@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | \core\common\Entity::intoThePotatoes(); |
146 | 146 | // that's what all variants support. Sub-classes can change it. |
147 | 147 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_PEAP_MSCHAP2, \core\common\EAP::EAPTYPE_TTLS_PAP, \core\common\EAP::EAPTYPE_TTLS_MSCHAP2, \core\common\EAP::EAPTYPE_SILVERBULLET]); |
148 | - foreach(\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
148 | + foreach (\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
149 | 149 | if ($eapType->isPasswordRequired() || $eapType->isPasswordOptional()) { |
150 | 150 | $this->specialities['internal:verify_userinput_suffix'][serialize($eapType->getArrayRep())] = _("It is not possible to actively verify the user input for suffix match; but if there is no 'Terms of Use' configured, the installer will display a corresponding hint to the user instead."); |
151 | 151 | $this->specialities['media:consortium_OI'][serialize($eapType->getArrayRep())] = _("Passpoint networks are not provisioned due to severe UI limitations during install time."); |
@@ -184,15 +184,15 @@ discard block |
||
184 | 184 | <key>PayloadDescription</key> |
185 | 185 | <string>$tagline</string> |
186 | 186 | <key>PayloadDisplayName</key> |
187 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
187 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
188 | 188 | <key>PayloadIdentifier</key> |
189 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
189 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
190 | 190 | <key>PayloadOrganization</key> |
191 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
191 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
192 | 192 | <key>PayloadType</key> |
193 | 193 | <string>Configuration</string> |
194 | 194 | <key>PayloadUUID</key> |
195 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
195 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
196 | 196 | <key>PayloadVersion</key> |
197 | 197 | <integer>1</integer>"; |
198 | 198 | \core\common\Entity::outOfThePotatoes(); |
@@ -224,21 +224,21 @@ discard block |
||
224 | 224 | { |
225 | 225 | \core\common\Entity::intoThePotatoes(); |
226 | 226 | if (isset($this->attributes['support:info_file'])) { |
227 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
227 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
228 | 228 | } |
229 | 229 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
230 | 230 | if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) { |
231 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
231 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
232 | 232 | \core\common\Entity::outOfThePotatoes(); |
233 | 233 | return $retval; |
234 | 234 | } else { |
235 | 235 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
236 | 236 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
237 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
237 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
238 | 238 | \core\common\Entity::outOfThePotatoes(); |
239 | 239 | return $retval; |
240 | 240 | } |
241 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
241 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
242 | 242 | \core\common\Entity::outOfThePotatoes(); |
243 | 243 | return $retval; |
244 | 244 | } |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | // also escape htmlspecialchars |
263 | 263 | // not all names and profiles have a name, so be prepared |
264 | 264 | |
265 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
265 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
266 | 266 | |
267 | 267 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
268 | 268 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | |
305 | 305 | file_put_contents('installer_profile', $outputXml); |
306 | 306 | |
307 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
307 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
308 | 308 | |
309 | 309 | if (!$this->sign) { |
310 | 310 | rename("installer_profile", $fileName); |
@@ -313,7 +313,7 @@ discard block |
||
313 | 313 | } |
314 | 314 | // still here? Then we are signing. |
315 | 315 | $retval = 0; |
316 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null", $retval); |
|
316 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null", $retval); |
|
317 | 317 | if ($retval !== 0 || $signing === FALSE) { |
318 | 318 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
319 | 319 | // we are passing a name that will be then used as a path - this will not exist, hence an error will |
@@ -340,19 +340,19 @@ discard block |
||
340 | 340 | $oiCount = $oiCount + count($netDetail['oi']); |
341 | 341 | } |
342 | 342 | $certCount = count($this->attributes['internal:CAs'][0]); |
343 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
343 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
344 | 344 | $out .= "<p>"; |
345 | 345 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
346 | 346 | $out .= "<ul>"; |
347 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
348 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
347 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
348 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
349 | 349 | if ($certCount > 1) { |
350 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
350 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
351 | 351 | } |
352 | 352 | $out .= "</li>"; |
353 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
353 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
354 | 354 | if ($ssidCount > 1) { |
355 | - $out .= " " . sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount+$oiCount, $ssidCount, $oiCount); |
|
355 | + $out .= " ".sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount + $oiCount, $ssidCount, $oiCount); |
|
356 | 356 | } |
357 | 357 | $out .= "</li>"; |
358 | 358 | $out .= "</ul>"; |
@@ -392,7 +392,7 @@ discard block |
||
392 | 392 | <key>ServiceProviderRoamingEnabled</key> |
393 | 393 | <true/> |
394 | 394 | <key>DisplayedOperatorName</key> |
395 | - <string>" . $oiName . "</string>"; |
|
395 | + <string>" . $oiName."</string>"; |
|
396 | 396 | // if we don't know the realm, omit the entire DomainName key |
397 | 397 | if (isset($this->attributes['internal:realm'])) { |
398 | 398 | $retval .= "<key>DomainName</key> |
@@ -405,7 +405,7 @@ discard block |
||
405 | 405 | <array>"; |
406 | 406 | |
407 | 407 | foreach ($consortiumOi as $oneCons) { |
408 | - $retval .= "<string>" . strtoupper($oneCons) . "</string>"; |
|
408 | + $retval .= "<string>".strtoupper($oneCons)."</string>"; |
|
409 | 409 | } |
410 | 410 | |
411 | 411 | $retval .= "</array>"; |
@@ -443,7 +443,7 @@ discard block |
||
443 | 443 | <dict> |
444 | 444 | <key>AcceptEAPTypes</key> |
445 | 445 | <array> |
446 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
