Passed
Push — release_2_0 ( f088f0...711d83 )
by Tomasz
07:54
created
devices/ms/Device_Vista7.php 1 patch
Spacing   +32 added lines, -32 removed lines patch added patch discarded remove patch
@@ -71,7 +71,7 @@  discard block
 block discarded – undo
71 71
                 $delProfiles[] = $ssid;
72 72
             }
73 73
             if ($cipher == 'TKIP') {
74
-                $delProfiles[] = $ssid . ' (TKIP)';
74
+                $delProfiles[] = $ssid.' (TKIP)';
75 75
             }
76 76
         }
77 77
 
@@ -81,7 +81,7 @@  discard block
 block discarded – undo
81 81
             $iterator = 0;
82 82
             foreach ($allSSID as $ssid => $cipher) {
83 83
                 if ($cipher == 'TKIP') {
84
-                    $windowsProfile[$iterator] = $this->writeWLANprofile($ssid . ' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator);
84
+                    $windowsProfile[$iterator] = $this->writeWLANprofile($ssid.' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator);
85 85
                     $iterator++;
86 86
                 }
87 87
                 $windowsProfile[$iterator] = $this->writeWLANprofile($ssid, $ssid, 'WPA2', 'AES', $eapConfig, $iterator);
@@ -142,10 +142,10 @@  discard block
 block discarded – undo
142 142
         $profileFileCont = '<EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig">
143 143
 <EapMethod>
144 144
 <Type xmlns="http://www.microsoft.com/provisioning/EapCommon">' .
145
-                $this->selectedEap["OUTER"] . '</Type>
145
+                $this->selectedEap["OUTER"].'</Type>
146 146
 <VendorId xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorId>
147 147
 <VendorType xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorType>
148
-<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId . '</AuthorId>
148
+<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId.'</AuthorId>
149 149
 </EapMethod>
150 150
 ';
151 151
 
