@@ -755,7 +755,22 @@ |
||
755 | 755 | } |
756 | 756 | ?> |
757 | 757 | <div id="tabs-<?php echo $i;?>"> |
758 | - <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button> |
|
758 | + <button id="run_<?php if ($i==3) { |
|
759 | + echo 'd'; |
|
760 | +} else { |
|
761 | + echo 'o'; |
|
762 | +} |
|
763 | +?>_tests"; onclick="run_<?php if ($i==3) { |
|
764 | + echo 'dynamic'; |
|
765 | +} else { |
|
766 | + echo 'openroaming'; |
|
767 | +} |
|
768 | +?>()"><?php if ($i==3) { |
|
769 | + echo _("Repeat dynamic connectivity tests"); |
|
770 | +} else { |
|
771 | + echo _("Repeat OpenRoaming connectivity tests"); |
|
772 | +} |
|
773 | +?></button> |
|
759 | 774 | |
760 | 775 | <?php |
761 | 776 | echo "<div id='"; |
@@ -578,9 +578,9 @@ discard block |
||
578 | 578 | $naptr = $rfc7585suite->relevantNAPTR(); |
579 | 579 | if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
580 | 580 | if ($dynType == "") { |
581 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
581 | + echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
582 | 582 | } else { |
583 | - echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
583 | + echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
584 | 584 | } |
585 | 585 | } else { |
586 | 586 | echo "<table>"; |
@@ -698,7 +698,7 @@ discard block |
||
698 | 698 | echo "} |
699 | 699 | </script>"; |
700 | 700 | } else { |
701 | - echo ' |
|
701 | + echo ' |
|
702 | 702 | function run_openroaming() { |
703 | 703 | running_ajax_openroaming = 0; |
704 | 704 | $("#main_openroaming_ico").attr("src",icon_loading); |
@@ -720,10 +720,10 @@ discard block |
||
720 | 720 | } |
721 | 721 | } |
722 | 722 | if ($dynType == '') { |
723 | - $naptrs[0] = $naptr; |
|
724 | - } else { |
|
725 | - $naptrs[1] = $naptr; |
|
726 | - } |
|
723 | + $naptrs[0] = $naptr; |
|
724 | + } else { |
|
725 | + $naptrs[1] = $naptr; |
|
726 | + } |
|
727 | 727 | } |
728 | 728 | echo "<strong>" . _("Static connectivity tests") . "</strong> |
729 | 729 | <table><tr> |
@@ -736,7 +736,7 @@ discard block |
||
736 | 736 | </tr></table>"; |
737 | 737 | } |
738 | 738 | if (isset($orrealm) && count($orrealm) && ($naptrs[1] > 0)) { |
739 | - echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
739 | + echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
740 | 740 | <table><tr> |
741 | 741 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'> </td> |
742 | 742 | </tr></table>"; |
@@ -774,12 +774,12 @@ discard block |
||
774 | 774 | <?php |
775 | 775 | for ($i=3; $i<5; $i++) { |
776 | 776 | if ($i == 3 && $naptrs[0] <= 0) { |
777 | - continue; |
|
777 | + continue; |
|
778 | 778 | } |
779 | 779 | if ($i == 4) { |
780 | - if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) { |
|
781 | - continue; |
|
782 | - } |
|
780 | + if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) { |
|
781 | + continue; |
|
782 | + } |
|
783 | 783 | } |
784 | 784 | if ($i == 3) { |
785 | 785 | $rfc7585suite = $dnsChecks; |
@@ -796,16 +796,16 @@ discard block |
||
796 | 796 | echo "_tests'><fieldset class='option_container'> |
797 | 797 | <legend><strong>"; |
798 | 798 | if ($i==3) { |
799 | - echo _("DYNAMIC connectivity tests"); |
|
799 | + echo _("DYNAMIC connectivity tests"); |
|
800 | 800 | } else { |
801 | - echo _("OpenRoaming connectivity tests"); |
|
801 | + echo _("OpenRoaming connectivity tests"); |
|
802 | 802 | } |
803 | 803 | echo "</strong></legend>"; |
804 | 804 | $prefix1 = 'dynamic'; |
805 | 805 | $prefix2 = ''; |
806 | 806 | if ($i == 4) { |
807 | - $prefix1 = 'openroaming'; |
|
808 | - $prefix2 = $prefix1; |
|
807 | + $prefix1 = 'openroaming'; |
|
808 | + $prefix2 = $prefix1; |
|
809 | 809 | } |
810 | 810 | $resultstoprint = []; |
811 | 811 | if (count($rfc7585suite->NAPTR_hostname_records) > 0) { |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $loggerInstance = new \core\common\Logging(); |
25 | 25 | |
@@ -69,13 +69,13 @@ discard block |
||
69 | 69 | $dnsChecksOR = new \core\diag\RFC7585Tests($check_realm, "aaa+auth:radius.tls.tcp"); |
70 | 70 | } |
71 | 71 | } else { |
72 | - $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
|
72 | + $error_message = _("You asked for a realm check, but we don't know the realm for this profile!")."</p>"; |
|
73 | 73 | } |
74 | 74 | } else { // someone else's realm, and we don't know anything about it... only shallow checks |
75 | 75 | $check_realm = $validator->realm($realm ?? $_SESSION['check_realm'] ?? ""); |
76 | 76 | if ($check_realm !== FALSE) { |
77 | 77 | $_SESSION['check_realm'] = $check_realm; |
78 | - $testsuite = new \core\diag\RADIUSTests($check_realm, "@" . $check_realm); |
|
78 | + $testsuite = new \core\diag\RADIUSTests($check_realm, "@".$check_realm); |
|
79 | 79 | $dnsChecks = new \core\diag\RFC7585Tests($check_realm); |
80 | 80 | } else { |
81 | 81 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | var listofcas = "<?php echo _("You should update your list of accredited CAs") ?>"; |
123 | 123 | var getitfrom = "<?php echo _("Get it from here.") ?>"; |
124 | 124 | var listsource = "<?php echo \config\Diagnostics::RADIUSTESTS['accreditedCAsURL'] ?>"; |
125 | - var moretext = "<?php echo _("more") . "»" ?>"; |
|
125 | + var moretext = "<?php echo _("more")."»" ?>"; |
|
126 | 126 | var lesstext = "<?php echo "«" ?>"; |
127 | 127 | var morealltext = "<?php echo _("Show detailed information for all tests") ?>"; |
128 | 128 | var eof_error = "<?php echo \core\diag\RADIUSTests::CERTPROB_UNEXPECTED_EOF ?>"; |
@@ -273,10 +273,10 @@ discard block |
||
273 | 273 | |
274 | 274 | cliinfo = cliinfo + '<li>'; |
275 | 275 | if (data.ca[key].certificate[c].finalerror && data.ca[key].certificate[c].finalerror==2) { |
276 | - cliinfo = cliinfo + ' <?php echo _("this test was skipped - no appropriate client certificate");?>' + '</ul></li>'; |
|
276 | + cliinfo = cliinfo + ' <?php echo _("this test was skipped - no appropriate client certificate"); ?>' + '</ul></li>'; |
|
277 | 277 | } else { |
278 | 278 | cliinfo = cliinfo + '<table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] + '" style="width: 24px;"></td><td>' + state; |
279 | - cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
279 | + cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
280 | 280 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
281 | 281 | } |
282 | 282 | |
@@ -475,7 +475,7 @@ discard block |
||
475 | 475 | }); |
476 | 476 | } |
477 | 477 | o = o + cert_data + '</table>'; |
478 | - $("#eap_test" + data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="' + icons[v.level] + '"><span style="position: relative; top: -5px; <?php echo $start;?>: 1em">' + v.eap + ' – <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-<?php echo $start;?>: 40px"><div class="morecontent"><div style="display:none; background: #eee;">' + o + '</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
478 | + $("#eap_test" + data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="' + icons[v.level] + '"><span style="position: relative; top: -5px; <?php echo $start; ?>: 1em">' + v.eap + ' – <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-<?php echo $start; ?>: 40px"><div class="morecontent"><div style="display:none; background: #eee;">' + o + '</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
479 | 479 | }); |
480 | 480 | } |
481 | 481 | |
@@ -486,8 +486,8 @@ discard block |
||
486 | 486 | <?php |
487 | 487 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
488 | 488 | print " |
489 | -$(\"#live_src" . $hostindex . "_img\").attr('src',icon_loading); |
|
490 | -$(\"#live_src" . $hostindex . "_img\").show(); |
|
489 | +$(\"#live_src" . $hostindex."_img\").attr('src',icon_loading); |
|
490 | +$(\"#live_src" . $hostindex."_img\").show(); |
|
491 | 491 | $.ajax({ |
492 | 492 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
493 | 493 | type: 'POST', |
@@ -520,15 +520,15 @@ discard block |
||
520 | 520 | <?php |
521 | 521 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
522 | 522 | if ($testedProfile !== NULL) { |
523 | - $extraarg = "profile_id: " . $testedProfile->identifier . ", "; |
|
523 | + $extraarg = "profile_id: ".$testedProfile->identifier.", "; |
|
524 | 524 | } else { |
525 | 525 | $extraarg = ""; |
526 | 526 | } |
527 | 527 | print " |
528 | -$(\"#src" . $hostindex . "_img\").attr('src',icon_loading); |
|
528 | +$(\"#src" . $hostindex."_img\").attr('src',icon_loading); |
|
529 | 529 | $(\"#src$hostindex\").html(''); |
530 | 530 | running_ajax_stat++; |
531 | -$.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex'}, hostindex: '$hostindex', error: error_handler, success: udp, dataType: 'json'}); |
|
531 | +$.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex'}, hostindex: '$hostindex', error: error_handler, success: udp, dataType: 'json'}); |
|
532 | 532 | "; |
533 | 533 | } |
534 | 534 | |
@@ -586,7 +586,7 @@ discard block |
||
586 | 586 | if ($check_realm === FALSE) { |
587 | 587 | print "<p>$error_message</p>"; |
588 | 588 | } else { |