446 | + <integer>" . $eapType['OUTER']."</integer> |
|
447 | 447 | </array> |
448 | 448 | <key>EAPFASTProvisionPAC</key> |
449 | 449 | <true /> |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | "; |
457 | 457 | if ($realm !== NULL) { |
458 | 458 | $retval .= "<key>OuterIdentity</key> |
459 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
459 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
460 | 460 | "; |
461 | 461 | } |
462 | 462 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -480,11 +480,11 @@ discard block |
||
480 | 480 | $retval .= " |
481 | 481 | </array>"; |
482 | 482 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
483 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
483 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
484 | 484 | } |
485 | 485 | $retval .= " |
486 | 486 | <key>TTLSInnerAuthentication</key> |
487 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
487 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
488 | 488 | </dict>"; |
489 | 489 | return $retval; |
490 | 490 | } |
@@ -504,9 +504,9 @@ discard block |
||
504 | 504 | // characters are still reversed, invert on use! |
505 | 505 | $buffer .= "<string>Manual</string> |
506 | 506 | <key>ProxyServer</key> |
507 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
507 | + <string>" . strrev($serverAndPort[1])."</string> |
|
508 | 508 | <key>ProxyServerPort</key> |
509 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
509 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
510 | 510 | <key>ProxyPACFallbackAllowed</key> |
511 | 511 | <false/>"; |
512 | 512 | } else { |
@@ -556,7 +556,7 @@ discard block |
||
556 | 556 | throw new Exception("SSID must be a string!"); |
557 | 557 | } |
558 | 558 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
559 | - $payloadIdentifier = "wifi." . $this->serial; |
|
559 | + $payloadIdentifier = "wifi.".$this->serial; |
|
560 | 560 | $payloadShortName = sprintf(_("%s - SSID %s"), $prettyName, $escapedSSID); |
561 | 561 | $payloadName = sprintf(_("%s configuration for network name %s"), $prettyName, $escapedSSID); |
562 | 562 | $encryptionTypeString = $this->encryptionString(); |
@@ -586,9 +586,9 @@ discard block |
||
586 | 586 | if (count($toBeConfigured) == 0) { |
587 | 587 | return ""; |
588 | 588 | } |
589 | - $payloadIdentifier = "hs20.".implode('-',$toBeConfigured); |
|
589 | + $payloadIdentifier = "hs20.".implode('-', $toBeConfigured); |
|
590 | 590 | $payloadShortName = sprintf(_("%s - RCOI"), $prettyName); |
591 | - $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"),$prettyName); |
|
591 | + $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"), $prettyName); |
|
592 | 592 | $encryptionTypeString = $this->encryptionString(); |
593 | 593 | $setupModesString = ""; |
594 | 594 | $wifiNetworkIdentification = $this->passPointBlock($toBeConfigured, $prettyName); |
@@ -607,11 +607,11 @@ discard block |
||
607 | 607 | <key>PayloadDisplayName</key> |
608 | 608 | <string>$payloadShortName</string> |
609 | 609 | <key>PayloadIdentifier</key> |
610 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
610 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
611 | 611 | <key>PayloadOrganization</key> |
612 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
612 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
613 | 613 | <key>PayloadType</key> |
614 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
614 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
615 | 615 | $retval .= $this->proxySettings(); |
616 | 616 | $retval .= $setupModesString; |
617 | 617 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -623,7 +623,7 @@ discard block |
||
623 | 623 | } |
624 | 624 | $retval .= " |
625 | 625 | <key>PayloadUUID</key> |
626 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
626 | + <string>" . \core\common\Entity::uuid()."</string> |
|
627 | 627 | <key>PayloadVersion</key> |
628 | 628 | <integer>1</integer> |
629 | 629 | $wifiNetworkIdentification</dict>"; |
@@ -653,15 +653,15 @@ discard block |
||
653 | 653 | <key>IsHotspot</key> |
654 | 654 | <false/> |
655 | 655 | <key>PayloadDescription</key> |
656 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
656 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
657 | 657 | <key>PayloadDisplayName</key> |
658 | - <string>" . _("Disabled WiFi network") . "</string> |
|
658 | + <string>" . _("Disabled WiFi network")."</string> |
|
659 | 659 | <key>PayloadIdentifier</key> |
660 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
660 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
661 | 661 | <key>PayloadType</key> |
662 | 662 | <string>com.apple.wifi.managed</string> |
663 | 663 | <key>PayloadUUID</key> |
664 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
664 | + <string>".\core\common\Entity::uuid()."</string> |
|
665 | 665 | <key>PayloadVersion</key> |
666 | 666 | <real>1</real>"; |
667 | 667 | $retval .= $this->proxySettings(); |
@@ -741,12 +741,12 @@ discard block |
||
741 | 741 | $mimeBlob = base64_encode($binaryBlob); |
742 | 742 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
743 | 743 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
744 | - $retArray = ["block" => "<dict>" . |
|
744 | + $retArray = ["block" => "<dict>". |
|
745 | 745 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
746 | 746 | // <key>Password</key> |
747 | 747 | // <string>" . $this->clientCert['password'] . "</string> |
748 | 748 | "<key>PayloadCertificateFileName</key> |
749 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
749 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
750 | 750 | <key>PayloadContent</key> |
751 | 751 | <data> |
752 | 752 | $mimeFormatted |
@@ -754,7 +754,7 @@ discard block |
||
754 | 754 | <key>PayloadDescription</key> |
755 | 755 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
756 | 756 | <key>PayloadDisplayName</key> |
757 | - <string>" . _("User certificate") . "</string> |
|
757 | + <string>"._("User certificate")."</string> |
|
758 | 758 | <key>PayloadIdentifier</key> |
759 | 759 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
760 | 760 | <key>PayloadType</key> |
@@ -764,7 +764,7 @@ discard block |
||
764 | 764 | <key>PayloadVersion</key> |
765 | 765 | <integer>1</integer> |
766 | 766 | </dict>", |
767 | - "UUID" => $payloadUUID,]; |
|
767 | + "UUID" => $payloadUUID, ]; |
|
768 | 768 | \core\common\Entity::outOfThePotatoes(); |
769 | 769 | return $retArray; |
770 | 770 | } |
@@ -782,7 +782,7 @@ discard block |
||
782 | 782 | } |
783 | 783 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
784 | 784 | return "<key>RemovalDate</key> |
785 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
785 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
786 | 786 | } |
787 | 787 | |
