From 5f6010605ba8e3ab2fbc27080ec2db80dbd0e32e Mon Sep 17 00:00:00 2001 From: Phil Davis Date: Sun, 19 Apr 2015 18:00:00 +0545 Subject: Code style usr-local-www diag --- usr/local/www/diag_ipsec.php | 118 ++++++++++++++++++++++++++----------------- 1 file changed, 71 insertions(+), 47 deletions(-) (limited to 'usr/local/www/diag_ipsec.php') diff --git a/usr/local/www/diag_ipsec.php b/usr/local/www/diag_ipsec.php index 460a23d..4492b86 100644 --- a/usr/local/www/diag_ipsec.php +++ b/usr/local/www/diag_ipsec.php @@ -72,20 +72,23 @@ if ($_GET['act'] == 'connect') { } } else if ($_GET['act'] == 'ikedisconnect') { if (ctype_digit($_GET['ikeid'])) { - if (!empty($_GET['ikesaid']) && ctype_digit($_GET['ikesaid'])) + if (!empty($_GET['ikesaid']) && ctype_digit($_GET['ikesaid'])) { mwexec("/usr/local/sbin/ipsec down con" . escapeshellarg($_GET['ikeid']) . "[" . escapeshellarg($_GET['ikesaid']) . "]"); - else + } else { mwexec("/usr/local/sbin/ipsec down con" . escapeshellarg($_GET['ikeid'])); + } } } else if ($_GET['act'] == 'childdisconnect') { if (ctype_digit($_GET['ikeid'])) { - if (!empty($_GET['ikesaid']) && ctype_digit($_GET['ikesaid'])) + if (!empty($_GET['ikesaid']) && ctype_digit($_GET['ikesaid'])) { mwexec("/usr/local/sbin/ipsec down con" . escapeshellarg($_GET['ikeid']) . "{" . escapeshellarg($_GET['ikesaid']) . "}"); + } } } -if (!is_array($config['ipsec']['phase1'])) - $config['ipsec']['phase1'] = array(); +if (!is_array($config['ipsec']['phase1'])) { + $config['ipsec']['phase1'] = array(); +} $a_phase1 = &$config['ipsec']['phase1']; @@ -141,12 +144,13 @@ $status = ipsec_smp_dump_status(); $ipsecconnected[$con_id] = $ph1idx = $con_id; } - if (ipsec_phase1_status($status['query']['ikesalist']['ikesa'], $ikesa['id'])) + if (ipsec_phase1_status($status['query']['ikesalist']['ikesa'], $ikesa['id'])) { $icon = "pass"; - elseif (!isset($config['ipsec']['enable'])) + } elseif (!isset($config['ipsec']['enable'])) { $icon = "block"; - else + } else { $icon = "reject"; + } ?> @@ -156,71 +160,79 @@ $status = ipsec_smp_dump_status(); ' . gettext('Port: ') . htmlspecialchars($ikesa['local']['port']); - else + } else { echo gettext("Unknown"); - if ($ikesa['local']['port'] == '4500') + } + if ($ikesa['local']['port'] == '4500') { echo " NAT-T"; + } } ?> {$identity}"; } else { - if (empty($identity)) + if (empty($identity)) { echo gettext("Unknown"); - else + } else { echo $identity; + } } } ?> ' . gettext('Port: ') . htmlspecialchars($ikesa['remote']['port']); - else + } else { echo gettext("Unknown"); - if ($ikesa['remote']['port'] == '4500') + } + if ($ikesa['remote']['port'] == '4500') { echo " NAT-T"; + } } ?> @@ -312,30 +324,36 @@ $status = ipsec_smp_dump_status(); "; - else + } + } else { echo gettext("Unknown"); + } ?> " . gettext("Remote: ") . htmlspecialchars($childsa['remote']['spi']); + } ?> "; - else + } + } else { echo gettext("Unknown"); + } ?> @@ -407,11 +425,13 @@ $status = ipsec_smp_dump_status(); $rgmap = array(); foreach ($a_phase1 as $ph1ent): - if (isset($ph1ent['disabled'])) + if (isset($ph1ent['disabled'])) { continue; + } $rgmap[$ph1ent['remote-gateway']] = $ph1ent['remote-gateway']; - if ($ipsecconnected[$ph1ent['ikeid']]) + if ($ipsecconnected[$ph1ent['ikeid']]) { continue; + } ?> @@ -422,37 +442,41 @@ $status = ipsec_smp_dump_status(); -- cgit v1.1