589 | - print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
589 | + print "<h1>".sprintf(_("Realm testing for: %s"), $check_realm)."</h1>\n"; |
|
590 | 590 | ?> |
591 | 591 | <div id="debug_out" style="display: none"></div> |
592 | 592 | <div id="tabs" style="min-width: 600px; max-width:1000px"> |
@@ -608,25 +608,25 @@ discard block |
||
608 | 608 | // NAPTR existence check |
609 | 609 | if ($dynType == "") { |
610 | 610 | $rfc7585suite = $dnsChecks; |
611 | - echo "<strong>" . _("DNS checks") . "</strong><div>"; |
|
611 | + echo "<strong>"._("DNS checks")."</strong><div>"; |
|
612 | 612 | } else { |
613 | 613 | if (count($orrealm) == 0) { |
614 | 614 | continue; |
615 | 615 | } |
616 | 616 | $rfc7585suite = $dnsChecksOR; |
617 | - echo "<strong>" . _("OpenRoaming DNS checks") . "</strong><div>"; |
|
617 | + echo "<strong>"._("OpenRoaming DNS checks")."</strong><div>"; |
|
618 | 618 | } |
619 | 619 | $naptr = $rfc7585suite->relevantNAPTR(); |
620 | 620 | if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
621 | 621 | if ($dynType == "") { |
622 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
622 | + echo "<tr><td>"._("Dynamic discovery test is not configured")."</td><td>"; |
|
623 | 623 | } else { |
624 | - echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
624 | + echo "<tr><td>"._("OpenRoaming connectivity test is not configured")."</td><td>"; |
|
625 | 625 | } |
626 | 626 | } else { |
627 | 627 | echo "<table>"; |
628 | 628 | // output in friendly words |
629 | - echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>"; |
|
629 | + echo "<tr><td>"._("Checking NAPTR existence:")."</td><td>"; |
|
630 | 630 | switch ($naptr) { |
631 | 631 | case \core\diag\RFC7585Tests::RETVAL_NONAPTR: |
632 | 632 | echo _("This realm has no NAPTR records."); |
@@ -641,7 +641,7 @@ discard block |
||
641 | 641 | |
642 | 642 | // compliance checks for NAPTRs |
643 | 643 | if ($naptr > 0) { |
644 | - echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>"; |
|
644 | + echo "<tr><td>"._("Checking NAPTR compliance (flag = S and regex = {empty}):")."</td><td>"; |
|
645 | 645 | $naptr_valid = $rfc7585suite->relevantNAPTRcompliance(); |
646 | 646 | switch ($naptr_valid) { |
647 | 647 | case \core\diag\RADIUSTests::RETVAL_OK: |
@@ -656,7 +656,7 @@ discard block |
||
656 | 656 | // SRV resolution |
657 | 657 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK) { |
658 | 658 | $srv = $rfc7585suite->relevantNAPTRsrvResolution(); |
659 | - echo "<tr><td>" . _("Checking SRVs:") . "</td><td>"; |
|
659 | + echo "<tr><td>"._("Checking SRVs:")."</td><td>"; |
|
660 | 660 | switch ($srv) { |
661 | 661 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
662 | 662 | echo _("This check was skipped."); |
@@ -672,7 +672,7 @@ discard block |
||
672 | 672 | // IP addresses for the hosts |
673 | 673 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK && $srv > 0) { |
674 | 674 | $hosts = $rfc7585suite->relevantNAPTRhostnameResolution(); |
675 | - echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>"; |
|
675 | + echo "<tr><td>"._("Checking IP address resolution:")."</td><td>"; |
|
676 | 676 | switch ($srv) { |
677 | 677 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
678 | 678 | echo _("This check was skipped."); |
@@ -689,12 +689,12 @@ discard block |
||
689 | 689 | echo "</table><br/>"; |
690 | 690 | if ($dynType == "") { |
691 | 691 | if (count($testsuite->listerrors()) == 0) { |
692 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!"); |
|
692 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("with no DNS errors encountered. Congratulations!"); |
|
693 | 693 | } else { |
694 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
694 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("but there were DNS errors! Check them!")." "._("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
695 | 695 | echo "<div class='notacceptable'><table>"; |
696 | 696 | foreach ($testsuite->listerrors() as $details) { |
697 | - echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
697 | + echo "<tr><td>".$details['TYPE']."</td><td>".$details['TARGET']."</td></tr>"; |
|
698 | 698 | } |
699 | 699 | echo "</table></div>"; |
700 | 700 | } |
@@ -713,7 +713,7 @@ discard block |
||
713 | 713 | $("#dynamic_tests").show(); |
714 | 714 | '; |
715 | 715 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
716 | - $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port']; |
|
716 | + $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port']; |
|
717 | 717 | $expectedName = $addr['hostname']; |
718 | 718 | $ssltest = 1; |
719 | 719 | if (isset($addr['unavailable']) && $addr['unavailable']) { |
@@ -722,9 +722,9 @@ discard block |
||
722 | 722 | //$rfc6614suite = new \core\diag\RFC6614Tests([$host], $expectedName, $consortiumName); |
723 | 723 | print " |
724 | 724 | running_ajax_dyn++; |
725 | - $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest }, hostindex: '$hostindex', error: error_handler, success: capath, dataType: 'json'}); |
|
725 | + $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'capath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest }, hostindex: '$hostindex', error: error_handler, success: capath, dataType: 'json'}); |
|
726 | 726 | running_ajax_dyn++; |
727 | - $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', ssltest: $ssltest }, hostindex: '$hostindex', error: error_handler, success: clients, dataType: 'json'}); |
|
727 | + $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'clients', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', ssltest: $ssltest }, hostindex: '$hostindex', error: error_handler, success: clients, dataType: 'json'}); |
|
728 | 728 | "; |
729 | 729 | } |
730 | 730 | echo "} |
@@ -740,11 +740,11 @@ discard block |
||
740 | 740 | $("#openroaming_tests").show(); |
741 | 741 | '; |
742 | 742 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
743 | - $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port']; |
|
743 | + $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port']; |
|
744 | 744 | $expectedName = $addr['hostname']; |
745 | 745 | print " |
746 | 746 | running_ajax_openroaming++; |
747 | - $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, hostindex: '$hostindex', openroaming: true, error: error_handler, success: capath, dataType: 'json'}); |
|
747 | + $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, hostindex: '$hostindex', openroaming: true, error: error_handler, success: capath, dataType: 'json'}); |
|
748 | 748 | "; |
749 | 749 | } |
750 | 750 | echo "} |
@@ -757,18 +757,18 @@ discard block |
||
757 | 757 | $naptrs[1] = $naptr; |
758 | 758 | } |
759 | 759 | } |
760 | - echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
760 | + echo "<strong>"._("Static connectivity tests")."</strong> |
|
761 | 761 | <table><tr> |
762 | 762 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
763 | 763 | </tr></table>"; |
764 | 764 | if ($naptrs[0] > 0) { |
765 | - echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
765 | + echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
766 | 766 | <table><tr> |
767 | 767 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
768 | 768 | </tr></table>"; |
769 | 769 | } |
770 | 770 | if (isset($orrealm) && count($orrealm) && ($naptrs[1] > 0)) { |
771 | - echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
771 | + echo "<hr><strong>"._("OpenRoaming connectivity tests")."</strong> |
|
772 | 772 | <table><tr> |
773 | 773 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'> </td> |
774 | 774 | </tr></table>"; |
@@ -788,12 +788,12 @@ discard block |
||
788 | 788 | print "<p>"; |
789 | 789 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
790 | 790 | print "<hr>"; |
791 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
791 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
792 | 792 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
793 | 793 | <tr> |
794 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
794 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
795 | 795 | <td id='src$hostindex' colspan=2> |
796 | -" . _("testing...") . " |
|
796 | +"._("testing...")." |
|
797 | 797 | </td> |
798 | 798 | </tr> |
799 | 799 | </table>"; |
@@ -804,7 +804,7 @@ discard block |
||
804 | 804 | |
805 | 805 | </div> |
806 | 806 | <?php |
807 | - for ($i=3; $i<5; $i++) { |
|
807 | + for ($i = 3; $i < 5; $i++) { |
|
808 | 808 | if ($i == 3 && $naptrs[0] <= 0) { |
809 | 809 | continue; |
810 | 810 | } |
@@ -819,15 +819,15 @@ discard block |
||
819 | 819 | $rfc7585suite = $dnsChecksOR; |
820 | 820 | } |
821 | 821 | ?> |
822 | - <div id="tabs-<?php echo $i;?>"> |
|
823 | - <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button> |
|
822 | + <div id="tabs-<?php echo $i; ?>"> |
|
823 | + <button id="run_<?php if ($i == 3) echo 'd'; else echo 'o'; ?>_tests"; onclick="run_<?php if ($i == 3) echo 'dynamic'; else echo 'openroaming'; ?>()"><?php if ($i == 3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests"); ?></button> |
