@@ -156,8 +156,8 @@ |
||
156 | 156 | // replace namespace separators with directory separators |
157 | 157 | // in the relative class name, append with .php |
158 | 158 | $file = $base_dir |
159 | - . str_replace('\\', '/', $relative_class) |
|
160 | - . '.php'; |
|
159 | + . str_replace('\\', '/', $relative_class) |
|
160 | + . '.php'; |
|
161 | 161 | |
162 | 162 | // if the mapped file exists, require it |
163 | 163 | if ($this->requireFile($file)) { |
@@ -97,10 +97,10 @@ |
||
97 | 97 | public function addNamespace($prefix, $base_dir, $prepend = false) |
98 | 98 | { |
99 | 99 | // normalize namespace prefix |
100 | - $prefix = trim($prefix, '\\') . '\\'; |
|
100 | + $prefix = trim($prefix, '\\').'\\'; |
|
101 | 101 | |
102 | 102 | // normalize the base directory with a trailing separator |
103 | - $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR) . '/'; |
|
103 | + $base_dir = rtrim($base_dir, DIRECTORY_SEPARATOR).'/'; |
|
104 | 104 | |
105 | 105 | // initialize the namespace prefix array |
106 | 106 | if (isset($this->prefixes[$prefix]) === false) { |
@@ -9,7 +9,7 @@ |
||
9 | 9 | */ |
10 | 10 | ?> |
11 | 11 | <h1>Example Skin (main user frontpage)</h1> |
12 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","consortium_logo.png");?>"/> |
|
12 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "consortium_logo.png"); ?>"/> |
|
13 | 13 | <p>This skin is much more sober and less bloated than the default one. As it happens, it also doesn't do anything.</p> |
14 | 14 | <p>But at least it goes to show that it's possible to include custom images/CSS/external software using findResourceUrl(..., $filename): |
15 | -<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES","custom.png");?>"/> |
|
15 | +<img src="<?php echo $Gui->skinObject->findresourceUrl("IMAGES", "custom.png"); ?>"/> |
@@ -246,11 +246,11 @@ discard block |
||
246 | 246 | } |
247 | 247 | |
248 | 248 | /** |
249 | - * This function parses a X.509 cert and returns all certificatePolicies OIDs |
|
250 | - * |
|
251 | - * @param array $cert (returned from openssl_x509_parse) |
|
252 | - * @return array of OIDs |
|
253 | - */ |
|
249 | + * This function parses a X.509 cert and returns all certificatePolicies OIDs |
|
250 | + * |
|
251 | + * @param array $cert (returned from openssl_x509_parse) |
|
252 | + * @return array of OIDs |
|
253 | + */ |
|
254 | 254 | private function propertyCheckPolicy($cert) { |
255 | 255 | $oids = []; |
256 | 256 | if ($cert['extensions']['certificatePolicies']) { |
@@ -263,11 +263,11 @@ discard block |
||
263 | 263 | return $oids; |
264 | 264 | } |
265 | 265 | /** |
266 | - * This function parses a X.509 cert and returns the value of $field |
|
267 | - * |
|
268 | - * @param array $cert (returned from openssl_x509_parse) |
|
269 | - * @return string value of the issuer field or '' |
|
270 | - */ |
|
266 | + * This function parses a X.509 cert and returns the value of $field |
|
267 | + * |
|
268 | + * @param array $cert (returned from openssl_x509_parse) |
|
269 | + * @return string value of the issuer field or '' |
|
270 | + */ |
|
271 | 271 | private function getCertificateIssuer($cert) { |
272 | 272 | $issuer = ''; |
273 | 273 | foreach ($cert['issuer'] as $key => $val) { |
@@ -23,7 +23,7 @@ discard block |
||
23 | 23 | |
24 | 24 | use \Exception; |
25 | 25 | |
26 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
26 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
27 | 27 | |
28 | 28 | /** |
29 | 29 | * Test suite to verify that a given NAI realm has NAPTR records according to |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['status'] = $cert['status']; |