@@ -158,9 +158,9 @@  discard block
 block discarded – undo
158 158
             $profileFileCont .= '
159 159
 <Config xmlns="http://www.microsoft.com/provisioning/EapHostConfig">
160 160
 <EAPIdentityProviderList xmlns="urn:ietf:params:xml:ns:yang:ietf-eap-metadata">
161
-<EAPIdentityProvider ID="' . $this->deviceUUID . '" namespace="urn:UUID">
161
+<EAPIdentityProvider ID="' . $this->deviceUUID.'" namespace="urn:UUID">
162 162
 <ProviderInfo>
163
-<DisplayName>' . $this->translateString($attr['general:instname'][0], $this->codePage) . '</DisplayName>
163
+<DisplayName>' . $this->translateString($attr['general:instname'][0], $this->codePage).'</DisplayName>
164 164
 </ProviderInfo>
165 165
 <AuthenticationMethods>
166 166
 <AuthenticationMethod>
@@ -172,7 +172,7 @@  discard block
 block discarded – undo
172 172
                 if ($outerUser == '') {
173 173
                     $profileFileCont .= '<AnonymousIdentity>@</AnonymousIdentity>';
174 174
                 } else {
175
-                    $profileFileCont .= '<AnonymousIdentity>' . $outerUser . '@' . $realm . '</AnonymousIdentity>';
175
+                    $profileFileCont .= '<AnonymousIdentity>'.$outerUser.'@'.$realm.'</AnonymousIdentity>';
176 176
                 }
177 177
             }
178 178
             $profileFileCont .= '</ClientSideCredential>
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
             $profileFileCont .= '
191 191
 </ServerSideCredential>
192 192
 <InnerAuthenticationMethod>
193
-<NonEAPAuthMethod>' .$innerMethod. '</NonEAPAuthMethod>
193
+<NonEAPAuthMethod>' .$innerMethod.'</NonEAPAuthMethod>
194 194
 </InnerAuthenticationMethod>
195 195
 <VendorSpecific>
196 196
 <SessionResumption>false</SessionResumption>
@@ -215,11 +215,11 @@  discard block
 block discarded – undo
215 215
 </eapTls:CredentialsSource>
216 216
 <eapTls:ServerValidation>
217 217
 <eapTls:DisableUserPromptForServerValidation>true</eapTls:DisableUserPromptForServerValidation>
218
-<eapTls:ServerNames>' . $servers . '</eapTls:ServerNames>';
218
+<eapTls:ServerNames>' . $servers.'</eapTls:ServerNames>';
219 219
             if ($caArray) {
220 220
                 foreach ($caArray as $certAuthority) {
221 221
                     if ($certAuthority['root']) {
222
-                        $profileFileCont .= "<eapTls:TrustedRootCA>" . $certAuthority['sha1'] . "</eapTls:TrustedRootCA>\n";
222
+                        $profileFileCont .= "<eapTls:TrustedRootCA>".$certAuthority['sha1']."</eapTls:TrustedRootCA>\n";
223 223
                     }
224 224
                 }
225 225
             }
@@ -251,11 +251,11 @@  discard block
 block discarded – undo
251 251
 <msPeap:EapType>
252 252
 <msPeap:ServerValidation>
253 253
 <msPeap:DisableUserPromptForServerValidation>true</msPeap:DisableUserPromptForServerValidation> 
254
-<msPeap:ServerNames>' . $servers . '</msPeap:ServerNames>';
254
+<msPeap:ServerNames>' . $servers.'</msPeap:ServerNames>';
255 255
             if ($caArray) {
256 256
                 foreach ($caArray as $certAuthority) {
257 257
                     if ($certAuthority['root']) {
258
-                        $vistaExt .= "<msPeap:TrustedRootCA>" . $certAuthority['sha1'] . "</msPeap:TrustedRootCA>\n";
258
+                        $vistaExt .= "<msPeap:TrustedRootCA>".$certAuthority['sha1']."</msPeap:TrustedRootCA>\n";
259 259
                     }
260 260
                 }
261 261
             }
@@ -268,7 +268,7 @@  discard block
 block discarded – undo
268 268
 <msChapV2:UseWinLogonCredentials>false</msChapV2:UseWinLogonCredentials> 
269 269
 </msChapV2:EapType>
270 270
 </baseEap:Eap>
271
-<msPeap:EnableQuarantineChecks>' . $nea . '</msPeap:EnableQuarantineChecks>
271
+<msPeap:EnableQuarantineChecks>' . $nea.'</msPeap:EnableQuarantineChecks>
272 272
 <msPeap:RequireCryptoBinding>false</msPeap:RequireCryptoBinding>
273 273
 </msPeap:EapType>
274 274
 </baseEap:Eap>
@@ -280,11 +280,11 @@  discard block
 block discarded – undo
280 280
 <EapType xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV1">
281 281
 <ServerValidation>
282 282
 <DisableUserPromptForServerValidation>true</DisableUserPromptForServerValidation>
283
-<ServerNames>' . $servers . '</ServerNames>';
283
+<ServerNames>' . $servers.'</ServerNames>';
284 284
             if ($caArray) {
285 285
                 foreach ($caArray as $certAuthority) {
286 286
                     if ($certAuthority['root']) {
287
-                        $w7Ext .= "<TrustedRootCA>" . $certAuthority['sha1'] . "</TrustedRootCA>\n";
287
+                        $w7Ext .= "<TrustedRootCA>".$certAuthority['sha1']."</TrustedRootCA>\n";
288 288
                     }
289 289
                 }
290 290
             }
@@ -297,14 +297,14 @@  discard block
 block discarded – undo
297 297
 <UseWinLogonCredentials>false</UseWinLogonCredentials> 
298 298
 </EapType>
299 299
 </Eap>
300
-<EnableQuarantineChecks>' . $nea . '</EnableQuarantineChecks>
300
+<EnableQuarantineChecks>' . $nea.'</EnableQuarantineChecks>
301 301
 <RequireCryptoBinding>false</RequireCryptoBinding>
302 302
 ';
303 303
             if ($useAnon) {
304 304
                 $w7Ext .= '<PeapExtensions>
305 305
 <IdentityPrivacy xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV2">
306 306
 <EnableIdentityPrivacy>true</EnableIdentityPrivacy>
307
-<AnonymousUserName>' . $outerUser . '</AnonymousUserName>
307
+<AnonymousUserName>' . $outerUser.'</AnonymousUserName>
308 308
 </IdentityPrivacy>
309 309
 </PeapExtensions>
310 310
             ';
@@ -322,8 +322,8 @@  discard block
 block discarded – undo
322 322
         $profileFileContEnd = '</EapHostConfig></EAPConfig>
323 323
 ';
324 324
         $returnArray = [];
325
-        $returnArray['vista'] = $profileFileCont . $vistaExt . $profileFileContEnd;
326
-        $returnArray['w7'] = $profileFileCont . $w7Ext . $profileFileContEnd;
325
+        $returnArray['vista'] = $profileFileCont.$vistaExt.$profileFileContEnd;
326
+        $returnArray['w7'] = $profileFileCont.$w7Ext.$profileFileContEnd;
327 327
         return $returnArray;
328 328
     }
329 329
 
@@ -342,10 +342,10 @@  discard block
 block discarded – undo
342 342
     private function writeWLANprofile($wlanProfileName, $ssid, $auth, $encryption, $eapConfig, $profileNumber) {
343 343
         $profileFileCont = '<?xml version="1.0"?>
344 344
 <WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1">
345
-<name>' . $wlanProfileName . '</name>
345
+<name>' . $wlanProfileName.'</name>
346 346
 <SSIDConfig>
347 347
 <SSID>
348
-<name>' . $ssid . '</name>
348
+<name>' . $ssid.'</name>
349 349
 </SSID>
350 350
 <nonBroadcast>true</nonBroadcast>
351 351
 </SSIDConfig>
@@ -355,8 +355,8 @@  discard block
 block discarded – undo
355 355
 <MSM>
356 356
 <security>
357 357
 <authEncryption>
358
-<authentication>' . $auth . '</authentication>
359
-<encryption>' . $encryption . '</encryption>
358
+<authentication>' . $auth.'</authentication>
359
+<encryption>' . $encryption.'</encryption>
360 360
 <useOneX>true</useOneX>
361 361
 </authEncryption>
362 362
 ';
@@ -386,9 +386,9 @@  discard block
 block discarded – undo
386 386
             mkdir('vista');
387 387
         }
388 388
         $vistaFileName = "vista/wlan_prof-$profileNumber.xml";
389
-        file_put_contents($vistaFileName, $profileFileCont . $eapConfig['vista'] . $closing);
389
+        file_put_contents($vistaFileName, $profileFileCont.$eapConfig['vista'].$closing);
390 390
         $sevenFileName = "w7/wlan_prof-$profileNumber.xml";
391
-        file_put_contents($sevenFileName, $profileFileCont . $eapConfig['w7'] . $closing);
391
+        file_put_contents($sevenFileName, $profileFileCont.$eapConfig['w7'].$closing);
392 392
         $this->loggerInstance->debug(2, "Installer has been written into directory $this->FPATH\n");
393 393
         $this->loggerInstance->debug(4, "WLAN_Profile:$wlanProfileName:$encryption\n");
394 394
         return("\"$wlanProfileName\" \"$encryption\"");
@@ -424,8 +424,8 @@  discard block
 block discarded – undo
424 424
             mkdir('vista');
425 425
         }
426 426
         
