1
  
2
  
3
  
4
  
5
  
6
  
7
  
8
  
9
  
10
  
11
  
12
  
13
  
14
  
15
  
16
  
17
  
18
  
19
  
20
  
21
  
22
  
23
  
24
  
25
  
26
  
27
  
28
  
29
  
30
  
31
  
32
  
33
  
34
  
35
  
36
  
37
  
38
  
39
  
40
  
41
  
42
  
43
  
44
  
45
  
46
  
47
  
48
  
49
  
50
  
51
  
52
  
53
  
54
  
55
  
56
  
57
  
58
  
59
  
60
  
61
  
62
  
63
  
64
  
65
  
66
  
67
  
68
  
69
  
70
  
71
  
72
  
73
  
74
  
75
  
76
  
77
  
78
  
79
  
80
  
81
  
82
  
83
  
84
  
85
  
86
  
87
  
88
  
89
  
90
  
91
  
92
  
93
  
94
  
95
  
96
  
97
  
98
  
99
  
100
  
101
  
102
  
103
  
104
  
105
  
106
  
107
  
108
  
109
  
110
  
111
  
112
  
113
  
114
  
115
  
116
  
117
  
118
  
119
  
120
  
121
  
122
  
123
  
124
  
125
  
126
  
127
  
128
  
129
  
130
  
131
  
132
  
133
  
134
  
135
  
136
  
137
  
138
  
139
  
140
  
141
  
142
  
143
  
144
  
145
  
146
  
147
  
148
  
149
  
150
  
151
  
152
  
153
  
154
  
155
  
156
  
157
  
158
  
159
  
160
  
161
  
162
  
163
  
164
  
165
  
166
  
167
  
168
  
169
  
170
  
171
  
172
  
173
  
174
  
175
  
176
  
177
  
178
  
179
  
180
  
181
  
182
  
183
  
184
  
185
  
186
  
187
  
188
  
189
  
190
  
191
  
192
  
193
  
194
  
195
  
196
  
197
  
198
  
199
  
200
  
201
  
202
  
203
  
204
  
205
  
206
  
207
  
208
  
209
  
210
  
211
  
212
  
213
  
214
  
215
  
216
  
217
  
218
  
219
  
220
  
221
  
222
  
223
  
224
  
225
  
226
  
227
  
228
  
229
  
230
  
231
  
232
  
233
  
234
  
235
  
236
  
237
  
238
  
239
  
240
  
241
  
242
  
243
  
244
  
245
  
246
  
247
  
248
  
249
  
250
  
251
  
252
  
253
  
254
  
255
  
256
  
257
  
258
  
259
  
260
  
261
  
262
  
263
  
264
  
265
  
266
  
267
  
268
  
269
  
270
  
271
  
272
  
273
  
274
  
275
  
276
  
277
  
278
  
279
  
280
  
281
  
282
  
283
  
284
  
285
  
286
  
287
  
288
  
/* 
 * $Id: make_csr.pike,v 1.12 1999/05/13 23:35:14 mast Exp $ 
 */ 
 
inherit "wizard"; 
 
import Standards.PKCS; 
#if constant(Standards.ASN1.Types) //0.6 feature 
import Standards.ASN1.Types; 
#else 
import Standards.ASN1.Encode; 
#endif /* constant(Standards.ASN1.Types) */ 
 
 
#if 0 
#define WERROR werror 
#else 
#define WERROR(x) 
#endif 
 
constant name = "Security//Generate a Certificate Signing Request for an RSA key..."; 
 
constant doc = ("To use an RSA key with your server, you must have a certificate " 
                "for it. You request a certificate by sending a Certificate " 
                "Signing Request to a Certificate Authority, for example Thawte " 
                "or VeriSign."); 
 
#if !constant(_Crypto) || !constant(Crypto.rsa) 
 
constant action_disabled = 1; 
 
#else /* constant(_Crypto) && constant(Crypto.rsa) */ 
 
mixed page_0(object id, object mc) 
{ 
  string msg; 
   
  if (id->variables->_error) 
  { 
    msg = "<font color=red>" + id->variables->_error 
      + "</font><p>"; 
    id->variables->_error = 0; 
  } 
 
  return (msg || "" ) 
    + ("<font size=+1>Which key do you want to certify?</font><p>" 
       "<var name=key_file type=string><br>\n" 
       "Where the private key is stored, relative to " + getcwd() + ".<br> " 
       "<help><blockquote>" 
       "A filename in the real filesystem, where the private key is stored. " 
       "(The private key is needed to sign the CSR. It is <em>not</em> " 
       "included in the file sent to the Certificate Authority)." 
       "</blockquote></help>"); 
} 
 
