@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $therealm = filter_input(INPUT_GET, 'realm', FILTER_SANITIZE_STRING); |
25 | 25 | $thevisited = filter_input(INPUT_GET, 'visited', FILTER_SANITIZE_STRING); |
@@ -35,7 +35,7 @@ discard block |
||
35 | 35 | $validator = new \web\lib\common\InputValidation(); |
36 | 36 | |
37 | 37 | echo "<pre>"; |
38 | - echo "Testing " . $validatedRealm . " in " . $validator->string($thevisited); |
|
38 | + echo "Testing ".$validatedRealm." in ".$validator->string($thevisited); |
|
39 | 39 | print_r($telepath->magic()); |
40 | 40 | echo "</pre>"; |
41 | 41 | } |
42 | 42 | \ No newline at end of file |
@@ -19,7 +19,7 @@ |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $sociopath = new \core\diag\Sociopath(); |
25 | 25 |
@@ -95,17 +95,17 @@ |
||
95 | 95 | } |
96 | 96 | |
97 | 97 | // does the file exist in the current skin's directory? Has precedence |
98 | - if ($submodule !== '' && file_exists(__DIR__ . "/../../skins/" . $this->skin . "/" . $submodule . $path . $filename)) { |
|
99 | - $extrapath = "/skins/" . $this->skin . "/" . $submodule; |
|
98 | + if ($submodule !== '' && file_exists(__DIR__."/../../skins/".$this->skin."/".$submodule.$path.$filename)) { |
|
99 | + $extrapath = "/skins/".$this->skin."/".$submodule; |
|
100 | 100 | } |
101 | - elseif (file_exists(__DIR__ . "/../../skins/" . $this->skin . $path . $filename)) { |
|
102 | - $extrapath = "/skins/" . $this->skin; |
|
103 | - } elseif (file_exists(__DIR__ . "/../../" . $path . $filename)) { |
|
101 | + elseif (file_exists(__DIR__."/../../skins/".$this->skin.$path.$filename)) { |
|
102 | + $extrapath = "/skins/".$this->skin; |
|
103 | + } elseif (file_exists(__DIR__."/../../".$path.$filename)) { |
|
104 | 104 | $extrapath = ""; |
105 | 105 | } else { |
106 | 106 | return FALSE; |
107 | 107 | } |
108 | - return htmlspecialchars(\core\CAT::getRootUrlPath() . $extrapath . $path . $filename, ENT_QUOTES); |
|
108 | + return htmlspecialchars(\core\CAT::getRootUrlPath().$extrapath.$path.$filename, ENT_QUOTES); |
|
109 | 109 | } |
110 | 110 | |
111 | 111 | } |
@@ -34,8 +34,8 @@ discard block |
||
34 | 34 | */ |
35 | 35 | public static function deleteObsoleteTempDirs() { |
36 | 36 | $downloadsDirs = [ |
37 | - 'site_installers' => dirname(dirname(dirname(dirname(__FILE__)))) . "/var/installer_cache", |
|
38 | - 'silverbullet' => dirname(dirname(dirname(dirname(__FILE__)))) . "/var/silverbullet" |
|
37 | + 'site_installers' => dirname(dirname(dirname(dirname(__FILE__))))."/var/installer_cache", |
|
38 | + 'silverbullet' => dirname(dirname(dirname(dirname(__FILE__))))."/var/silverbullet" |
|
39 | 39 | ]; |
40 | 40 | $tm = time(); |
41 | 41 | $i = 0; |
@@ -54,14 +54,14 @@ discard block |
||
54 | 54 | if ($entry === '.' || $entry === '..' || $entry === '.gitignore') { |
55 | 55 | continue; |
56 | 56 | } |
57 | - $ftime = $tm - filemtime($downloads . '/' . $entry); |
|
57 | + $ftime = $tm - filemtime($downloads.'/'.$entry); |
|
58 | 58 | if ($ftime < 3600) { |
59 | 59 | continue; |
60 | 60 | } |
61 | 61 | if (isset($Cache[$entry])) { |
62 | 62 | continue; |
63 | 63 | } |
64 | - \core\common\Entity::rrmdir($downloads . '/' . $entry); |
|
64 | + \core\common\Entity::rrmdir($downloads.'/'.$entry); |
|
65 | 65 | $i = $i + 1; |
66 | 66 | print "$entry\n"; |
67 | 67 | } |
@@ -25,7 +25,7 @@ |
||
25 | 25 | * @author Stefan Winter <[email protected]> |
26 | 26 | * @package Core |
27 | 27 | */ |
28 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
28 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
29 | 29 | |
30 | 30 | $Gui = new \web\lib\user\Gui(); |
31 | 31 | // ... unless overwritten by direct GET/POST parameter in the request or a SESSION setting |
@@ -25,7 +25,7 @@ |
||
25 | 25 | * @author Stefan Winter <[email protected]> |
26 | 26 | * @package Core |
27 | 27 | */ |
28 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
28 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
29 | 29 | |
30 | 30 | $Gui = new \web\lib\user\Gui(); |
31 | 31 | // ... unless overwritten by direct GET/POST parameter in the request or a SESSION setting |
@@ -117,7 +117,7 @@ discard block |
||
117 | 117 | $cryptoJson = openssl_encrypt($clearJson, 'AES-256-CBC', $encryptionKey, OPENSSL_RAW_DATA, $initVector); |
118 | 118 | $hmac = hash_hmac("sha1", $cryptoJson, $encryptionKey, TRUE); |
119 | 119 | |
120 | - $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = " . $password . "\nb(IV) = " . base64_encode($initVector) . "\nb(Cipher) = " . base64_encode($cryptoJson) . "\nb(HMAC) = " . base64_encode($hmac)); |
|
