Roxen.git
/
server
/
config_actions
/
make_csr.pike
version
»
Context lines:
10
20
40
80
file
none
3
Roxen.git/server/config_actions/make_csr.pike:1:
/*
-
* $Id: make_csr.pike,v 1.
5
1998/04/
20
04
:
36
:
10
nisse Exp $
+
* $Id: make_csr.pike,v 1.
6
1998/04/
21
16
:
46
:
15
nisse Exp $
*/ inherit "wizard"; import Standards.PKCS; import Standards.ASN1.Encode; #if 0 #define WERROR werror #else
Roxen.git/server/config_actions/make_csr.pike:121:
"Name. This means that you can have a certificate for " "<tt>*.idonex.se</tt> which will match all servers at Idonex." "Thawte allows wild card certificates, while VeriSign does not." "</blockquote></help>"); } mixed page_2(object id, object mc) { return ("<font size=+1>Certificate Attributes?</font><p>" "<help><blockquote>"
-
"
The
primary
parts of a
certificate
are
a Common
Name
"
-
"
and
a public key.
In
addition
to
these
components
,
a
"
-
"certificate may contain other useful information."
+
"
An
X.509
certificate
associates
a Common
Name\n
"
+
"
with
a public key.
Some
certificate
authorities
support\n"
+
"\"extended certificates\"
,
defined
in PKCS#10. An extended\n
"
+
"certificate may contain other useful information
associated\n"
+
"with the name and the key
.
This information is signed by the\n
"
+
"CA, together with the X.509 certificate.\n"
"</blockquote></help>\n" "<var name=emailAddress type=string><br>Email address<br>" "<help><blockquote>" "An email address to be embedded in the certificate." "</blockquote></help>\n"); } mixed page_3(object id, object mc) {
Roxen.git/server/config_actions/make_csr.pike:216:
csr_attrs[attr] = ({ asn1_printable_string(attrs[attr]) }); } mapping cert_attrs = ([ ]); foreach( ({ "emailAddress" }), attr) { if (attrs[attr]) cert_attrs[attr] = ({ asn1_IA5_string(attrs[attr]) }); }
+
/* Not all CA:s support extendedCertificateAttributes */
+
if (sizeof(cert_attrs))
csr_attrs->extendedCertificateAttributes = ({ Certificate.Attributes(Identifiers.attribute_ids, cert_attrs) }); object csr = CSR.build_csr(rsa, Certificate.build_distinguished_name(@name), csr_attrs);
-
return "<
pre
>"
+
return "<
textarea cols=80 rows=12
>"
+ Tools.PEM.simple_build_pem("CERTIFICATE REQUEST", csr->der())
-
+"</
pre
>";
+
+"</
textarea
>";
} mixed wizard_done(object id, object mc) { return 0; } mixed handle(object id) { return wizard_for(id,0); } #endif /* constant(_Crypto) && constant(Crypto.rsa) */