788 | 788 | /** |
@@ -804,27 +804,27 @@ discard block |
||
804 | 804 | $stream = " |
805 | 805 | <dict> |
806 | 806 | <key>PayloadCertificateFileName</key> |
807 | - <string>" . $ca['uuid'] . ".der</string> |
|
807 | + <string>" . $ca['uuid'].".der</string> |
|
808 | 808 | <key>PayloadContent</key> |
809 | 809 | <data> |
810 | -" . $trimmedPem . "</data> |
|
810 | +" . $trimmedPem."</data> |
|
811 | 811 | <key>PayloadDescription</key> |
812 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp) . "</string> |
|
812 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp)."</string> |
|
813 | 813 | <key>PayloadDisplayName</key> |
814 | 814 | <string>" . |
815 | 815 | /// example: "Identity Provider CA #1 (Root)" |
816 | - sprintf(_("%s CA #%d (%s)" ), |
|
816 | + sprintf(_("%s CA #%d (%s)"), |
|
817 | 817 | \core\common\Entity::$nomenclature_idp, |
818 | - count($this->CAsAccountedFor)+1, |
|
819 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
818 | + count($this->CAsAccountedFor) + 1, |
|
819 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
820 | 820 | "</string> |
821 | 821 | <key>PayloadIdentifier</key> |
822 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
822 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
823 | 823 | <key>PayloadOrganization</key> |
824 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
824 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
825 | 825 | <key>PayloadType</key> |
826 | 826 | <string>com.apple.security.root</string> |
827 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
827 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
828 | 828 | <key>PayloadVersion</key> |
829 | 829 | <integer>1</integer> |
830 | 830 | </dict>"; |
@@ -50,11 +50,11 @@ discard block |
||
50 | 50 | print "vendorlogo ='';\n"; |
51 | 51 | } |
52 | 52 | if ($operatingSystem) { |
53 | - print "recognisedOS = '".$operatingSystem['device'] . "';\n"; |
|
54 | - print "recognisedOShs20 = '".$operatingSystem['hs20'] . "';\n"; |
|
53 | + print "recognisedOS = '".$operatingSystem['device']."';\n"; |
|
54 | + print "recognisedOShs20 = '".$operatingSystem['hs20']."';\n"; |
|
55 | 55 | } |
56 | 56 | |
57 | -print 'downloadMessage = "'.$Gui->textTemplates->templates[\web\lib\user\DOWNLOAD_MESSAGE] . '";'; |
|
57 | +print 'downloadMessage = "'.$Gui->textTemplates->templates[\web\lib\user\DOWNLOAD_MESSAGE].'";'; |
|
58 | 58 | //TODO modify this based on OS detection |
59 | 59 | $userAgent = $_SERVER['HTTP_USER_AGENT'] ?? ""; |
60 | 60 | if (preg_match('/Android/', $userAgent)) { |
@@ -83,7 +83,7 @@ discard block |
||
83 | 83 | <?php echo $divs->divHeading($visibility); ?> |
84 | 84 | <div id="main_page"> |
85 | 85 | <div id="loading_ico"> |
86 | - <?php echo _("Authenticating") . "..." ?><br><img src="<?php echo $Gui->skinObject->findResourceUrl("IMAGES", "icons/loading51.gif"); ?>" alt="Authenticating ..."/> |
|
86 | + <?php echo _("Authenticating")."..." ?><br><img src="<?php echo $Gui->skinObject->findResourceUrl("IMAGES", "icons/loading51.gif"); ?>" alt="Authenticating ..."/> |
|
87 | 87 | </div> |
88 | 88 | <div id="info_overlay"> <!-- device info --> |
89 | 89 | <div id="info_window"></div> |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $deco = new \web\lib\admin\PageDecoration(); |
32 | 32 | $validator = new \web\lib\common\InputValidation(); |
@@ -40,10 +40,10 @@ discard block |
||
40 | 40 | ( $_POST['consortium'] == "OpenRoaming" && count($myfed->getAttributes("fed:openroaming")) > 0 ) |
41 | 41 | ) |
42 | 42 | ) {*/ |
43 | - if (isset($_POST['consortium']) && $_POST['consortium'] == "eduroam") |
|
43 | + if (isset($_POST['consortium']) && $_POST['consortium'] == "eduroam") |
|
44 | 44 | { |
45 | 45 | $my_inst->newDeployment(\core\AbstractDeployment::DEPLOYMENTTYPE_MANAGED, $_POST['consortium']); |
46 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
46 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
47 | 47 | exit(0); |
48 | 48 | } else { |
49 | 49 | throw new Exception("Desired consortium for Managed SP needs to be specified, and allowed!"); |
@@ -100,18 +100,18 @@ discard block |
||
100 | 100 | if (isset($_POST['agreement']) && $_POST['agreement'] == "true") { |
101 | 101 | $deployment->addAttribute("hiddenmanagedsp:tou_accepted", NULL, 1); |
102 | 102 | } |
103 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
103 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
104 | 104 | exit(0); |
105 | 105 | case web\lib\common\FormElements::BUTTON_DELETE: |
106 | 106 | $response = $deployment->setRADIUSconfig(); |
107 | 107 | if (in_array('OK', $response)) { |
108 | 108 | $deployment->deactivate(); |
109 | 109 | } |
110 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response))); |
|
110 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response))); |
|
111 | 111 | exit(0); |
112 | 112 | case web\lib\common\FormElements::BUTTON_REMOVESP: |
113 | 113 | $deployment->remove(); |
114 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
114 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
115 | 115 | exit(0); |
116 | 116 | case web\lib\common\FormElements::BUTTON_ACTIVATE: |
117 | 117 | if (count($deployment->getAttributes("hiddenmanagedsp:tou_accepted")) > 0) { |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | if (in_array('OK', $response)) { |
120 | 120 | $deployment->activate(); |
121 | 121 | } |
122 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response))); |
|
122 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response))); |
|
123 | 123 | exit(0); |
124 | 124 | } else { |
125 | 125 | throw new Exception("Activate button pushed without acknowledged ToUs!"); |
@@ -148,7 +148,7 @@ discard block |
||
148 | 148 | } else { |
149 | 149 | $response = ['NOOP', 'NOOP']; |
150 | 150 | } |
151 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response))); |
|
151 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response))); |
|
152 | 152 | exit(0); |
153 | 153 | default: |
154 | 154 | throw new Exception("Unknown button action requested!"); |
@@ -157,10 +157,10 @@ discard block |
||
157 | 157 | if (isset($_POST['command'])) { |
158 | 158 | switch ($_POST['command']) { |
159 | 159 | case web\lib\common\FormElements::BUTTON_CLOSE: |
160 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
160 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
161 | 161 | exit(0); |
162 | 162 | default: |
163 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
163 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
164 | 164 | exit(0); |
165 | 165 | } |
166 | 166 | } |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | echo $uiElements->instLevelInfoBoxes($my_inst); |
188 | 188 | $deploymentOptions = $deployment->getAttributes(); |