427
-        file_put_contents("vista/lan_prof.xml", $profileFileCont . $eapConfig['vista'] . $closing);
428
-        file_put_contents("w7/lan_prof.xml", $profileFileCont . $eapConfig['w7'] . $closing);
427
+        file_put_contents("vista/lan_prof.xml", $profileFileCont.$eapConfig['vista'].$closing);
428
+        file_put_contents("w7/lan_prof.xml", $profileFileCont.$eapConfig['w7'].$closing);
429 429
         
430 430
     }
431 431
 
@@ -439,7 +439,7 @@  discard block
 block discarded – undo
439 439
     private function writeMainNSH($eap, $attr) {
440 440
         $this->loggerInstance->debug(4, "writeMainNSH");
441 441
         $this->loggerInstance->debug(4, $attr);
442
-        $this->loggerInstance->debug(4, "MYLANG=" . $this->lang . "\n");
442
+        $this->loggerInstance->debug(4, "MYLANG=".$this->lang."\n");
443 443
 
444 444
         $eapOptions = [
445 445
             \core\common\EAP::PEAP => ['str' => 'PEAP', 'exec' => 'user'],
@@ -470,8 +470,8 @@  discard block
 block discarded – undo
470 470
         $this->loggerInstance->debug(4, "EAP_STR=$eapStr\n");
471 471
         $this->loggerInstance->debug(4, $eap);
472 472
 
473
-        $fcontents .= '!define ' . $eapStr;
474
-        $fcontents .= "\n" . '!define EXECLEVEL "' . $execLevel . '"';
473
+        $fcontents .= '!define '.$eapStr;
474
+        $fcontents .= "\n".'!define EXECLEVEL "'.$execLevel.'"';
475 475
         $fcontents .= $this->writeNsisDefines($attr);
476 476
         file_put_contents('main.nsh', $fcontents);
477 477
     }
@@ -500,7 +500,7 @@  discard block
 block discarded – undo
500 500
         }
501 501
         foreach ($caArray as $certAuthority) {
502 502
             $store = $certAuthority['root'] ? "root" : "ca";
503
-            $contentCerts .= '!insertmacro install_ca_cert "' . $certAuthority['file'] . '" "' . $certAuthority['sha1'] . '" "' . $store . "\"\n";
503
+            $contentCerts .= '!insertmacro install_ca_cert "'.$certAuthority['file'].'" "'.$certAuthority['sha1'].'" "'.$store."\"\n";
504 504
         }
505 505
         fwrite($fileHandleCerts, $contentCerts);
506 506
         fclose($fileHandleCerts);
@@ -515,7 +515,7 @@  discard block
 block discarded – undo
515 515
      */
516 516
     private function copyFiles($eap) {
517 517
         $this->loggerInstance->debug(4, "copyFiles start\n");
518
-        $this->loggerInstance->debug(4, "code_page=" . $this->codePage . "\n");
518
+        $this->loggerInstance->debug(4, "code_page=".$this->codePage."\n");
519 519
         $this->copyBasicFiles();
520 520
 
521 521
         switch ($eap["OUTER"]) {
Please login to merge, or discard this patch.
devices/chromebook/Device_chromebook.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -117,7 +117,7 @@  discard block
 block discarded – undo
117 117
         $cryptoJson = openssl_encrypt($clearJson, 'AES-256-CBC', $encryptionKey, OPENSSL_RAW_DATA, $initVector);
118 118
         $hmac = hash_hmac("sha1", $cryptoJson, $encryptionKey, TRUE);
119 119
 
120
-        $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = " . $password . "\nb(IV) = " . base64_encode($initVector) . "\nb(Cipher) = " . base64_encode($cryptoJson) . "\nb(HMAC) = " . base64_encode($hmac));
120
+        $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = ".$password."\nb(IV) = ".base64_encode($initVector)."\nb(Cipher) = ".base64_encode($cryptoJson)."\nb(HMAC) = ".base64_encode($hmac));
121 121
 
122 122
         // now, generate the container that holds all the crypto data
123 123
         $finalArray = [
@@ -188,7 +188,7 @@  discard block
 block discarded – undo
188 188
      */
189 189
     private function wiredBlock($eapdetails) {
190 190
         return [
191
-            "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet") . "}",
191
+            "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet")."}",
192 192
             "Name" => "eduroam configuration (wired network)",
193 193
             "Remove" => false,
194 194
             "Type" => "Ethernet",
@@ -228,7 +228,7 @@  discard block
 block discarded – undo
228 228
         // if silverbullet, we deliver the client cert inline
229 229
 