|
824 | 824 | |
825 | 825 | <?php |
826 | 826 | echo "<div id='"; |
827 | - if ($i==3) { echo 'dynamic'; } else { echo 'openroaming'; } |
|
827 | + if ($i == 3) { echo 'dynamic'; } else { echo 'openroaming'; } |
|
828 | 828 | echo "_tests'><fieldset class='option_container'> |
829 | 829 | <legend><strong>"; |
830 | - if ($i==3) { |
|
830 | + if ($i == 3) { |
|
831 | 831 | echo _("DYNAMIC connectivity tests"); |
832 | 832 | } else { |
833 | 833 | echo _("OpenRoaming connectivity tests"); |
@@ -841,11 +841,11 @@ discard block |
||
841 | 841 | } |
842 | 842 | $resultstoprint = []; |
843 | 843 | if (count($rfc7585suite->NAPTR_hostname_records) > 0) { |
844 | - $resultstoprint[] = '<div style="align:'.$end.'; display: none;" id="' . $prefix1 . '_result_fail">' . _("Some errors were found during the tests, see below") . '</div><div style="align:'.$end.'; display: none;" id="' . $prefix1 . '_result_pass">' . _("All tests passed, congratulations!") . '</div>'; |
|
845 | - $resultstoprint[] = '<div style="align:'.$end.';"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
|
844 | + $resultstoprint[] = '<div style="align:'.$end.'; display: none;" id="'.$prefix1.'_result_fail">'._("Some errors were found during the tests, see below").'</div><div style="align:'.$end.'; display: none;" id="'.$prefix1.'_result_pass">'._("All tests passed, congratulations!").'</div>'; |
|
845 | + $resultstoprint[] = '<div style="align:'.$end.';"><a href="" class="moreall">'._('Show detailed information for all tests').'</a></div>'.'<p><strong>'._("Checking server handshake...")."</strong><p>"; |
|
846 | 846 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
847 | - $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]); |
|
848 | - $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong> (' . $addr['hostname'] . ')'; |
|
847 | + $bracketaddr = ($addr["family"] == "IPv6" ? "[".$addr["IP"]."]" : $addr["IP"]); |
|
848 | + $resultstoprint[] = '<p><strong>'.$bracketaddr.' TCP/'.$addr['port'].'</strong> ('.$addr['hostname'].')'; |
|
849 | 849 | $prots = []; |
850 | 850 | if (isset($addr['protocols'])) { |
851 | 851 | foreach ($addr['protocols'] as $protocol) { |
@@ -855,18 +855,18 @@ discard block |
||
855 | 855 | } |
856 | 856 | } |
857 | 857 | if (!empty($prots)) { |
858 | - $resultstoprint[] = ' ' . _("supported TLS protocols: "); |
|
858 | + $resultstoprint[] = ' '._("supported TLS protocols: "); |
|
859 | 859 | $resultstoprint[] = implode(', ', $prots); |
860 | 860 | if (!isset($addr['istls13']) || !$addr['istls13']) { |
861 | - $resultstoprint[] = ' ' . '<font color="red">' . _("not supported: ") . 'TLS1.3</font>'; |
|
861 | + $resultstoprint[] = ' '.'<font color="red">'._("not supported: ").'TLS1.3</font>'; |
|
862 | 862 | } |
863 | 863 | } |
864 | 864 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
865 | - $resultstoprint[] = "<table id='" . $prefix2 . "caresults$hostindex' style='width:100%'> |
|
865 | + $resultstoprint[] = "<table id='".$prefix2."caresults$hostindex' style='width:100%'> |
|
866 | 866 | <tr> |
867 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcca$hostindex" . "_img'></td> |
|
868 | -<td id='" . $prefix2 . "srcca$hostindex'> |
|
869 | -" . _("testing...") . " |
|
867 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcca$hostindex"."_img'></td> |
|
868 | +<td id='" . $prefix2."srcca$hostindex'> |
|
869 | +"._("testing...")." |
|
870 | 870 | </td> |
871 | 871 | </tr> |
872 | 872 | </table>"; |
@@ -874,26 +874,26 @@ discard block |
||
874 | 874 | } |
875 | 875 | $clientstest = []; |
876 | 876 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
877 | - $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
|
878 | - $clientstest[] = "<span id='" . $prefix2 . "clientresults$hostindex'><table style='width:100%'> |
|
877 | + $clientstest[] = '<p><strong>'.$addr['IP'].' TCP/'.$addr['port'].'</strong></p><ol>'; |
|
878 | + $clientstest[] = "<span id='".$prefix2."clientresults$hostindex'><table style='width:100%'> |
|
879 | 879 | <tr> |
880 | 880 | <td class='icon_td'>"; |
881 | - if ($i == 4 ) { |
|
881 | + if ($i == 4) { |
|
882 | 882 | $clientstest[] = "<!--"; |
883 | 883 | } |
884 | - $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcclient$hostindex" . "_img'></td> |
|
885 | -<td id='" . $prefix2 . "srcclient$hostindex'> |
|
886 | -" . _("testing..."); |
|
884 | + $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcclient$hostindex"."_img'></td> |
|
885 | +<td id='" . $prefix2."srcclient$hostindex'> |
|
886 | +"._("testing..."); |
|
887 | 887 | |
888 | - if ($i == 4 ) { |
|
889 | - $clientstest[] = "-->" . _("not implemented yet"); |
|
888 | + if ($i == 4) { |
|
889 | + $clientstest[] = "-->"._("not implemented yet"); |
|
890 | 890 | } |
891 | 891 | $clientstest[] = "</td></tr></table></span>"; |
892 | 892 | $clientstest[] = '</ol>'; |
893 | 893 | } |
894 | 894 | echo '<div style="align:'.$end.';">'; |
895 | 895 | echo join('', $resultstoprint); |
896 | - echo '<span id="' . $prefix2 . 'clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
896 | + echo '<span id="'.$prefix2.'clientstest" style="display: none;"><p><hr><b>'._('Checking if certificates from CAs are accepted...').'</b><p>'._('A few client certificates will be tested to check if servers are resistant to some certificate problems.').'<p>'; |
|
897 | 897 | print join('', $clientstest); |
898 | 898 | echo '</span>'; |
899 | 899 | echo '</div>'; |
@@ -907,7 +907,7 @@ discard block |
||
907 | 907 | // check if truncates/dies on Operator-Name |
908 | 908 | if ($my_profile !== NULL) { |
909 | 909 | echo "<div id='tabs-n'><fieldset class='option_container'> |
910 | - <legend><strong>" . _("Live login test") . "</strong></legend>"; |
|
910 | + <legend><strong>" . _("Live login test")."</strong></legend>"; |
|
911 | 911 | $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1); |
912 | 912 | if (count($prof_compl) > 0) { |
913 | 913 | $passwordReqired = FALSE; |
@@ -920,34 +920,34 @@ discard block |
||
920 | 920 | $clientCertRequired = TRUE; |
921 | 921 | } |
922 | 922 | } |
923 | - echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p> |
|
924 | - <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.") . "</p> |
|
925 | - <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
|
923 | + echo "<div id='disposable_credential_container'><p>"._("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.")."</p> |
|
924 | + <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.")."</p> |
|
925 | + <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!")."</p></div> |
|
926 | 926 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
927 | 927 | <input type='hidden' name='test_type' value='udp_login'> |
928 | - <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang() . "'> |
|
929 | - <input type='hidden' name='profile_id' value='" . $my_profile->identifier . "'> |
|
928 | + <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang()."'> |
|
929 | + <input type='hidden' name='profile_id' value='" . $my_profile->identifier."'> |
|
930 | 930 | <table id='live_tests'>"; |
931 | 931 | // if any password based EAP methods are available enable this section |
932 | 932 | if ($passwordReqired) { |
933 | - echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr> |
|
934 | - <tr><td>" . _("Real (inner) username:") . "</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
935 | - echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
936 | - echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
933 | + echo "<tr><td colspan='2'><strong>"._("Password-based EAP types")."</strong></td></tr> |
|
934 | + <tr><td>" . _("Real (inner) username:")."</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
935 | + echo "<tr><td>"._("Anonymous outer ID (optional):")."</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
936 | + echo "<tr><td>"._("Password:")."</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
937 | 937 | } |
938 | 938 | // ask for cert + privkey if TLS-based method is active |
939 | 939 | if ($clientCertRequired) { |
940 | - echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
941 | - <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
942 | - <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
943 | - <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
940 | + echo "<tr><td colspan='2'><strong>"._("Certificate-based EAP types")."</strong></td></tr> |
|
941 | + <tr><td>" . _("Certificate file (.p12 or .pfx):")."</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
942 | + <tr><td>" . _("Certificate password, if any:")."</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
943 | + <tr><td>" . _("Username, if different from certificate Subject:")."</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
944 | 944 | } |
945 | - echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
|
945 | + echo "<tr><td colspan='2'><button id='submit_credentials'>"._("Submit credentials")."</button></td></tr></table></form>"; |