189 | 189 | echo "<form enctype='multipart/form-data' action='edit_hotspot.php?inst_id=$my_inst->identifier&deployment_id=$deployment->identifier' method='post' accept-charset='UTF-8'> |
190 | - <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>"; |
|
190 | + <input type='hidden' name='MAX_FILE_SIZE' value='".\config\Master::MAX_UPLOAD_SIZE."'>"; |
|
191 | 191 | $optionDisplay = new \web\lib\admin\OptionDisplay($deploymentOptions, \core\Options::LEVEL_PROFILE); |
192 | 192 | ?> |
193 | 193 | <fieldset class='option_container' id='managedsp_override'> |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | <!-- input for VLAN identifier for home users--> |
222 | 222 | <td> |
223 | 223 | <span id='vlan_label'> |
224 | - <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " " . _("(unset with '0')"))); ?> |
|
224 | + <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " "._("(unset with '0')"))); ?> |
|
225 | 225 | </span> |
226 | 226 | </td> |
227 | 227 | <td> |
@@ -241,7 +241,7 @@ discard block |
||
241 | 241 | </fieldset> |
242 | 242 | |
243 | 243 | <?php |
244 | - echo "<p><button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>" . _("Discard changes") . "</button></p></form>"; |
|
244 | + echo "<p><button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>"._("Discard changes")."</button></p></form>"; |
|
245 | 245 | echo $deco->footer(); |
246 | 246 | |
247 | 247 | |
248 | 248 | \ No newline at end of file |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -72,7 +72,7 @@ discard block |
||
72 | 72 | // also send user back to the overview page |
73 | 73 | if (isset($_POST['requestcert']) && $_POST['requestcert'] == \web\lib\common\FormElements::BUTTON_SAVE) { |
74 | 74 | // basic sanity checks before we hand this over to openssl |
75 | - $sanitisedCsr = $validator->string($_POST['CSR'] ?? "" , TRUE); |
|
75 | + $sanitisedCsr = $validator->string($_POST['CSR'] ?? "", TRUE); |
|
76 | 76 | if (openssl_csr_get_public_key($sanitisedCsr) === FALSE) { |
77 | 77 | throw new Exception("Sorry: Unable to parse the submitted public key - no public key inside?"); |
78 | 78 | } |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | $fed = $validator->existingFederation($_POST['NRO-list']); |
87 | 87 | $country = strtoupper($fed->tld); |
88 | 88 | $DN[] = "C=$country"; |
89 | - $DN[] = "O=NRO of " . $cat->knownFederations[strtoupper($fed->tld)]; |
|
89 | + $DN[] = "O=NRO of ".$cat->knownFederations[strtoupper($fed->tld)]; |
|
90 | 90 | $externalDb = new \core\ExternalEduroamDBData(); |
91 | 91 | $serverInfo = $externalDb->listExternalTlsServersFederation($fed->tld); |
92 | 92 | $serverList = explode(",", array_key_first($serverInfo)); |
@@ -109,14 +109,14 @@ discard block |
||
109 | 109 | default: |
110 | 110 | throw new Exception("Sorry: Unknown level of issuance requested."); |
111 | 111 | } |
112 | - echo "<p style='font-size: large'>" . _("Requesting a certificate with the following properties"); |
|
112 | + echo "<p style='font-size: large'>"._("Requesting a certificate with the following properties"); |
|
113 | 113 | echo "<ul>"; |
114 | - echo "<li>" . _("Policy OIDs: ") . implode(", ", $policies) . "</li>"; |
|
115 | - echo "<li>" . _("Distinguished Name: ") . implode(", ", $DN) . "</li>"; |
|
116 | - echo "<li>" . _("subjectAltName:DNS : ") . implode(", ", $serverList) . "</li>"; |
|
114 | + echo "<li>"._("Policy OIDs: ").implode(", ", $policies)."</li>"; |
|
115 | + echo "<li>"._("Distinguished Name: ").implode(", ", $DN)."</li>"; |
|
116 | + echo "<li>"._("subjectAltName:DNS : ").implode(", ", $serverList)."</li>"; |
|
117 | 117 | $firstName = $serverInfo[array_key_first($serverInfo)][0]["name"]; |
118 | 118 | $firstMail = $serverInfo[array_key_first($serverInfo)][0]["mail"]; |
119 | - echo "<li>" . _("Requester Contact Details: ") . $firstName . " <" . $firstMail . ">" . "</li>"; |
|
119 | + echo "<li>"._("Requester Contact Details: ").$firstName." <".$firstMail.">"."</li>"; |
|
120 | 120 | echo "</ul></p>"; |
121 | 121 | /* $ossl = proc_open("openssl req -subj '/".implode("/", $DN)."'", [ 0 => ["pipe", "r"], 1 => ["pipe", "w"], 2 => [ "file", "/tmp/voodoo-error", "a"] ], $pipes); |
122 | 122 | if (is_resource($ossl)) { |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | "CSR_STRING" => /* $newCsr */ $vettedCsr, |
135 | 135 | "USERNAME" => $firstName, |
136 | 136 | "USERMAIL" => $firstMail, |
137 | - "SUBJECT" => implode(",", $DN) , |
|
137 | + "SUBJECT" => implode(",", $DN), |
|
138 | 138 | "ALTNAMES" => $serverList, |
139 | 139 | "FED" => $country]; |
140 | 140 | // our certs can be good for max 5 years |
@@ -142,7 +142,7 @@ discard block |
||
142 | 142 | echo "<p>"._("The certificate was requested.")."</p>"; |
143 | 143 | ?> |
144 | 144 | <form action="overview_certificates.php" method="GET"> |
145 | - <button type="submit"><?php echo _("Back to Certificate Overview");?></button> |
|
145 | + <button type="submit"><?php echo _("Back to Certificate Overview"); ?></button> |
|
146 | 146 | </form> |
147 | 147 | <?php |
148 | 148 | echo $deco->footer(); |
@@ -151,14 +151,14 @@ discard block |
||
151 | 151 | |
152 | 152 | // if we did not get a SAVE button, display UI for a fresh request instead |
153 | 153 | ?> |
154 | - <h2><?php echo _("1. Certificate Holder Details");?></h2> |
|
154 | + <h2><?php echo _("1. Certificate Holder Details"); ?></h2> |
|
155 | 155 | <form action="action_req_certificate.php" method="POST"> |
156 | 156 | <input type="radio" name="LEVEL" id="NRO" value="NRO" checked><?php printf(_("Certificate for %s role"), $uiElements->nomenclatureFed); ?></input> |
157 | 157 | <?php |
158 | 158 | if (count($feds) == 1) { |
159 | 159 | $fedObject = new \core\Federation($feds[0]['value']); |
160 | - echo " <strong>" . $cat->knownFederations[$fedObject->tld] . "</strong>"; |
|
161 | - echo '<input type="hidden" name="NRO-list" id="NRO-list" value="' . $fedObject->tld . '"/>'; |
|
160 | + echo " <strong>".$cat->knownFederations[$fedObject->tld]."</strong>"; |
|
161 | + echo '<input type="hidden" name="NRO-list" id="NRO-list" value="'.$fedObject->tld.'"/>'; |
|
162 | 162 | } else { |
163 | 163 | ?> |
164 | 164 | <select name="NRO-list" id="NRO-list"> |
@@ -166,7 +166,7 @@ discard block |
||
166 | 166 | <?php |
167 | 167 | foreach ($feds as $oneFed) { |
168 | 168 | $fedObject = new \core\Federation($oneFed['value']); |
169 | - echo '<option value="' . strtoupper($fedObject->tld) . '">' . $cat->knownFederations[$fedObject->tld] . "</option>"; |
|
169 | + echo '<option value="'.strtoupper($fedObject->tld).'">'.$cat->knownFederations[$fedObject->tld]."</option>"; |
|
170 | 170 | } |
171 | 171 | ?> |
172 | 172 | </select> |
@@ -194,10 +194,10 @@ discard block |
||
194 | 194 | ?> |
195 | 195 | </select> |
196 | 196 | <br/> |
197 | - <h2><?php echo _("2. CSR generation");?></h2> |
|
198 | - <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:");?></p> |