230 230
         if ($selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) {
231
-            $eaparray['ClientCertRef'] = "[" . $this->clientCert['GUID'] . "]";
231
+            $eaparray['ClientCertRef'] = "[".$this->clientCert['GUID']."]";
232 232
             $eaparray['ClientCertType'] = "Ref";
233 233
         }
234 234
 
@@ -261,7 +261,7 @@  discard block
 block discarded – undo
261 261
         $jsonArray = ["Type" => "UnencryptedConfiguration"];
262 262
 
263 263
         foreach ($this->attributes['internal:CAs'][0] as $ca) {
264
-            $caRefs[] = "{" . $ca['uuid'] . "}";
264
+            $caRefs[] = "{".$ca['uuid']."}";
265 265
         }
266 266
         // define CA certificates
267 267
         foreach ($this->attributes['internal:CAs'][0] as $ca) {
@@ -271,15 +271,15 @@  discard block
 block discarded – undo
271 271
             if ($caSanitized1 === FALSE) {
272 272
                 throw new Exception("Error cropping PEM data at its BEGIN marker.");
273 273
             }
274
-            $this->loggerInstance->debug(4, $caSanitized1 . "\n");
274
+            $this->loggerInstance->debug(4, $caSanitized1."\n");
275 275
             // remove \n
276 276
             $caSanitized = str_replace("\n", "", $caSanitized1);
277
-            $jsonArray["Certificates"][] = ["GUID" => "{" . $ca['uuid'] . "}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized];
278
-            $this->loggerInstance->debug(3, $caSanitized . "\n");
277
+            $jsonArray["Certificates"][] = ["GUID" => "{".$ca['uuid']."}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized];
278
+            $this->loggerInstance->debug(3, $caSanitized."\n");
279 279
         }
280 280
         // if we are doing silverbullet, include the unencrypted(!) P12 as a client certificate
281 281
         if ($this->selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) {
282
-            $jsonArray["Certificates"][] = ["GUID" => "[" . $this->clientCert['GUID'] . "]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"];
282
+            $jsonArray["Certificates"][] = ["GUID" => "[".$this->clientCert['GUID']."]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"];
283 283
         }
284 284
         $eaparray = $this->eapBlock($caRefs);
285 285
         // define Wi-Fi networks
@@ -300,7 +300,7 @@  discard block
 block discarded – undo
300 300
 
301 301
         file_put_contents('installer_profile', $finalJson);
302 302
 
303
-        $fileName = $this->installerBasename . '.onc';
303
+        $fileName = $this->installerBasename.'.onc';
304 304
 
305 305
         if (!$this->sign) {
306 306
             rename("installer_profile", $fileName);
@@ -311,7 +311,7 @@  discard block
 block discarded – undo
311 311
         // have the notion of signing
312 312
         // but if they ever change their mind, we are prepared
313 313
 
314
-        $outputFromSigning = system($this->sign . " installer_profile '$fileName' > /dev/null");
314
+        $outputFromSigning = system($this->sign." installer_profile '$fileName' > /dev/null");
315 315
         if ($outputFromSigning === FALSE) {
316 316
             $this->loggerInstance->debug(2, "Signing the ONC installer $fileName FAILED!\n");
317 317
         }
Please login to merge, or discard this patch.
devices/xml/XML.inc.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -118,7 +118,7 @@  discard block
 block discarded – undo
118 118
         if (is_scalar($value)) {
119 119
             $this->value = strval($value);
120 120
         } else {
121
-            throw new Exception("unexpected value type passed" . gettype($value));
121
+            throw new Exception("unexpected value type passed".gettype($value));
122 122
         }
123 123
     }
124 124
 
@@ -434,7 +434,7 @@  discard block
 block discarded – undo
434 434
     $qualClassName = get_class($object);
435 435
     // remove namespace qualifier
436 436
     $pos = strrpos($qualClassName, '\\');
437
-    $className =  substr($qualClassName, $pos + 1);
437
+    $className = substr($qualClassName, $pos + 1);
438 438
     $name = preg_replace("/_/", "-", $className);
439 439
     if ($object->getValue()) {
440 440
         $val = preg_replace('/&/', '&amp;', $object->getValue());
Please login to merge, or discard this patch.
devices/xml/Device_XML.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -31,7 +31,7 @@  discard block
 block discarded – undo
31 31
  */
32 32
 namespace devices\xml;
33 33
 use Exception;
34
-require_once dirname(__FILE__) . '/XML.inc.php';
34
+require_once dirname(__FILE__).'/XML.inc.php';
35 35
 
36 36
 /**
37 37
  * This class implements full functionality of the generic XML device
@@ -132,11 +132,11 @@  discard block
 block discarded – undo
132 132
         marshalObject($root, $eapIdp);
133 133
         $dom = dom_import_simplexml($root)->ownerDocument;
134 134
         //TODO schema validation makes sense so probably should be used
135
-        if ($dom->schemaValidate(ROOT . '/devices/xml/eap-metadata.xsd') === FALSE) {
135
+        if ($dom->schemaValidate(ROOT.'/devices/xml/eap-metadata.xsd') === FALSE) {
136 136
             throw new Exception("Schema validation failed for eap-metadata");
137 137
         }
138
-        file_put_contents($this->installerBasename . '.eap-config', $dom->saveXML());
139
-        return($this->installerBasename . '.eap-config');
138
+        file_put_contents($this->installerBasename.'.eap-config', $dom->saveXML());
139
+        return($this->installerBasename.'.eap-config');
140 140
     }
141 141
 