120 | + $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = ".$password."\nb(IV) = ".base64_encode($initVector)."\nb(Cipher) = ".base64_encode($cryptoJson)."\nb(HMAC) = ".base64_encode($hmac)); |
|
121 | 121 | |
122 | 122 | // now, generate the container that holds all the crypto data |
123 | 123 | $finalArray = [ |
@@ -188,7 +188,7 @@ discard block |
||
188 | 188 | */ |
189 | 189 | private function wiredBlock($eapdetails) { |
190 | 190 | return [ |
191 | - "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet") . "}", |
|
191 | + "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet")."}", |
|
192 | 192 | "Name" => "eduroam configuration (wired network)", |
193 | 193 | "Remove" => false, |
194 | 194 | "Type" => "Ethernet", |
@@ -228,7 +228,7 @@ discard block |
||
228 | 228 | // if silverbullet, we deliver the client cert inline |
229 | 229 | |
230 | 230 | if ($selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) { |
231 | - $eaparray['ClientCertRef'] = "[" . $this->clientCert['GUID'] . "]"; |
|
231 | + $eaparray['ClientCertRef'] = "[".$this->clientCert['GUID']."]"; |
|
232 | 232 | $eaparray['ClientCertType'] = "Ref"; |
233 | 233 | } |
234 | 234 | |
@@ -261,7 +261,7 @@ discard block |
||
261 | 261 | $jsonArray = ["Type" => "UnencryptedConfiguration"]; |
262 | 262 | |
263 | 263 | foreach ($this->attributes['internal:CAs'][0] as $ca) { |
264 | - $caRefs[] = "{" . $ca['uuid'] . "}"; |
|
264 | + $caRefs[] = "{".$ca['uuid']."}"; |
|
265 | 265 | } |
266 | 266 | // define CA certificates |
267 | 267 | foreach ($this->attributes['internal:CAs'][0] as $ca) { |
@@ -271,15 +271,15 @@ discard block |
||
271 | 271 | if ($caSanitized1 === FALSE) { |
272 | 272 | throw new Exception("Error cropping PEM data at its BEGIN marker."); |
273 | 273 | } |
274 | - $this->loggerInstance->debug(4, $caSanitized1 . "\n"); |
|
274 | + $this->loggerInstance->debug(4, $caSanitized1."\n"); |
|
275 | 275 | // remove \n |
276 | 276 | $caSanitized = str_replace("\n", "", $caSanitized1); |
277 | - $jsonArray["Certificates"][] = ["GUID" => "{" . $ca['uuid'] . "}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized]; |
|
278 | - $this->loggerInstance->debug(3, $caSanitized . "\n"); |
|
277 | + $jsonArray["Certificates"][] = ["GUID" => "{".$ca['uuid']."}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized]; |
|
278 | + $this->loggerInstance->debug(3, $caSanitized."\n"); |
|
279 | 279 | } |
280 | 280 | // if we are doing silverbullet, include the unencrypted(!) P12 as a client certificate |
281 | 281 | if ($this->selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) { |
282 | - $jsonArray["Certificates"][] = ["GUID" => "[" . $this->clientCert['GUID'] . "]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"]; |
|
282 | + $jsonArray["Certificates"][] = ["GUID" => "[".$this->clientCert['GUID']."]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"]; |
|
283 | 283 | } |
284 | 284 | $eaparray = $this->eapBlock($caRefs); |
285 | 285 | // define Wi-Fi networks |
@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | |
301 | 301 | file_put_contents('installer_profile', $finalJson); |
302 | 302 | |
303 | - $fileName = $this->installerBasename . '.onc'; |
|
303 | + $fileName = $this->installerBasename.'.onc'; |
|
304 | 304 | |
305 | 305 | if (!$this->sign) { |
306 | 306 | rename("installer_profile", $fileName); |
@@ -311,7 +311,7 @@ discard block |
||
311 | 311 | // have the notion of signing |
312 | 312 | // but if they ever change their mind, we are prepared |
313 | 313 | |
314 | - $outputFromSigning = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
314 | + $outputFromSigning = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
315 | 315 | if ($outputFromSigning === FALSE) { |
316 | 316 | $this->loggerInstance->debug(2, "Signing the ONC installer $fileName FAILED!\n"); |
317 | 317 | } |
@@ -138,8 +138,8 @@ |
||
138 | 138 | */ |
139 | 139 | private function zipInstaller() { |
140 | 140 | // one can always access $this->attributes to check things |
141 | - $fileName = $this->installerBasename . '.zip'; |
|
142 | - $output = system('zip -q ' . $fileName . ' *'); |
|
141 | + $fileName = $this->installerBasename.'.zip'; |
|
142 | + $output = system('zip -q '.$fileName.' *'); |
|
143 | 143 | if ($output === FALSE) { |
144 | 144 | $this->loggerInstance->debug(2, "unable to zip the installer\n"); |
145 | 145 | } |
@@ -30,7 +30,7 @@ |
||
30 | 30 | final public function __construct() { |
31 | 31 | parent::__construct(); |
32 | 32 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_NONE]); |
33 | - $this->loggerInstance->debug(4,"RedirectEx called"); |
|
33 | + $this->loggerInstance->debug(4, "RedirectEx called"); |
|
34 | 34 | } |
35 | 35 | |
36 | 36 | /** |