|
197 | + <h2><?php echo _("2. CSR generation"); ?></h2> |
|
198 | + <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:"); ?></p> |
|
199 | 199 | <p>openssl req -new -newkey rsa:4096 -out test.csr -keyout test.key -subj /DC=test/DC=test/DC=eduroam/C=XY/O=WillBeReplaced/CN=will.be.replaced</p> |
200 | - <h2><?php echo _("3. Submission");?></h2> |
|
200 | + <h2><?php echo _("3. Submission"); ?></h2> |
|
201 | 201 | <?php echo _("Please paste your CSR here:"); ?><br/><textarea name="CSR" id="CSR" rows="20" cols="85"/></textarea><br/> |
202 | 202 | <button type="submit" name="requestcert" id="requestcert" value="<?php echo \web\lib\common\FormElements::BUTTON_SAVE ?>"><?php echo _("Send request"); ?></button> |
203 | 203 | </form> |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -70,7 +70,7 @@ discard block |
||
70 | 70 | $feds = $user->getAttributes("user:fedadmin"); |
71 | 71 | foreach ($feds as $oneFed) { |
72 | 72 | $theFed = new \core\Federation($oneFed['value']); |
73 | - printf("<p>" . _("Certificate Information for %s %s"), $uiElements->nomenclatureFed, $theFed->name) . "</p>"; |
|
73 | + printf("<p>"._("Certificate Information for %s %s"), $uiElements->nomenclatureFed, $theFed->name)."</p>"; |
|
74 | 74 | foreach ($theFed->listTlsCertificates() as $oneCert) { |
75 | 75 | if ($oneCert['STATUS'] == "REQUESTED") { |
76 | 76 | $theFed->updateCertificateStatus($oneCert['REQSERIAL']); |
@@ -81,12 +81,12 @@ discard block |
||
81 | 81 | foreach ($theFed->listTlsCertificates() as $oneCert) { // fetch list a second time, in case we got a cert |
82 | 82 | $status = $oneCert['STATUS']; |
83 | 83 | echo "<tr>"; |
84 | - echo "<td>" . $oneCert['REQSERIAL'] . "</td><td>" . $oneCert['DN'] . "</td><td>" . $status . "</td><td>" . $oneCert['EXPIRY'] . "</td>"; |
|
84 | + echo "<td>".$oneCert['REQSERIAL']."</td><td>".$oneCert['DN']."</td><td>".$status."</td><td>".$oneCert['EXPIRY']."</td>"; |
|
85 | 85 | if ($status == "ISSUED") { |
86 | 86 | ?> |
87 | 87 | <td> |
88 | 88 | <form action='inc/showCert.inc.php' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8' method="POST"> |
89 | - <input type="hidden" name="certdata" value="<?php echo $oneCert['CERT'];?>"/> |
|
89 | + <input type="hidden" name="certdata" value="<?php echo $oneCert['CERT']; ?>"/> |
|
90 | 90 | <button type="submit">Display</button> |
91 | 91 | </form> |
92 | 92 | <td> |
@@ -20,7 +20,7 @@ |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | return $this->counter; |
127 | 127 | } |
128 | 128 | |
129 | - $cachedNumber = @file_get_contents(ROOT . "/var/tmp/cachedSPNumber.serialised"); |
|
129 | + $cachedNumber = @file_get_contents(ROOT."/var/tmp/cachedSPNumber.serialised"); |
|
130 | 130 | if ($cachedNumber !== FALSE) { |
131 | 131 | $numberData = unserialize($cachedNumber); |
132 | 132 | $now = new \DateTime(); |
@@ -139,7 +139,7 @@ discard block |
||
139 | 139 | } else { // data in cache is too old or doesn't exist. We really need to ask the database |
140 | 140 | $list = $this->listAllServiceProviders(); |
141 | 141 | $this->counter = count($list); |
142 | - file_put_contents(ROOT . "/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()])); |
|
142 | + file_put_contents(ROOT."/var/tmp/cachedSPNumber.serialised", serialize(["number" => $this->counter, "timestamp" => new \DateTime()])); |
|
143 | 143 | return $this->counter; |
144 | 144 | } |
145 | 145 | } |
@@ -188,7 +188,7 @@ discard block |
||
188 | 188 | $returnarray = []; |
189 | 189 | $query = "SELECT id_institution AS id, country, inst_realm as realmlist, name AS collapsed_name, contact AS collapsed_contact, type FROM view_active_institution WHERE country = ?"; |
190 | 190 | if ($eduroamDbType !== NULL) { |
191 | - $query .= " AND ( type = '" . ExternalEduroamDBData::TYPE_IDPSP . "' OR type = '" . $eduroamDbType . "')"; |
|
191 | + $query .= " AND ( type = '".ExternalEduroamDBData::TYPE_IDPSP."' OR type = '".$eduroamDbType."')"; |
|
192 | 192 | } |
193 | 193 | $externals = $this->db->exec($query, "s", $tld); |
194 | 194 | // was a SELECT query, so a resource and not a boolean |
@@ -291,7 +291,7 @@ discard block |
||
291 | 291 | $instServerTransaction = $this->db->exec($query, "s", $tld); |
292 | 292 | while ($instServerResponses = mysqli_fetch_object(/** @scrutinizer ignore-type */ $instServerTransaction)) { |
293 | 293 | $contactList = $this->dissectCollapsedContacts($instServerResponses->contacts); |
294 | - $retval[$instServerResponses->ROid . $instServerResponses->instid] = [ |
|
294 | + $retval[$instServerResponses->ROid.$instServerResponses->instid] = [ |
|
295 | 295 | "names" => $this->splitNames($instServerResponses->inst_name), |
296 | 296 | "type" => $instServerResponses->type, |
297 | 297 | "servers" => $instServerResponses->servers, |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $deco = new \web\lib\admin\PageDecoration(); |
25 | 25 | $uiElements = new web\lib\admin\UIElements(); |
@@ -50,16 +50,16 @@ discard block |
||
50 | 50 | <div class="infobox"> |
51 | 51 | <h2><?php $tablecaption = _("Your Personal Information"); echo $tablecaption; ?></h2> |
52 | 52 | <table> |
53 | - <caption><?php echo $tablecaption;?></caption> |
|
53 | + <caption><?php echo $tablecaption; ?></caption> |
|
54 | 54 | <tr> |
55 | - <th class="wai-invisible" scope="col"><?php echo _("Property Type");?></th> |
|
56 | - <th class="wai-invisible" scope="col"><?php echo _("Language if applicable");?></th> |
|
57 | - <th class="wai-invisible" scope="col"><?php echo _("Property Value");?></th> |
|
55 | + <th class="wai-invisible" scope="col"><?php echo _("Property Type"); ?></th> |
|
56 | + <th class="wai-invisible" scope="col"><?php echo _("Language if applicable"); ?></th> |
|
57 | + <th class="wai-invisible" scope="col"><?php echo _("Property Value"); ?></th> |
|
58 | 58 | </tr> |
59 | 59 | <?php echo $uiElements->infoblock($user->getAttributes(), "user", "User"); ?> |
60 | 60 | <tr> |
61 | 61 | <td> |
62 | - <?php echo "" . _("Unique Identifier") ?> |
|
62 | + <?php echo ""._("Unique Identifier") ?> |
|
63 | 63 | </td> |
64 | 64 | <td> |
65 | 65 | </td> |
@@ -71,14 +71,14 @@ discard block |
||
71 | 71 | </div> |
72 | 72 | |
73 | 73 | <form action='overview_certificates.php' method='GET' accept-charset='UTF-8'> |
74 | - <button type='submit'><?php echo sprintf(_('RADIUS/TLS Certificate management'));?></button> |
|
74 | + <button type='submit'><?php echo sprintf(_('RADIUS/TLS Certificate management')); ?></button> |
|
75 | 75 | </form> |
76 | 76 | |
77 | 77 | <?php |
78 | 78 | $mgmt = new \core\UserManagement(); |
79 | 79 | |
80 | 80 | if (!$user->isFederationAdmin()) { |
81 | - echo "<p>" . sprintf(_("You are not a %s manager."), $uiElements->nomenclatureFed) . "</p>"; |
|
81 | + echo "<p>".sprintf(_("You are not a %s manager."), $uiElements->nomenclatureFed)."</p>"; |
