@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | } |
166 | 166 | } |
167 | 167 | |
168 | - $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . /** @scrutinizer ignore-type */ print_r($supportedEapTypes, true)); |
|
168 | + $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, "./** @scrutinizer ignore-type */ print_r($supportedEapTypes, true)); |
|
169 | 169 | $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedServerNames, true)); |
170 | 170 | $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedCABundle, true)); |
171 | 171 | |
@@ -252,7 +252,7 @@ discard block |
||
252 | 252 | $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME; |
253 | 253 | continue; // otherwise we'd ALSO complain that it's not a real hostname |
254 | 254 | } |
255 | - if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) { |
|
255 | + if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) { |
|
256 | 256 | $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME; |
257 | 257 | } |
258 | 258 | } |
@@ -278,7 +278,7 @@ discard block |
||
278 | 278 | $probValue = RADIUSTests::CERTPROB_SHA1_SIGNATURE; |
279 | 279 | $returnarray[] = $probValue; |
280 | 280 | } |
281 | - $this->loggerInstance->debug(4, "CERT IS: " . /** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE)); |
|
281 | + $this->loggerInstance->debug(4, "CERT IS: "./** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE)); |
|
282 | 282 | if ($intermediateCa['basicconstraints_set'] == 0) { |
283 | 283 | $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS; |
284 | 284 | } |
@@ -326,7 +326,7 @@ discard block |
||
326 | 326 | public function udpReachability($probeindex, $opnameCheck = TRUE, $frag = TRUE) { |
327 | 327 | // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy |
328 | 328 | // the following PEM data is one of the SENSE EAPLab client certs (not secret at all) |
329 | - $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12"); |
|
329 | + $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12"); |
|
330 | 330 | if ($clientcert === FALSE) { |
331 | 331 | throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!"); |
332 | 332 | } |
@@ -335,7 +335,7 @@ discard block |
||
335 | 335 | if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) { |
336 | 336 | return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert); |
337 | 337 | } |
338 | - return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert); |
|
338 | + return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert); |
|
339 | 339 | } |
340 | 340 | |
341 | 341 | /** |
@@ -356,7 +356,7 @@ discard block |
||
356 | 356 | return RADIUSTests::CERTPROB_NO_CDP_HTTP; |
357 | 357 | } |
358 | 358 | // first and second sub-match is the full URL... check it |
359 | - $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2])); |
|
359 | + $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2])); |
|
360 | 360 | if ($crlcontent === FALSE) { |
361 | 361 | return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL; |
362 | 362 | } |
@@ -371,7 +371,7 @@ discard block |
||
371 | 371 | // $pem = chunk_split(base64_encode($crlcontent), 64, "\n"); |
372 | 372 | // inspired by https://stackoverflow.com/questions/2390604/how-to-pass-variables-as-stdin-into-command-line-from-php |
373 | 373 | |
374 | - $proc = \config\Master::PATHS['openssl'] . " crl -inform der"; |
|
374 | + $proc = \config\Master::PATHS['openssl']." crl -inform der"; |
|
375 | 375 | $descriptorspec = [ |
376 | 376 | 0 => ["pipe", "r"], |
377 | 377 | 1 => ["pipe", "w"], |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | $origLength = strlen($hex); |
410 | 410 | for ($i = 1; $i < $origLength; $i++) { |
411 | 411 | if ($i % 2 == 1 && $i != strlen($hex)) { |
412 | - $spaced .= $hex[$i] . " "; |
|
412 | + $spaced .= $hex[$i]." "; |
|
413 | 413 | } else { |
414 | 414 | $spaced .= $hex[$i]; |
415 | 415 | } |
@@ -534,19 +534,19 @@ discard block |
||
534 | 534 | $eapText = \core\common\EAP::eapDisplayName($eaptype); |
535 | 535 | $config = ' |
536 | 536 | network={ |
537 | - ssid="' . \config\Master::APPEARANCE['productname'] . ' testing" |
|
537 | + ssid="' . \config\Master::APPEARANCE['productname'].' testing" |
|
538 | 538 | key_mgmt=WPA-EAP |
539 | 539 | proto=WPA2 |
540 | 540 | pairwise=CCMP |
541 | 541 | group=CCMP |
542 | 542 | '; |
543 | 543 | // phase 1 |
544 | - $config .= 'eap=' . $eapText['OUTER'] . "\n"; |
|
544 | + $config .= 'eap='.$eapText['OUTER']."\n"; |
|
545 | 545 | $logConfig = $config; |
546 | 546 | // phase 2 if applicable; all inner methods have passwords |
547 | 547 | if (isset($eapText['INNER']) && $eapText['INNER'] != "") { |
548 | - $config .= ' phase2="auth=' . $eapText['INNER'] . "\"\n"; |
|
549 | - $logConfig .= ' phase2="auth=' . $eapText['INNER'] . "\"\n"; |
|
548 | + $config .= ' phase2="auth='.$eapText['INNER']."\"\n"; |
|
549 | + $logConfig .= ' phase2="auth='.$eapText['INNER']."\"\n"; |
|
550 | 550 | } |
551 | 551 | // all methods set a password, except EAP-TLS |
552 | 552 | if ($eaptype != \core\common\EAP::EAPTYPE_TLS) { |
@@ -562,11 +562,11 @@ discard block |
||
562 | 562 | } |
563 | 563 | |
564 | 564 | // inner identity |
565 | - $config .= ' identity="' . $inner . "\"\n"; |
|
566 | - $logConfig .= ' identity="' . $inner . "\"\n"; |
|
565 | + $config .= ' identity="'.$inner."\"\n"; |
|
566 | + $logConfig .= ' identity="'.$inner."\"\n"; |
|
567 | 567 | // outer identity, may be equal |
568 | - $config .= ' anonymous_identity="' . $outer . "\"\n"; |
|
569 | - $logConfig .= ' anonymous_identity="' . $outer . "\"\n"; |
|
568 | + $config .= ' anonymous_identity="'.$outer."\"\n"; |
|
569 | + $logConfig .= ' anonymous_identity="'.$outer."\"\n"; |
|
570 | 570 | // done |
571 | 571 | $config .= "}"; |
572 | 572 | $logConfig .= "}"; |
@@ -627,13 +627,13 @@ discard block |
||
627 | 627 | * @return string the command-line for eapol_test |
628 | 628 | */ |
629 | 629 | private function eapolTestConfig($probeindex, $opName, $frag) { |
630 | - $cmdline = \config\Diagnostics::PATHS['eapol_test'] . |
|
631 | - " -a " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'] . |
|
632 | - " -s " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'] . |
|
633 | - " -o serverchain.pem" . |
|
634 | - " -c ./udp_login_test.conf" . |
|
635 | - " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " . |
|
636 | - " -t " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout'] . " "; |
|
630 | + $cmdline = \config\Diagnostics::PATHS['eapol_test']. |
|
631 | + " -a ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip']. |
|
632 | + " -s ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret']. |
|
633 | + " -o serverchain.pem". |
|
634 | + " -c ./udp_login_test.conf". |
|
635 | + " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ". |
|
636 | + " -t ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout']." "; |
|
637 | 637 | if ($opName) { |
638 | 638 | $cmdline .= '-N126:s:"1cat.eduroam.org" '; |
639 | 639 | } |
@@ -662,10 +662,10 @@ discard block |
||
662 | 662 | * @throws Exception |
663 | 663 | */ |
664 | 664 | private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs) { |
665 | - if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) { |
|
665 | + if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) { |
|
666 | 666 | throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n"); |
667 | 667 | } |
668 | - if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) { |
|
668 | + if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) { |
|
669 | 669 | throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n"); |
670 | 670 | } |
671 | 671 | // make a copy of the EAP-received chain and add the configured intermediates, if any |
@@ -679,15 +679,15 @@ discard block |
||
679 | 679 | } |
680 | 680 | if ($decoded['ca'] == 1) { |
681 | 681 | if ($decoded['root'] == 1) { // save CAT roots to the root directory |
682 | - file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']); |
|
683 | - file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']); |
|
682 | + file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']); |
|
683 | + file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']); |
|
684 | 684 | $catRoots[] = $decoded['pem']; |
685 | 685 | } else { // save the intermediates to allcerts directory |
686 | - file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']); |
|
686 | + file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']); |
|
687 | 687 | $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded)); |
688 | 688 | if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) { |
689 | 689 | $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain"); |
690 | - file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]); |
|
690 | + file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]); |
|
691 | 691 | } |
692 | 692 | $catIntermediates[] = $decoded['pem']; |
693 | 693 | } |
@@ -696,26 +696,26 @@ discard block |
||
696 | 696 | // save all intermediate certificates and CRLs to separate files in |
697 | 697 | // both root-ca directories |
698 | 698 | foreach ($eapIntermediates as $index => $onePem) { |
699 | - file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem); |
|
700 | - file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem); |
|
699 | + file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem); |
|
700 | + file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem); |
|
701 | 701 | } |
702 | 702 | foreach ($eapIntermediateCRLs as $index => $onePem) { |
703 | - file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem); |
|
704 | - file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem); |
|
703 | + file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem); |
|
704 | + file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem); |
|
705 | 705 | } |
706 | 706 | |
707 | 707 | $checkstring = ""; |
708 | 708 | if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) { |
709 | 709 | $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain"); |
710 | 710 | $checkstring = "-crl_check_all"; |
711 | - file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]); |
|
712 | - file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]); |
|
711 | + file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]); |
|
712 | + file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]); |
|
713 | 713 | } |
714 | 714 | |
715 | 715 | |
716 | 716 | // now c_rehash the root CA directory ... |
717 | - system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null"); |
|
718 | - system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null"); |
|
717 | + system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null"); |
|
718 | + system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null"); |
|
719 | 719 | return $checkstring; |
720 | 720 | } |
721 | 721 | |
@@ -747,12 +747,12 @@ discard block |
||
747 | 747 | // so test if there's something PEMy in the file at all |