145 | 145 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['message'] = $this->TLS_certkeys[$cert['status']]; |
146 | 146 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['expected'] = $cert['expected']; |
147 | - $add = ' -cert ' . ROOT . '/config/cli-certs/' . $cert['public'] . ' -key ' . ROOT . '/config/cli-certs/' . $cert['private']; |
|
147 | + $add = ' -cert '.ROOT.'/config/cli-certs/'.$cert['public'].' -key '.ROOT.'/config/cli-certs/'.$cert['private']; |
|
148 | 148 | if (!isset($this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k])) { |
149 | 149 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k] = []; |
150 | 150 | } |
@@ -188,11 +188,11 @@ discard block |
||
188 | 188 | // but code analysers want this more explicit, so here is this extra |
189 | 189 | // call to escapeshellarg() |
190 | 190 | $escapedHost = escapeshellarg($host); |
191 | - $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1\n"); |
|
191 | + $this->loggerInstance->debug(4, CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1\n"); |
|
192 | 192 | $time_start = microtime(true); |
193 | 193 | $opensslbabble = []; |
194 | 194 | $result = 999; // likely to become zero by openssl; don't want to initialise to zero, could cover up exec failures |
195 | - exec(CONFIG['PATHS']['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); |
|
195 | + exec(CONFIG['PATHS']['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/ $arg 2>&1", $opensslbabble, $result); |
|
196 | 196 | $time_stop = microtime(true); |
197 | 197 | $testresults['time_millisec'] = floor(($time_stop - $time_start) * 1000); |
198 | 198 | $testresults['returncode'] = $result; |
@@ -52,7 +52,7 @@ |
||
52 | 52 | they are from the same user group. You are not allowed to share them to an unlimited |
53 | 53 | audience (e.g. on a publicly accessible web server).</li> |
54 | 54 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to |
55 | -your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'];?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
55 | +your own <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?> end users, e.g. on the support web pages of your <?php echo CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']; ?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
56 | 56 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on |
57 | 57 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> |
58 | 58 | </ul> |
@@ -88,7 +88,7 @@ |
||
88 | 88 | 'server_suffix' => '.hosted.eduroam.org', |
89 | 89 | 'gracetime' => 90, |
90 | 90 | 'CA' => ["type" => "embedded"], # OCSP URL needs to be configured in openssl.cnf |
91 | - # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], |
|
91 | + # 'CA' => ["type" => "DFN", "SOAP_API_ENDPOINT" => "http://no.idea.where/"], |
|
92 | 92 | |
93 | 93 | ], |
94 | 94 | /** |
@@ -53,14 +53,14 @@ |
||
53 | 53 | } |
54 | 54 | |
55 | 55 | switch ($_GET['token']) { |
56 | - case "SELF-REGISTER": |
|
57 | - $token = "SELF-REGISTER"; |
|
58 | - $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
59 | - $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
60 | - break; |
|
61 | - default: |
|
62 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
63 | - $checkval = $usermgmt->checkTokenValidity($token); |
|
56 | + case "SELF-REGISTER": |
|
57 | + $token = "SELF-REGISTER"; |
|
58 | + $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
59 | + $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
60 | + break; |
|
61 | + default: |
|
62 | + $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