|
82 | 82 | echo $deco->footer(); |
83 | 83 | exit(0); |
84 | 84 | } |
@@ -92,16 +92,16 @@ discard block |
||
92 | 92 | <?php $tablecaption2 = sprintf(_("%s Properties: %s"), $uiElements->nomenclatureFed, $thefed->name); echo $tablecaption2; ?> |
93 | 93 | </h2> |
94 | 94 | <table> |
95 | - <caption><?php echo $tablecaption2;?></caption> |
|
95 | + <caption><?php echo $tablecaption2; ?></caption> |
|
96 | 96 | <tr> |
97 | - <th class="wai-invisible" scope="col"><?php echo _("Property Type");?></th> |
|
98 | - <th class="wai-invisible" scope="col"><?php echo _("Language if applicable");?></th> |
|
99 | - <th class="wai-invisible" scope="col"><?php echo _("Property Value");?></th> |
|
97 | + <th class="wai-invisible" scope="col"><?php echo _("Property Type"); ?></th> |
|
98 | + <th class="wai-invisible" scope="col"><?php echo _("Language if applicable"); ?></th> |
|
99 | + <th class="wai-invisible" scope="col"><?php echo _("Property Value"); ?></th> |
|
100 | 100 | </tr> |
101 | 101 | <!-- fed properties --> |
102 | 102 | <tr> |
103 | 103 | <td> |
104 | - <?php echo "" . _("Country") ?> |
|
104 | + <?php echo ""._("Country") ?> |
|
105 | 105 | </td> |
106 | 106 | <td> |
107 | 107 | </td> |
@@ -182,7 +182,7 @@ discard block |
||
182 | 182 | default: |
183 | 183 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
184 | 184 | } |
185 | - echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter) . " " . $cryptText, _("Sent successfully.")); |
|
185 | + echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter)." ".$cryptText, _("Sent successfully.")); |
|
186 | 186 | break; |
187 | 187 | case "FAILURE": |
188 | 188 | echo $uiElements->boxError(_("No invitation email could be sent!"), _("Sending failure!")); |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | default: |
203 | 203 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
204 | 204 | } |
205 | - echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter) . " " . $cryptText, _("Partial success.")); |
|
205 | + echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter)." ".$cryptText, _("Partial success.")); |
|
206 | 206 | break; |
207 | 207 | case "INVALIDSYNTAX": |
208 | 208 | echo $uiElements->boxError(_("The invitation email address was malformed, no invitation was sent!"), _("The invitation email address was malformed, no invitation was sent!")); |
@@ -218,27 +218,27 @@ discard block |
||
218 | 218 | } else { |
219 | 219 | $link = 'http://'; |
220 | 220 | } |
221 | - $link .= $_SERVER['SERVER_NAME'] . $_SERVER['SCRIPT_NAME']; |
|
221 | + $link .= $_SERVER['SERVER_NAME'].$_SERVER['SCRIPT_NAME']; |
|
222 | 222 | $link = htmlspecialchars($link); |
223 | 223 | if (\config\Master::FUNCTIONALITY_LOCATIONS['CONFASSISTANT_RADIUS'] == 'LOCAL' && \config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS'] == 'LOCAL') { |
224 | 224 | echo "<table><tr> |
225 | - <td>" . sprintf(_("Diagnose reachability and connection parameters of any %s %s"), \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureIdP) . "</td> |
|
225 | + <td>" . sprintf(_("Diagnose reachability and connection parameters of any %s %s"), \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureIdP)."</td> |
|
226 | 226 | <td><form method='post' action='../diag/action_realmcheck.php' accept-charset='UTF-8'> |
227 | 227 | <input type='hidden' name='comefrom' id='comefrom' value='$link'/> |
228 | - <button id='realmcheck' style='cursor:pointer;' type='submit'>" . _("Go!") . "</button> |
|
228 | + <button id='realmcheck' style='cursor:pointer;' type='submit'>"._("Go!")."</button> |
|
229 | 229 | </form> |
230 | 230 | </td> |
231 | 231 | </tr> |
232 | 232 | </table>"; |
233 | 233 | } |
234 | 234 | if (\config\ConfAssistant::CONSORTIUM['name'] == 'eduroam') { |
235 | - $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>%s manual</a>"), "https://wiki.geant.org/x/qJg7Bw", $uiElements->nomenclatureFed) . "</h3>"; |
|
235 | + $helptext = "<h3>".sprintf(_("Need help? Refer to the <a href='%s'>%s manual</a>"), "https://wiki.geant.org/x/qJg7Bw", $uiElements->nomenclatureFed)."</h3>"; |
|
236 | 236 | } else { |
237 | 237 | $helptext = ""; |
238 | 238 | } |
239 | 239 | ?> |
240 | 240 | <table class='user_overview' style='border:0px; width:unset'> |
241 | - <caption><?php echo _("Participant Details");?></caption> |
|
241 | + <caption><?php echo _("Participant Details"); ?></caption> |
|
242 | 242 | <tr> |
243 | 243 | <th scope='col' style="width:13em"><?php echo _("Configured / Visible / OpenRoaming"); ?></th> |
244 | 244 | <th scope='col'><?php echo sprintf(_("%s Name"), $uiElements->nomenclatureParticipant); ?></th> |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | $pending_invites = $mgmt->listPendingInvitations(); |
248 | 248 | |
249 | 249 | if (\config\Master::DB['enforce-external-sync']) { |
250 | - echo "<th scope='col'>" . sprintf(_("%s Database Sync Status"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</th>"; |
|
250 | + echo "<th scope='col'>".sprintf(_("%s Database Sync Status"), \config\ConfAssistant::CONSORTIUM['display_name'])."</th>"; |
|
251 | 251 | } |
252 | 252 | ?> |
253 | 253 | <th scope='col'> |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | foreach ($feds as $onefed) { |
263 | 263 | $thefed = new \core\Federation(strtoupper($onefed['value'])); |
264 | 264 | /// nomenclature for 'federation', federation name, nomenclature for 'inst' |
265 | - echo "<tr><td colspan='8'><strong>" . sprintf(_("The following %s are in your %s %s:"), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed, '<span style="color:green">' . $thefed->name . '</span>') . "</strong></td></tr>"; |
|
265 | + echo "<tr><td colspan='8'><strong>".sprintf(_("The following %s are in your %s %s:"), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed, '<span style="color:green">'.$thefed->name.'</span>')."</strong></td></tr>"; |
|
266 | 266 | |
267 | 267 | // extract only pending invitations for *this* fed |
268 | 268 | $display_pendings = FALSE; |
@@ -287,9 +287,9 @@ discard block |
||
287 | 287 | // deployment status; need to dive into profiles for this |
288 | 288 | // show happy eyeballs if at least one profile is configured/showtime |
289 | 289 | echo "<td>"; |
290 | - echo ($idp_instance->maxProfileStatus() >= \core\IdP::PROFILES_CONFIGURED ? "C" : "-" ) |
|
290 | + echo ($idp_instance->maxProfileStatus() >= \core\IdP::PROFILES_CONFIGURED ? "C" : "-") |
|
291 | 291 | . " " |
292 | - . ($idp_instance->maxProfileStatus() >= \core\IdP::PROFILES_SHOWTIME ? "V" : "-" ) |
|
292 | + . ($idp_instance->maxProfileStatus() >= \core\IdP::PROFILES_SHOWTIME ? "V" : "-") |
|
293 | 293 | . " " |
294 | 294 | . "<span style='color:"; |
295 | 295 | switch ($idp_instance->maxOpenRoamingStatus()) { |
@@ -324,23 +324,23 @@ discard block |
||
324 | 324 | } |