748 | 748 | // serverchain.pem is the output from eapol_test; incomingserver.pem is written by extractIncomingCertsfromEAP() if there was at least one server cert. |
749 | 749 | if (filesize("$tmpDir/serverchain.pem") > 10 && filesize("$tmpDir/incomingserver.pem") > 10) { |
750 | - exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly); |
|
751 | - $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n"); |
|
752 | - $this->loggerInstance->debug(4, "Chain verify pass 1: " . /** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE) . "\n"); |
|
753 | - exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts); |
|
754 | - $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n"); |
|
755 | - $this->loggerInstance->debug(4, "Chain verify pass 2: " . /** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE) . "\n"); |
|
750 | + exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly); |
|
751 | + $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n"); |
|
752 | + $this->loggerInstance->debug(4, "Chain verify pass 1: "./** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE)."\n"); |
|
753 | + exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts); |
|
754 | + $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n"); |
|
755 | + $this->loggerInstance->debug(4, "Chain verify pass 2: "./** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE)."\n"); |
|
756 | 756 | } |
757 | 757 | |
758 | 758 | // now we do certificate verification against the collected parents |
@@ -817,7 +817,7 @@ discard block |
||
817 | 817 | // we are UNHAPPY if no names match! |
818 | 818 | $happiness = "UNHAPPY"; |
819 | 819 | foreach ($this->expectedServerNames as $expectedName) { |
820 | - $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . /** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE) . /** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE)); |
|
820 | + $this->loggerInstance->debug(4, "Managing expectations for $expectedName: "./** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE)./** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE)); |
|
821 | 821 | if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) { |
822 | 822 | $this->loggerInstance->debug(4, "Totally happy!"); |
823 | 823 | $happiness = "TOTALLY"; |
@@ -861,11 +861,11 @@ discard block |
||
861 | 861 | $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password); |
862 | 862 | // the config intentionally does not include CA checking. We do this |
863 | 863 | // ourselves after getting the chain with -o. |
864 | - file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]); |
|
864 | + file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]); |
|
865 | 865 | |
866 | 866 | $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag); |
867 | 867 | $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n"); |
868 | - $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n"); |
|
868 | + $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n"); |
|
869 | 869 | $time_start = microtime(true); |
870 | 870 | $pflow = []; |
871 | 871 | exec($cmdline, $pflow); |
@@ -874,7 +874,7 @@ discard block |
||
874 | 874 | } |
875 | 875 | $time_stop = microtime(true); |
876 | 876 | $output = print_r($this->redact($password, $pflow), TRUE); |
877 | - file_put_contents($tmpDir . "/eapol_test_output_redacted_$probeindex.txt", $output); |
|
877 | + file_put_contents($tmpDir."/eapol_test_output_redacted_$probeindex.txt", $output); |
|
878 | 878 | $this->loggerInstance->debug(5, "eapol_test output saved to eapol_test_output_redacted_$probeindex.txt\n"); |
879 | 879 | return [ |
880 | 880 | "time" => ($time_stop - $time_start) * 1000, |
@@ -910,7 +910,7 @@ discard block |
||
910 | 910 | if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) { |
911 | 911 | array_pop($packetflow); |
912 | 912 | } |
913 | - $this->loggerInstance->debug(5, "Packetflow: " . /** @scrutinizer ignore-type */ print_r($packetflow, TRUE)); |
|
913 | + $this->loggerInstance->debug(5, "Packetflow: "./** @scrutinizer ignore-type */ print_r($packetflow, TRUE)); |
|
914 | 914 | $packetcount = array_count_values($packetflow); |
915 | 915 | $testresults['packetcount'] = $packetcount; |
916 | 916 | $testresults['packetflow'] = $packetflow; |
@@ -950,7 +950,7 @@ discard block |
||
950 | 950 | */ |
951 | 951 | private function wasModernTlsNegotiated(&$testresults, $packetflow_orig) { |
952 | 952 | $negotiatedTlsVersion = $this->checkLineparse($packetflow_orig, self::LINEPARSE_TLSVERSION); |
953 | - $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion" . "\n"); |
|
953 | + $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion"."\n"); |
|
954 | 954 | if ($negotiatedTlsVersion === FALSE) { |
955 | 955 | $testresults['cert_oddities'][] = RADIUSTests::TLSPROB_UNKNOWN_TLS_VERSION; |
956 | 956 | } elseif ($negotiatedTlsVersion != self::TLS_VERSION_1_2 && $negotiatedTlsVersion != self::TLS_VERSION_1_3) { |
@@ -1008,7 +1008,7 @@ discard block |
||
1008 | 1008 | |
1009 | 1009 | $x509 = new \core\common\X509(); |
1010 | 1010 | // $eap_certarray holds all certs received in EAP conversation |
1011 | - $incomingData = file_get_contents($tmpDir . "/serverchain.pem"); |
|
1011 | + $incomingData = file_get_contents($tmpDir."/serverchain.pem"); |
|
1012 | 1012 | if ($incomingData !== FALSE && strlen($incomingData) > 0) { |
1013 | 1013 | $eapCertArray = $x509->splitCertificate($incomingData); |
1014 | 1014 | } else { |
@@ -1039,10 +1039,10 @@ discard block |
||
1039 | 1039 | case RADIUSTests::SERVER_CA_SELFSIGNED: |
1040 | 1040 | $servercert[] = $cert; |
1041 | 1041 | if (count($servercert) == 1) { |
1042 | - if (file_put_contents($tmpDir . "/incomingserver.pem", $cert['pem'] . "\n") === FALSE) { |
|
1042 | + if (file_put_contents($tmpDir."/incomingserver.pem", $cert['pem']."\n") === FALSE) { |
|
1043 | 1043 | $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n"); |
1044 | 1044 | } |
1045 | - $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . /** @scrutinizer ignore-type */ print_r($servercert[0], true)); |
|
1045 | + $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: "./** @scrutinizer ignore-type */ print_r($servercert[0], true)); |
|
1046 | 1046 | } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) { |
1047 | 1047 | $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS; |
1048 | 1048 | } |
@@ -1112,7 +1112,7 @@ discard block |
||
1112 | 1112 | public function autodetectCAWithProbe($outerId) { |
1113 | 1113 | // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy |
1114 | 1114 | // the following PEM data is one of the SENSE EAPLab client certs (not secret at all) |
1115 | - $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12"); |
|
1115 | + $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12"); |
|
1116 | 1116 | if ($clientcert === FALSE) { |
1117 | 1117 | throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!"); |
1118 | 1118 | } |
@@ -1127,7 +1127,7 @@ discard block |
||
1127 | 1127 | $tmpDir = $temporary['dir']; |
1128 | 1128 | chdir($tmpDir); |
1129 | 1129 | $this->loggerInstance->debug(4, "temp dir: $tmpDir\n"); |
1130 | - file_put_contents($tmpDir . "/client.p12", $clientcert); |
|
1130 | + file_put_contents($tmpDir."/client.p12", $clientcert); |
|
1131 | 1131 | $testresults = ['cert_oddities' => []]; |
1132 | 1132 | $runtime_results = $this->executeEapolTest($tmpDir, $probeindex, \core\common\EAP::EAPTYPE_ANY, $outerId, $outerId, "eaplab", FALSE, FALSE); |
1133 | 1133 | $packetflow_orig = $runtime_results['output']; |
@@ -1143,8 +1143,7 @@ discard block |
||
1143 | 1143 | // that's not the case if we do EAP-pwd or could not negotiate an EAP method at |
1144 | 1144 | // all |
1145 | 1145 | // in that case: no server CA guess possible |
1146 | - if (! |
|
1147 | - ($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK |
|
1146 | + if (!($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK |
|
1148 | 1147 | ) { |
1149 | 1148 | return RADIUSTests::RETVAL_INVALID; |
1150 | 1149 | } |
@@ -1183,7 +1182,7 @@ discard block |
||
1183 | 1182 | // trust, and custom ones we may have configured |
1184 | 1183 | $ourRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-custom']); |
1185 | 1184 | $mozillaRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-mozilla']); |
1186 | - $allRoots = $x509->splitCertificate($ourRoots . "\n" . $mozillaRoots); |
|
1185 | + $allRoots = $x509->splitCertificate($ourRoots."\n".$mozillaRoots); |
|
1187 | 1186 | foreach ($allRoots as $oneRoot) { |
1188 | 1187 | $processedRoot = $x509->processCertificate($oneRoot); |
1189 | 1188 | if ($processedRoot['full_details']['subject'] == $currentHighestKnownIssuer) { |
@@ -1225,7 +1224,7 @@ discard block |
||
1225 | 1224 | chdir($tmpDir); |
1226 | 1225 | $this->loggerInstance->debug(4, "temp dir: $tmpDir\n"); |
1227 | 1226 | if ($clientcertdata !== NULL) { |
1228 | - file_put_contents($tmpDir . "/client.p12", $clientcertdata); |
|
1227 | + file_put_contents($tmpDir."/client.p12", $clientcertdata); |
|
1229 | 1228 | } |
1230 | 1229 | $testresults = []; |
1231 | 1230 | // initialise the sub-array for cleaner parsing |
@@ -1330,7 +1329,7 @@ discard block |
||
1330 | 1329 | 'issuer' => $this->printDN($certdata['issuer']), |
1331 | 1330 | 'validFrom' => $this->printTm($certdata['validFrom_time_t']), |
1332 | 1331 | 'validTo' => $this->printTm($certdata['validTo_time_t']), |
1333 | - 'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']), |
|
1332 | + 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']), |
|
1334 | 1333 | 'sha1' => $certdata['sha1'], |
1335 | 1334 | 'extensions' => $certdata['extensions'] |
1336 | 1335 | ]; |
@@ -101,7 +101,7 @@ discard block |
||
101 | 101 | $optionClass = \core\Options::instance(); |
102 | 102 | $optionProps = $optionClass->optionType($optiontype); |
103 | 103 | $allowedValues = explode(',', substr($optionProps["flags"], 7)); |
104 | - if (in_array($incomingBinary,$allowedValues)) { |
|
104 | + if (in_array($incomingBinary, $allowedValues)) { |
|
105 | 105 | return TRUE; |
106 | 106 | } |
107 | 107 | return FALSE; |
@@ -346,14 +346,14 @@ discard block |
||
346 | 346 | case \core\Options::TYPECODE_TEXT: |
347 | 347 | case \core\Options::TYPECODE_COORDINATES: |
348 | 348 | case \core\Options::TYPECODE_INTEGER: |
349 | - $varName = $listOfEntries["$objId-" . self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
349 | + $varName = $listOfEntries["$objId-".self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
350 | 350 | if (!empty($varName)) { |
351 | 351 | $content = call_user_func_array([$this->validator, self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['function']], array_merge([$varName], self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['extraarg'])); |
352 | 352 | break; |
353 | 353 | } |
354 | 354 | continue 2; |
355 | 355 | case \core\Options::TYPECODE_BOOLEAN: |
356 | - $varName = $listOfEntries["$objId-" . \core\Options::TYPECODE_BOOLEAN]; |
|
356 | + $varName = $listOfEntries["$objId-".\core\Options::TYPECODE_BOOLEAN]; |
