@@ -150,8 +150,8 @@ discard block |
||
150 | 150 | <td> |
151 | 151 | <?php |
152 | 152 | echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_1]['icon'] . |
153 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
154 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "'>"; |
|
153 | + "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
154 | + "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "'>"; |
|
155 | 155 | ?> |
156 | 156 | </td> |
157 | 157 | </tr> |
@@ -173,8 +173,8 @@ discard block |
||
173 | 173 | <td> |
174 | 174 | <?php |
175 | 175 | echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_2]['icon'] . |
176 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
177 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "'>"; |
|
176 | + "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
177 | + "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "'>"; |
|
178 | 178 | ?> |
179 | 179 | </td> |
180 | 180 | </tr> |
@@ -1,10 +1,10 @@ |
||
1 | 1 | <?php |
2 | 2 | require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
3 | 3 | /** |
4 | - * check if URL responds with 200 |
|
5 | - * |
|
6 | - * @param string $srv server name |
|
7 | - * @return integer or NULL |
|
4 | + * check if URL responds with 200 |
|
5 | + * |
|
6 | + * @param string $srv server name |
|
7 | + * @return integer or NULL |
|
8 | 8 | */ |
9 | 9 | function checkConfigRADIUSDaemon ($srv) { |
10 | 10 | $ch = curl_init(); |
@@ -236,7 +236,7 @@ |
||
236 | 236 | const AUXATTRIB_SB_USERNAME = "ATTRIB-MANAGED-USERNAME"; |
237 | 237 | const AUXATTRIB_SB_USERID = "ATTRIB-MANAGED-USERID"; |
238 | 238 | const AUXATTRIB_SB_CERTSERIAL = "ATTRIB-MANAGED-CERTSERIAL"; |
239 | - const AUXATTRIB_SB_CERTCN = "ATTRIB-MANAGED-CERTCN"; |
|
239 | + const AUXATTRIB_SB_CERTCN = "ATTRIB-MANAGED-CERTCN"; |
|
240 | 240 | const AUXATTRIB_SB_CERTANNOTATION = "ATTRIB-MANAGED-CERTANNOTATION"; |
241 | 241 | const AUXATTRIB_SB_EXPIRY = "ATTRIB-MANAGED-EXPIRY"; /* MySQL timestamp format */ |
242 | 242 | const AUXATTRIB_TOKEN = "ATTRIB-TOKEN"; |
@@ -417,7 +417,7 @@ |
||
417 | 417 | $userId = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID); |
418 | 418 | $userName = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERNAME); |
419 | 419 | $certSerial = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL); |
420 | - $certCN = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTCN); |
|
420 | + $certCN = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTCN); |
|
421 | 421 | if ($userId === FALSE && $userName === FALSE && $certSerial === FALSE && $certCN === FALSE) { |
422 | 422 | // we need at least one of those |
423 | 423 | $adminApi->returnError(\web\lib\admin\API::ERROR_MISSING_PARAMETER, "At least one of User ID, Username, certificate serial, or certificate CN is required."); |
@@ -201,7 +201,7 @@ |
||
201 | 201 | } |
202 | 202 | |
203 | 203 | if (!empty($this->attributes['internal:realm'][0])) { |
204 | - $config['USER_REALM'] = $this->attributes['internal:realm'][0]; |
|
204 | + $config['USER_REALM'] = $this->attributes['internal:realm'][0]; |
|
205 | 205 | } |
206 | 206 | |
207 | 207 | if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
@@ -35,8 +35,8 @@ |
||
35 | 35 | * @author Tomasz Wolniewicz <[email protected]> |
36 | 36 | * @package ModuleWriting |
37 | 37 | */ |
38 | - class DeviceW8W10 extends WindowsCommon |
|
39 | - { |
|
38 | + class DeviceW8W10 extends WindowsCommon |
|
39 | + { |
|
40 | 40 | final public function __construct() { |
41 | 41 | parent::__construct(); |
42 | 42 | \core\common\Entity::intoThePotatoes(); |
@@ -774,7 +774,7 @@ |
||
774 | 774 | \core\common\Entity::$nomenclature_inst, |
775 | 775 | count($this->CAsAccountedFor)+1, |
776 | 776 | ($ca['root'] ? _("Root") : _("Intermediate"))) . |
777 | - "</string> |
|
777 | + "</string> |
|
778 | 778 | <key>PayloadIdentifier</key> |
779 | 779 | <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
780 | 780 | <key>PayloadOrganization</key> |
@@ -197,7 +197,6 @@ |
||
197 | 197 | * - RETVAL_NOTCONFIGURED; needs \config\Diagnostics::RADIUSTESTS['TLS-discoverytag'] |
198 | 198 | * - RETVAL_INVALID (at least one format error) |
199 | 199 | * - RETVAL_OK (all fine) |
200 | - |
|
201 | 200 | * @return int one of two RETVALs above |
202 | 201 | */ |
203 | 202 | public function relevantNAPTRcompliance() |
@@ -109,7 +109,6 @@ |
||
109 | 109 | * ["my.server.name"] => "my.server.name" |
110 | 110 | * ["foo.bar.de", "baz.bar.ge"] => "e" |
111 | 111 | * ["server1.example.com", "server2.example.com", "serverN.example.com"] => ".example.com" |
112 | - |
|
113 | 112 | * @return string |
114 | 113 | */ |
115 | 114 | public function longestNameSuffix() |