@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | protected function setSupportedEapMethods($eapArray) |
87 | 87 | { |
88 | 88 | $this->supportedEapMethods = $eapArray; |
89 | - $this->loggerInstance->debug(4, "This device (" . __CLASS__ . ") supports the following EAP methods: "); |
|
89 | + $this->loggerInstance->debug(4, "This device (".__CLASS__.") supports the following EAP methods: "); |
|
90 | 90 | $this->loggerInstance->debug(4, $this->supportedEapMethods); |
91 | 91 | } |
92 | 92 | |
@@ -460,7 +460,7 @@ discard block |
||
460 | 460 | return $baseName.$inst.'-'.$prof; |
461 | 461 | } |
462 | 462 | } |
463 | - return $baseName . $inst; |
|
463 | + return $baseName.$inst; |
|
464 | 464 | } |
465 | 465 | |
466 | 466 | /** |
@@ -590,7 +590,7 @@ discard block |
||
590 | 590 | // only add network blocks if their respective condition is met in this profile |
591 | 591 | if ($netDetails['condition'] === TRUE || (isset($this->attributes[$netDetails['condition']]) && $this->attributes[$netDetails['condition']] === TRUE)) { |
592 | 592 | $networks[$netName] = $netDetails; |
593 | - $this->loggerInstance->debug(5,$netName, "\nAdding network: "); |
|
593 | + $this->loggerInstance->debug(5, $netName, "\nAdding network: "); |
|
594 | 594 | } |
595 | 595 | } |
596 | 596 | // add locally defined SSIDs |
@@ -17,9 +17,9 @@ discard block |
||
17 | 17 | class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface |
18 | 18 | { |
19 | 19 | |
20 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
20 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
23 | 23 | private const EDUPKI_RA_ID = 700; |
24 | 24 | private const EDUPKI_CERT_PROFILE = "User SOAP"; |
25 | 25 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -35,13 +35,13 @@ discard block |
||
35 | 35 | parent::__construct(); |
36 | 36 | |
37 | 37 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) { |
38 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
38 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
39 | 39 | } |
40 | 40 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) { |
41 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
41 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
42 | 42 | } |
43 | 43 | if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) { |
44 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
44 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
45 | 45 | } |
46 | 46 | } |
47 | 47 | |
@@ -75,19 +75,19 @@ discard block |
||
75 | 75 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
76 | 76 | try { |
77 | 77 | $altArray = [# Array mit den Subject Alternative Names |
78 | - "email:" . $csr["USERNAME"] |
|
78 | + "email:".$csr["USERNAME"] |
|
79 | 79 | ]; |
80 | 80 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
81 | 81 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
82 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n"); |
|
83 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
82 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n"); |
|
83 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
84 | 84 | $this->loggerInstance->debug(5, "PARAM_3: "); |
85 | 85 | $this->loggerInstance->debug(5, $altArray); |
86 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n"); |
|
87 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
88 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
89 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n"); |
|
90 | - $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n"); |
|
86 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n"); |
|
87 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
88 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
89 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n"); |
|
90 | + $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n"); |
|
91 | 91 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
92 | 92 | $soapNewRequest = $soapPub->newRequest( |
93 | 93 | CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID |
@@ -109,11 +109,11 @@ discard block |
||
109 | 109 | } catch (Exception $e) { |
110 | 110 | // PHP 7.1 can do this much better |
111 | 111 | if (is_soap_fault($e)) { |