325 | 325 | } |
326 | 326 | echo "<td style='vertical-align:top;'> |
327 | - <input type='hidden' name='inst' value='" . $index . "'>" . $idp_instance->name . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) . implode("</li><li>", $listOfSilverbulletRealms) . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) . " |
|
327 | + <input type='hidden' name='inst' value='" . $index."'>".$idp_instance->name.(empty($listOfSilverbulletRealms) ? "" : "<ul><li>").implode("</li><li>", $listOfSilverbulletRealms).(empty($listOfSilverbulletRealms) ? "" : "</li><ul>")." |
|
328 | 328 | </td>"; |
329 | 329 | // external DB sync, if configured as being necessary |
330 | 330 | if (\config\Master::DB['enforce-external-sync']) { |
331 | 331 | echo "<td style='display: ruby;'>"; |
332 | 332 | if ($readonly === FALSE) { |
333 | - echo "<form method='post' action='inc/manageDBLink.inc.php?inst_id=" . $idp_instance->identifier . "' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
334 | - <button type='submit'>" . _("Manage DB Link") . "</button></form> "; |
|
333 | + echo "<form method='post' action='inc/manageDBLink.inc.php?inst_id=".$idp_instance->identifier."' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
334 | + <button type='submit'>" . _("Manage DB Link")."</button></form> "; |
|
335 | 335 | } |
336 | 336 | switch ($idp_instance->getExternalDBSyncState()) { |
337 | 337 | case \core\IdP::EXTERNAL_DB_SYNCSTATE_NOTSUBJECTTOSYNCING: |
338 | 338 | break; |
339 | 339 | case \core\IdP::EXTERNAL_DB_SYNCSTATE_SYNCED: |
340 | - echo "<div class='acceptable'>" . _("Linked") . "</div>"; |
|
340 | + echo "<div class='acceptable'>"._("Linked")."</div>"; |
|
341 | 341 | break; |
342 | 342 | case \core\IdP::EXTERNAL_DB_SYNCSTATE_NOT_SYNCED: |
343 | - echo "<div class='notacceptable'>" . _("NOT linked") . "</div>"; |
|
343 | + echo "<div class='notacceptable'>"._("NOT linked")."</div>"; |
|
344 | 344 | |
345 | 345 | |
346 | 346 | break; |
@@ -353,9 +353,9 @@ discard block |
||
353 | 353 | echo "<td style='vertical-align: top;'>"; |
354 | 354 | if ($readonly === FALSE) { |
355 | 355 | echo "<div style='white-space: nowrap;'> |
356 | - <form method='post' action='inc/manageAdmins.inc.php?inst_id=" . $index . "' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
356 | + <form method='post' action='inc/manageAdmins.inc.php?inst_id=" . $index."' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
357 | 357 | <button type='submit'>" . |
358 | - _("Add/Remove Administrators") . " |
|
358 | + _("Add/Remove Administrators")." |
|
359 | 359 | </button> |
360 | 360 | </form> |
361 | 361 | </div>"; |
@@ -368,7 +368,7 @@ discard block |
||
368 | 368 | echo "<tr> |
369 | 369 | <td colspan='2'> |
370 | 370 | <strong>" . |
371 | - sprintf(_("Pending invitations in the %s:"), $uiElements->nomenclatureFed) . " |
|
371 | + sprintf(_("Pending invitations in the %s:"), $uiElements->nomenclatureFed)." |
|
372 | 372 | </strong> |
373 | 373 | </td> |
374 | 374 | </tr>"; |
@@ -376,16 +376,16 @@ discard block |
||
376 | 376 | if (strtoupper($oneinvite['country']) == strtoupper($thefed->tld)) { |
377 | 377 | echo "<tr> |
378 | 378 | <td>" . |
379 | - $oneinvite['name'] . " |
|
379 | + $oneinvite['name']." |
|
380 | 380 | </td> |
381 | 381 | <td>" . |
382 | - $oneinvite['mail'] . " |
|
382 | + $oneinvite['mail']." |
|
383 | 383 | </td> |
384 | 384 | <td colspan=2>"; |
385 | 385 | if ($readonly === FALSE) { |
386 | 386 | echo "<form method='post' action='overview_federation.php' accept-charset='UTF-8'> |
387 | - <input type='hidden' name='invitation_id' value='" . $oneinvite['token'] . "'/> |
|
388 | - <button class='delete' type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_DELETE . "'>" . _("Revoke Invitation") . "</button> " |
|
387 | + <input type='hidden' name='invitation_id' value='" . $oneinvite['token']."'/> |
|
388 | + <button class='delete' type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_DELETE."'>"._("Revoke Invitation")."</button> " |
|
389 | 389 | . sprintf(_("(expires %s)"), $oneinvite['expiry']) |
390 | 390 | . "</form>"; |
391 | 391 | } |
@@ -24,9 +24,9 @@ discard block |
||
24 | 24 | #private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
25 | 25 | |
26 | 26 | |
27 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
28 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
29 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
27 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
28 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
29 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
30 | 30 | private const EDUPKI_RA_ID = 700; |
31 | 31 | private const EDUPKI_CERT_PROFILE = "Radius Server SOAP"; |
32 | 32 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -42,13 +42,13 @@ discard block |
||
42 | 42 | parent::__construct(); |
43 | 43 | |
44 | 44 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) { |
45 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
45 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
46 | 46 | } |
47 | 47 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) { |
48 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
48 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
49 | 49 | } |
50 | 50 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) { |
51 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
51 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
52 | 52 | } |
53 | 53 | } |
54 | 54 | |
@@ -106,22 +106,22 @@ discard block |
||
106 | 106 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
107 | 107 | try { |
108 | 108 | $altArray = [# Array mit den Subject Alternative Names |
109 | - "email:" . $csr["USERMAIL"] |
|
109 | + "email:".$csr["USERMAIL"] |
|
110 | 110 | ]; |
111 | 111 | foreach ($csr["ALTNAMES"] as $oneAltName) { |
112 | - $altArray[] = "DNS:" . $oneAltName; |
|
112 | + $altArray[] = "DNS:".$oneAltName; |
|
113 | 113 | } |
114 | 114 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
115 | 115 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
116 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n"); |
|
117 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
116 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n"); |
|
117 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
118 | 118 | $this->loggerInstance->debug(5, "PARAM_3: "); |
119 | 119 | $this->loggerInstance->debug(5, $altArray); |
120 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE . "\n"); |
|
121 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
122 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
123 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n"); |
|
124 | - $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n"); |
|
120 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE."\n"); |
|
121 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
122 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
123 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n"); |
|
124 | + $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n"); |
|
125 | 125 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
126 | 126 | $soapNewRequest = $soapPub->newRequest( |
127 | 127 | CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID |
@@ -143,11 +143,11 @@ discard block |
||
143 | 143 | } catch (Exception $e) { |
144 | 144 | // PHP 7.1 can do this much better |
145 | 145 | if (is_soap_fault($e)) { |
146 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
146 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
147 | 147 | $e->faultstring |
148 | 148 | }\n"); |
149 | 149 | } |
150 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
150 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
151 | 151 | } |
152 | 152 | try { |
153 | 153 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -181,7 +181,7 @@ discard block |
||
181 | 181 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
182 | 182 | // rather than just using the string. Grr. |
183 | 183 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
184 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
184 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
185 | 185 | // retrieve our RA cert from filesystem |
186 | 186 | // the RA certificates are not needed right now because we |
187 | 187 | // have resorted to S/MIME signatures with openssl command-line |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
194 | 194 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
195 | 195 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
196 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
196 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
197 | 197 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
198 | 198 | $output = []; |
199 | 199 | $return = 999; |
@@ -202,21 +202,21 @@ discard block |
||
202 | 202 | throw new Exception("Non-zero return value from openssl smime!"); |
203 | 203 | } |
204 | 204 | // and get the signature blob back from the filesystem |
205 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
205 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
206 | 206 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
207 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
208 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
209 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
207 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
208 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
209 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
210 | 210 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
211 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
212 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
211 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
212 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
213 | 213 | if ($soapIssueCert === FALSE) { |
214 | 214 | throw new Exception("The locally approved request was NOT processed by the CA."); |
215 | 215 | } |
216 | 216 | } catch (SoapFault $e) { |
217 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
217 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
218 | 218 | } catch (Exception $e) { |
219 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
219 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
220 | 220 | } |
221 | 221 | return $soapReqnum; |
222 | 222 | } |
@@ -268,9 +268,9 @@ discard block |
||
268 | 268 | throw new Exception("CAInfo has no root certificate for us!"); |
269 | 269 | } |
270 | 270 | } catch (SoapFault $e) { |
271 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
271 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
272 | 272 | } catch (Exception $e) { |
273 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
273 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
274 | 274 | } |
275 | 275 | return [ |
276 | 276 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -303,12 +303,12 @@ discard block |
||
303 | 303 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
304 | 304 | // rather than just using the string. Grr. |
305 | 305 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
306 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
306 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
307 | 307 | // retrieve our RA cert from filesystem |
308 | 308 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
309 | 309 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
310 | 310 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
311 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
311 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
312 | 312 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
313 | 313 | $output = []; |
314 | 314 | $return = 999; |
@@ -317,7 +317,7 @@ discard block |
||
317 | 317 | throw new Exception("Non-zero return value from openssl smime!"); |
318 | 318 | } |
319 | 319 | // and get the signature blob back from the filesystem |
320 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
320 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
321 | 321 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
322 | 322 | if ($soapIssueRev === FALSE) { |
323 | 323 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -325,9 +325,9 @@ discard block |
||
325 | 325 | } catch (Exception $e) { |
326 | 326 | // PHP 7.1 can do this much better |
327 | 327 | if (is_soap_fault($e)) { |
328 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
328 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
329 | 329 | } |
330 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
330 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
331 | 331 | } |
332 | 332 | } |
333 | 333 | |
@@ -427,9 +427,9 @@ discard block |
||
427 | 427 | */ |
428 | 428 | public function soapToXmlInteger($x) |
429 | 429 | { |
430 | - return '<' . $x[0] . '>' |
|
430 | + return '<'.$x[0].'>' |
|
431 | 431 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
432 | - . '</' . $x[0] . '>'; |
|
432 | + . '</'.$x[0].'>'; |
|
433 | 433 | } |
434 | 434 | |
435 | 435 | /** |
@@ -448,9 +448,9 @@ discard block |
||
448 | 448 | // dump private key into directory |
449 | 449 | $outstring = ""; |
450 | 450 | openssl_pkey_export($privateKey, $outstring); |
451 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
451 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
452 | 452 | // PHP can only do one DC in the Subject. But we need three. |
453 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
453 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
454 | 454 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
455 | 455 | $output = []; |
456 | 456 | $return = 999; |