|
946 | 946 | echo "<div id='live_login_results' style='display:none'>"; |
947 | 947 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
948 | 948 | print "<hr>"; |
949 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
950 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; $start: 20px; bottom: 0px; '></span>"; |
|
949 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
950 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; $start: 20px; bottom: 0px; '></span>"; |
|
951 | 951 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
952 | 952 | } |
953 | 953 | echo "</div>"; |
@@ -962,9 +962,9 @@ discard block |
||
962 | 962 | } |
963 | 963 | |
964 | 964 | if (isset($_POST['comefrom'])) { |
965 | - $return = htmlspecialchars_decode($_POST['comefrom']) . ( $inst_id ? "?inst_id=" . $inst_id : "" ); |
|
965 | + $return = htmlspecialchars_decode($_POST['comefrom']).($inst_id ? "?inst_id=".$inst_id : ""); |
|
966 | 966 | echo "<form method='post' action='$return' accept-charset='UTF-8'> |
967 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CLOSE . "'>" . sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp) . "</button>" |
|
967 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CLOSE."'>".sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp)."</button>" |
|
968 | 968 | . "</form>"; |
969 | 969 | } |
970 | 970 | if ($check_realm !== FALSE) { |
@@ -17,9 +17,9 @@ discard block |
||
17 | 17 | class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface |
18 | 18 | { |
19 | 19 | |
20 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
20 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
23 | 23 | private const EDUPKI_RA_ID = 700; |
24 | 24 | private const EDUPKI_CERT_PROFILE = "User SOAP"; |
25 | 25 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -35,13 +35,13 @@ discard block |
||
35 | 35 | parent::__construct(); |
36 | 36 | |
37 | 37 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) { |
38 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
38 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
39 | 39 | } |
40 | 40 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) { |
41 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
41 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
42 | 42 | } |
43 | 43 | if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) { |
44 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
44 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
45 | 45 | } |
46 | 46 | } |
47 | 47 | |
@@ -75,19 +75,19 @@ discard block |
||
75 | 75 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
76 | 76 | try { |
77 | 77 | $altArray = [# Array mit den Subject Alternative Names |
78 | - "email:" . $csr["USERNAME"] |
|
78 | + "email:".$csr["USERNAME"] |
|
79 | 79 | ]; |
80 | 80 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
81 | 81 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
82 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n"); |
|
83 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
82 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n"); |
|
83 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
84 | 84 | $this->loggerInstance->debug(5, "PARAM_3: "); |
85 | 85 | $this->loggerInstance->debug(5, $altArray); |
86 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n"); |
|
87 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
88 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
89 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n"); |
|
90 | - $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n"); |
|
86 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n"); |
|
87 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
88 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
89 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n"); |
|
90 | + $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n"); |
|
91 | 91 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
92 | 92 | $soapNewRequest = $soapPub->newRequest( |
93 | 93 | CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID |
@@ -109,11 +109,11 @@ discard block |
||
109 | 109 | } catch (Exception $e) { |
110 | 110 | // PHP 7.1 can do this much better |
111 | 111 | if (is_soap_fault($e)) { |
112 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
112 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
113 | 113 | $e->faultstring |
114 | 114 | }\n"); |
115 | 115 | } |
116 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
116 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
117 | 117 | } |
118 | 118 | try { |
119 | 119 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -125,8 +125,8 @@ discard block |
||
125 | 125 | $soapReqnum, [ |
126 | 126 | "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID, |
127 | 127 | "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE, |
128 | - "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'], |
|
129 | - "SubjectAltNames" => ["email:" . $csr["USERNAME"]], |
|
128 | + "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'], |
|
129 | + "SubjectAltNames" => ["email:".$csr["USERNAME"]], |
|
130 | 130 | "NotBefore" => (new \DateTime())->format('c'), |
131 | 131 | "NotAfter" => $expiry->format('c'), |
132 | 132 | ] |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
146 | 146 | // rather than just using the string. Grr. |
147 | 147 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
148 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
148 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
149 | 149 | // retrieve our RA cert from filesystem |
150 | 150 | // the RA certificates are not needed right now because we |
151 | 151 | // have resorted to S/MIME signatures with openssl command-line |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
158 | 158 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
159 | 159 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
160 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
160 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
161 | 161 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
162 | 162 | $output = []; |
163 | 163 | $return = 999; |
@@ -166,14 +166,14 @@ discard block |
||
166 | 166 | throw new Exception("Non-zero return value from openssl smime!"); |
167 | 167 | } |
168 | 168 | // and get the signature blob back from the filesystem |
169 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
169 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
170 | 170 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
171 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
172 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
173 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
171 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
172 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
173 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
174 | 174 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
175 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
176 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
175 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
176 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
177 | 177 | if ($soapIssueCert === FALSE) { |
178 | 178 | throw new Exception("The locally approved request was NOT processed by the CA."); |
179 | 179 | } |
@@ -210,9 +210,9 @@ discard block |
||
210 | 210 | throw new Exception("CAInfo has no root certificate for us!"); |
211 | 211 | } |
212 | 212 | } catch (SoapFault $e) { |
213 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
213 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
214 | 214 | } catch (Exception $e) { |
215 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
215 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
216 | 216 | } |
217 | 217 | return [ |
218 | 218 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -245,12 +245,12 @@ discard block |
||
245 | 245 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
246 | 246 | // rather than just using the string. Grr. |
247 | 247 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
248 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
248 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
249 | 249 | // retrieve our RA cert from filesystem |
250 | 250 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
251 | 251 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
252 | 252 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
253 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
253 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
254 | 254 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
255 | 255 | $output = []; |
256 | 256 | $return = 999; |
@@ -259,7 +259,7 @@ discard block |
||
259 | 259 | throw new Exception("Non-zero return value from openssl smime!"); |
260 | 260 | } |
261 | 261 | // and get the signature blob back from the filesystem |
262 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
