[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ipcop-svn
Subject:    [Ipcop-svn] SF.net SVN: ipcop:[7040] ipcop/trunk/html/cgi-bin/ipsec.cgi
From:       dotzball () users ! sourceforge ! net
Date:       2013-05-21 10:36:08
Message-ID: E1UejvM-0004Pb-JJ () sfp-svn-3 ! v30 ! ch3 ! sourceforge ! com
[Download RAW message or body]

Revision: 7040
          http://ipcop.svn.sourceforge.net/ipcop/?rev=7040&view=rev
Author:   dotzball
Date:     2013-05-21 10:36:08 +0000 (Tue, 21 May 2013)
Log Message:
-----------
Remove trailing spaces. Prepare for the "Certificate file move failed" fix.

Modified Paths:
--------------
    ipcop/trunk/html/cgi-bin/ipsec.cgi

Modified: ipcop/trunk/html/cgi-bin/ipsec.cgi
===================================================================
--- ipcop/trunk/html/cgi-bin/ipsec.cgi	2013-05-20 17:47:43 UTC (rev 7039)
+++ ipcop/trunk/html/cgi-bin/ipsec.cgi	2013-05-21 10:36:08 UTC (rev 7040)
@@ -143,7 +143,7 @@
             $ip >>= 1;
             $mm >>= 1;
         }
-    } 
+    }
     else {
         $ip >>=  (32 - $2);
     }
@@ -210,7 +210,7 @@
         print "Content-Disposition: attachment; \
                filename=$cahash{$cgiparams{'KEY'}}[0]cert.pem\r\n\r\n";
         print `/usr/bin/openssl x509 -in \
/var/ipcop/ca/$cahash{$cgiparams{'KEY'}}[0]cert.pem`;  exit(0);
-    } 
+    }
     else {
         $errormessage = $Lang::tr{'invalid key'};
     }
@@ -218,7 +218,7 @@
 ###
 ### Export PKCS12 file to browser
 ###
-} 
+}
 elsif ($cgiparams{'ACTION'} eq $Lang::tr{'download pkcs12 file'}) {
     &General::readhasharray("/var/ipcop/ipsec/config", \%confighash);
     print "Content-Type: application/force-download\n";
@@ -264,7 +264,7 @@
 ###
 ### Export Certificate to browser
 ###
-} 
+}
 elsif ($cgiparams{'ACTION'} eq $Lang::tr{'download certificate'}) {
     &General::readhasharray("/var/ipcop/ipsec/config", \%confighash);
 
@@ -278,7 +278,7 @@
 ###
 ### Enable/Disable connection
 ###
-} 
+}
 elsif ($cgiparams{'ACTION'} eq $Lang::tr{'toggle enable disable'}) {
 