142 142
     private $AttributeNames = [
@@ -162,7 +162,7 @@  discard block
 block discarded – undo
162 162
             $this->loggerInstance->debug(4, "Missing class definition for $attrName\n");
163 163
             return([]);
164 164
         }
165
-        $className = "\devices\xml\\" . $this->AttributeNames[$attrName];
165
+        $className = "\devices\xml\\".$this->AttributeNames[$attrName];
166 166
         $objs = [];
167 167
         if ($this->langScope === 'global') {
168 168
             foreach ($attributeList['langs'] as $language => $value) {
@@ -200,7 +200,7 @@  discard block
 block discarded – undo
200 200
                 $displayname = new DisplayName();
201 201
                 if (isset($profileNameLangs)) {
202 202
                     $langOrC = isset($profileNameLangs[$language]) ? $profileNameLangs[$language] : $profileNameLangs['C'];
203
-                    $value .= ' - ' . $langOrC;
203
+                    $value .= ' - '.$langOrC;
204 204
                 }
205 205
                 $displayname->setValue($value);
206 206
                 $displayname->setAttributes(['lang' => $language]);
@@ -210,7 +210,7 @@  discard block
 block discarded – undo
210 210
             $displayname = new DisplayName();
211 211
             $value = $attr['general:instname'][0];
212 212
             if ($attr['internal:profile_count'][0] > 1) {
213
-                $value .= ' - ' . $attr['profile:name'][0];
213
+                $value .= ' - '.$attr['profile:name'][0];
214 214
             }
215 215
             $displayname->setValue($value);
216 216
             $objs[] = $displayname;
@@ -227,7 +227,7 @@  discard block
 block discarded – undo
227 227
         $attr = $this->attributes;
228 228
         if (isset($attr['general:logo_file'][0])) {
229 229
             $logoString = base64_encode($attr['general:logo_file'][0]);
230
-            $logoMime = 'image/' . $attr['internal:logo_file'][0]['mime'];
230
+            $logoMime = 'image/'.$attr['internal:logo_file'][0]['mime'];
231 231
             $providerlogo = new ProviderLogo();
232 232
             $providerlogo->setAttributes(['mime' => $logoMime, 'encoding' => 'base64']);
233 233
             $providerlogo->setValue($logoString);
@@ -327,7 +327,7 @@  discard block
 block discarded – undo
327 327
 
328 328
         if (isset($inner["METHOD"]) && $inner["METHOD"]) {
329 329
             $innerauthmethod = new InnerAuthenticationMethod();
330
-            $typeOfInner = "\devices\xml\\" . ($inner["EAP"] ? 'EAPMethod' : 'NonEAPAuthMethod');
330
+            $typeOfInner = "\devices\xml\\".($inner["EAP"] ? 'EAPMethod' : 'NonEAPAuthMethod');
331 331
             $eapmethod = new $typeOfInner();
332 332
             $eaptype = new Type();
333 333
             $eaptype->setValue($inner['METHOD']);
@@ -364,7 +364,7 @@  discard block
 block discarded – undo
364 364
         return($serversidecredential);
365 365
     }
366 366
     
367
-    private function setClientSideRealm ($clientsidecredential) {
367
+    private function setClientSideRealm($clientsidecredential) {
368 368
         $attr = $this->attributes;
369 369
         $realm = \core\common\Entity::getAttributeValue($attr, 'internal:realm', 0);
370 370
         if ($realm === NULL) {
Please login to merge, or discard this patch.
devices/redirect_dev/Device_RedirectDev.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -30,7 +30,7 @@
 block discarded – undo
30 30
     final public function __construct() {
31 31
         parent::__construct();
32 32
       $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_NONE]);
33
-      $this->loggerInstance->debug(4,"RedirectEx called");
33
+      $this->loggerInstance->debug(4, "RedirectEx called");
34 34
     }
35 35
     