262 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
263 | 263 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
264 | 264 | if ($soapIssueRev === FALSE) { |
265 | 265 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -267,9 +267,9 @@ discard block |
||
267 | 267 | } catch (Exception $e) { |
268 | 268 | // PHP 7.1 can do this much better |
269 | 269 | if (is_soap_fault($e)) { |
270 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
270 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
271 | 271 | } |
272 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
272 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
273 | 273 | } |
274 | 274 | } |
275 | 275 | |
@@ -369,9 +369,9 @@ discard block |
||
369 | 369 | */ |
370 | 370 | public function soapToXmlInteger($x) |
371 | 371 | { |
372 | - return '<' . $x[0] . '>' |
|
372 | + return '<'.$x[0].'>' |
|
373 | 373 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
374 | - . '</' . $x[0] . '>'; |
|
374 | + . '</'.$x[0].'>'; |
|
375 | 375 | } |
376 | 376 | |
377 | 377 | /** |
@@ -390,9 +390,9 @@ discard block |
||
390 | 390 | // dump private key into directory |
391 | 391 | $outstring = ""; |
392 | 392 | openssl_pkey_export($privateKey, $outstring); |
393 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
393 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
394 | 394 | // PHP can only do one DC in the Subject. But we need three. |
395 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
395 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
396 | 396 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
397 | 397 | $output = []; |
398 | 398 | $return = 999; |
@@ -62,7 +62,7 @@ |
||
62 | 62 | they are from the same user group. You are not allowed to share them to an unlimited |
63 | 63 | audience (e.g. on a publicly accessible web server).</li> |
64 | 64 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to |
65 | -your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
65 | +your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
66 | 66 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on |
67 | 67 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> |
68 | 68 | </ul> |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | $ownermgmt = new \core\UserManagement(); |
83 | 83 | $ownermgmt->addAdminToIdp($my_inst, $_SESSION['user']); |
84 | 84 | } else { |
85 | - echo "Fatal Error: you wanted to take control over an " . \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ", but are not a " . \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . " operator!"; |
|
85 | + echo "Fatal Error: you wanted to take control over an ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant'].", but are not a ".\config\ConfAssistant::CONSORTIUM['nomenclature_federation']." operator!"; |
|
86 | 86 | exit(1); |
87 | 87 | } |
88 | 88 | break; |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | default: |
119 | 119 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
120 | 120 | } |
121 | - echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter) . " " . $cryptText, _("Sent successfully.")); |
|
121 | + echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter)." ".$cryptText, _("Sent successfully.")); |
|
122 | 122 | break; |
123 | 123 | case "FAILURE": |
124 | 124 | echo $uiElements->boxError(_("No invitation email could be sent!"), _("Sending failure!")); |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | default: |
139 | 139 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
140 | 140 | } |
141 | - echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter) . " " . $cryptText, _("Partial success.")); |
|
141 | + echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter)." ".$cryptText, _("Partial success.")); |
|
142 | 142 | break; |
143 | 143 | case "INVALIDSYNTAX": |
144 | 144 | echo $uiElements->boxError(_("The invitation email address was malformed, no invitation was sent!"), _("The invitation email address was malformed, no invitation was sent!")); |
@@ -190,7 +190,7 @@ discard block |
||
190 | 190 | <?php echo $invite; ?> |
191 | 191 | </td> |
192 | 192 | <td> |
193 | - <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ( $oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : "" ); ?> accept-charset='UTF-8'> |
|
193 | + <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ($oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : ""); ?> accept-charset='UTF-8'> |
|
194 | 194 | <input type='hidden' name='admin_id' value='<?php echo $oneowner['ID']; ?>'></input> |
195 | 195 | <button type='submit' name='submitbutton' class='delete' value='<?php echo web\lib\common\FormElements::BUTTON_DELETE; ?>'><?php echo _("Delete Administrator") ?></button> |
196 | 196 | </form> |
@@ -207,10 +207,10 @@ discard block |
||
207 | 207 | $loggerInstance = new \core\common\Logging(); |
208 | 208 | $loggerInstance->debug(4, "Displaying pending invitations for $my_inst->identifier.\n"); |
209 | 209 | if (count($pending_invites) > 0) { |
210 | - echo "<strong>" . _("Pending invitations for this IdP") . "</strong>"; |
|
210 | + echo "<strong>"._("Pending invitations for this IdP")."</strong>"; |
|
211 | 211 | echo "<table>"; |
212 | 212 | foreach ($pending_invites as $invitee) { |
213 | - echo "<tr><td>" . $invitee['mail'] . "</td><td>" . sprintf(_("(expires %s)"), $invitee['expiry']) . "</td></tr>"; |
|
213 | + echo "<tr><td>".$invitee['mail']."</td><td>".sprintf(_("(expires %s)"), $invitee['expiry'])."</td></tr>"; |
|
214 | 214 | } |
215 | 215 | echo "</table>"; |
216 | 216 | } |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | |
233 | 233 | if (!$is_admin_himself) { |
234 | 234 | echo "<form action='inc/manageAdmins.inc.php?inst_id=$my_inst->identifier' method='post' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
235 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_TAKECONTROL . "'>" . sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant) . "</button> |
|
235 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_TAKECONTROL."'>".sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant)."</button> |
|
236 | 236 | </form>"; |
237 | 237 | } |
238 | 238 | } |
@@ -522,7 +522,7 @@ discard block |
||
522 | 522 | if ( |
523 | 523 | get_class($this) == "devices\apple_mobileconfig\DeviceMobileconfigIos12plus" || |
524 | 524 | get_class($this) == "devices\apple_mobileconfig\DeviceMobileconfigOsX" |
525 | - ) { |
|
525 | + ) { |
|
526 | 526 | return "WPA2"; |
527 | 527 | } else { |
528 | 528 | return "WPA"; |
@@ -809,7 +809,7 @@ discard block |
||
809 | 809 | \core\common\Entity::$nomenclature_idp, |
810 | 810 | count($this->CAsAccountedFor)+1, |
811 | 811 | ($ca['root'] ? _("Root") : _("Intermediate"))) . |
812 | - "</string> |
|
812 | + "</string> |
|
813 | 813 | <key>PayloadIdentifier</key> |
814 | 814 | <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
815 | 815 | <key>PayloadOrganization</key> |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | \core\common\Entity::intoThePotatoes(); |
146 | 146 | // that's what all variants support. Sub-classes can change it. |
147 | 147 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_PEAP_MSCHAP2, \core\common\EAP::EAPTYPE_TTLS_PAP, \core\common\EAP::EAPTYPE_TTLS_MSCHAP2, \core\common\EAP::EAPTYPE_SILVERBULLET]); |
148 | - foreach(\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
148 | + foreach (\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
149 | 149 | if ($eapType->isPasswordRequired() || $eapType->isPasswordOptional()) { |
150 | 150 | $this->specialities['internal:verify_userinput_suffix'][serialize($eapType->getArrayRep())] = _("It is not possible to actively verify the user input for suffix match; but if there is no 'Terms of Use' configured, the installer will display a corresponding hint to the user instead."); |
151 | 151 | $this->specialities['media:consortium_OI'][serialize($eapType->getArrayRep())] = _("Passpoint networks are not provisioned due to severe UI limitations during install time."); |
@@ -184,15 +184,15 @@ discard block |
||
184 | 184 | <key>PayloadDescription</key> |
185 | 185 | <string>$tagline</string> |
186 | 186 | <key>PayloadDisplayName</key> |
187 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
187 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
188 | 188 | <key>PayloadIdentifier</key> |
189 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
189 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
190 | 190 | <key>PayloadOrganization</key> |
191 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
191 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
192 | 192 | <key>PayloadType</key> |
193 | 193 | <string>Configuration</string> |
194 | 194 | <key>PayloadUUID</key> |
195 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
195 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
196 | 196 | <key>PayloadVersion</key> |
197 | 197 | <integer>1</integer>"; |
198 | 198 | \core\common\Entity::outOfThePotatoes(); |