|
357 | 357 | if (!empty($varName)) { |
358 | 358 | $contentValid = $this->validator->boolean($varName); |
359 | 359 | if ($contentValid) { |
@@ -366,7 +366,7 @@ discard block |
||
366 | 366 | } |
367 | 367 | continue 2; |
368 | 368 | case \core\Options::TYPECODE_STRING: |
369 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
369 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
370 | 370 | if (!empty($previsionalContent)) { |
371 | 371 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
372 | 372 | if ($content === FALSE) { |
@@ -377,7 +377,7 @@ discard block |
||
377 | 377 | continue 2; |
378 | 378 | |
379 | 379 | case \core\Options::TYPECODE_ENUM_OPENROAMING: |
380 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
380 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
381 | 381 | if (!empty($previsionalContent)) { |
382 | 382 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
383 | 383 | if ($content === FALSE) { |
@@ -388,15 +388,15 @@ discard block |
||
388 | 388 | continue 2; |
389 | 389 | case \core\Options::TYPECODE_FILE: |
390 | 390 | // this is either actually an uploaded file, or a reference to a DB entry of a previously uploaded file |
391 | - $reference = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
391 | + $reference = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
392 | 392 | if (!empty($reference)) { // was already in, by ROWID reference, extract |
393 | 393 | // ROWID means it's a multi-line string (simple strings are inline in the form; so allow whitespace) |
394 | 394 | $content = $this->validator->string(urldecode($reference), TRUE); |
395 | 395 | break; |
396 | 396 | } |
397 | - $fileName = $listOfEntries["$objId-" . \core\Options::TYPECODE_FILE] ?? ""; |
|
397 | + $fileName = $listOfEntries["$objId-".\core\Options::TYPECODE_FILE] ?? ""; |
|
398 | 398 | if ($fileName != "") { // let's do the download |
399 | - $rawContent = \core\common\OutsideComm::downloadFile("file:///" . $fileName); |
|
399 | + $rawContent = \core\common\OutsideComm::downloadFile("file:///".$fileName); |
|
400 | 400 | |
401 | 401 | if ($rawContent === FALSE || !$this->checkUploadSanity($objValue, $rawContent)) { |
402 | 402 | $bad[] = $objValue; |
@@ -407,7 +407,7 @@ discard block |
||
407 | 407 | } |
408 | 408 | continue 2; |
409 | 409 | default: |
410 | - throw new Exception("Internal Error: Unknown option type " . $objValue . "!"); |
|
410 | + throw new Exception("Internal Error: Unknown option type ".$objValue."!"); |
|
411 | 411 | } |
412 | 412 | // lang can be NULL here, if it's not a multilang attribute, or a ROWID reference. Never mind that. |
413 | 413 | $retval[] = ["$objValue" => ["lang" => $languageFlag, "content" => $content]]; |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | public function divSilverbullet() { |
125 | 125 | $retval = " |
126 | 126 | <div id='silverbullet'>" |
127 | - .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] . |
|
127 | + .$this->Gui->textTemplates->templates[user\SB_GO_AWAY]. |
|
128 | 128 | "</div> |
129 | 129 | "; |
130 | 130 | return $retval; |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | <div id='profiles'> <!-- this is the profile selection filled during run time --> |
223 | 223 | <div id='profiles_h' class='sub_h'>".$this->Gui->textTemplates->templates[user\PROFILE_SELECTION]." |
224 | 224 | </div>" . |
225 | - "<select id='profile_list'></select><div id='profile_desc' class='profile_desc'></div>" . |
|
225 | + "<select id='profile_list'></select><div id='profile_desc' class='profile_desc'></div>". |
|
226 | 226 | "</div>"; |
227 | 227 | } |
228 | 228 | |
@@ -250,7 +250,7 @@ discard block |
||
250 | 250 | public function divInstitution($selectButton = TRUE) { |
251 | 251 | $retval = "<div id='institution_name'> |
252 | 252 | <span id='inst_name_span'></span> <div id='inst_extra_text'></div><!-- this will be filled with the IdP name -->" . |
253 | - ($selectButton ? "<a id='select_another' class='signin' href=\"\">".$this->Gui->textTemplates->templates[user\INSTITUTION_SELECTION]."</a>" : "") . |
|
253 | + ($selectButton ? "<a id='select_another' class='signin' href=\"\">".$this->Gui->textTemplates->templates[user\INSTITUTION_SELECTION]."</a>" : ""). |
|
254 | 254 | "</div>"; |
255 | 255 | $retval .= $this->emptyImage('idp_logo', 'IdP Logo'); |
256 | 256 | return $retval; |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | public function divSilverbullet() { |
125 | 125 | $retval = " |
126 | 126 | <div id='silverbullet'>" |
127 | - .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] . |
|
127 | + .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] . |
|
128 | 128 | "</div> |
129 | 129 | "; |
130 | 130 | return $retval; |
@@ -293,8 +293,8 @@ discard block |
||
293 | 293 | } |
294 | 294 | |
295 | 295 | $retval .= "<td><button name='$d' class='other_os' id='$d'>".$D['display']."</button>" |
296 | - ."</td>" |
|
297 | - ."<td><button name='$d' class='more_info_b' id='info_b_$d'>i</button></td></tr>\n"; |
|
296 | + ."</td>" |
|
297 | + ."<td><button name='$d' class='more_info_b' id='info_b_$d'>i</button></td></tr>\n"; |
|
298 | 298 | $deviceIndex++; |
299 | 299 | } |
300 | 300 | $retval .= "</tbody>"; |
@@ -341,7 +341,7 @@ discard block |
||
341 | 341 | <tr> |
342 | 342 | <td>" . |
343 | 343 | $this->Gui->catCopyright |
344 | - ." |
|
344 | + ." |
|
345 | 345 | </td>"; |
346 | 346 | |
347 | 347 | if (!empty(\config\Master::APPEARANCE['privacy_notice_url'])) { |
@@ -112,7 +112,7 @@ discard block |
||
112 | 112 | */ |
113 | 113 | public function prefilledOptionTable(string $attributePrefix, $fed) |
114 | 114 | { |
115 | - $retval = "<table id='expandable_$attributePrefix" . "_options'>"; |
|
115 | + $retval = "<table id='expandable_$attributePrefix"."_options'>"; |
|
116 | 116 | |
117 | 117 | $prepopulate = []; |
118 | 118 | foreach ($this->listOfOptions as $existingAttribute) { |
@@ -120,7 +120,7 @@ discard block |
||
120 | 120 | $prepopulate[] = $existingAttribute; |
121 | 121 | } |
122 | 122 | } |
123 | - if (is_array($prepopulate) && ( count($prepopulate) > 0 || $attributePrefix == "device-specific" || $attributePrefix == "eap-specific" )) { // editing... fill with values |
|
123 | + if (is_array($prepopulate) && (count($prepopulate) > 0 || $attributePrefix == "device-specific" || $attributePrefix == "eap-specific")) { // editing... fill with values |
|
124 | 124 | $retval .= $this->addOptionEdit($attributePrefix, $prepopulate); |
125 | 125 | } else { |
126 | 126 | $retval .= $this->addOptionNew($attributePrefix, $fed); |
@@ -153,7 +153,7 @@ discard block |
||
153 | 153 | $optiontypearray = $optioninfo->optionType($option['name']); |
154 | 154 | $loggerInstance = new \core\common\Logging(); |
155 | 155 | $loggerInstance->debug(5, "About to execute optiontext with PREFILL!\n"); |
156 | - $retval .= $this->optiontext([$option['name']], ($optiontypearray["type"] == "file" ? 'ROWID-' . $option['level'] . '-' . $option['row'] : $option['value']), $option['lang']); |
|
156 | + $retval .= $this->optiontext([$option['name']], ($optiontypearray["type"] == "file" ? 'ROWID-'.$option['level'].'-'.$option['row'] : $option['value']), $option['lang']); |
|
157 | 157 | } |
158 | 158 | } |
159 | 159 | return $retval; |
@@ -252,18 +252,18 @@ discard block |
||
252 | 252 | } |
253 | 253 | $descriptions["media:force_proxy"] = sprintf(_("The format of this option is: IPv4|IPv6|hostname:port . Forcing your users through a content filter of your own is a significant invasion of user self-determination. It also has technical issues. Please throughly read the discussion at %s before specifying a proxy with this option. This feature is currently experimental and only has an effect in Apple installers."), "https://github.com/GEANT/CAT/issues/96"); |
254 | 254 | $descriptions["managedsp:realmforvlan"] = sprintf(_("If you are also using %s, then your own realm is automatically tagged with the VLAN you choose, there is no need to add it here manually."), \core\ProfileSilverbullet::PRODUCTNAME); |
255 | - $descriptions["media:openroaming"] = sprintf(_("By opting in to OpenRoaming, you agree to be bound by the %s."), "eduroam Ecosystem Broker OpenRoaming Identity Provider Policy") . |
|
256 | - " " . |
|
257 | - sprintf(_("Note that your requirement to inform users about the OpenRoaming End User Terms and Conditions is fulfilled when directing your end users to the %s download portal for installer download. Any other means of providing the installers needs to present this information via its own channel."), \config\Master::APPEARANCE['productname']) . |
|
258 | - " " . |
|
259 | - _("You are also aware that for best technical interoperability, you need to add a DNS entry into the DNS zone of your RADIUS realm.") . |
|
260 | - " " . |
|
255 | + $descriptions["media:openroaming"] = sprintf(_("By opting in to OpenRoaming, you agree to be bound by the %s."), "eduroam Ecosystem Broker OpenRoaming Identity Provider Policy"). |
|
256 | + " ". |
|
257 | + sprintf(_("Note that your requirement to inform users about the OpenRoaming End User Terms and Conditions is fulfilled when directing your end users to the %s download portal for installer download. Any other means of providing the installers needs to present this information via its own channel."), \config\Master::APPEARANCE['productname']). |
|
258 | + " ". |
|
259 | + _("You are also aware that for best technical interoperability, you need to add a DNS entry into the DNS zone of your RADIUS realm."). |
|
260 | + " ". |
|
261 | 261 | _("Read the instructions in the wiki."); |
262 | 262 | \core\common\Entity::outOfThePotatoes(); |
263 | 263 | if (!isset($descriptions[$input])) { |
264 | 264 | return ""; |
265 | 265 | } |
266 | - return "<span class='tooltip' id='S$rowid-tooltip-$input' style='display:" . ($isVisible ? "block" : "none") . "' onclick='alert(\"" . $descriptions[$input] . "\")'><img src='../resources/images/icons/question-mark-icon.png" . "'></span>"; |
|
266 | + return "<span class='tooltip' id='S$rowid-tooltip-$input' style='display:".($isVisible ? "block" : "none")."' onclick='alert(\"".$descriptions[$input]."\")'><img src='../resources/images/icons/question-mark-icon.png"."'></span>"; |
|
267 | 267 | } |
268 | 268 | |
269 | 269 | /** |
@@ -277,19 +277,19 @@ discard block |
||
277 | 277 | private function selectElement($rowid, $list) |
278 | 278 | { |
279 | 279 | $jsmagic = "onchange=' |
280 | - if (/#ML#/.test(document.getElementById(\"option-S" . $rowid . "-select\").value)) { |
|
280 | + if (/#ML#/.test(document.getElementById(\"option-S" . $rowid."-select\").value)) { |
|
281 | 281 | document.getElementById(\"S$rowid-input-langselect\").style.display = \"block\"; |
282 | 282 | } else { |
283 | 283 | document.getElementById(\"S$rowid-input-langselect\").style.display = \"none\"; |
284 | 284 | }"; |
285 | 285 | foreach (array_keys($this->htmlDatatypeTexts) as $key) { |