63 | + $checkval = $usermgmt->checkTokenValidity($token); |
|
64 | 64 | } |
65 | 65 | |
66 | 66 | if ($checkval < 0) { |
@@ -30,7 +30,7 @@ discard block |
||
30 | 30 | ?> |
31 | 31 | <?php |
32 | 32 | |
33 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
33 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
34 | 34 | |
35 | 35 | $auth = new \web\lib\admin\Authentication(); |
36 | 36 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -70,22 +70,22 @@ discard block |
||
70 | 70 | $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
71 | 71 | break; |
72 | 72 | default: |
73 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
73 | + $token = $validator->token(filter_input(INPUT_GET, 'token', FILTER_SANITIZE_STRING)); |
|
74 | 74 | $checkval = $usermgmt->checkTokenValidity($token); |
75 | 75 | } |
76 | 76 | |
77 | 77 | if ($checkval < 0) { |
78 | 78 | echo $deco->pageheader(_("Error creating new IdP binding!"), "ADMIN-IDP"); |
79 | - echo "<h1>" . _("Error creating new IdP binding!") . "</h1>"; |
|
79 | + echo "<h1>"._("Error creating new IdP binding!")."</h1>"; |
|
80 | 80 | switch ($checkval) { |
81 | 81 | case \core\UserManagement::TOKENSTATUS_FAIL_ALREADYCONSUMED: |
82 | - echo "<p>" . sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst) . "</p>"; |
|
82 | + echo "<p>".sprintf(_("Sorry... this token has already been used. The %s is already created. If you got the invitation from a mailing list, probably someone else used it before you."), $elements->nomenclatureInst)."</p>"; |
|
83 | 83 | break; |
84 | 84 | case \core\UserManagement::TOKENSTATUS_FAIL_EXPIRED: |
85 | - echo "<p>" . sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed) . "</p>"; |
|
85 | + echo "<p>".sprintf(_("Sorry... this token has expired. Invitation tokens are valid for 24 hours. The %s administrator can create a new one for you."), $elements->nomenclatureFed)."</p>"; |
|
86 | 86 | break; |
87 | 87 | default: |
88 | - echo "<p>" . _("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.") . "</p>"; |
|
88 | + echo "<p>"._("Sorry... you have come to the enrollment page without a valid token. Are you a nasty person? If not, you should go to <a href='overview_user.php'>your profile page</a> instead.")."</p>"; |
|
89 | 89 | } |
90 | 90 | echo $deco->footer(); |
91 | 91 | throw new Exception("Terminating because something is wrong with the token we received."); |
@@ -100,12 +100,12 @@ discard block |
||
100 | 100 | case "SELF-REGISTER": |
101 | 101 | $fed = new \core\Federation($federation); |
102 | 102 | $newidp = new \core\IdP($fed->newIdP($user, "FED", "SELFSERVICE")); |
103 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - selfservice registration"); |
|
103 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - selfservice registration"); |
|
104 | 104 | break; |
105 | 105 | default: |
106 | 106 | $newidp = $usermgmt->createIdPFromToken($token, $user); |
107 | 107 | $usermgmt->invalidateToken($token); |
108 | - $loggerInstance->writeAudit($user, "MOD", "IdP " . $newidp->identifier . " - Token used and invalidated"); |
|
108 | + $loggerInstance->writeAudit($user, "MOD", "IdP ".$newidp->identifier." - Token used and invalidated"); |
|
109 | 109 | break; |
110 | 110 | } |
111 | 111 |
@@ -1019,12 +1019,12 @@ |
||
1019 | 1019 | $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); |
1020 | 1020 | $certUsernameLength = strlen($certUsernameLabel); |
1021 | 1021 | $labelLength = max($certPasswordLength,$certUsernameLength); |
1022 | - ?> |
|
1022 | + ?> |
|
1023 | 1023 | ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" |