@@ -224,21 +224,21 @@ discard block |
||
224 | 224 | { |
225 | 225 | \core\common\Entity::intoThePotatoes(); |
226 | 226 | if (isset($this->attributes['support:info_file'])) { |
227 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
227 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
228 | 228 | } |
229 | 229 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
230 | 230 | if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) { |
231 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
231 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
232 | 232 | \core\common\Entity::outOfThePotatoes(); |
233 | 233 | return $retval; |
234 | 234 | } else { |
235 | 235 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
236 | 236 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
237 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
237 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
238 | 238 | \core\common\Entity::outOfThePotatoes(); |
239 | 239 | return $retval; |
240 | 240 | } |
241 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
241 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
242 | 242 | \core\common\Entity::outOfThePotatoes(); |
243 | 243 | return $retval; |
244 | 244 | } |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | // also escape htmlspecialchars |
263 | 263 | // not all names and profiles have a name, so be prepared |
264 | 264 | |
265 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
265 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
266 | 266 | |
267 | 267 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
268 | 268 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | |
305 | 305 | file_put_contents('installer_profile', $outputXml); |
306 | 306 | |
307 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
307 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
308 | 308 | |
309 | 309 | if (!$this->sign) { |
310 | 310 | rename("installer_profile", $fileName); |
@@ -313,7 +313,7 @@ discard block |
||
313 | 313 | } |
314 | 314 | // still here? Then we are signing. |
315 | 315 | $retval = 0; |
316 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null", $retval); |
|
316 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null", $retval); |
|
317 | 317 | if ($retval !== 0 || $signing === FALSE) { |
318 | 318 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
319 | 319 | // we are passing a name that will be then used as a path - this will not exist, hence an error will |
@@ -340,19 +340,19 @@ discard block |
||
340 | 340 | $oiCount = $oiCount + count($netDetail['oi']); |
341 | 341 | } |
342 | 342 | $certCount = count($this->attributes['internal:CAs'][0]); |
343 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
343 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
344 | 344 | $out .= "<p>"; |
345 | 345 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
346 | 346 | $out .= "<ul>"; |
347 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
348 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
347 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
348 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
349 | 349 | if ($certCount > 1) { |
350 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
350 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
351 | 351 | } |
352 | 352 | $out .= "</li>"; |
353 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
353 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
354 | 354 | if ($ssidCount > 1) { |
355 | - $out .= " " . sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount+$oiCount, $ssidCount, $oiCount); |
|
355 | + $out .= " ".sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount + $oiCount, $ssidCount, $oiCount); |
|
356 | 356 | } |
357 | 357 | $out .= "</li>"; |
358 | 358 | $out .= "</ul>"; |
@@ -392,7 +392,7 @@ discard block |
||
392 | 392 | <key>ServiceProviderRoamingEnabled</key> |
393 | 393 | <true/> |
394 | 394 | <key>DisplayedOperatorName</key> |
395 | - <string>" . $oiName . "</string>"; |
|
395 | + <string>" . $oiName."</string>"; |
|
396 | 396 | // if we don't know the realm, omit the entire DomainName key |
397 | 397 | if (isset($this->attributes['internal:realm'])) { |
398 | 398 | $retval .= "<key>DomainName</key> |
@@ -405,7 +405,7 @@ discard block |
||
405 | 405 | <array>"; |
406 | 406 | |
407 | 407 | foreach ($consortiumOi as $oneCons) { |
408 | - $retval .= "<string>" . strtoupper($oneCons) . "</string>"; |
|
408 | + $retval .= "<string>".strtoupper($oneCons)."</string>"; |
|
409 | 409 | } |
410 | 410 | |
411 | 411 | $retval .= "</array>"; |
@@ -443,7 +443,7 @@ discard block |
||
443 | 443 | <dict> |
444 | 444 | <key>AcceptEAPTypes</key> |
445 | 445 | <array> |
446 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
446 | + <integer>" . $eapType['OUTER']."</integer> |
|
447 | 447 | </array> |
448 | 448 | <key>EAPFASTProvisionPAC</key> |
449 | 449 | <true /> |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | "; |
457 | 457 | if ($realm !== NULL) { |
458 | 458 | $retval .= "<key>OuterIdentity</key> |
459 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
459 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
460 | 460 | "; |
461 | 461 | } |
462 | 462 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -480,11 +480,11 @@ discard block |
||
480 | 480 | $retval .= " |
481 | 481 | </array>"; |
482 | 482 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
483 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
483 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
484 | 484 | } |
485 | 485 | $retval .= " |
486 | 486 | <key>TTLSInnerAuthentication</key> |
487 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
487 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
488 | 488 | </dict>"; |
489 | 489 | return $retval; |
490 | 490 | } |
@@ -504,9 +504,9 @@ discard block |
||
504 | 504 | // characters are still reversed, invert on use! |
505 | 505 | $buffer .= "<string>Manual</string> |
506 | 506 | <key>ProxyServer</key> |
507 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
507 | + <string>" . strrev($serverAndPort[1])."</string> |
|
508 | 508 | <key>ProxyServerPort</key> |
509 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
509 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
510 | 510 | <key>ProxyPACFallbackAllowed</key> |
511 | 511 | <false/>"; |
512 | 512 | } else { |
@@ -556,7 +556,7 @@ discard block |
||
556 | 556 | throw new Exception("SSID must be a string!"); |
557 | 557 | } |
558 | 558 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
559 | - $payloadIdentifier = "wifi." . $this->serial; |
|
559 | + $payloadIdentifier = "wifi.".$this->serial; |
|
560 | 560 | $payloadShortName = sprintf(_("%s - SSID %s"), $prettyName, $escapedSSID); |
561 | 561 | $payloadName = sprintf(_("%s configuration for network name %s"), $prettyName, $escapedSSID); |
562 | 562 | $encryptionTypeString = $this->encryptionString(); |
@@ -586,9 +586,9 @@ discard block |
||
586 | 586 | if (count($toBeConfigured) == 0) { |
587 | 587 | return ""; |
588 | 588 | } |
589 | - $payloadIdentifier = "hs20.".implode('-',$toBeConfigured); |
|
589 | + $payloadIdentifier = "hs20.".implode('-', $toBeConfigured); |
|
590 | 590 | $payloadShortName = sprintf(_("%s - RCOI"), $prettyName); |
591 | - $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"),$prettyName); |
|
591 | + $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"), $prettyName); |
|
592 | 592 | $encryptionTypeString = $this->encryptionString(); |
593 | 593 | $setupModesString = ""; |
594 | 594 | $wifiNetworkIdentification = $this->passPointBlock($toBeConfigured, $prettyName); |
@@ -607,11 +607,11 @@ discard block |
||
607 | 607 | <key>PayloadDisplayName</key> |
608 | 608 | <string>$payloadShortName</string> |
609 | 609 | <key>PayloadIdentifier</key> |
610 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
610 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
611 | 611 | <key>PayloadOrganization</key> |
612 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
612 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
613 | 613 | <key>PayloadType</key> |
614 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
614 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
615 | 615 | $retval .= $this->proxySettings(); |
616 | 616 | $retval .= $setupModesString; |
617 | 617 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -623,7 +623,7 @@ discard block |
||
623 | 623 | } |
624 | 624 | $retval .= " |
625 | 625 | <key>PayloadUUID</key> |
626 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
626 | + <string>" . \core\common\Entity::uuid()."</string> |
|
627 | 627 | <key>PayloadVersion</key> |
628 | 628 | <integer>1</integer> |
629 | 629 | $wifiNetworkIdentification</dict>"; |
@@ -653,15 +653,15 @@ discard block |
||
653 | 653 | <key>IsHotspot</key> |
654 | 654 | <false/> |
655 | 655 | <key>PayloadDescription</key> |
656 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