286 | - $jsmagic .= "if (/#" . $key . "#/.test(document.getElementById(\"option-S" . $rowid . "-select\").value)) { |
|
287 | - document.getElementById(\"S$rowid-input-file\").style.display = \"" . ($key == \core\Options::TYPECODE_FILE ? "block" : "none") . "\"; |
|
288 | - document.getElementById(\"S$rowid-input-text\").style.display = \"" . ($key == \core\Options::TYPECODE_TEXT ? "block" : "none") . "\"; |
|
289 | - document.getElementById(\"S$rowid-input-string\").style.display = \"" . ($key == \core\Options::TYPECODE_STRING ? "block" : "none") . "\"; |
|
290 | - document.getElementById(\"S$rowid-input-enum_openroaming\").style.display = \"" . ($key == \core\Options::TYPECODE_ENUM_OPENROAMING ? "block" : "none") . "\"; |
|
291 | - document.getElementById(\"S$rowid-input-boolean\").style.display = \"" . ($key == \core\Options::TYPECODE_BOOLEAN ? "block" : "none") . "\"; |
|
292 | - document.getElementById(\"S$rowid-input-integer\").style.display = \"" . ($key == \core\Options::TYPECODE_INTEGER ? "block" : "none") . "\"; |
|
286 | + $jsmagic .= "if (/#".$key."#/.test(document.getElementById(\"option-S".$rowid."-select\").value)) { |
|
287 | + document.getElementById(\"S$rowid-input-file\").style.display = \"".($key == \core\Options::TYPECODE_FILE ? "block" : "none")."\"; |
|
288 | + document.getElementById(\"S$rowid-input-text\").style.display = \"".($key == \core\Options::TYPECODE_TEXT ? "block" : "none")."\"; |
|
289 | + document.getElementById(\"S$rowid-input-string\").style.display = \"".($key == \core\Options::TYPECODE_STRING ? "block" : "none")."\"; |
|
290 | + document.getElementById(\"S$rowid-input-enum_openroaming\").style.display = \"".($key == \core\Options::TYPECODE_ENUM_OPENROAMING ? "block" : "none")."\"; |
|
291 | + document.getElementById(\"S$rowid-input-boolean\").style.display = \"".($key == \core\Options::TYPECODE_BOOLEAN ? "block" : "none")."\"; |
|
292 | + document.getElementById(\"S$rowid-input-integer\").style.display = \"".($key == \core\Options::TYPECODE_INTEGER ? "block" : "none")."\"; |
|
293 | 293 | } |
294 | 294 | "; |
295 | 295 | // hide all tooltips (each is a <span>, and there are no other <span>s) |
@@ -320,7 +320,7 @@ discard block |
||
320 | 320 | $value = array_shift($list); |
321 | 321 | $listtype = $optioninfo->optionType($value); |
322 | 322 | $retval .= $uiElements->displayName($value); |
323 | - $retval .= "<input type='hidden' name='option[S$rowid]' value='$value#" . $listtype["type"] . "#" . $listtype["flag"] . "#'/>"; |
|
323 | + $retval .= "<input type='hidden' name='option[S$rowid]' value='$value#".$listtype["type"]."#".$listtype["flag"]."#'/>"; |
|
324 | 324 | $activelisttype = $listtype; |
325 | 325 | $tooltips = $this->tooltip($rowid, $value, TRUE); |
326 | 326 | break; |
@@ -328,7 +328,7 @@ discard block |
||
328 | 328 | $retval .= "<select id='option-S$rowid-select' name='option[S$rowid]' $jsmagic>"; |
329 | 329 | foreach ($list as $value) { |
330 | 330 | $listtype = $optioninfo->optionType($value); |
331 | - $retval .= "<option id='option-S$rowid-v-$value' value='$value#" . $listtype["type"] . "#" . $listtype["flag"] . "#' "; |
|
331 | + $retval .= "<option id='option-S$rowid-v-$value' value='$value#".$listtype["type"]."#".$listtype["flag"]."#' "; |
|
332 | 332 | if ($iterator == $this->optionIterator) { |
333 | 333 | $retval .= "selected='selected'"; |
334 | 334 | $activelisttype = $listtype; |
@@ -336,7 +336,7 @@ discard block |
||
336 | 336 | } else { |
337 | 337 | $tooltips .= $this->tooltip($rowid, $value, FALSE); |
338 | 338 | } |
339 | - $retval .= ">" . $uiElements->displayName($value) . "</option>"; |
|
339 | + $retval .= ">".$uiElements->displayName($value)."</option>"; |
|
340 | 340 | $iterator++; |
341 | 341 | } |
342 | 342 | |
@@ -362,9 +362,9 @@ discard block |
||
362 | 362 | private function selectLanguage($rowid, $makeVisible) |
363 | 363 | { |
364 | 364 | \core\common\Entity::intoThePotatoes(); |
365 | - $retval = "<select style='display:" . ($makeVisible ? "block" : "none") . "' name='value[S$rowid-lang]' id='S" . $rowid . "-input-langselect'> |
|
366 | - <option value='' name='select_language' selected>" . _("select language") . "</option> |
|
367 | - <option value='C' name='all_languages'>" . _("default/other languages") . "</option>"; |
|
365 | + $retval = "<select style='display:".($makeVisible ? "block" : "none")."' name='value[S$rowid-lang]' id='S".$rowid."-input-langselect'> |
|
366 | + <option value='' name='select_language' selected>" . _("select language")."</option> |
|
367 | + <option value='C' name='all_languages'>" . _("default/other languages")."</option>"; |
|
368 | 368 | foreach (\config\Master::LANGUAGES as $langindex => $possibleLang) { |
369 | 369 | $thislang = $possibleLang['display']; |
370 | 370 | $retval .= "<option value='$langindex' name='$langindex'>$thislang</option>"; |
@@ -385,7 +385,7 @@ discard block |
||
385 | 385 | { |
386 | 386 | $retval = ""; |
387 | 387 | foreach ($this->htmlDatatypeTexts as $key => $type) { |
388 | - $retval .= "<" . $type['html'] . " style='display:" . ($activetype['type'] == $key ? "block" : "none") . "' name='value[S$rowid-$key]' id='S" . $rowid . "-input-" . $key . "'" . $type['tail'] . ">"; |
|
388 | + $retval .= "<".$type['html']." style='display:".($activetype['type'] == $key ? "block" : "none")."' name='value[S$rowid-$key]' id='S".$rowid."-input-".$key."'".$type['tail'].">"; |
|
389 | 389 | } |
390 | 390 | return $retval; |
391 | 391 | } |
@@ -401,11 +401,11 @@ discard block |
||
401 | 401 | { |
402 | 402 | // first column: the <select> element with the names of options and their field-toggling JS magic |
403 | 403 | $selectorInfo = $this->selectElement($rowid, $list); |
404 | - $retval = "<td>" . $selectorInfo["TEXT"] . "</td>"; |
|
404 | + $retval = "<td>".$selectorInfo["TEXT"]."</td>"; |
|
405 | 405 | // second column: the <select> element for language selection - only visible if the active option is multi-lang |
406 | - $retval .= "<td>" . $this->selectLanguage($rowid, $selectorInfo['ACTIVE']['flag'] == "ML") . "</td>"; |
|
406 | + $retval .= "<td>".$this->selectLanguage($rowid, $selectorInfo['ACTIVE']['flag'] == "ML")."</td>"; |
|
407 | 407 | // third column: the actual input fields; the data type of the active option is visible, all others hidden |
408 | - $retval .= "<td>" . $this->inputFields($rowid, $selectorInfo['ACTIVE']) . "</td>"; |
|
408 | + $retval .= "<td>".$this->inputFields($rowid, $selectorInfo['ACTIVE'])."</td>"; |
|
409 | 409 | return $retval; |
410 | 410 | } |
411 | 411 | |
@@ -429,20 +429,20 @@ discard block |
||
429 | 429 | $retval .= "<td>"; |
430 | 430 | $uiElements = new UIElements(); |
431 | 431 | $listtype = $optioninfo->optionType($optionName); |
432 | - $retval .= "<span style='display:flex;'>" . $uiElements->displayName($optionName); |
|
433 | - $retval .= $this->tooltip($rowid, $optionName, TRUE) . "</span>"; |
|
434 | - $retval .= "<input type='hidden' id='option-S$rowid-select' name='option[S$rowid]' value='$optionName#" . $listtype["type"] . "#" . $listtype["flag"] . "#' ></td>"; |
|
432 | + $retval .= "<span style='display:flex;'>".$uiElements->displayName($optionName); |
|
433 | + $retval .= $this->tooltip($rowid, $optionName, TRUE)."</span>"; |
|
434 | + $retval .= "<input type='hidden' id='option-S$rowid-select' name='option[S$rowid]' value='$optionName#".$listtype["type"]."#".$listtype["flag"]."#' ></td>"; |
|
435 | 435 | |
436 | 436 | // language tag if any |
437 | 437 | $retval .= "<td>"; |
438 | 438 | if ($listtype["flag"] == "ML") { |
439 | 439 | |
440 | - $language = "(" . strtoupper($optionLang) . ")"; |
|
440 | + $language = "(".strtoupper($optionLang).")"; |
|
441 | 441 | if ($optionLang == 'C') { |
442 | 442 | $language = _("(default/other languages)"); |
443 | 443 | } |
444 | 444 | $retval .= $language; |
445 | - $retval .= "<input type='hidden' name='value[S$rowid-lang]' id='S" . $rowid . "-input-langselect' value='" . $optionLang . "' style='display:block'>"; |
|
445 | + $retval .= "<input type='hidden' name='value[S$rowid-lang]' id='S".$rowid."-input-langselect' value='".$optionLang."' style='display:block'>"; |
|
446 | 446 | } |
447 | 447 | $retval .= "</td>"; |
448 | 448 | // attribute content |
@@ -452,12 +452,12 @@ discard block |
||
452 | 452 | case \core\Options::TYPECODE_COORDINATES: |
453 | 453 | $this->allLocationCount = $this->allLocationCount + 1; |
454 | 454 | // display of the locations varies by map provider |
455 | - $classname = "\web\lib\admin\Map" . \config\ConfAssistant::MAPPROVIDER['PROVIDER']; |
|
455 | + $classname = "\web\lib\admin\Map".\config\ConfAssistant::MAPPROVIDER['PROVIDER']; |
|
456 | 456 | $link = $classname::optionListDisplayCode($optionValue, $this->allLocationCount); |
457 | - $retval .= "<input readonly style='display:none' type='text' name='value[S$rowid-" . \core\Options::TYPECODE_TEXT . "]' id='S$rowid-input-text' value='$optionValue'>$link"; |
|
457 | + $retval .= "<input readonly style='display:none' type='text' name='value[S$rowid-".\core\Options::TYPECODE_TEXT."]' id='S$rowid-input-text' value='$optionValue'>$link"; |
|
458 | 458 | break; |
459 | 459 | case \core\Options::TYPECODE_FILE: |
460 | - $retval .= "<input readonly type='text' name='value[S$rowid-" . \core\Options::TYPECODE_STRING . "]' id='S" . $rowid . "-input-string' style='display:none' value='" . urlencode($optionValue) . "'>"; |
|
460 | + $retval .= "<input readonly type='text' name='value[S$rowid-".\core\Options::TYPECODE_STRING."]' id='S".$rowid."-input-string' style='display:none' value='".urlencode($optionValue)."'>"; |
|
461 | 461 | $uiElements = new UIElements(); |
462 | 462 | switch ($optionName) { |
463 | 463 | case "eap:ca_file": |
@@ -479,7 +479,7 @@ discard block |
||
479 | 479 | break; |
480 | 480 | case \core\Options::TYPECODE_ENUM_OPENROAMING: // is a string after all |
481 | 481 | $displayedVariant = $this->enumPrettyPrints[$optionValue]; |
482 | - $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-" . $listtype['type'] . "]' id='S" . $rowid . "-input-" . $listtype["type"] . "' value=\"" . htmlspecialchars($optionValue) . "\" style='display:block'>"; |
|
482 | + $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-".$listtype['type']."]' id='S".$rowid."-input-".$listtype["type"]."' value=\"".htmlspecialchars($optionValue)."\" style='display:block'>"; |
|
483 | 483 | break; |
484 | 484 | case \core\Options::TYPECODE_STRING: |
485 | 485 | // fall-thorugh is intentional; mostly identical HTML code for the three types |
@@ -487,11 +487,11 @@ discard block |
||
487 | 487 | // fall-thorugh is intentional; mostly identical HTML code for the three types |
488 | 488 | case \core\Options::TYPECODE_TEXT: |
489 | 489 | $displayedVariant = $optionValue; // for all three types, value tag and actual display are identical |
490 | - $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-" . $listtype['type'] . "]' id='S" . $rowid . "-input-" . $listtype["type"] . "' value=\"" . htmlspecialchars($optionValue) . "\" style='display:block'>"; |