1024 | 1024 | !else |
1025 | 1025 | <?php $certPasswordLabel = WindowsCommon::sprint_nsi(_("import password:")); |
1026 | 1026 | $certPasswordLength = strlen($certPasswordLabel); |
1027 | - ?> |
|
1027 | + ?> |
|
1028 | 1028 | !insertmacro debug_cat 4 "Unpacking SB_cert.p12" |
1029 | 1029 | File "SB_cert.p12" |
1030 | 1030 | nsArray::Set Delete_files "SB_cert.p12" |
@@ -135,10 +135,10 @@ discard block |
||
135 | 135 | !define MUI_HEADERIMAGE_BITMAP "cat_150.bmp" |
136 | 136 | !define MUI_COMPONENTSPAGE_SMALLDESC |
137 | 137 | |
138 | -!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" |
|
139 | -!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi( _("Installation complete"))?>" |
|
140 | -!define FAREWELL_TEXT "<?php WindowsCommon::echo_nsi( _("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi( _("Your system is ready."))?>" |
|
141 | -!define FAREWELL_FAIL "<?php WindowsCommon::echo_nsi( _("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi( _("Please contact \${SUPPORT}."))?>" |
|
138 | +!define WELCOME_HEADER "<?php printf(WindowsCommon::sprint_nsi(_("Welcome to the %s installer")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?>" |
|
139 | +!define FAREWELL_HEADER "<?php WindowsCommon::echo_nsi(_("Installation complete"))?>" |
|
140 | +!define FAREWELL_TEXT "<?php WindowsCommon::echo_nsi(_("Network profiles have been installed."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Your system is ready."))?>" |
|
141 | +!define FAREWELL_FAIL "<?php WindowsCommon::echo_nsi(_("Network installation had errors."))?>$\r$\n$\n <?php WindowsCommon::echo_nsi(_("Please contact \${SUPPORT}."))?>" |
|
142 | 142 | ;-------------------------------- |
143 | 143 | ;Languages |
144 | 144 | !insertmacro MUI_LANGUAGE "${LANG}" |
@@ -146,14 +146,14 @@ discard block |
||
146 | 146 | ;-------------------------------- |
147 | 147 | ; License file |
148 | 148 | !ifdef LICENSE_FILE |
149 | -LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi( _("Accept"))?>" |
|
149 | +LicenseForceSelection checkbox "<?php WindowsCommon::echo_nsi(_("Accept"))?>" |
|
150 | 150 | LicenseText "<?php WindowsCommon::echo_nsi(_("If you accept the conditions then select Accept and then click Install to continue."))?>" |
151 | 151 | LicenseData ${LICENSE_FILE} |
152 | 152 | !endif |
153 | 153 | |
154 | 154 | ;----------------------------------- |
155 | 155 | |
156 | -MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi( _("Finish"))?>" |
|
156 | +MiscButtonText "" "" "" "<?php WindowsCommon::echo_nsi(_("Finish"))?>" |
|
157 | 157 | ;---------------------------------- |
158 | 158 | ; FUNCTIONS |
159 | 159 | |
@@ -186,7 +186,7 @@ discard block |
||
186 | 186 | |
187 | 187 | !macro install_ca_cert ca_file ca_fingerprint level |
188 | 188 | !insertmacro debug_cat 2 "locating certificate SHA=${ca_fingerprint} Level=${level}" |
189 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("searching for certificate"))?> ${ca_file}" |
|
189 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("searching for certificate"))?> ${ca_file}" |
|
190 | 190 | File "${ca_file}" |
191 | 191 | nsArray::Set Delete_files "${ca_file}" |
192 | 192 | !insertmacro debug_cat 2 "Testing machine store root" |
@@ -248,13 +248,13 @@ discard block |
||
248 | 248 | ${EndIf} |
249 | 249 | !insertmacro debug_cat 2 "installing certificate $TEMP\${ca_file}" |
250 | 250 | !insertmacro debug_cat 3 "Execute: certutil -addstore -user ${level} $TEMP\${ca_file}" |
251 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("installing certificate"))?> ${ca_file}" |