656 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
657 | 657 | <key>PayloadDisplayName</key> |
658 | - <string>" . _("Disabled WiFi network") . "</string> |
|
658 | + <string>" . _("Disabled WiFi network")."</string> |
|
659 | 659 | <key>PayloadIdentifier</key> |
660 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
660 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
661 | 661 | <key>PayloadType</key> |
662 | 662 | <string>com.apple.wifi.managed</string> |
663 | 663 | <key>PayloadUUID</key> |
664 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
664 | + <string>".\core\common\Entity::uuid()."</string> |
|
665 | 665 | <key>PayloadVersion</key> |
666 | 666 | <real>1</real>"; |
667 | 667 | $retval .= $this->proxySettings(); |
@@ -741,12 +741,12 @@ discard block |
||
741 | 741 | $mimeBlob = base64_encode($binaryBlob); |
742 | 742 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
743 | 743 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
744 | - $retArray = ["block" => "<dict>" . |
|
744 | + $retArray = ["block" => "<dict>". |
|
745 | 745 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
746 | 746 | // <key>Password</key> |
747 | 747 | // <string>" . $this->clientCert['password'] . "</string> |
748 | 748 | "<key>PayloadCertificateFileName</key> |
749 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
749 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
750 | 750 | <key>PayloadContent</key> |
751 | 751 | <data> |
752 | 752 | $mimeFormatted |
@@ -754,7 +754,7 @@ discard block |
||
754 | 754 | <key>PayloadDescription</key> |
755 | 755 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
756 | 756 | <key>PayloadDisplayName</key> |
757 | - <string>" . _("User certificate") . "</string> |
|
757 | + <string>"._("User certificate")."</string> |
|
758 | 758 | <key>PayloadIdentifier</key> |
759 | 759 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
760 | 760 | <key>PayloadType</key> |
@@ -764,7 +764,7 @@ discard block |
||
764 | 764 | <key>PayloadVersion</key> |
765 | 765 | <integer>1</integer> |
766 | 766 | </dict>", |
767 | - "UUID" => $payloadUUID,]; |
|
767 | + "UUID" => $payloadUUID, ]; |
|
768 | 768 | \core\common\Entity::outOfThePotatoes(); |
769 | 769 | return $retArray; |
770 | 770 | } |
@@ -782,7 +782,7 @@ discard block |
||
782 | 782 | } |
783 | 783 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
784 | 784 | return "<key>RemovalDate</key> |
785 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
785 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
786 | 786 | } |
787 | 787 | |
788 | 788 | /** |
@@ -804,27 +804,27 @@ discard block |
||
804 | 804 | $stream = " |
805 | 805 | <dict> |
806 | 806 | <key>PayloadCertificateFileName</key> |
807 | - <string>" . $ca['uuid'] . ".der</string> |
|
807 | + <string>" . $ca['uuid'].".der</string> |
|
808 | 808 | <key>PayloadContent</key> |
809 | 809 | <data> |
810 | -" . $trimmedPem . "</data> |
|
810 | +" . $trimmedPem."</data> |
|
811 | 811 | <key>PayloadDescription</key> |
812 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp) . "</string> |
|
812 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp)."</string> |
|
813 | 813 | <key>PayloadDisplayName</key> |
814 | 814 | <string>" . |
815 | 815 | /// example: "Identity Provider CA #1 (Root)" |
816 | - sprintf(_("%s CA #%d (%s)" ), |
|
816 | + sprintf(_("%s CA #%d (%s)"), |
|
817 | 817 | \core\common\Entity::$nomenclature_idp, |
818 | - count($this->CAsAccountedFor)+1, |
|
819 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
818 | + count($this->CAsAccountedFor) + 1, |
|
819 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
820 | 820 | "</string> |
821 | 821 | <key>PayloadIdentifier</key> |
822 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
822 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
823 | 823 | <key>PayloadOrganization</key> |
824 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
824 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
825 | 825 | <key>PayloadType</key> |
826 | 826 | <string>com.apple.security.root</string> |
827 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
827 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
828 | 828 | <key>PayloadVersion</key> |
829 | 829 | <integer>1</integer> |
830 | 830 | </dict>"; |
@@ -21,7 +21,7 @@ discard block |
||
21 | 21 | |
22 | 22 | // please run this as a cron job every hour |
23 | 23 | |
24 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
24 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
25 | 25 | |
26 | 26 | // iterate through all federations and see if there are recently expired |
27 | 27 | // invitations for any of them |
@@ -55,7 +55,7 @@ discard block |
||
55 | 55 | $admins = $this_fed->listFederationAdmins(); |
56 | 56 | $mailtext = "Hello, |
57 | 57 | |
58 | -invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] ." have recently expired: |
|
58 | +invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have recently expired: |
|
59 | 59 | |
60 | 60 | "; |
61 | 61 | foreach ($listofinstnames as $instname) { |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | if ($numberofexistingidps > 0) { |
66 | 66 | $mailtext .= " |
67 | 67 | |
68 | -Additionally, $numberofexistingidps invitations for an existing ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired. |
|
68 | +Additionally, $numberofexistingidps invitations for an existing ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired. |
|
69 | 69 | "; |
70 | 70 | } |
71 | 71 | $mailtext .= " |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | Greetings, |
75 | 75 | |
76 | -A humble " . \config\Master::APPEARANCE['productname'] . " cron job |
|
76 | +A humble " . \config\Master::APPEARANCE['productname']." cron job |
|
77 | 77 | "; |
78 | 78 | |
79 | 79 | foreach ($admins as $admin) { |
@@ -76,7 +76,7 @@ discard block |
||
76 | 76 | $delProfiles[] = $ssid; |
77 | 77 | } |
78 | 78 | if ($cipher == 'TKIP') { |
79 | - $delProfiles[] = $ssid . ' (TKIP)'; |
|
79 | + $delProfiles[] = $ssid.' (TKIP)'; |
|
80 | 80 | } |
81 | 81 | } |
82 | 82 | |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | $iterator = 0; |
87 | 87 | foreach ($allSSID as $ssid => $cipher) { |
88 | 88 | if ($cipher == 'TKIP') { |
89 | - $windowsProfile[$iterator] = $this->writeWLANprofile($ssid . ' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
89 | + $windowsProfile[$iterator] = $this->writeWLANprofile($ssid.' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
90 | 90 | $iterator++; |
91 | 91 | } |
92 | 92 | $windowsProfile[$iterator] = $this->writeWLANprofile($ssid, $ssid, 'WPA2', 'AES', $eapConfig, $iterator); |
@@ -148,10 +148,10 @@ discard block |
||
148 | 148 | $profileFileCont = '<EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
149 | 149 | <EapMethod> |
150 | 150 | <Type xmlns="http://www.microsoft.com/provisioning/EapCommon">' . |
151 | - $this->selectedEap["OUTER"] . '</Type> |
|
151 | + $this->selectedEap["OUTER"].'</Type> |
|
152 | 152 | <VendorId xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorId> |
153 | 153 | <VendorType xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorType> |
154 | -<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId . '</AuthorId> |
|
154 | +<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId.'</AuthorId> |
|
155 | 155 | </EapMethod> |
156 | 156 | '; |
157 | 157 | |
@@ -164,9 +164,9 @@ discard block |
||
164 | 164 | $profileFileCont .= ' |
165 | 165 | <Config xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
166 | 166 | <EAPIdentityProviderList xmlns="urn:ietf:params:xml:ns:yang:ietf-eap-metadata"> |
167 | -<EAPIdentityProvider ID="' . $this->deviceUUID . '" namespace="urn:UUID"> |
|
167 | +<EAPIdentityProvider ID="' . $this->deviceUUID.'" namespace="urn:UUID"> |
|
168 | 168 | <ProviderInfo> |
169 | -<DisplayName>' . $this->translateString($attr['general:instname'][0]) . '</DisplayName> |
|
169 | +<DisplayName>' . $this->translateString($attr['general:instname'][0]).'</DisplayName> |
|
170 | 170 | </ProviderInfo> |
171 | 171 | <AuthenticationMethods> |
172 | 172 | <AuthenticationMethod> |
@@ -178,7 +178,7 @@ discard block |
||
178 | 178 | if ($outerUser == '') { |
179 | 179 | $profileFileCont .= '<AnonymousIdentity>@</AnonymousIdentity>'; |
180 | 180 | } else { |
181 | - $profileFileCont .= '<AnonymousIdentity>' . $outerUser . '@' . $realm . '</AnonymousIdentity>'; |
|
181 | + $profileFileCont .= '<AnonymousIdentity>'.$outerUser.'@'.$realm.'</AnonymousIdentity>'; |
|
182 | 182 | } |
183 | 183 | } |
184 | 184 | $profileFileCont .= '</ClientSideCredential> |
@@ -196,7 +196,7 @@ discard block |
||
196 | 196 | $profileFileCont .= ' |
197 | 197 | </ServerSideCredential> |
198 | 198 | <InnerAuthenticationMethod> |
199 | -<NonEAPAuthMethod>' .$innerMethod. '</NonEAPAuthMethod> |
|
199 | +<NonEAPAuthMethod>' .$innerMethod.'</NonEAPAuthMethod> |
|
200 | 200 | </InnerAuthenticationMethod> |
201 | 201 | <VendorSpecific> |