mixed verify_0(object id, object mc) 
{ 
  if (!file_stat(id->variables->key_file)) 
  { 
    id->variables->_error = "File not found."; 
    return 1; 
  } 
  return 0; 
} 
 
mixed page_1(mixed id, mixed mc) 
{ 
  return ("<font size=+1>Your Distinguished Name?</font><p>" 
          "<help><blockquote>" 
          "Your X.501 Distinguished Name consists of a chain of attributes " 
          "and values, where each link in the chain defines more precisely " 
          "who you are. Which attributes are necessary or useful " 
          "depends on what you will use the certificate for, and which " 
          "Certificate Authority you use. This page lets you specify " 
          "the most useful attributes. If you leave a field blank, " 
          "that attribute will be omitted from your name.<p>\n" 
          "Although most browsers will accept 8 bit ISO 8859-1 characters in " 
          "these fields, it can't be counted on. To be on the safe side, " 
          "use only US-ASCII.\n" 
          "</blockquote></help>" 
 
          "<var name=countryName type=string default=SE><br>" 
          "Your country code<br>\n" 
          "<help><blockquote>" 
          "Your two-letter country code, for example GB (United Kingdom). " 
          "This attribute is required." 
          "</blockquote></help>" 
 
          "<var name=stateOrProvinceName type=string><br>" 
          "State/Province<br>\n" 
          "<help><blockquote>" 
          "The state where you are operating. VeriSign requires this attribute " 
          "to be present for US and Canadian customers. Do not abbreviate." 
          "</blockquote></help>" 
 
          "<var name=localityName type=string default=Stockholm><br>" 
          "City/Locality<br>\n" 
          "<help><blockquote>" 
          "The city or locality where you are registered. VeriSign " 
          "requires that at least one of the locality and the state " 
          "attributes are present. Do not abbreviate." 
          "</blockquote></help>" 
           
          "<var name=organizationName type=string default=\"Idonex AB\"><br>" 
          "Organization/Company<br>\n" 
          "<help><blockquote>" 
          "The organization name under which you are registered with some " 
          "national or regional authority." 
          "</blockquote></help>" 
           
          "<var name=organizationUnitName type=string " 
          "default=\"Roxen Development\"><br>" 
          "Organizational unit<br>\n" 
          "<help><blockquote>" 
          "This attribute is optional, and there are no " 
          "specific requirements on the value of this attribute." 
          "</blockquote></help>" 
 
          "<var name=commonName type=string default=\"www.idonex.se\"><br>" 
          "Common Name<br>\n" 
          "This is the DNS name of your server (i.e. the host part of " 
          "the URL).\n" 
          "<help><blockquote>" 
          "Browsers will compare the URL they are connecting to with " 
          "the Common Name in the server's certificate, and warn the user " 
          "if they don't match.<p>" 
          "Some Certificate Authorities allow wild cards in the Common " 
          "Name. This means that you can have a certificate for " 
          "<tt>*.idonex.se</tt> which will match all servers at Idonex." 
          "Thawte allows wild card certificates, while VeriSign does not." 
          "</blockquote></help>"); 
} 
 
mixed page_2(object id, object mc) 
{ 
  return ("<font size=+1>Certificate Attributes?</font><p>" 
          "<help><blockquote>" 
          "An X.509 certificate associates a Common Name\n" 
          "with a public key. Some certificate authorities support\n" 
          "\"extended certificates\", defined in PKCS#10. An extended\n" 
          "certificate may contain other useful information associated\n" 
          "with the name and the key. This information is signed by the\n" 
          "CA, together with the X.509 certificate.\n" 
          "</blockquote></help>\n" 
 
          "<var name=emailAddress type=string><br>Email address<br>" 
          "<help><blockquote>" 
          "An email address to be embedded in the certificate." 
          "</blockquote></help>\n"); 
} 
 
mixed page_3(object id, object mc) 
{ 
  return ("<font size=+1>CSR Attributes?</font><p>" 
          "At last, you can add attributes to the Certificate Signing " 
          "Request, which are meant for the Certificate Authority " 
          "and are not included in the issued Certificate." 
 