|
251 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("installing certificate"))?> ${ca_file}" |
|
252 | 252 | nsExec::Exec '"certutil" -addstore -user ${level} "$TEMP"\${ca_file}' |
253 | 253 | Pop $0 |
254 | 254 | !insertmacro debug_cat 3 "certutil returned $0" |
255 | 255 | ${If} $0 != 0 |
256 | 256 | IfSilent +2 |
257 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("could not install certificate"))?> ${ca_file}" |
|
257 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("could not install certificate"))?> ${ca_file}" |
|
258 | 258 | !insertmacro debug_cat 1 "could not install certificate ${ca_file}" |
259 | 259 | ${EndIf} |
260 | 260 | no_install_${ca_file}: |
@@ -461,26 +461,26 @@ discard block |
||
461 | 461 | pop $R0 |
462 | 462 | ${If} $tkip_count > 0 |
463 | 463 | ${If} $aes_count > 1 |
464 | - StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" |
|
464 | + StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profiles are preferred. Always use them if you have a choice."))?>" |
|
465 | 465 | ${Else} |
466 | - StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi( _("The non TKIP profile is preferred. Always use it if you have a choice."))?>" |
|
466 | + StrCpy $R1 "$\r$\n$\n<?php WindowsCommon::echo_nsi(_("The non TKIP profile is preferred. Always use it if you have a choice."))?>" |
|
467 | 467 | ${EndIf} |
468 | 468 | ${Else} |
469 | 469 | StrCpy $R1 "" |
470 | 470 | ${EndIf} |
471 | 471 | ${If} $profile_count > 0 |
472 | - StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
473 | -<?php WindowsCommon::echo_nsi( _("The installer will create the following wireless profiles:"))?>$\r$\n\ |
|
472 | + StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
473 | +<?php WindowsCommon::echo_nsi(_("The installer will create the following wireless profiles:"))?>$\r$\n\ |
|
474 | 474 | $R0.\ |
475 | 475 | $R1$\r$\n$\n\ |
476 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ |
|
476 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ |
|
477 | 477 | EMAIL: ${SUPPORT}$\r$\n\ |
478 | 478 | WWW: ${URL}" |
479 | 479 | ${Else} |
480 | -StrCpy $welcome_message "<?php WindowsCommon::echo_nsi( _("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
481 | -<?php WindowsCommon::echo_nsi( _("The installer will create the wireless profile:"))?> $R0.\ |
|
480 | +StrCpy $welcome_message "<?php WindowsCommon::echo_nsi(_("This installer has been prepared for \${ORGANISATION}"))?>.$\r$\n\ |
|
481 | +<?php WindowsCommon::echo_nsi(_("The installer will create the wireless profile:"))?> $R0.\ |
|
482 | 482 | $R1$\r$\n$\n\ |
483 | -<?php WindowsCommon::echo_nsi( _("More information and comments:"))?>$\r$\n\ |
|
483 | +<?php WindowsCommon::echo_nsi(_("More information and comments:"))?>$\r$\n\ |
|
484 | 484 | EMAIL: ${SUPPORT}$\r$\n\ |
485 | 485 | WWW: ${URL}" |
486 | 486 | ${EndIf} |
@@ -506,7 +506,7 @@ discard block |
||
506 | 506 | SendMessage $HEADLINE ${WM_SETFONT} $HEADLINE_FONT 0 |
507 | 507 | ;TRANSLATION |
508 | 508 | nsDialogs::CreateControl STATIC ${WS_VISIBLE}|${WS_CHILD}|${WS_CLIPSIBLINGS} 0 120u 46u -130u -32u "$welcome_message\ |
509 | -$\r$\n$\r$\n<?php WindowsCommon::echo_nsi( _("Installer created with software from the GEANT project."))?>" |
|
509 | +$\r$\n$\r$\n<?php WindowsCommon::echo_nsi(_("Installer created with software from the GEANT project."))?>" |
|
510 | 510 | Pop $TEXT |
511 | 511 | |
512 | 512 | SetCtlColors $DIALOG "" 0xffffff |
@@ -619,18 +619,18 @@ discard block |
||
619 | 619 | ${If} $wireless_result == 1 |
620 | 620 | !insertmacro debug_cat 1 "wlan_test.exe did not find wireless configuration service" |