112 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
112 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
113 | 113 | $e->faultstring |
114 | 114 | }\n"); |
115 | 115 | } |
116 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
116 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
117 | 117 | } |
118 | 118 | try { |
119 | 119 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -125,8 +125,8 @@ discard block |
||
125 | 125 | $soapReqnum, [ |
126 | 126 | "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID, |
127 | 127 | "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE, |
128 | - "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'], |
|
129 | - "SubjectAltNames" => ["email:" . $csr["USERNAME"]], |
|
128 | + "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'], |
|
129 | + "SubjectAltNames" => ["email:".$csr["USERNAME"]], |
|
130 | 130 | "NotBefore" => (new \DateTime())->format('c'), |
131 | 131 | "NotAfter" => $expiry->format('c'), |
132 | 132 | ] |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
146 | 146 | // rather than just using the string. Grr. |
147 | 147 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
148 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
148 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
149 | 149 | // retrieve our RA cert from filesystem |
150 | 150 | // the RA certificates are not needed right now because we |
151 | 151 | // have resorted to S/MIME signatures with openssl command-line |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
158 | 158 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
159 | 159 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
160 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
160 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
161 | 161 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
162 | 162 | $output = []; |
163 | 163 | $return = 999; |
@@ -166,14 +166,14 @@ discard block |
||
166 | 166 | throw new Exception("Non-zero return value from openssl smime!"); |
167 | 167 | } |
168 | 168 | // and get the signature blob back from the filesystem |
169 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
169 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
170 | 170 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
171 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
172 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
173 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
171 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
172 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
173 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
174 | 174 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
175 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
176 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
175 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
176 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
177 | 177 | if ($soapIssueCert === FALSE) { |
178 | 178 | throw new Exception("The locally approved request was NOT processed by the CA."); |
179 | 179 | } |
@@ -210,9 +210,9 @@ discard block |
||
210 | 210 | throw new Exception("CAInfo has no root certificate for us!"); |
211 | 211 | } |
212 | 212 | } catch (SoapFault $e) { |
213 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
213 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
214 | 214 | } catch (Exception $e) { |
215 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
215 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
216 | 216 | } |
217 | 217 | return [ |
218 | 218 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -245,12 +245,12 @@ discard block |
||
245 | 245 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
246 | 246 | // rather than just using the string. Grr. |
247 | 247 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
248 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
248 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
249 | 249 | // retrieve our RA cert from filesystem |
250 | 250 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
251 | 251 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
252 | 252 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