|
490 | + $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-".$listtype['type']."]' id='S".$rowid."-input-".$listtype["type"]."' value=\"".htmlspecialchars($optionValue)."\" style='display:block'>"; |
|
491 | 491 | break; |
492 | 492 | case \core\Options::TYPECODE_BOOLEAN: |
493 | 493 | $displayedVariant = ($optionValue == "on" ? _("on") : _("off")); |
494 | - $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-" . $listtype['type'] . "]' id='S" . $rowid . "-input-" . $listtype["type"] . "' value=\"" . htmlspecialchars($optionValue) . "\" style='display:block'>"; |
|
494 | + $retval .= "<strong>$displayedVariant</strong><input type='hidden' name='value[S$rowid-".$listtype['type']."]' id='S".$rowid."-input-".$listtype["type"]."' value=\"".htmlspecialchars($optionValue)."\" style='display:block'>"; |
|
495 | 495 | break; |
496 | 496 | default: |
497 | 497 | // this should never happen! |
@@ -537,10 +537,10 @@ discard block |
||
537 | 537 | <td> |
538 | 538 | <button type='button' class='delete' onclick='"; |
539 | 539 | if ($prefillValue !== NULL && $item == "general:geo_coordinates") { |
540 | - $funcname = "Map" . \config\ConfAssistant::MAPPROVIDER['PROVIDER'] . 'DeleteCoord'; |
|
541 | - $retval .= 'if (typeof ' . $funcname . ' === "function") { ' . $funcname . '(' . $this->allLocationCount . '); } '; |
|
540 | + $funcname = "Map".\config\ConfAssistant::MAPPROVIDER['PROVIDER'].'DeleteCoord'; |
|
541 | + $retval .= 'if (typeof '.$funcname.' === "function") { '.$funcname.'('.$this->allLocationCount.'); } '; |
|
542 | 542 | } |
543 | - $retval .= 'deleteOption("option-S' . $rowid . '")'; |
|
543 | + $retval .= 'deleteOption("option-S'.$rowid.'")'; |
|
544 | 544 | $retval .= "'>-</button> |
545 | 545 | </td> |
546 | 546 | </tr>"; |
@@ -166,27 +166,27 @@ discard block |
||
166 | 166 | { |
167 | 167 | // it could match CN or sAN:DNS, we don't care which |
168 | 168 | if (isset($this->TLS_CA_checks_result[$host]['certdata']['subject'])) { |
169 | - $this->loggerInstance->debug(4, "Checking expected server name " . $this->expectedName . " against Subject: "); |
|
169 | + $this->loggerInstance->debug(4, "Checking expected server name ".$this->expectedName." against Subject: "); |
|
170 | 170 | $this->loggerInstance->debug(4, $this->TLS_CA_checks_result[$host]['certdata']['subject']); |
171 | 171 | // we are checking against accidental misconfig, not attacks, so loosely checking against end of string is appropriate |
172 | - if (preg_match("/CN=" . $this->expectedName . "/", $this->TLS_CA_checks_result[$host]['certdata']['subject']) === 1) { |
|
172 | + if (preg_match("/CN=".$this->expectedName."/", $this->TLS_CA_checks_result[$host]['certdata']['subject']) === 1) { |
|
173 | 173 | return TRUE; |
174 | 174 | } |
175 | 175 | } |
176 | 176 | if (isset($this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname'])) { |
177 | - $this->loggerInstance->debug(4, "Checking expected server name " . $this->expectedName . " against sANs: "); |
|
177 | + $this->loggerInstance->debug(4, "Checking expected server name ".$this->expectedName." against sANs: "); |
|
178 | 178 | $this->loggerInstance->debug(4, $this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']); |
179 | 179 | $testNames = $this->TLS_CA_checks_result[$host]['certdata']['extensions']['subjectaltname']; |
180 | 180 | if (!is_array($testNames)) { |
181 | 181 | $testNames = [$testNames]; |
182 | 182 | } |
183 | 183 | foreach ($testNames as $oneName) { |
184 | - if (preg_match("/" . $this->expectedName . "/", $oneName) === 1) { |
|
184 | + if (preg_match("/".$this->expectedName."/", $oneName) === 1) { |
|
185 | 185 | return TRUE; |
186 | 186 | } |
187 | 187 | } |
188 | 188 | } |
189 | - $this->loggerInstance->debug(3, "Tried to check expected server name " . $this->expectedName . " but neither CN nor sANs matched."); |
|
189 | + $this->loggerInstance->debug(3, "Tried to check expected server name ".$this->expectedName." but neither CN nor sANs matched."); |
|
190 | 190 | |
191 | 191 | $this->TLS_CA_checks_result[$host]['cert_oddity'] = RADIUSTests::CERTPROB_DYN_SERVER_NAME_MISMATCH; |
192 | 192 | return FALSE; |
@@ -216,7 +216,7 @@ discard block |
||
216 | 216 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['status'] = $cert['status']; |
217 | 217 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['message'] = $this->TLS_certkeys[$cert['status']]; |
218 | 218 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k]['expected'] = $cert['expected']; |
219 | - $add = ' -cert ' . ROOT . '/config/cli-certs/' . $cert['public'] . ' -key ' . ROOT . '/config/cli-certs/' . $cert['private']; |
|
219 | + $add = ' -cert '.ROOT.'/config/cli-certs/'.$cert['public'].' -key '.ROOT.'/config/cli-certs/'.$cert['private']; |
|
220 | 220 | if (!isset($this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k])) { |
221 | 221 | $this->TLS_clients_checks_result[$host]['ca'][$type]['certificate'][$k] = []; |
222 | 222 | } |
@@ -261,11 +261,11 @@ discard block |
||
261 | 261 | // but code analysers want this more explicit, so here is this extra |
262 | 262 | // call to escapeshellarg() |
263 | 263 | $escapedHost = escapeshellarg($host); |
264 | - $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " s_client -connect " . $escapedHost . " -tls1 -CApath " . ROOT . "/config/ca-certs/$this->consortium/ $arg 2>&1\n"); |
|
264 | + $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." s_client -connect ".$escapedHost." -tls1 -CApath ".ROOT."/config/ca-certs/$this->consortium/ $arg 2>&1\n"); |
|
265 | 265 | $time_start = microtime(true); |
266 | 266 | $opensslbabble = []; |
267 | 267 | $result = 999; // likely to become zero by openssl; don't want to initialise to zero, could cover up exec failures |
268 | - exec(\config\Master::PATHS['openssl'] . " s_client -connect " . $escapedHost . " -no_ssl3 -CApath " . ROOT . "/config/ca-certs/$this->consortium/ $arg 2>&1", $opensslbabble, $result); |
|
268 | + exec(\config\Master::PATHS['openssl']." s_client -connect ".$escapedHost." -no_ssl3 -CApath ".ROOT."/config/ca-certs/$this->consortium/ $arg 2>&1", $opensslbabble, $result); |
|
269 | 269 | $time_stop = microtime(true); |
270 | 270 | $testresults['time_millisec'] = floor(($time_stop - $time_start) * 1000); |
271 | 271 | $testresults['returncode'] = $result; |
@@ -44,8 +44,8 @@ discard block |
||
44 | 44 | $operatingSystem = $Gui->detectOS(); |
45 | 45 | $Gui->loggerInstance->debug(4, $operatingSystem); |
46 | 46 | if ($operatingSystem) { |
47 | - print "recognisedOS = '".$operatingSystem['device'] . "';\n"; |
|
48 | - print "recognisedOShs20 = '".$operatingSystem['hs20'] . "';\n"; |
|
47 | + print "recognisedOS = '".$operatingSystem['device']."';\n"; |
|
48 | + print "recognisedOShs20 = '".$operatingSystem['hs20']."';\n"; |
|
49 | 49 | $vendorlogo = $Gui->skinObject->findResourceUrl("IMAGES", "vendorlogo/"); |
50 | 50 | if ($vendorlogo !== FALSE) { |
51 | 51 | print "vendorlogo = '$vendorlogo';\n"; |
@@ -54,7 +54,7 @@ discard block |
||
54 | 54 | } |
55 | 55 | } |
56 | 56 | |
57 | -print 'downloadMessage = "'.$Gui->textTemplates->templates[\web\lib\user\DOWNLOAD_MESSAGE] . '";'; |
|
57 | +print 'downloadMessage = "'.$Gui->textTemplates->templates[\web\lib\user\DOWNLOAD_MESSAGE].'";'; |
|
58 | 58 | //TODO modify this based on OS detection |
59 | 59 | $userAgent = $_SERVER['HTTP_USER_AGENT'] ?? ""; |
60 | 60 | if (preg_match('/Android/', $userAgent)) { |
@@ -83,7 +83,7 @@ discard block |
||
83 | 83 | <?php echo $divs->divHeading($visibility); ?> |
84 | 84 | <div id="main_page"> |
85 | 85 | <div id="loading_ico"> |
86 | - <?php echo _("Authenticating") . "..." ?><br><img src="<?php echo $Gui->skinObject->findResourceUrl("IMAGES", "icons/loading51.gif"); ?>" alt="Authenticating ..."/> |
|
86 | + <?php echo _("Authenticating")."..." ?><br><img src="<?php echo $Gui->skinObject->findResourceUrl("IMAGES", "icons/loading51.gif"); ?>" alt="Authenticating ..."/> |
|
87 | 87 | </div> |
88 | 88 | <div id="info_overlay"> <!-- device info --> |
89 | 89 | <div id="info_window"></div> |
@@ -115,12 +115,12 @@ discard block |
||
115 | 115 | $this->name = $this->languageInstance->getLocalisedValue($this->getAttributes('general:instname')); |
116 | 116 | $eligibility = $this->eligibility(); |
117 | 117 | if (in_array(IdP::ELIGIBILITY_IDP, $eligibility) && in_array(IdP::ELIGIBILITY_SP, $eligibility)) { |
118 | - $eligType = IdP::TYPE_IDPSP . ""; |
|
118 | + $eligType = IdP::TYPE_IDPSP.""; |
|
119 | 119 | $this->type = $eligType; |
120 | 120 | } elseif (in_array(IdP::ELIGIBILITY_IDP, $eligibility)) { |
121 | - $eligType = IdP::TYPE_IDP . ""; |
|
121 | + $eligType = IdP::TYPE_IDP.""; |
|
122 | 122 | } else { |
123 | - $eligType = IdP::TYPE_SP . ""; |
|
123 | + $eligType = IdP::TYPE_SP.""; |
|
124 | 124 | } |
125 | 125 | $this->type = $eligType; |
126 | 126 | $this->loggerInstance->debug(3, "--- END Constructing new IdP object ... ---\n"); |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | */ |
135 | 135 | public function listProfiles(bool $activeOnly = FALSE) |
136 | 136 | { |
137 | - $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier" . ($activeOnly ? " AND showtime = 1" : ""); |
|
137 | + $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier".($activeOnly ? " AND showtime = 1" : ""); |
|
138 | 138 | $allProfiles = $this->databaseHandle->exec($query); |
139 | 139 | $returnarray = []; |
140 | 140 | // SELECT -> resource, not boolean |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | $returnarray[] = $oneProfile; |
145 | 145 | } |
146 | 146 | |
147 | - $this->loggerInstance->debug(4, "listProfiles: " . /** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
147 | + $this->loggerInstance->debug(4, "listProfiles: "./** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
148 | 148 | return $returnarray; |
149 | 149 | } |
150 | 150 | |
@@ -156,7 +156,7 @@ discard block |
||
156 | 156 | */ |
157 | 157 | public function listDeployments(bool $activeOnly = FALSE) |
158 | 158 | { |
159 | - $query = "SELECT deployment_id FROM deployment WHERE inst_id = $this->identifier" . ($activeOnly ? " AND status = " . AbstractDeployment::ACTIVE : ""); |
|
159 | + $query = "SELECT deployment_id FROM deployment WHERE inst_id = $this->identifier".($activeOnly ? " AND status = ".AbstractDeployment::ACTIVE : ""); |
|
160 | 160 | $allDeployments = $this->databaseHandle->exec($query); |
161 | 161 | $returnarray = []; |
162 | 162 | // SELECT -> resource, not boolean |
@@ -164,7 +164,7 @@ discard block |
||
164 | 164 | $returnarray[] = new DeploymentManaged($this, $deploymentQuery->deployment_id); |
165 | 165 | } |
166 | 166 | |
167 | - $this->loggerInstance->debug(4, "listDeployments: " . /** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
167 | + $this->loggerInstance->debug(4, "listDeployments: "./** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
168 | 168 | return $returnarray; |