          "<var name=challengePassword type=password> <br>Challenge Password<br>" 
          "<help><blockquote>" 
          "This password could be used if you ever want to revoke " 
          "your certificate. Of course, this depends on the policy of " 
          "your Certificate Authority." 
          "</blockquote></help>\n"); 
} 
 
object trim = Regexp("^[ \t]*([^ \t](.*[^ \t]|))[ \t]*$"); 
 
mixed page_4(object id, object mc) 
{ 
  object file = Stdio.File(); 
 
  object privs = Privs("Reading private RSA key"); 
  if (!file->open(id->variables->key_file, "r")) 
  { 
    privs = 0; 
 
    return "<font color=red>Could not open key file: " 
      + strerror(file->errno()) + "\n</font>"; 
  } 
  privs = 0; 
  string s = file->read(0x10000); 
  if (!s) 
    return "<font color=red>Could not read private key: " 
      + strerror(file->errno()) + "\n</font>"; 
 
#if constant(Tools) 
  object msg = Tools.PEM.pem_msg()->init(s); 
  object part = msg->parts["RSA PRIVATE KEY"]; 
   
  if (!part) 
    return "<font color=red>Key file not formatted properly.\n</font>"; 
 
  object rsa = RSA.parse_private_key(part->decoded_body()); 
#else /* !constant(Tools)*/ 
  /* Backward compatibility */ 
  mapping m = SSL.pem.parse_pem(s); 
  if (!m || !m["RSA PRIVATE KEY"]) 
    return "<font color=red>Key file not formatted properly.\n</font>"; 
 
  object rsa = RSA.parse_private_key(m["RSA PRIVATE KEY"]); 
#endif /* constant(Tools) */ 
  if (!rsa) 
    return "<font color=red>Invalid key.\n</font>"; 
   
  mapping attrs = ([]); 
  string attr; 
   
  /* Remove initial and trailing whitespace, and ignore 
   * empty attributes. */ 
  foreach( ({ "countryName", "stateOrProvinceName", "localityName", 
              "organizationName", "organizationUnitName", "commonName", 
              "emailAddress", "challengePassword"}), attr) 
  { 
    if (id->variables[attr]) 
      { 
        array a = trim->split(id->variables[attr]); 
        if (a) 
          attrs[attr] = a[0]; 
      } 
  } 
 
  array name = ({ }); 
  if (attrs->countryName) 
    name += ({(["countryName": asn1_printable_string (attrs->countryName)])}); 
  object printable_invalid_chars = Regexp ("([^-A-Za-z0-9 '()+,./:=?])"); 
  foreach( ({ "stateOrProvinceName", 
              "localityName", "organizationName", 
              "organizationUnitName", "commonName" }), attr) 
  { 
    if (attrs[attr]) 
      name += ({ ([ attr : (printable_invalid_chars->match (attrs[attr]) ? 
                            asn1_T61_string : 
                            asn1_printable_string) (attrs[attr]) ]) }); 
  } 
 
  mapping csr_attrs = ([]); 
  foreach( ({ "challengePassword" }), attr) 
  { 
    if (attrs[attr]) 
      csr_attrs[attr] = ({ asn1_printable_string(attrs[attr]) }); 
  } 
 
  mapping cert_attrs = ([ ]); 
  foreach( ({ "emailAddress" }), attr) 
  { 
    if (attrs[attr]) 
      cert_attrs[attr] = ({ asn1_IA5_string(attrs[attr]) }); 
  } 
 
  /* Not all CA:s support extendedCertificateAttributes */ 
  if (sizeof(cert_attrs)) 
    csr_attrs->extendedCertificateAttributes = 
      ({ Certificate.Attributes(Identifiers.attribute_ids, 
                                cert_attrs) }); 
   
  object csr = CSR.build_csr(rsa, 
                             Certificate.build_distinguished_name(@name), 
                             csr_attrs); 
 
#if 0 
  werror("csr: %s\n", Crypto.string_to_hex(csr->get_der())); 
#endif 
 
  string res = "The certificate request:<br>\n"; 
 
#if constant(Tools) 
  return res + "<textarea cols=80 rows=12>" 
    + Tools.PEM.simple_build_pem("CERTIFICATE REQUEST", csr->get_der()) 
    +"</textarea>"; 
#else /* !constant(Tools) */ 
  /* Backward compatibility */ 
  return res + "<textarea cols=80 rows=12>" 
    + SSL.pem.build_pem("CERTIFICATE REQUEST", csr->get_der()) 
    +"</textarea>"; 
#endif /* constant(Tools) */ 
} 
 
mixed wizard_done(object id, object mc) 
{ 
  return 0; 
} 
 
mixed handle(object id) { return wizard_for(id,0); } 
 
#endif /* constant(_Crypto) && constant(Crypto.rsa) */