253 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
253 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
254 | 254 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
255 | 255 | $output = []; |
256 | 256 | $return = 999; |
@@ -259,7 +259,7 @@ discard block |
||
259 | 259 | throw new Exception("Non-zero return value from openssl smime!"); |
260 | 260 | } |
261 | 261 | // and get the signature blob back from the filesystem |
262 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
262 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
263 | 263 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
264 | 264 | if ($soapIssueRev === FALSE) { |
265 | 265 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -267,9 +267,9 @@ discard block |
||
267 | 267 | } catch (Exception $e) { |
268 | 268 | // PHP 7.1 can do this much better |
269 | 269 | if (is_soap_fault($e)) { |
270 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
270 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
271 | 271 | } |
272 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
272 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
273 | 273 | } |
274 | 274 | } |
275 | 275 | |
@@ -369,9 +369,9 @@ discard block |
||
369 | 369 | */ |
370 | 370 | public function soapToXmlInteger($x) |
371 | 371 | { |
372 | - return '<' . $x[0] . '>' |
|
372 | + return '<'.$x[0].'>' |
|
373 | 373 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
374 | - . '</' . $x[0] . '>'; |
|
374 | + . '</'.$x[0].'>'; |
|
375 | 375 | } |
376 | 376 | |
377 | 377 | /** |
@@ -390,9 +390,9 @@ discard block |
||
390 | 390 | // dump private key into directory |
391 | 391 | $outstring = ""; |
392 | 392 | openssl_pkey_export($privateKey, $outstring); |
393 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
393 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
394 | 394 | // PHP can only do one DC in the Subject. But we need three. |
395 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
395 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
396 | 396 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
397 | 397 | $output = []; |
398 | 398 | $return = 999; |
@@ -62,7 +62,7 @@ |
||
62 | 62 | they are from the same user group. You are not allowed to share them to an unlimited |
63 | 63 | audience (e.g. on a publicly accessible web server).</li> |
64 | 64 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to |
65 | -your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
65 | +your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
66 | 66 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on |
67 | 67 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> |
68 | 68 | </ul> |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | $ownermgmt = new \core\UserManagement(); |
83 | 83 | $ownermgmt->addAdminToIdp($my_inst, $_SESSION['user']); |
84 | 84 | } else { |
85 | - echo "Fatal Error: you wanted to take control over an " . \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ", but are not a " . \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . " operator!"; |
|
85 | + echo "Fatal Error: you wanted to take control over an ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant'].", but are not a ".\config\ConfAssistant::CONSORTIUM['nomenclature_federation']." operator!"; |
|
86 | 86 | exit(1); |
87 | 87 | } |
88 | 88 | break; |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | default: |
119 | 119 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
120 | 120 | } |
121 | - echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter) . " " . $cryptText, _("Sent successfully.")); |
|
121 | + echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter)." ".$cryptText, _("Sent successfully.")); |
|
122 | 122 | break; |
123 | 123 | case "FAILURE": |
124 | 124 | echo $uiElements->boxError(_("No invitation email could be sent!"), _("Sending failure!")); |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | default: |
139 | 139 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
140 | 140 | } |
141 | - echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter) . " " . $cryptText, _("Partial success.")); |