36 36
     /**
Please login to merge, or discard this patch.
devices/test_module/Device_TestModule.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -138,8 +138,8 @@
 block discarded – undo
138 138
      */
139 139
     private function zipInstaller() {
140 140
         // one can always access $this->attributes to check things
141
-        $fileName = $this->installerBasename . '.zip';
142
-        $output = system('zip -q ' . $fileName . ' *');
141
+        $fileName = $this->installerBasename.'.zip';
142
+        $output = system('zip -q '.$fileName.' *');
143 143
         if ($output === FALSE) {
144 144
             $this->loggerInstance->debug(2, "unable to zip the installer\n");
145 145
         }
Please login to merge, or discard this patch.
devices/linux/Device_Linux.php 1 patch
Spacing   +21 added lines, -21 removed lines patch added patch discarded remove patch
@@ -54,9 +54,9 @@  discard block
 block discarded – undo
54 54
      *
55 55
      */
56 56
     public function writeInstaller() {
57
-        $installerPath = $this->installerBasename . ".py";
57
+        $installerPath = $this->installerBasename.".py";
58 58
         $this->copyFile("main.py", $installerPath);
59
-        $installer = fopen($installerPath,"a");
59
+        $installer = fopen($installerPath, "a");
60 60
         if ($installer === FALSE) {
61 61
             throw new Exception("Unable to open installer file for writing!");
62 62
         }
@@ -83,9 +83,9 @@  discard block
 block discarded – undo
83 83
         $out .= "<p>";
84 84
         if ($ssidCount > 1) {
85 85
             if ($ssidCount > 2) {
86
-                $out .= sprintf(_("In addition to <strong>%s</strong> the installer will also configure access to the following networks:"), implode(', ', CONFIG_CONFASSISTANT['CONSORTIUM']['ssid'])) . " ";
86
+                $out .= sprintf(_("In addition to <strong>%s</strong> the installer will also configure access to the following networks:"), implode(', ', CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']))." ";
87 87
             } else {
88
-                $out .= sprintf(_("In addition to <strong>%s</strong> the installer will also configure access to:"), implode(', ', CONFIG_CONFASSISTANT['CONSORTIUM']['ssid'])) . " ";
88
+                $out .= sprintf(_("In addition to <strong>%s</strong> the installer will also configure access to:"), implode(', ', CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']))." ";
89 89
             }
90 90
             $iterator = 0;
91 91
             foreach ($this->attributes['internal:SSID'] as $ssid => $v) {
@@ -123,8 +123,8 @@  discard block
 block discarded – undo
123 123
      * @return void
124 124
      */
125 125
     private function writeConfigLine($file, $prefix, $name, $text) {
126
-        $out = $prefix . $name . ' = "' . $text;
127
-        fwrite($file, wordwrap($out, 70, " \" \\\n    \"") . "\n");
126
+        $out = $prefix.$name.' = "'.$text;
127
+        fwrite($file, wordwrap($out, 70, " \" \\\n    \"")."\n");
128 128
     }
129 129
     
130 130
     /**
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
         'user_cert_missing' => _("personal certificate file not found"),
164 164
         ];
165 165
         foreach ($messages as $name => $value) {
166
-            $this->writeConfigLine($file, 'Messages.', $name, $value . '"');
166
+            $this->writeConfigLine($file, 'Messages.', $name, $value.'"');
167 167
         }
168 168
         \core\common\Entity::outOfThePotatoes();
169 169
     }
@@ -207,39 +207,39 @@  discard block
 block discarded – undo
207 207
         }
208 208
 
209 209
         if ($outerId !== NULL) {
210
-            $configRaw['anonymous_identity'] = '"' . $outerId . '"';
210
+            $configRaw['anonymous_identity'] = '"'.$outerId.'"';
211 211
         }
212 212
 
213 213
         if (!empty($this->attributes['internal:realm'][0])) {
214 214
            $config['user_realm'] = $this->attributes['internal:realm'][0];
215 215
         }
216 216
         
217
-        if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) {
217
+        if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) {
218 218
             $configRaw['hint_user_input'] = "True";
219 219
         }
220 220
         
221
-        if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) {
221
+        if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) {
222 222
             $configRaw['verify_user_realm_input'] = "True";
223 223
         }
224 224
         
225 225
         foreach ($config as $name => $value) {
226
-            $this->writeConfigLine($file, 'Config.', $name, $value . '"');
226
+            $this->writeConfigLine($file, 'Config.', $name, $value.'"');
227 227
         }
228 228
         
229 229
         foreach ($configRaw as $name => $value) {
230
-            fwrite($file, 'Config.' . $name . ' = ' . $value . "\n");
230
+            fwrite($file, 'Config.'.$name.' = '.$value."\n");
231 231
         }
232 232
         
233 233
         if ($tou === '') {
234
-            fwrite($file, 'Config.tou = ""' . "\n");
234
+            fwrite($file, 'Config.tou = ""'."\n");
235 235
         } else {
236
-            fwrite($file, 'Config.tou = """' . $tou . '"""' . "\n");
236
+            fwrite($file, 'Config.tou = """'.$tou.'"""'."\n");
237 237
         }
238 238
         
239
-        fwrite($file, 'Config.CA = """' . $this->mkCAfile() . '"""' . "\n");
239
+        fwrite($file, 'Config.CA = """'.$this->mkCAfile().'"""'."\n");
240 240
         $sbUserFile = $this->mkSbUserFile();
241 241
         if ($sbUserFile !== '') {
242
-            fwrite($file, 'Config.sb_user_file = """' . $sbUserFile . '"""' . "\n");
242
+            fwrite($file, 'Config.sb_user_file = """'.$sbUserFile.'"""'."\n");
243 243
         }
244 244
     }
245 245
 
@@ -291,7 +291,7 @@  discard block
 block discarded – undo
291 291
             }
292 292
             $out .= "'DNS:$oneServer'";
293 293
         }
294
-        return "[" . $out. "]";
294
+        return "[".$out."]";
295 295
     }
296 296
 
297 297
     /**
@@ -305,7 +305,7 @@  discard block
 block discarded – undo
305 305
         foreach ($ssids as $ssid => $cipher) {
306 306
             $outArray[] = "'$ssid'";
307 307
         }
308
-        return '[' . implode(', ', $outArray) . ']';
308
+        return '['.implode(', ', $outArray).']';
309 309
     }
310 310
     
311 311
     /**
@@ -321,7 +321,7 @@  discard block
 block discarded – undo
321 321
                 $outArray[] = "'$ssid'";
322 322
             }
323 323
         }
324
-        return '[' . implode(', ', $outArray) . ']';
324
+        return '['.implode(', ', $outArray).']';
325 325
     }
326 326
     
327 327
     /**
@@ -329,7 +329,7 @@  discard block
 block discarded – undo
329 329
      * 
330 330
      * @return string
331 331
      */
332
-    private function mkCAfile(){
332
+    private function mkCAfile() {
333 333
         $out = '';
334 334
         $cAlist = $this->attributes['internal:CAs'][0];
335 335
         foreach ($cAlist as $oneCa) {
@@ -345,7 +345,7 @@  discard block
 block discarded – undo
345 345
      */
346 346
     private function mkIntro() {
347 347
         \core\common\Entity::intoThePotatoes();
348
-        $out = _("This installer has been prepared for {0}") . '\n\n' . _("More information and comments:") . '\n\nEMAIL: {1}\nWWW: {2}\n\n' .
348
+        $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n'.
349 349
             _("Installer created with software from the GEANT project.");
350 350
         \core\common\Entity::outOfThePotatoes();
351 351
         return $out;
Please login to merge, or discard this patch.
web/index.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -25,7 +25,7 @@
 block discarded – undo
25 25
  * @author Stefan Winter <[email protected]>
26 26
  * @package Core
27 27
  */
28
-require_once dirname(dirname(__FILE__)) . "/config/_config.php";
28
+require_once dirname(dirname(__FILE__))."/config/_config.php";
29 29
 
30 30
 $Gui = new \web\lib\user\Gui();
31 31
 // ... unless overwritten by direct GET/POST parameter in the request or a SESSION setting
Please login to merge, or discard this patch.
core/SilverbulletCertificate.php 1 patch
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -155,7 +155,7 @@  discard block
 block discarded – undo
155 155
         $invitationObject = new SilverbulletInvitation($token);
156 156
         $profile = new ProfileSilverbullet($invitationObject->profile);
157 157
         $inst = new IdP($profile->institution);
158
-        $loggerInstance->debug(5, "tokenStatus: done, got " . $invitationObject->invitationTokenStatus . ", " . $invitationObject->profile . ", " . $invitationObject->userId . ", " . $invitationObject->expiry . ", " . $invitationObject->invitationTokenString . "\n");
158
+        $loggerInstance->debug(5, "tokenStatus: done, got ".$invitationObject->invitationTokenStatus.", ".$invitationObject->profile.", ".$invitationObject->userId.", ".$invitationObject->expiry.", ".$invitationObject->invitationTokenString."\n");
159 159
         if ($invitationObject->invitationTokenStatus != SilverbulletInvitation::SB_TOKENSTATUS_VALID && $invitationObject->invitationTokenStatus != SilverbulletInvitation::SB_TOKENSTATUS_PARTIALLY_REDEEMED) {
160 160
             throw new Exception("Attempt to generate a SilverBullet installer with an invalid/redeemed/expired token. The user should never have gotten that far!");
161 161
         }
@@ -168,12 +168,12 @@  discard block
 block discarded – undo
168 168
             throw new Exception("Despite a valid token, the corresponding user was not found in database or database query error!");
169 169
         }
170 170
         $expiryObject = mysqli_fetch_object(/** @scrutinizer ignore-type */ $userrow);
171
-        $loggerInstance->debug(5, "EXP: " . $expiryObject->expiry . "\n");
171
+        $loggerInstance->debug(5, "EXP: ".$expiryObject->expiry."\n");
172 172
         $expiryDateObject = date_create_from_format("Y-m-d H:i:s", $expiryObject->expiry);
173 173
         if ($expiryDateObject === FALSE) {
174 174
             throw new Exception("The expiry date we got from the DB is bogus!");
175 175
         }
176
-        $loggerInstance->debug(5, $expiryDateObject->format("Y-m-d H:i:s") . "\n");
176
+        $loggerInstance->debug(5, $expiryDateObject->format("Y-m-d H:i:s")."\n");
177 177
         // date_create with no parameters can't fail, i.e. is never FALSE
178 178
         $validity = date_diff(/** @scrutinizer ignore-type */ date_create(), $expiryDateObject);
179 179
         $expiryDays = $validity->days + 1;
@@ -222,7 +222,7 @@  discard block
 block discarded – undo
222 222
         $certString = "";
223 223
         openssl_x509_export($cert, $certString);
224 224
         $parsedCert = $x509->processCertificate($certString);
225
-        $loggerInstance->debug(5, "CERTINFO: " . print_r($parsedCert['full_details'], true));
225
+        $loggerInstance->debug(5, "CERTINFO: ".print_r($parsedCert['full_details'], true));
226 226
         $realExpiryDate = date_create_from_format("U", $parsedCert['full_details']['validTo_time_t'])->format("Y-m-d H:i:s");
227 227
 
228 228
         // store new cert info in DB
@@ -280,26 +280,26 @@  discard block
 block discarded – undo
280 280
                 $cat = new CAT();
281 281
                 $tempdirArray = $cat->createTemporaryDirectory("test");
282 282
                 $tempdir = $tempdirArray['dir'];
283
-                $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
284
-                $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
283
+                $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
284
+                $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
285 285
                 $serialHex = strtoupper(dechex($this->serial));
286 286
                 if (strlen($serialHex) % 2 == 1) {
287
-                    $serialHex = "0" . $serialHex;
287
+                    $serialHex = "0".$serialHex;
288 288
                 }
289 289
 