169 | 169 | } |
170 | 170 | |
@@ -197,7 +197,7 @@ discard block |
||
197 | 197 | $allProfiles = $this->databaseHandle->exec("SELECT MIN(openroaming) AS maxlevel FROM profile WHERE inst_id = $this->identifier"); |
198 | 198 | // SELECT yields a resource, not a boolean |
199 | 199 | while ($res = mysqli_fetch_object(/** @scrutinizer ignore-type */ $allProfiles)) { |
200 | - return (is_numeric($res->maxlevel) ? (int)$res->maxlevel : AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO ); // insts without profiles should get a "NO" |
|
200 | + return (is_numeric($res->maxlevel) ? (int) $res->maxlevel : AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO); // insts without profiles should get a "NO" |
|
201 | 201 | } |
202 | 202 | return AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO; |
203 | 203 | } |
@@ -331,7 +331,7 @@ discard block |
||
331 | 331 | case AbstractProfile::PROFILETYPE_SILVERBULLET: |
332 | 332 | $theProfile = new ProfileSilverbullet($identifier, $this); |
333 | 333 | $theProfile->addSupportedEapMethod(new \core\common\EAP(\core\common\EAP::EAPTYPE_SILVERBULLET), 1); |
334 | - $theProfile->setRealm($this->identifier . "-" . $theProfile->identifier . "." . strtolower($this->federation) . strtolower(\config\ConfAssistant::SILVERBULLET['realm_suffix'])); |
|
334 | + $theProfile->setRealm($this->identifier."-".$theProfile->identifier.".".strtolower($this->federation).strtolower(\config\ConfAssistant::SILVERBULLET['realm_suffix'])); |
|
335 | 335 | return $theProfile; |
336 | 336 | default: |
337 | 337 | throw new Exception("This type of profile is unknown and can not be added."); |
@@ -473,7 +473,7 @@ discard block |
||
473 | 473 | public function getExternalDBId() |
474 | 474 | { |
475 | 475 | if (\config\ConfAssistant::CONSORTIUM['name'] == "eduroam" && isset(\config\ConfAssistant::CONSORTIUM['deployment-voodoo']) && \config\ConfAssistant::CONSORTIUM['deployment-voodoo'] == "Operations Team") { // SW: APPROVED |
476 | - $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = " . self::EXTERNAL_DB_SYNCSTATE_SYNCED); |
|
476 | + $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = ".self::EXTERNAL_DB_SYNCSTATE_SYNCED); |
|
477 | 477 | // SELECT -> it's a resource, not a boolean |
478 | 478 | if (mysqli_num_rows(/** @scrutinizer ignore-type */ $idQuery) == 0) { |
479 | 479 | return FALSE; |
@@ -539,16 +539,16 @@ discard block |
||
539 | 539 | } |
540 | 540 | foreach ($baseline as $lang => $value) { |
541 | 541 | if (!key_exists($lang, $newvalues)) { |
542 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] DELETED"; |
|
542 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] DELETED"; |
|
543 | 543 | } else { |
544 | 544 | if ($value != $newvalues[$lang]) { |
545 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] CHANGED from '" . $baseline[$lang] . "' to '" . $newvalues[$lang] . "'"; |
|
545 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] CHANGED from '".$baseline[$lang]."' to '".$newvalues[$lang]."'"; |
|
546 | 546 | } |
547 | 547 | } |
548 | 548 | } |
549 | 549 | foreach ($newvalues as $lang => $value) { |
550 | 550 | if (!key_exists($lang, $baseline)) { |
551 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] ADDED as '" . $value . "'"; |
|
551 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] ADDED as '".$value."'"; |
|
552 | 552 | } |
553 | 553 | } |
554 | 554 | return $retval; |
@@ -121,7 +121,7 @@ discard block |
||
121 | 121 | $cryptoJson = openssl_encrypt($clearJson, 'AES-256-CBC', $encryptionKey, OPENSSL_RAW_DATA, $initVector); |
122 | 122 | $hmac = hash_hmac("sha1", $cryptoJson, $encryptionKey, TRUE); |
123 | 123 | |
124 | - $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = " . $password . "\nb(IV) = " . base64_encode($initVector) . "\nb(Cipher) = " . base64_encode($cryptoJson) . "\nb(HMAC) = " . base64_encode($hmac)); |
|
124 | + $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = ".$password."\nb(IV) = ".base64_encode($initVector)."\nb(Cipher) = ".base64_encode($cryptoJson)."\nb(HMAC) = ".base64_encode($hmac)); |
|
125 | 125 | |
126 | 126 | // now, generate the container that holds all the crypto data |
127 | 127 | $finalArray = [ |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | private function wiredBlock($eapdetails) |
196 | 196 | { |
197 | 197 | return [ |
198 | - "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet") . "}", |
|
198 | + "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet")."}", |
|
199 | 199 | "Name" => "eduroam configuration (wired network)", |
200 | 200 | "Remove" => false, |
201 | 201 | "Type" => "Ethernet", |
@@ -236,7 +236,7 @@ discard block |
||
236 | 236 | // if silverbullet, we deliver the client cert inline |
237 | 237 | |
238 | 238 | if ($selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) { |
239 | - $eaparray['ClientCertRef'] = "[" . $this->clientCert['GUID'] . "]"; |
|
239 | + $eaparray['ClientCertRef'] = "[".$this->clientCert['GUID']."]"; |
|
240 | 240 | $eaparray['ClientCertType'] = "Ref"; |
241 | 241 | } |
242 | 242 | |
@@ -271,7 +271,7 @@ discard block |
||
271 | 271 | $jsonArray = ["Type" => "UnencryptedConfiguration"]; |
272 | 272 | |
273 | 273 | foreach ($this->attributes['internal:CAs'][0] as $ca) { |
274 | - $caRefs[] = "{" . $ca['uuid'] . "}"; |
|
274 | + $caRefs[] = "{".$ca['uuid']."}"; |
|
275 | 275 | } |
276 | 276 | // define CA certificates |
277 | 277 | foreach ($this->attributes['internal:CAs'][0] as $ca) { |
@@ -281,15 +281,15 @@ discard block |
||
281 | 281 | if ($caSanitized1 === FALSE) { |
282 | 282 | throw new Exception("Error cropping PEM data at its BEGIN marker."); |
283 | 283 | } |
284 | - $this->loggerInstance->debug(4, $caSanitized1 . "\n"); |
|
284 | + $this->loggerInstance->debug(4, $caSanitized1."\n"); |
|
285 | 285 | // remove \n |
286 | 286 | $caSanitized = str_replace("\n", "", $caSanitized1); |
287 | - $jsonArray["Certificates"][] = ["GUID" => "{" . $ca['uuid'] . "}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized]; |
|
288 | - $this->loggerInstance->debug(3, $caSanitized . "\n"); |
|
287 | + $jsonArray["Certificates"][] = ["GUID" => "{".$ca['uuid']."}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized]; |
|
288 | + $this->loggerInstance->debug(3, $caSanitized."\n"); |
|
289 | 289 | } |
290 | 290 | // if we are doing silverbullet, include the unencrypted(!) P12 as a client certificate |
291 | 291 | if ($this->selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) { |
292 | - $jsonArray["Certificates"][] = ["GUID" => "[" . $this->clientCert['GUID'] . "]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"]; |
|
292 | + $jsonArray["Certificates"][] = ["GUID" => "[".$this->clientCert['GUID']."]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"]; |
|
293 | 293 | } |
294 | 294 | $eaparray = $this->eapBlock($caRefs); |
295 | 295 | // define Wi-Fi networks |
@@ -312,7 +312,7 @@ discard block |
||
312 | 312 | |
313 | 313 | file_put_contents('installer_profile', $finalJson); |
314 | 314 | |
315 | - $fileName = $this->installerBasename . '.onc'; |
|
315 | + $fileName = $this->installerBasename.'.onc'; |
|
316 | 316 | |
317 | 317 | if (!$this->sign) { |
318 | 318 | rename("installer_profile", $fileName); |
@@ -323,7 +323,7 @@ discard block |
||
323 | 323 | // have the notion of signing |
324 | 324 | // but if they ever change their mind, we are prepared |
325 | 325 | |
326 | - $outputFromSigning = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
326 | + $outputFromSigning = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
327 | 327 | if ($outputFromSigning === FALSE) { |
328 | 328 | $this->loggerInstance->debug(2, "Signing the ONC installer $fileName FAILED!\n"); |
329 | 329 | } |
@@ -755,7 +755,22 @@ |
||
755 | 755 | } |
756 | 756 | ?> |
757 | 757 | <div id="tabs-<?php echo $i;?>"> |
758 | - <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button> |
|
758 | + <button id="run_<?php if ($i==3) { |
|
759 | + echo 'd'; |
|
760 | +} else { |
|
761 | + echo 'o'; |
|
762 | +} |
|
763 | +?>_tests"; onclick="run_<?php if ($i==3) { |
|
764 | + echo 'dynamic'; |
|
765 | +} else { |
|
766 | + echo 'openroaming'; |
|
767 | +} |
|
768 | +?>()"><?php if ($i==3) { |
|
769 | + echo _("Repeat dynamic connectivity tests"); |
|
770 | +} else { |
|
771 | + echo _("Repeat OpenRoaming connectivity tests"); |
|
772 | +} |
|
773 | +?></button> |
|
759 | 774 | |
760 | 775 | <?php |
761 | 776 | echo "<div id='"; |
@@ -567,9 +567,9 @@ discard block |
||
567 | 567 | $naptr = $rfc7585suite->relevantNAPTR(); |
568 | 568 | if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
569 | 569 | if ($dynType == "") { |
570 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
570 | + echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
571 | 571 | } else { |
572 | - echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
572 | + echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
573 | 573 | } |
574 | 574 | } else { |
575 | 575 | echo "<table>"; |
@@ -673,7 +673,7 @@ discard block |
||
673 | 673 | echo "} |
674 | 674 | </script>"; |
675 | 675 | } else { |
676 | - echo ' |
|
676 | + echo ' |
|
677 | 677 | function run_openroaming() { |
678 | 678 | running_ajax_openroaming = 0; |
679 | 679 | $("#main_openroaming_ico").attr("src",icon_loading); |
@@ -695,10 +695,10 @@ discard block |
||
695 | 695 | } |
696 | 696 | } |
697 | 697 | if ($dynType == '') { |
698 | - $naptrs[0] = $naptr; |
|
699 | - } else { |
|
700 | - $naptrs[1] = $naptr; |
|
701 | - } |
|
698 | + $naptrs[0] = $naptr; |
|
699 | + } else { |
|
700 | + $naptrs[1] = $naptr; |
|
701 | + } |
|
702 | 702 | } |
703 | 703 | echo "<strong>" . _("Static connectivity tests") . "</strong> |
704 | 704 | <table><tr> |
@@ -711,7 +711,7 @@ discard block |
||
711 | 711 | </tr></table>"; |
712 | 712 | } |
713 | 713 | if (count($orrealm) && ($naptrs[1] > 0)) { |
714 | - echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
714 | + echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
715 | 715 | <table><tr> |
716 | 716 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'> </td> |
717 | 717 | </tr></table>"; |
@@ -749,12 +749,12 @@ discard block |
||
749 | 749 | <?php |
750 | 750 | for ($i=3; $i<5; $i++) { |
751 | 751 | if ($i == 3 && $naptrs[0] <= 0) { |
752 | - continue; |
|
752 | + continue; |
|
753 | 753 | } |
754 | 754 | if ($i == 4) { |
755 | - if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) { |
|
756 | - continue; |
|
757 | - } |
|
755 | + if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) { |
|
756 | + continue; |
|
757 | + } |
|
758 | 758 | } |
759 | 759 | if ($i == 3) { |
760 | 760 | $rfc7585suite = $dnsChecks; |
@@ -771,16 +771,16 @@ discard block |
||
771 | 771 | echo "_tests'><fieldset class='option_container'> |
772 | 772 | <legend><strong>"; |
773 | 773 | if ($i==3) { |
774 | - echo _("DYNAMIC connectivity tests"); |
|
774 | + echo _("DYNAMIC connectivity tests"); |
|
775 | 775 | } else { |
776 | - echo _("OpenRoaming connectivity tests"); |