|
141 | + echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter)." ".$cryptText, _("Partial success.")); |
|
142 | 142 | break; |
143 | 143 | case "INVALIDSYNTAX": |
144 | 144 | echo $uiElements->boxError(_("The invitation email address was malformed, no invitation was sent!"), _("The invitation email address was malformed, no invitation was sent!")); |
@@ -190,7 +190,7 @@ discard block |
||
190 | 190 | <?php echo $invite; ?> |
191 | 191 | </td> |
192 | 192 | <td> |
193 | - <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ( $oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : "" ); ?> accept-charset='UTF-8'> |
|
193 | + <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ($oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : ""); ?> accept-charset='UTF-8'> |
|
194 | 194 | <input type='hidden' name='admin_id' value='<?php echo $oneowner['ID']; ?>'></input> |
195 | 195 | <button type='submit' name='submitbutton' class='delete' value='<?php echo web\lib\common\FormElements::BUTTON_DELETE; ?>'><?php echo _("Delete Administrator") ?></button> |
196 | 196 | </form> |
@@ -207,10 +207,10 @@ discard block |
||
207 | 207 | $loggerInstance = new \core\common\Logging(); |
208 | 208 | $loggerInstance->debug(4, "Displaying pending invitations for $my_inst->identifier.\n"); |
209 | 209 | if (count($pending_invites) > 0) { |
210 | - echo "<strong>" . _("Pending invitations for this IdP") . "</strong>"; |
|
210 | + echo "<strong>"._("Pending invitations for this IdP")."</strong>"; |
|
211 | 211 | echo "<table>"; |
212 | 212 | foreach ($pending_invites as $invitee) { |
213 | - echo "<tr><td>" . $invitee['mail'] . "</td><td>" . sprintf(_("(expires %s)"), $invitee['expiry']) . "</td></tr>"; |
|
213 | + echo "<tr><td>".$invitee['mail']."</td><td>".sprintf(_("(expires %s)"), $invitee['expiry'])."</td></tr>"; |
|
214 | 214 | } |
215 | 215 | echo "</table>"; |
216 | 216 | } |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | |
233 | 233 | if (!$is_admin_himself) { |
234 | 234 | echo "<form action='inc/manageAdmins.inc.php?inst_id=$my_inst->identifier' method='post' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
235 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_TAKECONTROL . "'>" . sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant) . "</button> |
|
235 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_TAKECONTROL."'>".sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant)."</button> |
|
236 | 236 | </form>"; |
237 | 237 | } |
238 | 238 | } |
@@ -21,7 +21,7 @@ discard block |
||
21 | 21 | |
22 | 22 | // please run this as a cron job every hour |
23 | 23 | |
24 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
24 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
25 | 25 | |
26 | 26 | // iterate through all federations and see if there are recently expired |
27 | 27 | // invitations for any of them |
@@ -55,7 +55,7 @@ discard block |
||
55 | 55 | $admins = $this_fed->listFederationAdmins(); |
56 | 56 | $mailtext = "Hello, |
57 | 57 | |
58 | -invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] ." have recently expired: |
|
58 | +invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have recently expired: |
|
59 | 59 | |
60 | 60 | "; |
61 | 61 | foreach ($listofinstnames as $instname) { |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | if ($numberofexistingidps > 0) { |
66 | 66 | $mailtext .= " |
67 | 67 | |
68 | -Additionally, $numberofexistingidps invitations for an existing ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired. |
|
68 | +Additionally, $numberofexistingidps invitations for an existing ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired. |
|
69 | 69 | "; |
70 | 70 | } |
71 | 71 | $mailtext .= " |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | Greetings, |
75 | 75 | |
76 | -A humble " . \config\Master::APPEARANCE['productname'] . " cron job |
|
76 | +A humble " . \config\Master::APPEARANCE['productname']." cron job |
|
77 | 77 | "; |
78 | 78 | |
79 | 79 | foreach ($admins as $admin) { |
@@ -76,7 +76,7 @@ discard block |
||
76 | 76 | $delProfiles[] = $ssid; |
77 | 77 | } |
78 | 78 | if ($cipher == 'TKIP') { |
79 | - $delProfiles[] = $ssid . ' (TKIP)'; |
|
79 | + $delProfiles[] = $ssid.' (TKIP)'; |
|
80 | 80 | } |
81 | 81 | } |
82 | 82 | |
@@ -86,7 +86,7 @@ discard block |
||
86 | 86 | $iterator = 0; |
87 | 87 | foreach ($allSSID as $ssid => $cipher) { |
88 | 88 | if ($cipher == 'TKIP') { |
89 | - $windowsProfile[$iterator] = $this->writeWLANprofile($ssid . ' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
89 | + $windowsProfile[$iterator] = $this->writeWLANprofile($ssid.' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
90 | 90 | $iterator++; |
91 | 91 | } |
92 | 92 | $windowsProfile[$iterator] = $this->writeWLANprofile($ssid, $ssid, 'WPA2', 'AES', $eapConfig, $iterator); |
@@ -148,10 +148,10 @@ discard block |
||
148 | 148 | $profileFileCont = '<EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
149 | 149 | <EapMethod> |
150 | 150 | <Type xmlns="http://www.microsoft.com/provisioning/EapCommon">' . |
151 | - $this->selectedEap["OUTER"] . '</Type> |
|
151 | + $this->selectedEap["OUTER"].'</Type> |
|
152 | 152 | <VendorId xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorId> |
153 | 153 | <VendorType xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorType> |
154 | -<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId . '</AuthorId> |
|
154 | +<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId.'</AuthorId> |
|
155 | 155 | </EapMethod> |
156 | 156 | '; |
157 | 157 | |
@@ -164,9 +164,9 @@ discard block |
||
164 | 164 | $profileFileCont .= ' |
165 | 165 | <Config xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
166 | 166 | <EAPIdentityProviderList xmlns="urn:ietf:params:xml:ns:yang:ietf-eap-metadata"> |
167 | -<EAPIdentityProvider ID="' . $this->deviceUUID . '" namespace="urn:UUID"> |
|
167 | +<EAPIdentityProvider ID="' . $this->deviceUUID.'" namespace="urn:UUID"> |
|
168 | 168 | <ProviderInfo> |
169 | -<DisplayName>' . $this->translateString($attr['general:instname'][0]) . '</DisplayName> |
|
169 | +<DisplayName>' . $this->translateString($attr['general:instname'][0]).'</DisplayName> |
|
170 | 170 | </ProviderInfo> |
171 | 171 | <AuthenticationMethods> |
172 | 172 | <AuthenticationMethod> |
@@ -178,7 +178,7 @@ discard block |
||
178 | 178 | if ($outerUser == '') { |
179 | 179 | $profileFileCont .= '<AnonymousIdentity>@</AnonymousIdentity>'; |
180 | 180 | } else { |
181 | - $profileFileCont .= '<AnonymousIdentity>' . $outerUser . '@' . $realm . '</AnonymousIdentity>'; |
|
181 | + $profileFileCont .= '<AnonymousIdentity>'.$outerUser.'@'.$realm.'</AnonymousIdentity>'; |
|
182 | 182 | } |
183 | 183 | } |
184 | 184 | $profileFileCont .= '</ClientSideCredential> |
@@ -196,7 +196,7 @@ discard block |
||
196 | 196 | $profileFileCont .= ' |
197 | 197 | </ServerSideCredential> |
198 | 198 | <InnerAuthenticationMethod> |
199 | -<NonEAPAuthMethod>' .$innerMethod. '</NonEAPAuthMethod> |
|
199 | +<NonEAPAuthMethod>' .$innerMethod.'</NonEAPAuthMethod> |
|
200 | 200 | </InnerAuthenticationMethod> |
201 | 201 | <VendorSpecific> |
202 | 202 | <SessionResumption>false</SessionResumption> |
@@ -221,11 +221,11 @@ discard block |
||
221 | 221 | </eapTls:CredentialsSource> |
222 | 222 | <eapTls:ServerValidation> |
223 | 223 | <eapTls:DisableUserPromptForServerValidation>true</eapTls:DisableUserPromptForServerValidation> |
224 | -<eapTls:ServerNames>' . $servers . '</eapTls:ServerNames>'; |
|
224 | +<eapTls:ServerNames>' . $servers.'</eapTls:ServerNames>'; |
|
225 | 225 | if ($caArray) { |
226 | 226 | foreach ($caArray as $certAuthority) { |
227 | 227 | if ($certAuthority['root']) { |
228 | - $profileFileCont .= "<eapTls:TrustedRootCA>" . $certAuthority['sha1'] . "</eapTls:TrustedRootCA>\n"; |
|
228 | + $profileFileCont .= "<eapTls:TrustedRootCA>".$certAuthority['sha1']."</eapTls:TrustedRootCA>\n"; |
|
229 | 229 | } |
230 | 230 | } |
231 | 231 | } |
@@ -257,11 +257,11 @@ discard block |
||
257 | 257 | <msPeap:EapType> |
258 | 258 | <msPeap:ServerValidation> |
259 | 259 | <msPeap:DisableUserPromptForServerValidation>true</msPeap:DisableUserPromptForServerValidation> |
260 | -<msPeap:ServerNames>' . $servers . '</msPeap:ServerNames>'; |
|
260 | +<msPeap:ServerNames>' . $servers.'</msPeap:ServerNames>'; |
|
261 | 261 | if ($caArray) { |