290
-                $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . CONFIG_CONFASSISTANT['CONSORTIUM']['name'] . "/OU=$federation/CN=$this->username\n";
290
+                $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".CONFIG_CONFASSISTANT['CONSORTIUM']['name']."/OU=$federation/CN=$this->username\n";
291 291
                 $logHandle->debug(4, "index.txt contents-to-be: $indexStatement");
292
-                if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
292
+                if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
293 293
                     $logHandle->debug(1, "Unable to write openssl index.txt file for revocation handling!");
294 294
                 }
295 295
                 // index.txt.attr is dull but needs to exist
296
-                file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
296
+                file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
297 297
                 // call "openssl ocsp" to manufacture our own OCSP statement
298 298
                 // adding "-rmd sha1" to the following command-line makes the
299 299
                 // choice of signature algorithm for the response explicit
300 300
                 // but it's only available from openssl-1.1.0 (which we do not
301 301
                 // want to require just for that one thing).
302
-                $execCmd = CONFIG['PATHS']['openssl'] . " ocsp -issuer " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rsigner " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rkey " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".key -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
302
+                $execCmd = CONFIG['PATHS']['openssl']." ocsp -issuer ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rsigner ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rkey ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".key -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
303 303
                 $logHandle->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
304 304
                 $output = [];
305 305
                 $return = 999;
@@ -307,11 +307,11 @@  discard block
 block discarded – undo
307 307
                 if ($return !== 0) {
308 308
                     throw new Exception("Non-zero return value from openssl ocsp!");
309 309
                 }
310
-                $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
310
+                $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
311 311
                 // remove the temp dir!
312
-                unlink($tempdir . "/$serialHex.response.der");
313
-                unlink($tempdir . "/index.txt.attr");
314
-                unlink($tempdir . "/index.txt");
312
+                unlink($tempdir."/$serialHex.response.der");
313
+                unlink($tempdir."/index.txt.attr");
314
+                unlink($tempdir."/index.txt");
315 315
                 rmdir($tempdir);
316 316
                 break;
317 317
             default:
@@ -365,7 +365,7 @@  discard block
 block discarded – undo
365 365
         $username = "";
366 366
         while ($usernameIsUnique === FALSE) {
367 367
             $usernameLocalPart = common\Entity::randomString(64 - 1 - strlen($realm), "0123456789abcdefghijklmnopqrstuvwxyz");
368
-            $username = $usernameLocalPart . "@" . $realm;
368
+            $username = $usernameLocalPart."@".$realm;
369 369
             $uniquenessQuery = $databaseHandle->exec("SELECT cn from silverbullet_certificate WHERE cn = ?", "s", $username);
370 370
             // SELECT -> resource, not boolean
371 371
             if (mysqli_num_rows(/** @scrutinizer ignore-type */ $uniquenessQuery) == 0) {
@@ -417,10 +417,10 @@  discard block
 block discarded – undo
417 417
         $databaseHandle = DBConnection::handle("INST");
418 418
         switch (CONFIG_CONFASSISTANT['SILVERBULLET']['CA']['type']) {
419 419
             case "embedded":
420
-                $rootCaPem = file_get_contents(ROOT . "/config/SilverbulletClientCerts/rootca-$certtype.pem");
421
-                $issuingCaPem = file_get_contents(ROOT . "/config/SilverbulletClientCerts/real-$certtype.pem");
420
+                $rootCaPem = file_get_contents(ROOT."/config/SilverbulletClientCerts/rootca-$certtype.pem");
421
+                $issuingCaPem = file_get_contents(ROOT."/config/SilverbulletClientCerts/real-$certtype.pem");
422 422
                 $issuingCa = openssl_x509_read($issuingCaPem);
423
-                $issuingCaKey = openssl_pkey_get_private("file://" . ROOT . "/config/SilverbulletClientCerts/real-$certtype.key");
423
+                $issuingCaKey = openssl_pkey_get_private("file://".ROOT."/config/SilverbulletClientCerts/real-$certtype.key");
424 424
                 $nonDupSerialFound = FALSE;
425 425
                 do {
426 426
                     $serial = random_int(1000000000, PHP_INT_MAX);
@@ -442,7 +442,7 @@  discard block
 block discarded – undo
442 442
                         throw new Exception("Unknown cert type!");
443 443
                 }
444 444
                 return [
445
-                    "CERT" => openssl_csr_sign($csr, $issuingCa, $issuingCaKey, $expiryDays, ['digest_alg' => $alg, 'config' => dirname(__DIR__) . "/config/SilverbulletClientCerts/openssl-$certtype.cnf"], $serial),
445
+                    "CERT" => openssl_csr_sign($csr, $issuingCa, $issuingCaKey, $expiryDays, ['digest_alg' => $alg, 'config' => dirname(__DIR__)."/config/SilverbulletClientCerts/openssl-$certtype.cnf"], $serial),
446 446
                     "SERIAL" => $serial,
447 447
                     "ISSUER" => $issuingCaPem,
448 448
                     "ROOT" => $rootCaPem,
Please login to merge, or discard this patch.