     &General::readhash("/var/ipcop/ipsec/settings", \%vpnsettings);
@@ -293,7 +293,7 @@
                 &General::log("ipsec", "Activate connection #$cgiparams{'KEY'}");
                 system("/usr/local/bin/ipsecctrl --start=$cgiparams{'KEY'}")
             }
-        } 
+        }
         else {
             if (&VPN::ipsecenabled(\%vpnsettings)) {
                 &General::log("ipsec", "Deactivate connection #$cgiparams{'KEY'}");
@@ -304,7 +304,7 @@
             &VPN::writeipsecfiles();
         }
         sleep $sleepDelay;
-    } 
+    }
     else {
         $errormessage = $Lang::tr{'invalid key'};
     }
@@ -312,7 +312,7 @@
 ###
 ### Restart connection
 ###
-} 
+}
 elsif ($cgiparams{'ACTION'} eq $Lang::tr{'restart'}) {
     &General::readhash("/var/ipcop/ipsec/settings", \%vpnsettings);
     &General::readhasharray("/var/ipcop/ipsec/config", \%confighash);
@@ -323,7 +323,7 @@
             system("/usr/local/bin/ipsecctrl --start=$cgiparams{'KEY'}");
             sleep $sleepDelay;
         }
-    } 
+    }
     else {
         $errormessage = $Lang::tr{'invalid key'};
     }
@@ -345,7 +345,7 @@
         delete $confighash{$cgiparams{'KEY'}};
         &General::writehasharray("/var/ipcop/ipsec/config", \%confighash);
         &VPN::writeipsecfiles();
-    } 
+    }
     else {
         $errormessage = $Lang::tr{'invalid key'};
     }
@@ -387,7 +387,7 @@
 ###
 ### Adding/Editing/Saving a  connection
 ###
-} 
+}
 elsif (($cgiparams{'ACTION'} eq $Lang::tr{'add'}) ||
      ($cgiparams{'ACTION'} eq $Lang::tr{'edit'}) ||
      ($cgiparams{'ACTION'} eq $Lang::tr{'save'} && $cgiparams{'ADVANCED'} eq '')) {
@@ -428,7 +428,7 @@
         $cgiparams{'ONLY_PROPOSED'} = $confighash{$cgiparams{'KEY'}}[24];
         $cgiparams{'PFS'}           = $confighash{$cgiparams{'KEY'}}[28];
         $cgiparams{'VHOST'}         = $confighash{$cgiparams{'KEY'}}[14];
-    } 
+    }
     elsif ($cgiparams{'ACTION'} eq $Lang::tr{'save'}) {
         $cgiparams{'REMARK'} = &Header::cleanhtml($cgiparams{'REMARK'});
         if ($cgiparams{'TYPE'} !~ /^(host|net)$/) {
@@ -475,7 +475,7 @@
                 if (! &General::validfqdn ($cgiparams{'REMOTE'}))  {
                     $errormessage = $Lang::tr{'invalid input for remote host/ip'};
                     goto VPNCONF_ERROR;
-                } 
+                }
                 else {
                     if (&General::validdnshost($cgiparams{'REMOTE'})) {
                         $warnmessage = "$Lang::tr{'check vpn lr'} \
$cgiparams{'REMOTE'}. $Lang::tr{'dns check failed'}"; @@ -608,7 +608,7 @@
                 $opt .= " -in $filename";
                 $opt .= " -out /tmp/newcacert";
                 $errormessage = &VPN::callssl ($opt);
-            } 
+            }
             else {    #child
                 print "$cgiparams{'P12_PASS'}\n";
                 exit (0);
@@ -798,7 +798,7 @@
                 goto VPNCONF_ERROR;
             }
 