262 | 262 | foreach ($caArray as $certAuthority) { |
263 | 263 | if ($certAuthority['root']) { |
264 | - $vistaExt .= "<msPeap:TrustedRootCA>" . $certAuthority['sha1'] . "</msPeap:TrustedRootCA>\n"; |
|
264 | + $vistaExt .= "<msPeap:TrustedRootCA>".$certAuthority['sha1']."</msPeap:TrustedRootCA>\n"; |
|
265 | 265 | } |
266 | 266 | } |
267 | 267 | } |
@@ -274,7 +274,7 @@ discard block |
||
274 | 274 | <msChapV2:UseWinLogonCredentials>false</msChapV2:UseWinLogonCredentials> |
275 | 275 | </msChapV2:EapType> |
276 | 276 | </baseEap:Eap> |
277 | -<msPeap:EnableQuarantineChecks>' . $nea . '</msPeap:EnableQuarantineChecks> |
|
277 | +<msPeap:EnableQuarantineChecks>' . $nea.'</msPeap:EnableQuarantineChecks> |
|
278 | 278 | <msPeap:RequireCryptoBinding>false</msPeap:RequireCryptoBinding> |
279 | 279 | </msPeap:EapType> |
280 | 280 | </baseEap:Eap> |
@@ -286,11 +286,11 @@ discard block |
||
286 | 286 | <EapType xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV1"> |
287 | 287 | <ServerValidation> |
288 | 288 | <DisableUserPromptForServerValidation>true</DisableUserPromptForServerValidation> |
289 | -<ServerNames>' . $servers . '</ServerNames>'; |
|
289 | +<ServerNames>' . $servers.'</ServerNames>'; |
|
290 | 290 | if ($caArray) { |
291 | 291 | foreach ($caArray as $certAuthority) { |
292 | 292 | if ($certAuthority['root']) { |
293 | - $w7Ext .= "<TrustedRootCA>" . $certAuthority['sha1'] . "</TrustedRootCA>\n"; |
|
293 | + $w7Ext .= "<TrustedRootCA>".$certAuthority['sha1']."</TrustedRootCA>\n"; |
|
294 | 294 | } |
295 | 295 | } |
296 | 296 | } |
@@ -303,14 +303,14 @@ discard block |
||
303 | 303 | <UseWinLogonCredentials>false</UseWinLogonCredentials> |
304 | 304 | </EapType> |
305 | 305 | </Eap> |
306 | -<EnableQuarantineChecks>' . $nea . '</EnableQuarantineChecks> |
|
306 | +<EnableQuarantineChecks>' . $nea.'</EnableQuarantineChecks> |
|
307 | 307 | <RequireCryptoBinding>false</RequireCryptoBinding> |
308 | 308 | '; |
309 | 309 | if ($useAnon) { |
310 | 310 | $w7Ext .= '<PeapExtensions> |
311 | 311 | <IdentityPrivacy xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV2"> |
312 | 312 | <EnableIdentityPrivacy>true</EnableIdentityPrivacy> |
313 | -<AnonymousUserName>' . $outerUser . '</AnonymousUserName> |
|
313 | +<AnonymousUserName>' . $outerUser.'</AnonymousUserName> |
|
314 | 314 | </IdentityPrivacy> |
315 | 315 | </PeapExtensions> |
316 | 316 | '; |
@@ -328,8 +328,8 @@ discard block |
||
328 | 328 | $profileFileContEnd = '</EapHostConfig></EAPConfig> |
329 | 329 | '; |
330 | 330 | $returnArray = []; |
331 | - $returnArray['vista'] = $profileFileCont . $vistaExt . $profileFileContEnd; |
|
332 | - $returnArray['w7'] = $profileFileCont . $w7Ext . $profileFileContEnd; |
|
331 | + $returnArray['vista'] = $profileFileCont.$vistaExt.$profileFileContEnd; |
|
332 | + $returnArray['w7'] = $profileFileCont.$w7Ext.$profileFileContEnd; |
|
333 | 333 | return $returnArray; |
334 | 334 | } |
335 | 335 | |
@@ -348,10 +348,10 @@ discard block |
||
348 | 348 | private function writeWLANprofile($wlanProfileName, $ssid, $auth, $encryption, $eapConfig, $profileNumber) { |
349 | 349 | $profileFileCont = '<?xml version="1.0"?> |
350 | 350 | <WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1"> |
351 | -<name>' . $wlanProfileName . '</name> |
|
351 | +<name>' . $wlanProfileName.'</name> |
|
352 | 352 | <SSIDConfig> |
353 | 353 | <SSID> |
354 | -<name>' . $ssid . '</name> |
|
354 | +<name>' . $ssid.'</name> |
|
355 | 355 | </SSID> |
356 | 356 | <nonBroadcast>true</nonBroadcast> |
357 | 357 | </SSIDConfig> |
@@ -361,8 +361,8 @@ discard block |
||
361 | 361 | <MSM> |
362 | 362 | <security> |
363 | 363 | <authEncryption> |
364 | -<authentication>' . $auth . '</authentication> |
|
365 | -<encryption>' . $encryption . '</encryption> |
|
364 | +<authentication>' . $auth.'</authentication> |
|
365 | +<encryption>' . $encryption.'</encryption> |
|
366 | 366 | <useOneX>true</useOneX> |
367 | 367 | </authEncryption> |
368 | 368 | '; |
@@ -392,9 +392,9 @@ discard block |
||
392 | 392 | mkdir('vista'); |
393 | 393 | } |
394 | 394 | $vistaFileName = "vista/wlan_prof-$profileNumber.xml"; |