|
776 | + echo _("OpenRoaming connectivity tests"); |
|
777 | 777 | } |
778 | 778 | echo "</strong></legend>"; |
779 | 779 | $prefix1 = 'dynamic'; |
780 | 780 | $prefix2 = ''; |
781 | 781 | if ($i == 4) { |
782 | - $prefix1 = 'openroaming'; |
|
783 | - $prefix2 = $prefix1; |
|
782 | + $prefix1 = 'openroaming'; |
|
783 | + $prefix2 = $prefix1; |
|
784 | 784 | } |
785 | 785 | $resultstoprint = []; |
786 | 786 | if (count($rfc7585suite->NAPTR_hostname_records) > 0) { |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $loggerInstance = new \core\common\Logging(); |
25 | 25 | |
@@ -69,13 +69,13 @@ discard block |
||
69 | 69 | $dnsChecksOR = new \core\diag\RFC7585Tests($check_realm, "aaa+auth:radius.tls.tcp"); |
70 | 70 | } |
71 | 71 | } else { |
72 | - $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
|
72 | + $error_message = _("You asked for a realm check, but we don't know the realm for this profile!")."</p>"; |
|
73 | 73 | } |
74 | 74 | } else { // someone else's realm, and we don't know anything about it... only shallow checks |
75 | 75 | $check_realm = $validator->realm($realm ?? $_SESSION['check_realm'] ?? ""); |
76 | 76 | if ($check_realm !== FALSE) { |
77 | 77 | $_SESSION['check_realm'] = $check_realm; |
78 | - $testsuite = new \core\diag\RADIUSTests($check_realm, "@" . $check_realm); |
|
78 | + $testsuite = new \core\diag\RADIUSTests($check_realm, "@".$check_realm); |
|
79 | 79 | $dnsChecks = new \core\diag\RFC7585Tests($check_realm); |
80 | 80 | } else { |
81 | 81 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | var listofcas = "<?php echo _("You should update your list of accredited CAs") ?>"; |
123 | 123 | var getitfrom = "<?php echo _("Get it from here.") ?>"; |
124 | 124 | var listsource = "<?php echo \config\Diagnostics::RADIUSTESTS['accreditedCAsURL'] ?>"; |
125 | - var moretext = "<?php echo _("more") . "»" ?>"; |
|
125 | + var moretext = "<?php echo _("more")."»" ?>"; |
|
126 | 126 | var lesstext = "<?php echo "«" ?>"; |
127 | 127 | var morealltext = "<?php echo _("Show detailed information for all tests") ?>"; |
128 | 128 | var unknownca_code = "<?php echo \core\diag\RADIUSTests::CERTPROB_UNKNOWN_CA ?>"; |
@@ -265,7 +265,7 @@ discard block |
||
265 | 265 | } |
266 | 266 | } |
267 | 267 | cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] + '" style="width: 24px;"></td><td>' + state; |
268 | - cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
268 | + cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
269 | 269 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
270 | 270 | if (data.ca[key].certificate[c].finalerror === 1) { |
271 | 271 | cliinfo = cliinfo + '<li>' + restskipped + '</li>'; |
@@ -468,8 +468,8 @@ discard block |
||
468 | 468 | <?php |
469 | 469 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
470 | 470 | print " |
471 | -$(\"#live_src" . $hostindex . "_img\").attr('src',icon_loading); |
|
472 | -$(\"#live_src" . $hostindex . "_img\").show(); |
|
471 | +$(\"#live_src" . $hostindex."_img\").attr('src',icon_loading); |
|
472 | +$(\"#live_src" . $hostindex."_img\").show(); |
|
473 | 473 | $.ajax({ |
474 | 474 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
475 | 475 | type: 'POST', |
@@ -499,15 +499,15 @@ discard block |
||
499 | 499 | <?php |
500 | 500 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
501 | 501 | if ($testedProfile !== NULL) { |
502 | - $extraarg = "profile_id: " . $testedProfile->identifier . ", "; |
|
502 | + $extraarg = "profile_id: ".$testedProfile->identifier.", "; |
|
503 | 503 | } else { |
504 | 504 | $extraarg = ""; |
505 | 505 | } |
506 | 506 | print " |
507 | -$(\"#src" . $hostindex . "_img\").attr('src',icon_loading); |
|
507 | +$(\"#src" . $hostindex."_img\").attr('src',icon_loading); |
|
508 | 508 | $(\"#src$hostindex\").html(''); |
509 | 509 | running_ajax_stat++; |
510 | -$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex' }, udp, 'json'); |
|
510 | +$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex' }, udp, 'json'); |
|
511 | 511 | |
512 | 512 | "; |
513 | 513 | } |
@@ -534,7 +534,7 @@ discard block |
||
534 | 534 | if ($check_realm === FALSE) { |
535 | 535 | print "<p>$error_message</p>"; |
536 | 536 | } else { |
537 | - print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
537 | + print "<h1>".sprintf(_("Realm testing for: %s"), $check_realm)."</h1>\n"; |
|
538 | 538 | ?> |
539 | 539 | <div id="debug_out" style="display: none"></div> |
540 | 540 | <div id="tabs" style="min-width: 600px; max-width:1000px"> |
@@ -556,25 +556,25 @@ discard block |
||
556 | 556 | // NAPTR existence check |
557 | 557 | if ($dynType == "") { |
558 | 558 | $rfc7585suite = $dnsChecks; |
559 | - echo "<strong>" . _("DNS checks") . "</strong><div>"; |
|
559 | + echo "<strong>"._("DNS checks")."</strong><div>"; |
|
560 | 560 | } else { |
561 | 561 | if (count($orrealm) == 0) { |
562 | 562 | continue; |
563 | 563 | } |
564 | 564 | $rfc7585suite = $dnsChecksOR; |
565 | - echo "<strong>" . _("OpenRoaming DNS checks") . "</strong><div>"; |
|
565 | + echo "<strong>"._("OpenRoaming DNS checks")."</strong><div>"; |
|
566 | 566 | } |
567 | 567 | $naptr = $rfc7585suite->relevantNAPTR(); |
568 | 568 | if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
569 | 569 | if ($dynType == "") { |
570 | - echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
|
570 | + echo "<tr><td>"._("Dynamic discovery test is not configured")."</td><td>"; |
|
571 | 571 | } else { |
572 | - echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>"; |
|
572 | + echo "<tr><td>"._("OpenRoaming connectivity test is not configured")."</td><td>"; |
|
573 | 573 | } |
574 | 574 | } else { |
575 | 575 | echo "<table>"; |
576 | 576 | // output in friendly words |
577 | - echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>"; |
|
577 | + echo "<tr><td>"._("Checking NAPTR existence:")."</td><td>"; |
|
578 | 578 | switch ($naptr) { |
579 | 579 | case \core\diag\RFC7585Tests::RETVAL_NONAPTR: |
580 | 580 | echo _("This realm has no NAPTR records."); |
@@ -589,7 +589,7 @@ discard block |
||
589 | 589 | |
590 | 590 | // compliance checks for NAPTRs |
591 | 591 | if ($naptr > 0) { |
592 | - echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>"; |
|
592 | + echo "<tr><td>"._("Checking NAPTR compliance (flag = S and regex = {empty}):")."</td><td>"; |
|
593 | 593 | $naptr_valid = $rfc7585suite->relevantNAPTRcompliance(); |
594 | 594 | switch ($naptr_valid) { |
595 | 595 | case \core\diag\RADIUSTests::RETVAL_OK: |
@@ -604,7 +604,7 @@ discard block |
||
604 | 604 | // SRV resolution |
605 | 605 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK) { |
606 | 606 | $srv = $rfc7585suite->relevantNAPTRsrvResolution(); |
607 | - echo "<tr><td>" . _("Checking SRVs:") . "</td><td>"; |
|
607 | + echo "<tr><td>"._("Checking SRVs:")."</td><td>"; |
|
608 | 608 | switch ($srv) { |
609 | 609 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
610 | 610 | echo _("This check was skipped."); |
@@ -620,7 +620,7 @@ discard block |
||
620 | 620 | // IP addresses for the hosts |
621 | 621 | if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK && $srv > 0) { |
622 | 622 | $hosts = $rfc7585suite->relevantNAPTRhostnameResolution(); |
623 | - echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>"; |
|
623 | + echo "<tr><td>"._("Checking IP address resolution:")."</td><td>"; |
|
624 | 624 | switch ($srv) { |
625 | 625 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
626 | 626 | echo _("This check was skipped."); |
@@ -637,12 +637,12 @@ discard block |
||
637 | 637 | echo "</table><br/>"; |
638 | 638 | if ($dynType == "") { |
639 | 639 | if (count($testsuite->listerrors()) == 0) { |
640 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!"); |
|
640 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("with no DNS errors encountered. Congratulations!"); |
|
641 | 641 | } else { |
642 | - echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
642 | + echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("but there were DNS errors! Check them!")." "._("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
|
643 | 643 | echo "<div class='notacceptable'><table>"; |
644 | 644 | foreach ($testsuite->listerrors() as $details) { |
645 | - echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
|
645 | + echo "<tr><td>".$details['TYPE']."</td><td>".$details['TARGET']."</td></tr>"; |
|
646 | 646 | } |
647 | 647 | echo "</table></div>"; |
648 | 648 | } |
@@ -661,13 +661,13 @@ discard block |
||
661 | 661 | $("#dynamic_tests").show(); |
662 | 662 | '; |
663 | 663 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
664 | - $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port']; |
|
664 | + $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port']; |
|
665 | 665 | $expectedName = $addr['hostname']; |
666 | 666 | print " |
667 | 667 | running_ajax_dyn++; |
668 | - $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
668 | + $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
669 | 669 | running_ajax_dyn++; |
670 | - $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
670 | + $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
671 | 671 | "; |
672 | 672 | } |
673 | 673 | echo "} |
@@ -683,11 +683,11 @@ discard block |
||
683 | 683 | $("#openroaming_tests").show(); |
684 | 684 | '; |
685 | 685 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
686 | - $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port']; |
|
686 | + $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port']; |
|
687 | 687 | $expectedName = $addr['hostname']; |
688 | 688 | print " |
689 | 689 | running_ajax_openroaming++; |
690 | - $.ajax({url:'radius_tests.php', data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
690 | + $.ajax({url:'radius_tests.php', data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName' }, error: eee, success: capath, dataType: 'json'}); |
|
691 | 691 | "; |
692 | 692 | } |
693 | 693 | echo "} |
@@ -700,18 +700,18 @@ discard block |
||
700 | 700 | $naptrs[1] = $naptr; |
701 | 701 | } |
702 | 702 | } |
703 | - echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
703 | + echo "<strong>"._("Static connectivity tests")."</strong> |
|
704 | 704 | <table><tr> |
705 | 705 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
706 | 706 | </tr></table>"; |
707 | 707 | if ($naptrs[0] > 0) { |
708 | - echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
708 | + echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
709 | 709 | <table><tr> |
710 | 710 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
711 | 711 | </tr></table>"; |
712 | 712 | } |
713 | 713 | if (count($orrealm) && ($naptrs[1] > 0)) { |
714 | - echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong> |
|
714 | + echo "<hr><strong>"._("OpenRoaming connectivity tests")."</strong> |
|
715 | 715 | <table><tr> |
716 | 716 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'> </td> |