-            if (($cgiparams{'YEAR'} < $this_year) 
+            if (($cgiparams{'YEAR'} < $this_year)
                 || (($cgiparams{'YEAR'} == $this_year) && ($cgiparams{'MONTH'} < \
                $now[4]))
                 || (($cgiparams{'YEAR'} == $this_year) && ($cgiparams{'MONTH'} == \
$now[4]) && ($cgiparams{'DAY'} < $now[3])) ) {  $errormessage = $Lang::tr{'invalid \
date entered'}; @@ -870,7 +870,7 @@
                 unlink ("/var/ipcop/certs/$cgiparams{'NAME'}cert.pem");
                 &VPN::cleanssldatabase();
                 goto VPNCONF_ERROR;
-            } 
+            }
             else {
                 unlink ($v3extname);
                 unlink ("/var/ipcop/certs/$cgiparams{'NAME'}req.pem");
@@ -893,7 +893,7 @@
                 unlink ("/var/ipcop/certs/$cgiparams{'NAME'}cert.pem");
                 unlink ("/var/ipcop/certs/$cgiparams{'NAME'}.p12");
                 goto VPNCONF_ERROR;
-            } 
+            }
             else {
                 unlink ("/var/ipcop/certs/$cgiparams{'NAME'}key.pem");
             }
@@ -903,7 +903,7 @@
         }
         elsif ($cgiparams{'AUTH'} eq 'auth-dn') {
             $cgiparams{'CERT_NAME'} = '%auth-dn';   # a special value saying 'no \
                cert file'
-        } 
+        }
         else {
             $errormessage = $Lang::tr{'invalid input for authentication method'};
             goto VPNCONF_ERROR;
@@ -937,7 +937,7 @@
         if ($cgiparams{'AUTH'} eq 'psk') {
             $confighash{$key}[4] = 'psk';
             $confighash{$key}[5] = $cgiparams{'PSK'};
-        } 
+        }
         else {
             $confighash{$key}[4] = 'cert';
         }
@@ -988,10 +988,10 @@
         $cgiparams{'ENABLED'} = 'on';
         if ( ! -f "/var/ipcop/private/cakey.pem" ) {
             $cgiparams{'AUTH'} = 'psk';
-        } 
+        }
         elsif ( ! -f "/var/ipcop/ca/cacert.pem") {
             $cgiparams{'AUTH'} = 'certfile';
-        } 
+        }
         else {
             $cgiparams{'AUTH'} = 'certgen';
         }
@@ -1007,14 +1007,14 @@
         # choose appropriate dpd action
         if ($cgiparams{'TYPE'} eq 'host') {
             $cgiparams{'DPD_ACTION'} = 'clear';
-        } 
+        }
         else {
             $cgiparams{'DPD_ACTION'} = 'restart';
         }
         # choose appropriate tunnel start action
         if ($cgiparams{'TYPE'} eq 'host') {
             $cgiparams{'TUNNELSTART'} = 'add';
-        } 
+        }
         else {
             $cgiparams{'TUNNELSTART'} = 'start';
         }
@@ -1219,7 +1219,7 @@
 <hr />
 END
         ;
-    } 
+    }
     elsif (! $cgiparams{'KEY'}) {
         # Using %defaultroute in ipsec.secrets produces an error during openswan \
                start
         # strangely a roadwarrior using PSK can still connect, so we'll allow \
%defaultroute for RW with PSK for now. @@ -1876,10 +1876,10 @@
 {
     if ($confighash{$a}[1] lt $confighash{$b}[1]) {
         return -1;
-    } 
+    }
     elsif ($confighash{$a}[1] gt $confighash{$b}[1]) {
         return 1;
-    } 
+    }
     else {
         return 0;
     }
@@ -1894,10 +1894,10 @@
     print "<td align='center' nowrap='nowrap'>" . $Lang::tr{"$confighash{$key}[3]"} \
. " (" . $Lang::tr{"$confighash{$key}[4]"} . ")</td>";  if ($confighash{$key}[2] eq \
                '%auth-dn') {
         print "<td align='center' nowrap='nowrap'>$confighash{$key}[9]</td>";
-    } 
+    }
     elsif ($confighash{$key}[4] eq 'cert') {
         print "<td align='center' nowrap='nowrap'>$confighash{$key}[2]</td>";
-    } 
+    }
     else {
         print "<td align='center'>$confighash{$key}[8]";
         print "<br />[$confighash{$key}[10]]" if ($confighash{$key}[10] ne '');
@@ -1954,7 +1954,7 @@
     </td>
 END
         ;
-    } 
+    }
     else {
         print "<td width='2%'>&nbsp;</td>";
     }
@@ -1968,8 +1968,8 @@
         </form>
     </td>
 END
-        ; 
-    } 
+        ;
+    }
     elsif (($confighash{$key}[4] eq 'cert') && ($confighash{$key}[2] ne '%auth-dn')) \
{  print <<END
     <td align='center'>
@@ -1981,7 +1981,7 @@
     </td>
 END
         ;
-    } 
+    }
     else {
         print "<td width='2%'>&nbsp;</td>";
     }

This was sent by the SourceForge.net collaborative development platform, the world's \
largest Open Source development site.


------------------------------------------------------------------------------
Try New Relic Now & We'll Send You this Cool Shirt
New Relic is the only SaaS-based application performance monitoring service 
that delivers powerful full stack analytics. Optimize and monitor your
browser, app, & servers with just a few lines of code. Try New Relic
and get this awesome Nerd Life shirt! http://p.sf.net/sfu/newrelic_d2d_may
_______________________________________________
Ipcop-svn mailing list
Ipcop-svn@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipcop-svn


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic