PASS'], | 
| 113 | - [ | |
| 113 | + [ | |
| 114 | 114 | 'status' => 'WRONGPOLICY', | 
| 115 | 115 | 'public' => 'ca1-nopolicy-cert.pem', | 
| 116 | 116 | 'private' => 'ca1-nopolicy-key.key', | 
| 117 | 117 | 'expected' => 'FAIL'], | 
| 118 | - [ | |
| 118 | + [ | |
| 119 | 119 | 'status' => 'EXPIRED', | 
| 120 | 120 | 'public' => 'ca1-exp.pem', | 
| 121 | 121 | 'private' => 'ca1-exp.key', | 
| 122 | 122 | 'expected' => 'FAIL'], | 
| 123 | - [ | |
| 123 | + [ | |
| 124 | 124 | 'status' => 'REVOKED', | 
| 125 | 125 | 'public' => 'ca1-revoked.pem', | 
| 126 | 126 | 'private' => 'ca1-revoked.key', | 
| 127 | 127 | 'expected' => 'FAIL'], | 
| 128 | 128 | ] | 
| 129 | - ], | |
| 130 | - 'CA-N' => [ | |
| 129 | + ], | |
| 130 | + 'CA-N' => [ | |
| 131 | 131 | 'status' => 'NONACCREDITED', | 
| 132 | 132 | 'issuerCA' => '/DC=org/DC=pkiN/CN=PKI N', | 
| 133 | 133 | 'certificates' => [ | 
| 134 | - [ | |
| 134 | + [ | |
| 135 | 135 | 'status' => 'CORRECT', | 
| 136 | 136 | 'public' => 'caN-client-cert.pem', | 
| 137 | 137 | 'private' => 'caN-client-cert.key', | 
| 138 | 138 | 'expected' => 'FAIL'], | 
| 139 | - ] | |
| 140 | - ] | |
| 141 | - ], | |
| 142 | - 'accreditedCAsURL' => '', | |
| 139 | + ] | |
| 140 | + ] | |
| 141 | + ], | |
| 142 | + 'accreditedCAsURL' => '', | |
| 143 | 143 | ], | 
| 144 | 144 | 'eduGainResolver' => [ | 
| 145 | 145 | 'url' => 'https://technical.edugain.org/api.php', |