diff options
author | Ermal <eri@pfsense.org> | 2013-07-10 15:20:31 +0000 |
---|---|---|
committer | Ermal <eri@pfsense.org> | 2013-07-10 15:27:45 +0000 |
commit | de2fe652ca87d7c6c7db583050d3a807b034040f (patch) | |
tree | c59ee24818c99ab0ebf8d87a213366799d67a95a | |
parent | a19fcb824c8d443cafa42f7d826407e475f40fa8 (diff) | |
download | pfsense-de2fe652ca87d7c6c7db583050d3a807b034040f.zip pfsense-de2fe652ca87d7c6c7db583050d3a807b034040f.tar.gz |
Use empty to cover all needed cases as suggested on #3062. Suggested from pull request #698
-rw-r--r-- | etc/inc/captiveportal.inc | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/etc/inc/captiveportal.inc b/etc/inc/captiveportal.inc index 873dcdb..830dbcb 100644 --- a/etc/inc/captiveportal.inc +++ b/etc/inc/captiveportal.inc @@ -362,6 +362,7 @@ EOD; /* remove old information */ unlink_if_exists("{$g['vardb_path']}/captiveportal{$cpzone}.db"); unlink_if_exists("{$g['vardb_path']}/captiveportal_radius_{$cpzone}.db"); + unlink_if_exists("{$g['vardb_path']}/captiveportal_{$cpzone}.rules"); mwexec("/usr/local/sbin/ipfw_context -d {$cpzone}", true); @@ -1200,7 +1201,7 @@ function radius($username,$password,$clientip,$clientmac,$type, $radiusctx = nul $pipeno = captiveportal_get_next_dn_ruleno(); /* If the pool is empty, return appropriate message and fail authentication */ - if (is_null($pipeno)) { + if (empty($pipeno)) { $auth_list = array(); $auth_list['auth_val'] = 1; $auth_list['error'] = "System reached maximum login capacity"; |