621 | 621 | IfSilent +2 |
622 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" |
|
622 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("Windows wireless configuration service is not enabled. The installer cannot continue."))?>" |
|
623 | 623 | Call Cleanup |
624 | 624 | ${EndIf} |
625 | 625 | ${If} $wireless_result == 2 |
626 | 626 | IfSilent +2 |
627 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. The installer cannot continue."))?>" |
|
627 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. The installer cannot continue."))?>" |
|
628 | 628 | Call Cleanup |
629 | 629 | ${EndIf} |
630 | 630 | ${Else} |
631 | 631 | ${If} $wireless_result > 0 |
632 | 632 | IfSilent +3 |
633 | - MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes |
|
633 | + MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("No wireless interfaces found. Wireless access will not be configured. Would you like to continue and configure access on the wired interface?"))?>" IDYES wired_yes |
|
634 | 634 | Call Cleanup |
635 | 635 | wired_yes: |
636 | 636 | Push 1 |
@@ -646,7 +646,7 @@ discard block |
||
646 | 646 | ${If} $wired == 1 |
647 | 647 | ${If} $force_wired == 0 |
648 | 648 | IfSilent wired |
649 | - MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi( _("Do you want to enable access on wired interfaces?"))?>" IDYES wired |
|
649 | + MessageBox MB_YESNO "<?php WindowsCommon::echo_nsi(_("Do you want to enable access on wired interfaces?"))?>" IDYES wired |
|
650 | 650 | Push 0 |
651 | 651 | Pop $wired |
652 | 652 | ${EndIf} |
@@ -687,7 +687,7 @@ discard block |
||
687 | 687 | ;================================ |
688 | 688 | |
689 | 689 | Function ShowInstfiles |
690 | - !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Profiles installation"))?>" " " |
|
690 | + !insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Profiles installation"))?>" " " |
|
691 | 691 | FunctionEnd |
692 | 692 | ;================================ |
693 | 693 | ; Check if a wireless profile exist and put it on delete list |
@@ -706,7 +706,7 @@ discard block |
||
706 | 706 | |
707 | 707 | Function FindProfile |
708 | 708 | Pop $R8 |
709 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("Checking for profile \$R8"))?>" |
|
709 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("Checking for profile \$R8"))?>" |
|
710 | 710 | !insertmacro debug_cat 2 "Checking for profile $R8" |
711 | 711 | !insertmacro debug_cat 3 "Exec: $Netsh wlan show profiles $R8" |
712 | 712 | nsExec::Exec '"$Netsh" wlan show profiles "$R8"' |
@@ -714,7 +714,7 @@ discard block |
||
714 | 714 | !insertmacro debug_cat 4 "netsh returned $0" |
715 | 715 | ${If} $0 == 0 |
716 | 716 | !insertmacro debug_cat 1 "found profile $R8" |
717 | - DetailPrint "<?php WindowsCommon::echo_nsi( _("found profile \$R8"))?>" |
|
717 | + DetailPrint "<?php WindowsCommon::echo_nsi(_("found profile \$R8"))?>" |
|
718 | 718 | Push 0 |
719 | 719 | ${Else} |
720 | 720 | !insertmacro debug_cat 1 "profile $R8 not found" |
@@ -809,7 +809,7 @@ discard block |
||
809 | 809 | ${If} $Symantec_installed != 0 |
810 | 810 | !insertmacro debug_cat 3 "Symantec problem" |
811 | 811 | IfSilent +2 |
812 | - MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" |
|
812 | + MessageBox MB_OK|MB_ICONEXCLAMATION "<?php printf(WindowsCommon::sprint_nsi(_("Please READ this message it is IMPORTANT.$\\r$\\nInstallation problems may be due to the fact that Symantec Endpoint Protection is installed on your machine.$\\r$\\nWhile this is a well-known bug of the Symantec product, about which the installer can not do anything, there is a workaround.$\\r$\\nWhen you close this window the installer will exit and an explorer window will be started (it could appear underneath already opened windows). In this window you should see a script named inst_cat. Start it by double-clicking, It will install the profiles. You will need to login to %s with your username and password.")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) ?>" |
|
813 | 813 | Exec '"explorer" /select,"$EXEDIR\inst_cat.cmd"' |
814 | 814 | Quit |
815 | 815 | |
@@ -1097,7 +1097,7 @@ discard block |
||
1097 | 1097 | Function PFXCertificateSelect |
1098 | 1098 | !ifndef SILVERBULLET |
1099 | 1099 | ;TRANSLATION |
1100 | -!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" |
|
1100 | +!insertmacro MUI_HEADER_TEXT "<?php printf(WindowsCommon::sprint_nsi(_("%s installer for")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])?> " "<?php WindowsCommon::echo_nsi(_("Install personal certificate"))?>" |
|
1101 | 1101 | ;TRANSLATION |
1102 | 1102 | IfSilent +2 |
1103 | 1103 | MessageBox MB_OK "<?php WindowsCommon::echo_nsi(_("Preparing to install personal certificate."))?>$\r$\n<?php WindowsCommon::echo_nsi(_("Click OK to continue"))?> " |
@@ -1113,7 +1113,7 @@ discard block |
||
1113 | 1113 | $certPasswordLength = strlen($certPasswordLabel); |
1114 | 1114 | $certUsernameLabel = WindowsCommon::sprint_nsi(_("Username:")); |
1115 | 1115 | $certUsernameLength = strlen($certUsernameLabel); |
1116 | - $labelLength = max($certPasswordLength,$certUsernameLength); |
|
1116 | + $labelLength = max($certPasswordLength, $certUsernameLength); |
|
1117 | 1117 | ?> |
1118 | 1118 | ${NSD_CreateLabel} 0 0 100% 32u "<?php WindowsCommon::echo_nsi(_("Selected file: \$Cert_file"))?>" |
1119 | 1119 | !else |
@@ -1130,11 +1130,11 @@ discard block |
||
1130 | 1130 | !insertmacro debug_cat 3 "Vista level (Vista without Service pack): $VistaNoSP"; |
1131 | 1131 | ${If} $VistaNoSP == 0 |
1132 | 1132 | !ifdef PFX_USERNAME |
1133 | - !define LABEL_LENGTH "<?php echo($labelLength*3.5)?>u" |
|
1134 | - !define TEXT_START "<?php echo($labelLength*3.5 +5)?>u" |
|
1133 | + !define LABEL_LENGTH "<?php echo($labelLength * 3.5)?>u" |
|
1134 | + !define TEXT_START "<?php echo($labelLength * 3.5 + 5)?>u" |
|
1135 | 1135 | !else |
1136 | - !define LABEL_LENGTH "<?php echo($certPasswordLength*3.5)?>u" |
|
1137 | - !define TEXT_START "<?php echo($certPasswordLength*3.5 +5)?>u" |
|
1136 | + !define LABEL_LENGTH "<?php echo($certPasswordLength * 3.5)?>u" |
|
1137 | + !define TEXT_START "<?php echo($certPasswordLength * 3.5 + 5)?>u" |
|
1138 | 1138 | !endif |
1139 | 1139 | ${NSD_CreateLabel} 0 35u ${LABEL_LENGTH} 12u "<?php echo $certPasswordLabel?>" |
1140 | 1140 | ${NSD_CreatePassword} ${TEXT_START} 34.5u 120u 12u "" |
@@ -1496,7 +1496,7 @@ discard block |
||
1496 | 1496 | Section "-start" |
1497 | 1497 | SectionIn RO |
1498 | 1498 | |
1499 | -!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi( _("Installation"))?>" "<?php WindowsCommon::echo_nsi( _("Checking for existing wireless profiles"))?>" |
|
1499 | +!insertmacro MUI_HEADER_TEXT "<?php WindowsCommon::echo_nsi(_("Installation"))?>" "<?php WindowsCommon::echo_nsi(_("Checking for existing wireless profiles"))?>" |
|
1500 | 1500 | !ifndef PWD |
1501 | 1501 | !include "certs.nsh" |
1502 | 1502 | !endif |
@@ -185,7 +185,6 @@ |
||
185 | 185 | * - RETVAL_NOTCONFIGURED; needs CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-discoverytag'] |
186 | 186 | * - RETVAL_INVALID (at least one format error) |
187 | 187 | * - RETVAL_OK (all fine) |