717 | 717 | </tr></table>"; |
@@ -731,12 +731,12 @@ discard block |
||
731 | 731 | print "<p>"; |
732 | 732 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
733 | 733 | print "<hr>"; |
734 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
734 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
735 | 735 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
736 | 736 | <tr> |
737 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
737 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
738 | 738 | <td id='src$hostindex' colspan=2> |
739 | -" . _("testing...") . " |
|
739 | +"._("testing...")." |
|
740 | 740 | </td> |
741 | 741 | </tr> |
742 | 742 | </table>"; |
@@ -747,7 +747,7 @@ discard block |
||
747 | 747 | |
748 | 748 | </div> |
749 | 749 | <?php |
750 | - for ($i=3; $i<5; $i++) { |
|
750 | + for ($i = 3; $i < 5; $i++) { |
|
751 | 751 | if ($i == 3 && $naptrs[0] <= 0) { |
752 | 752 | continue; |
753 | 753 | } |
@@ -762,15 +762,15 @@ discard block |
||
762 | 762 | $rfc7585suite = $dnsChecksOR; |
763 | 763 | } |
764 | 764 | ?> |
765 | - <div id="tabs-<?php echo $i;?>"> |
|
766 | - <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button> |
|
765 | + <div id="tabs-<?php echo $i; ?>"> |
|
766 | + <button id="run_<?php if ($i == 3) echo 'd'; else echo 'o'; ?>_tests"; onclick="run_<?php if ($i == 3) echo 'dynamic'; else echo 'openroaming'; ?>()"><?php if ($i == 3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests"); ?></button> |
|
767 | 767 | |
768 | 768 | <?php |
769 | 769 | echo "<div id='"; |
770 | - if ($i==3) { echo 'dynamic'; } else { echo 'openroaming'; } |
|
770 | + if ($i == 3) { echo 'dynamic'; } else { echo 'openroaming'; } |
|
771 | 771 | echo "_tests'><fieldset class='option_container'> |
772 | 772 | <legend><strong>"; |
773 | - if ($i==3) { |
|
773 | + if ($i == 3) { |
|
774 | 774 | echo _("DYNAMIC connectivity tests"); |
775 | 775 | } else { |
776 | 776 | echo _("OpenRoaming connectivity tests"); |
@@ -784,17 +784,17 @@ discard block |
||
784 | 784 | } |
785 | 785 | $resultstoprint = []; |
786 | 786 | if (count($rfc7585suite->NAPTR_hostname_records) > 0) { |
787 | - $resultstoprint[] = '<div style="align:right; display: none;" id="' . $prefix1 . '_result_fail">' . _("Some errors were found during the tests, see below") . '</div><div style="align:right; display: none;" id="' . $prefix1 . '_result_pass">' . _("All tests passed, congratulations!") . '</div>'; |
|
788 | - $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
|
787 | + $resultstoprint[] = '<div style="align:right; display: none;" id="'.$prefix1.'_result_fail">'._("Some errors were found during the tests, see below").'</div><div style="align:right; display: none;" id="'.$prefix1.'_result_pass">'._("All tests passed, congratulations!").'</div>'; |
|
788 | + $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">'._('Show detailed information for all tests').'</a></div>'.'<p><strong>'._("Checking server handshake...")."</strong><p>"; |
|
789 | 789 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
790 | - $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]); |
|
791 | - $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong>'; |
|
790 | + $bracketaddr = ($addr["family"] == "IPv6" ? "[".$addr["IP"]."]" : $addr["IP"]); |
|
791 | + $resultstoprint[] = '<p><strong>'.$bracketaddr.' TCP/'.$addr['port'].'</strong>'; |
|
792 | 792 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
793 | - $resultstoprint[] = "<table id='" . $prefix2 . "caresults$hostindex' style='width:100%'> |
|
793 | + $resultstoprint[] = "<table id='".$prefix2."caresults$hostindex' style='width:100%'> |
|
794 | 794 | <tr> |
795 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcca$hostindex" . "_img'></td> |
|
796 | -<td id='" . $prefix2 . "srcca$hostindex'> |
|
797 | -" . _("testing...") . " |
|
795 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcca$hostindex"."_img'></td> |
|
796 | +<td id='" . $prefix2."srcca$hostindex'> |
|
797 | +"._("testing...")." |
|
798 | 798 | </td> |
799 | 799 | </tr> |
800 | 800 | </table>"; |
@@ -802,26 +802,26 @@ discard block |
||
802 | 802 | } |
803 | 803 | $clientstest = []; |
804 | 804 | foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) { |
805 | - $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
|
806 | - $clientstest[] = "<span id='" . $prefix2 . "clientresults$hostindex$clinx'><table style='width:100%'> |
|
805 | + $clientstest[] = '<p><strong>'.$addr['IP'].' TCP/'.$addr['port'].'</strong></p><ol>'; |
|
806 | + $clientstest[] = "<span id='".$prefix2."clientresults$hostindex$clinx'><table style='width:100%'> |
|
807 | 807 | <tr> |
808 | 808 | <td class='icon_td'>"; |
809 | - if ($i == 4 ) { |
|
809 | + if ($i == 4) { |
|
810 | 810 | $clientstest[] = "<!--"; |
811 | 811 | } |
812 | - $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcclient$hostindex" . "_img'></td> |
|
813 | -<td id='" . $prefix2 . "srcclient$hostindex'> |
|
814 | -" . _("testing..."); |
|
812 | + $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcclient$hostindex"."_img'></td> |
|
813 | +<td id='" . $prefix2."srcclient$hostindex'> |
|
814 | +"._("testing..."); |
|
815 | 815 | |
816 | - if ($i == 4 ) { |
|
817 | - $clientstest[] = "-->" . _("not implemented yet"); |
|
816 | + if ($i == 4) { |
|
817 | + $clientstest[] = "-->"._("not implemented yet"); |
|
818 | 818 | } |
819 | 819 | $clientstest[] = "</td></tr></table></span>"; |
820 | 820 | $clientstest[] = '</ol>'; |
821 | 821 | } |
822 | 822 | echo '<div style="align:right;">'; |
823 | 823 | echo join('', $resultstoprint); |
824 | - echo '<span id="' . $prefix2 . 'clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
824 | + echo '<span id="'.$prefix2.'clientstest" style="display: none;"><p><hr><b>'._('Checking if certificates from CAs are accepted...').'</b><p>'._('A few client certificates will be tested to check if servers are resistant to some certificate problems.').'<p>'; |
|
825 | 825 | print join('', $clientstest); |
826 | 826 | echo '</span>'; |
827 | 827 | echo '</div>'; |
@@ -835,7 +835,7 @@ discard block |
||
835 | 835 | // check if truncates/dies on Operator-Name |
836 | 836 | if ($my_profile !== NULL) { |
837 | 837 | echo "<div id='tabs-n'><fieldset class='option_container'> |
838 | - <legend><strong>" . _("Live login test") . "</strong></legend>"; |
|
838 | + <legend><strong>" . _("Live login test")."</strong></legend>"; |
|
839 | 839 | $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1); |
840 | 840 | if (count($prof_compl) > 0) { |
841 | 841 | $passwordReqired = FALSE; |
@@ -848,34 +848,34 @@ discard block |
||
848 | 848 | $clientCertRequired = TRUE; |
849 | 849 | } |
850 | 850 | } |
851 | - echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p> |
|
852 | - <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.") . "</p> |
|
853 | - <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
|
851 | + echo "<div id='disposable_credential_container'><p>"._("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.")."</p> |
|
852 | + <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.")."</p> |
|
853 | + <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!")."</p></div> |
|
854 | 854 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
855 | 855 | <input type='hidden' name='test_type' value='udp_login'> |
856 | - <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang() . "'> |
|
857 | - <input type='hidden' name='profile_id' value='" . $my_profile->identifier . "'> |
|
856 | + <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang()."'> |
|
857 | + <input type='hidden' name='profile_id' value='" . $my_profile->identifier."'> |
|
858 | 858 | <table id='live_tests'>"; |
859 | 859 | // if any password based EAP methods are available enable this section |
860 | 860 | if ($passwordReqired) { |
861 | - echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr> |
|
862 | - <tr><td>" . _("Real (inner) username:") . "</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
863 | - echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
864 | - echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
861 | + echo "<tr><td colspan='2'><strong>"._("Password-based EAP types")."</strong></td></tr> |
|
862 | + <tr><td>" . _("Real (inner) username:")."</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>"; |
|
863 | + echo "<tr><td>"._("Anonymous outer ID (optional):")."</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>"; |
|
864 | + echo "<tr><td>"._("Password:")."</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>"; |
|
865 | 865 | } |
866 | 866 | // ask for cert + privkey if TLS-based method is active |
867 | 867 | if ($clientCertRequired) { |
868 | - echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr> |
|
869 | - <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
870 | - <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
871 | - <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
868 | + echo "<tr><td colspan='2'><strong>"._("Certificate-based EAP types")."</strong></td></tr> |
|
869 | + <tr><td>" . _("Certificate file (.p12 or .pfx):")."</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr> |
|
870 | + <tr><td>" . _("Certificate password, if any:")."</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr> |
|
871 | + <tr><td>" . _("Username, if different from certificate Subject:")."</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>"; |
|
872 | 872 | } |
873 | - echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>"; |
|
873 | + echo "<tr><td colspan='2'><button id='submit_credentials'>"._("Submit credentials")."</button></td></tr></table></form>"; |
|
874 | 874 | echo "<div id='live_login_results' style='display:none'>"; |
875 | 875 | foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
876 | 876 | print "<hr>"; |
877 | - printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
878 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
877 | + printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
878 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
879 | 879 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
880 | 880 | } |
881 | 881 | echo "</div>"; |
@@ -890,9 +890,9 @@ discard block |
||
890 | 890 | } |
891 | 891 | |
892 | 892 | if (isset($_POST['comefrom'])) { |
893 | - $return = htmlspecialchars_decode($_POST['comefrom']) . ( $inst_id ? "?inst_id=" . $inst_id : "" ); |
|
893 | + $return = htmlspecialchars_decode($_POST['comefrom']).($inst_id ? "?inst_id=".$inst_id : ""); |
|
894 | 894 | echo "<form method='post' action='$return' accept-charset='UTF-8'> |
895 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CLOSE . "'>" . sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp) . "</button>" |
|
895 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CLOSE."'>".sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp)."</button>" |
|
896 | 896 | . "</form>"; |
897 | 897 | } |
898 | 898 | if ($check_realm !== FALSE) { |