Roxen.git
/
server
/
config_actions
/
make_csr.pike
version
»
Context lines:
10
20
40
80
file
none
3
Roxen.git/server/config_actions/make_csr.pike:1:
/*
-
* $Id: make_csr.pike,v 1.
8
1998
/
04
/
22
14
:
32
:
19
grubba
Exp $
+
* $Id: make_csr.pike,v 1.
9
1999
/
01
/
31
23
:
26
:
59
peter
Exp $
*/ inherit "wizard"; import Standards.PKCS;
-
+
#if constant(Standards.ASN1.Types) //0.6 feature
+
import Standards.ASN1.Types;
+
#else
import Standards.ASN1.Encode;
-
+
#endif /* constant(Standards.ASN1.Types) */
-
+
#if 0 #define WERROR werror #else #define WERROR(x) #endif constant name = "Security//Generate a Certificate Signing Request for an RSA key..."; constant doc = ("To use an RSA key with your server, you must have a certificate " "for it. You request a certificate by sending a Certificate "
Roxen.git/server/config_actions/make_csr.pike:239:
/* Not all CA:s support extendedCertificateAttributes */ if (sizeof(cert_attrs)) csr_attrs->extendedCertificateAttributes = ({ Certificate.Attributes(Identifiers.attribute_ids, cert_attrs) }); object csr = CSR.build_csr(rsa, Certificate.build_distinguished_name(@name), csr_attrs);
+
#if 0
+
werror("csr: %s\n", Crypto.string_to_hex(csr->get_der()));
+
#endif
+
#if constant(Tools) return "<textarea cols=80 rows=12>"
-
+ Tools.PEM.simple_build_pem("CERTIFICATE REQUEST", csr->der())
+
+ Tools.PEM.simple_build_pem("CERTIFICATE REQUEST", csr->
get_
der())
+"</textarea>"; #else /* !constant(Tools) */ /* Backward compatibility */ return "<textarea cols=80 rows=12>"
-
+ SSL.pem.build_pem("CERTIFICATE REQUEST", csr->der())
+
+ SSL.pem.build_pem("CERTIFICATE REQUEST", csr->
get_
der())
+"</textarea>"; #endif /* constant(Tools) */ } mixed wizard_done(object id, object mc) { return 0; } mixed handle(object id) { return wizard_for(id,0); } #endif /* constant(_Crypto) && constant(Crypto.rsa) */