188 | - |
|
189 | 188 | * @return int one of two RETVALs above |
190 | 189 | */ |
191 | 190 | public function relevantNAPTRcompliance() { |
@@ -21,7 +21,7 @@ discard block |
||
21 | 21 | |
22 | 22 | namespace core\diag; |
23 | 23 | |
24 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
24 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
25 | 25 | |
26 | 26 | /** |
27 | 27 | * Test suite to verify that a given NAI realm has NAPTR records according to |
@@ -169,7 +169,7 @@ discard block |
||
169 | 169 | $this->NAPTR_executed = RADIUSTests::RETVAL_NOTCONFIGURED; |
170 | 170 | return RADIUSTests::RETVAL_NOTCONFIGURED; |
171 | 171 | } |
172 | - $NAPTRs = dns_get_record($this->realm . ".", DNS_NAPTR); |
|
172 | + $NAPTRs = dns_get_record($this->realm.".", DNS_NAPTR); |
|
173 | 173 | if ($NAPTRs === FALSE || count($NAPTRs) == 0) { |
174 | 174 | $this->NAPTR_executed = RFC7585Tests::RETVAL_NONAPTR; |
175 | 175 | return RFC7585Tests::RETVAL_NONAPTR; |
@@ -59,12 +59,12 @@ discard block |
||
59 | 59 | */ |
60 | 60 | |
61 | 61 | /** |
62 | - * Various paths. |
|
63 | - * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. |
|
64 | - * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. |
|
65 | - * See also NSIS_VERSION further down |
|
66 | - * @var array |
|
67 | - */ |
|
62 | + * Various paths. |
|
63 | + * eapol_test: absolute path to the eapol_test executable. If you just fill in "eapol_test" the one from the system $PATH will be taken. |
|
64 | + * c_rehash: absolute path to the c_rehash executable. If you just fill in "c_rehash" the one from the system $PATH will be taken. |
|
65 | + * See also NSIS_VERSION further down |
|
66 | + * @var array |
|
67 | + */ |
|
68 | 68 | 'PATHS' => [ |
69 | 69 | 'c_rehash' => 'c_rehash', |
70 | 70 | 'eapol_test' => 'eapol_test', |
@@ -101,45 +101,45 @@ discard block |
||
101 | 101 | ], |
102 | 102 | |
103 | 103 | 'TLS-clientcerts' => [ |
104 | - 'CA1' => [ |
|
104 | + 'CA1' => [ |
|
105 | 105 | 'status' => 'ACCREDITED', |
106 | 106 | 'issuerCA' => '/DC=org/DC=pki1/CN=PKI 1', |
107 | 107 | 'certificates' => [ |
108 | - [ |
|
108 | + [ |
|
109 | 109 | 'status' => 'CORRECT', |
110 | 110 | 'public' => 'ca1-client-cert.pem', |
111 | 111 | 'private' => 'ca1-client-key.pem', |
112 | 112 | 'expected' => 'PASS'], |
113 | - [ |
|
113 | + [ |
|
114 | 114 | 'status' => 'WRONGPOLICY', |
115 | 115 | 'public' => 'ca1-nopolicy-cert.pem', |
116 | 116 | 'private' => 'ca1-nopolicy-key.key', |
117 | 117 | 'expected' => 'FAIL'], |
118 | - [ |
|
118 | + [ |
|
119 | 119 | 'status' => 'EXPIRED', |
120 | 120 | 'public' => 'ca1-exp.pem', |
121 | 121 | 'private' => 'ca1-exp.key', |
122 | 122 | 'expected' => 'FAIL'], |
123 | - [ |
|
123 | + [ |
|
124 | 124 | 'status' => 'REVOKED', |
125 | 125 | 'public' => 'ca1-revoked.pem', |
126 | 126 | 'private' => 'ca1-revoked.key', |
127 | 127 | 'expected' => 'FAIL'], |
128 | 128 | ] |
129 | - ], |
|
130 | - 'CA-N' => [ |
|
129 | + ], |
|
130 | + 'CA-N' => [ |
|
131 | 131 | 'status' => 'NONACCREDITED', |
132 | 132 | 'issuerCA' => '/DC=org/DC=pkiN/CN=PKI N', |
133 | 133 | 'certificates' => [ |
134 | - [ |
|
134 | + [ |
|
135 | 135 | 'status' => 'CORRECT', |
136 | 136 | 'public' => 'caN-client-cert.pem', |
137 | 137 | 'private' => 'caN-client-cert.key', |
138 | 138 | 'expected' => 'FAIL'], |
139 | - ] |
|
140 | - ] |
|
141 | - ], |
|
142 | - 'accreditedCAsURL' => '', |
|
139 | + ] |
|
140 | + ] |
|
141 | + ], |
|
142 | + 'accreditedCAsURL' => '', |
|
143 | 143 | ], |
144 | 144 | 'eduGainResolver' => [ |
145 | 145 | 'url' => 'https://technical.edugain.org/api.php', |