395 | - file_put_contents($vistaFileName, $profileFileCont . $eapConfig['vista'] . $closing); |
|
395 | + file_put_contents($vistaFileName, $profileFileCont.$eapConfig['vista'].$closing); |
|
396 | 396 | $sevenFileName = "w7/wlan_prof-$profileNumber.xml"; |
397 | - file_put_contents($sevenFileName, $profileFileCont . $eapConfig['w7'] . $closing); |
|
397 | + file_put_contents($sevenFileName, $profileFileCont.$eapConfig['w7'].$closing); |
|
398 | 398 | $this->loggerInstance->debug(2, "Installer has been written into directory $this->FPATH\n"); |
399 | 399 | $this->loggerInstance->debug(4, "WLAN_Profile:$wlanProfileName:$encryption\n"); |
400 | 400 | return("\"$wlanProfileName\" \"$encryption\""); |
@@ -431,8 +431,8 @@ discard block |
||
431 | 431 | mkdir('vista'); |
432 | 432 | } |
433 | 433 | |
434 | - file_put_contents("vista/lan_prof.xml", $profileFileCont . $eapConfig['vista'] . $closing); |
|
435 | - file_put_contents("w7/lan_prof.xml", $profileFileCont . $eapConfig['w7'] . $closing); |
|
434 | + file_put_contents("vista/lan_prof.xml", $profileFileCont.$eapConfig['vista'].$closing); |
|
435 | + file_put_contents("w7/lan_prof.xml", $profileFileCont.$eapConfig['w7'].$closing); |
|
436 | 436 | |
437 | 437 | } |
438 | 438 | |
@@ -446,7 +446,7 @@ discard block |
||
446 | 446 | private function writeMainNSH($eap, $attr) { |
447 | 447 | $this->loggerInstance->debug(4, "writeMainNSH"); |
448 | 448 | $this->loggerInstance->debug(4, $attr); |
449 | - $this->loggerInstance->debug(4, "MYLANG=" . $this->lang . "\n"); |
|
449 | + $this->loggerInstance->debug(4, "MYLANG=".$this->lang."\n"); |
|
450 | 450 | |
451 | 451 | $eapOptions = [ |
452 | 452 | \core\common\EAP::PEAP => ['str' => 'PEAP', 'exec' => 'user'], |
@@ -477,8 +477,8 @@ discard block |
||
477 | 477 | $this->loggerInstance->debug(4, "EAP_STR=$eapStr\n"); |
478 | 478 | $this->loggerInstance->debug(4, $eap); |
479 | 479 | |
480 | - $fcontents .= '!define ' . $eapStr; |
|
481 | - $fcontents .= "\n" . '!define EXECLEVEL "' . $execLevel . '"'; |
|
480 | + $fcontents .= '!define '.$eapStr; |
|
481 | + $fcontents .= "\n".'!define EXECLEVEL "'.$execLevel.'"'; |
|
482 | 482 | $fcontents .= $this->writeNsisDefines($attr); |
483 | 483 | file_put_contents('main.nsh', $fcontents); |
484 | 484 | } |
@@ -507,7 +507,7 @@ discard block |
||
507 | 507 | } |
508 | 508 | foreach ($caArray as $certAuthority) { |
509 | 509 | $store = $certAuthority['root'] ? "root" : "ca"; |
510 | - $contentCerts .= '!insertmacro install_ca_cert "' . $certAuthority['file'] . '" "' . $certAuthority['sha1'] . '" "' . $store . "\"\n"; |
|
510 | + $contentCerts .= '!insertmacro install_ca_cert "'.$certAuthority['file'].'" "'.$certAuthority['sha1'].'" "'.$store."\"\n"; |
|
511 | 511 | } |
512 | 512 | fwrite($fileHandleCerts, $contentCerts); |
513 | 513 | fclose($fileHandleCerts); |
@@ -45,7 +45,7 @@ |
||
45 | 45 | private function getCredentialSource() |
46 | 46 | { |
47 | 47 | $element = new \core\DeviceXMLmain(); |
48 | - $element->setChild('CertificateStore',''); |
|
48 | + $element->setChild('CertificateStore', ''); |
|
49 | 49 | return($element); |
50 | 50 | } |
51 | 51 |
@@ -38,7 +38,7 @@ |
||
38 | 38 | { |
39 | 39 | $element = new \core\DeviceXMLmain(); |
40 | 40 | $element->setChild('ServerValidation', $this->getPeapServerValidation()); |
41 | - $element->setChild('FastReconnect','true'); |
|
41 | + $element->setChild('FastReconnect', 'true'); |
|
42 | 42 | $element->setChild('InnerEapOptional', 'false'); |
43 | 43 | $element->setChild('Eap', $this->getMsChapV2(), self::MS_BASEEAPCONN_NS); |
44 | 44 | $element->setChild('EnableQuarantineChecks', $this->nea); |
@@ -43,8 +43,8 @@ |
||
43 | 43 | { |
44 | 44 | $element = new \core\DeviceXMLmain(); |
45 | 45 | $element->setChild('Type', $this->eapConfig->type, self::MS_EAPCOMMON_NS); |
46 | - $element->setChild('VendorId',0, self::MS_EAPCOMMON_NS); |
|
47 | - $element->setChild('VendorType',0, self::MS_EAPCOMMON_NS); |
|
46 | + $element->setChild('VendorId', 0, self::MS_EAPCOMMON_NS); |
|
47 | + $element->setChild('VendorType', 0, self::MS_EAPCOMMON_NS); |
|
48 | 48 | $element->setChild('AuthorId', $this->eapConfig->authorId, self::MS_EAPCOMMON_NS); |
49 | 49 | return($element); |
50 | 50 | } |