202 | 202 | <SessionResumption>false</SessionResumption> |
@@ -221,11 +221,11 @@ discard block |
||
221 | 221 | </eapTls:CredentialsSource> |
222 | 222 | <eapTls:ServerValidation> |
223 | 223 | <eapTls:DisableUserPromptForServerValidation>true</eapTls:DisableUserPromptForServerValidation> |
224 | -<eapTls:ServerNames>' . $servers . '</eapTls:ServerNames>'; |
|
224 | +<eapTls:ServerNames>' . $servers.'</eapTls:ServerNames>'; |
|
225 | 225 | if ($caArray) { |
226 | 226 | foreach ($caArray as $certAuthority) { |
227 | 227 | if ($certAuthority['root']) { |
228 | - $profileFileCont .= "<eapTls:TrustedRootCA>" . $certAuthority['sha1'] . "</eapTls:TrustedRootCA>\n"; |
|
228 | + $profileFileCont .= "<eapTls:TrustedRootCA>".$certAuthority['sha1']."</eapTls:TrustedRootCA>\n"; |
|
229 | 229 | } |
230 | 230 | } |
231 | 231 | } |
@@ -257,11 +257,11 @@ discard block |
||
257 | 257 | <msPeap:EapType> |
258 | 258 | <msPeap:ServerValidation> |
259 | 259 | <msPeap:DisableUserPromptForServerValidation>true</msPeap:DisableUserPromptForServerValidation> |
260 | -<msPeap:ServerNames>' . $servers . '</msPeap:ServerNames>'; |
|
260 | +<msPeap:ServerNames>' . $servers.'</msPeap:ServerNames>'; |
|
261 | 261 | if ($caArray) { |
262 | 262 | foreach ($caArray as $certAuthority) { |
263 | 263 | if ($certAuthority['root']) { |
264 | - $vistaExt .= "<msPeap:TrustedRootCA>" . $certAuthority['sha1'] . "</msPeap:TrustedRootCA>\n"; |
|
264 | + $vistaExt .= "<msPeap:TrustedRootCA>".$certAuthority['sha1']."</msPeap:TrustedRootCA>\n"; |
|
265 | 265 | } |
266 | 266 | } |
267 | 267 | } |
@@ -274,7 +274,7 @@ discard block |
||
274 | 274 | <msChapV2:UseWinLogonCredentials>false</msChapV2:UseWinLogonCredentials> |
275 | 275 | </msChapV2:EapType> |
276 | 276 | </baseEap:Eap> |
277 | -<msPeap:EnableQuarantineChecks>' . $nea . '</msPeap:EnableQuarantineChecks> |
|
277 | +<msPeap:EnableQuarantineChecks>' . $nea.'</msPeap:EnableQuarantineChecks> |
|
278 | 278 | <msPeap:RequireCryptoBinding>false</msPeap:RequireCryptoBinding> |
279 | 279 | </msPeap:EapType> |
280 | 280 | </baseEap:Eap> |
@@ -286,11 +286,11 @@ discard block |
||
286 | 286 | <EapType xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV1"> |
287 | 287 | <ServerValidation> |
288 | 288 | <DisableUserPromptForServerValidation>true</DisableUserPromptForServerValidation> |
289 | -<ServerNames>' . $servers . '</ServerNames>'; |
|
289 | +<ServerNames>' . $servers.'</ServerNames>'; |
|
290 | 290 | if ($caArray) { |
291 | 291 | foreach ($caArray as $certAuthority) { |
292 | 292 | if ($certAuthority['root']) { |
293 | - $w7Ext .= "<TrustedRootCA>" . $certAuthority['sha1'] . "</TrustedRootCA>\n"; |
|
293 | + $w7Ext .= "<TrustedRootCA>".$certAuthority['sha1']."</TrustedRootCA>\n"; |
|
294 | 294 | } |
295 | 295 | } |
296 | 296 | } |
@@ -303,14 +303,14 @@ discard block |
||
303 | 303 | <UseWinLogonCredentials>false</UseWinLogonCredentials> |
304 | 304 | </EapType> |
305 | 305 | </Eap> |
306 | -<EnableQuarantineChecks>' . $nea . '</EnableQuarantineChecks> |
|
306 | +<EnableQuarantineChecks>' . $nea.'</EnableQuarantineChecks> |
|
307 | 307 | <RequireCryptoBinding>false</RequireCryptoBinding> |
308 | 308 | '; |
309 | 309 | if ($useAnon) { |
310 | 310 | $w7Ext .= '<PeapExtensions> |
311 | 311 | <IdentityPrivacy xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV2"> |
312 | 312 | <EnableIdentityPrivacy>true</EnableIdentityPrivacy> |
313 | -<AnonymousUserName>' . $outerUser . '</AnonymousUserName> |
|
313 | +<AnonymousUserName>' . $outerUser.'</AnonymousUserName> |
|
314 | 314 | </IdentityPrivacy> |
315 | 315 | </PeapExtensions> |
316 | 316 | '; |
@@ -328,8 +328,8 @@ discard block |
||
328 | 328 | $profileFileContEnd = '</EapHostConfig></EAPConfig> |
329 | 329 | '; |
330 | 330 | $returnArray = []; |
331 | - $returnArray['vista'] = $profileFileCont . $vistaExt . $profileFileContEnd; |
|
332 | - $returnArray['w7'] = $profileFileCont . $w7Ext . $profileFileContEnd; |
|
331 | + $returnArray['vista'] = $profileFileCont.$vistaExt.$profileFileContEnd; |
|
332 | + $returnArray['w7'] = $profileFileCont.$w7Ext.$profileFileContEnd; |
|
333 | 333 | return $returnArray; |
334 | 334 | } |
335 | 335 | |
@@ -348,10 +348,10 @@ discard block |
||
348 | 348 | private function writeWLANprofile($wlanProfileName, $ssid, $auth, $encryption, $eapConfig, $profileNumber) { |
349 | 349 | $profileFileCont = '<?xml version="1.0"?> |
350 | 350 | <WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1"> |
351 | -<name>' . $wlanProfileName . '</name> |
|
351 | +<name>' . $wlanProfileName.'</name> |
|
352 | 352 | <SSIDConfig> |
353 | 353 | <SSID> |
354 | -<name>' . $ssid . '</name> |
|
354 | +<name>' . $ssid.'</name> |
|
355 | 355 | </SSID> |
356 | 356 | <nonBroadcast>true</nonBroadcast> |
357 | 357 | </SSIDConfig> |
@@ -361,8 +361,8 @@ discard block |
||
361 | 361 | <MSM> |
362 | 362 | <security> |
363 | 363 | <authEncryption> |
364 | -<authentication>' . $auth . '</authentication> |
|
365 | -<encryption>' . $encryption . '</encryption> |
|
364 | +<authentication>' . $auth.'</authentication> |
|
365 | +<encryption>' . $encryption.'</encryption> |
|
366 | 366 | <useOneX>true</useOneX> |
367 | 367 | </authEncryption> |
368 | 368 | '; |
@@ -392,9 +392,9 @@ discard block |
||
392 | 392 | mkdir('vista'); |
393 | 393 | } |
394 | 394 | $vistaFileName = "vista/wlan_prof-$profileNumber.xml"; |
395 | - file_put_contents($vistaFileName, $profileFileCont . $eapConfig['vista'] . $closing); |
|
395 | + file_put_contents($vistaFileName, $profileFileCont.$eapConfig['vista'].$closing); |
|
396 | 396 | $sevenFileName = "w7/wlan_prof-$profileNumber.xml"; |
397 | - file_put_contents($sevenFileName, $profileFileCont . $eapConfig['w7'] . $closing); |
|
397 | + file_put_contents($sevenFileName, $profileFileCont.$eapConfig['w7'].$closing); |
|
398 | 398 | $this->loggerInstance->debug(2, "Installer has been written into directory $this->FPATH\n"); |
399 | 399 | $this->loggerInstance->debug(4, "WLAN_Profile:$wlanProfileName:$encryption\n"); |
400 | 400 | return("\"$wlanProfileName\" \"$encryption\""); |
@@ -431,8 +431,8 @@ discard block |
||
431 | 431 | mkdir('vista'); |
432 | 432 | } |
433 | 433 | |
434 | - file_put_contents("vista/lan_prof.xml", $profileFileCont . $eapConfig['vista'] . $closing); |
|
435 | - file_put_contents("w7/lan_prof.xml", $profileFileCont . $eapConfig['w7'] . $closing); |
|
434 | + file_put_contents("vista/lan_prof.xml", $profileFileCont.$eapConfig['vista'].$closing); |
|
435 | + file_put_contents("w7/lan_prof.xml", $profileFileCont.$eapConfig['w7'].$closing); |
|
436 | 436 | |
437 | 437 | } |
438 | 438 | |
@@ -446,7 +446,7 @@ discard block |
||
446 | 446 | private function writeMainNSH($eap, $attr) { |
447 | 447 | $this->loggerInstance->debug(4, "writeMainNSH"); |
448 | 448 | $this->loggerInstance->debug(4, $attr); |
449 | - $this->loggerInstance->debug(4, "MYLANG=" . $this->lang . "\n"); |
|
449 | + $this->loggerInstance->debug(4, "MYLANG=".$this->lang."\n"); |
|
450 | 450 | |
451 | 451 | $eapOptions = [ |
452 | 452 | \core\common\EAP::PEAP => ['str' => 'PEAP', 'exec' => 'user'], |
@@ -477,8 +477,8 @@ discard block |
||
477 | 477 | $this->loggerInstance->debug(4, "EAP_STR=$eapStr\n"); |
478 | 478 | $this->loggerInstance->debug(4, $eap); |
479 | 479 | |
480 | - $fcontents .= '!define ' . $eapStr; |
|
481 | - $fcontents .= "\n" . '!define EXECLEVEL "' . $execLevel . '"'; |
|
480 | + $fcontents .= '!define '.$eapStr; |
|
481 | + $fcontents .= "\n".'!define EXECLEVEL "'.$execLevel.'"'; |
|
482 | 482 | $fcontents .= $this->writeNsisDefines($attr); |
483 | 483 | file_put_contents('main.nsh', $fcontents); |
484 | 484 | } |
@@ -507,7 +507,7 @@ discard block |
||
507 | 507 | } |
508 | 508 | foreach ($caArray as $certAuthority) { |
509 | 509 | $store = $certAuthority['root'] ? "root" : "ca"; |
510 | - $contentCerts .= '!insertmacro install_ca_cert "' . $certAuthority['file'] . '" "' . $certAuthority['sha1'] . '" "' . $store . "\"\n"; |
|
510 | + $contentCerts .= '!insertmacro install_ca_cert "'.$certAuthority['file'].'" "'.$certAuthority['sha1'].'" "'.$store."\"\n"; |
|
511 | 511 | } |
512 | 512 | fwrite($fileHandleCerts, $contentCerts); |
513 | 513 | fclose($fileHandleCerts); |
@@ -45,7 +45,7 @@ |
||
45 | 45 | private function getCredentialSource() |
46 | 46 | { |
47 | 47 | $element = new \core\DeviceXMLmain(); |
48 | - $element->setChild('CertificateStore',''); |
|
48 | + $element->setChild('CertificateStore', ''); |
|
49 | 49 | return($element); |
50 | 50 | } |
51 | 51 |
@@ -38,7 +38,7 @@ |
||
38 | 38 | { |
39 | 39 | $element = new \core\DeviceXMLmain(); |
40 | 40 | $element->setChild('ServerValidation', $this->getPeapServerValidation()); |
41 | - $element->setChild('FastReconnect','true'); |
|
41 | + $element->setChild('FastReconnect', 'true'); |
|
42 | 42 | $element->setChild('InnerEapOptional', 'false'); |
43 | 43 | $element->setChild('Eap', $this->getMsChapV2(), self::MS_BASEEAPCONN_NS); |
44 | 44 | $element->setChild('EnableQuarantineChecks', $this->nea); |