gettext("Import an existing Certificate"), "internal" => gettext("Create an internal Certificate"), "external" => gettext("Create a Certificate Signing Request"), "sign" => gettext("Sign a Certificate Signing Request") ); $cert_keylens = array("512", "1024", "2048", "3072", "4096", "7680", "8192", "15360", "16384"); $cert_types = array( "server" => "Server Certificate", "user" => "User Certificate"); global $cert_altname_types; global $openssl_digest_algs; if (isset($_REQUEST['userid']) && is_numericint($_REQUEST['userid'])) { $userid = $_REQUEST['userid']; } if (isset($userid)) { $cert_methods["existing"] = gettext("Choose an existing certificate"); if (!is_array($config['system']['user'])) { $config['system']['user'] = array(); } $a_user =& $config['system']['user']; } if (isset($_REQUEST['id']) && is_numericint($_REQUEST['id'])) { $id = $_REQUEST['id']; } if (!is_array($config['ca'])) { $config['ca'] = array(); } $a_ca =& $config['ca']; if (!is_array($config['cert'])) { $config['cert'] = array(); } $a_cert =& $config['cert']; $internal_ca_count = 0; foreach ($a_ca as $ca) { if ($ca['prv']) { $internal_ca_count++; } } $act = $_REQUEST['act']; if ($_POST['act'] == "del") { if (!isset($a_cert[$id])) { pfSenseHeader("system_certmanager.php"); exit; } unset($a_cert[$id]); write_config(); $savemsg = sprintf(gettext("Certificate %s successfully deleted."), htmlspecialchars($a_cert[$id]['descr'])); pfSenseHeader("system_certmanager.php"); exit; } if ($act == "new") { $pconfig['method'] = $_POST['method']; $pconfig['keylen'] = "2048"; $pconfig['digest_alg'] = "sha256"; $pconfig['csr_keylen'] = "2048"; $pconfig['csr_digest_alg'] = "sha256"; $pconfig['type'] = "user"; $pconfig['lifetime'] = "3650"; } if ($act == "exp") { if (!$a_cert[$id]) { pfSenseHeader("system_certmanager.php"); exit; } $exp_name = urlencode("{$a_cert[$id]['descr']}.crt"); $exp_data = base64_decode($a_cert[$id]['crt']); $exp_size = strlen($exp_data); header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename={$exp_name}"); header("Content-Length: $exp_size"); echo $exp_data; exit; } if ($act == "req") { if (!$a_cert[$id]) { pfSenseHeader("system_certmanager.php"); exit; } $exp_name = urlencode("{$a_cert[$id]['descr']}.req"); $exp_data = base64_decode($a_cert[$id]['csr']); $exp_size = strlen($exp_data); header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename={$exp_name}"); header("Content-Length: $exp_size"); echo $exp_data; exit; } if ($act == "key") { if (!$a_cert[$id]) { pfSenseHeader("system_certmanager.php"); exit; } $exp_name = urlencode("{$a_cert[$id]['descr']}.key"); $exp_data = base64_decode($a_cert[$id]['prv']); $exp_size = strlen($exp_data); header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename={$exp_name}"); header("Content-Length: $exp_size"); echo $exp_data; exit; } if ($act == "p12") { if (!$a_cert[$id]) { pfSenseHeader("system_certmanager.php"); exit; } $exp_name = urlencode("{$a_cert[$id]['descr']}.p12"); $args = array(); $args['friendly_name'] = $a_cert[$id]['descr']; $ca = lookup_ca($a_cert[$id]['caref']); if ($ca) { $args['extracerts'] = openssl_x509_read(base64_decode($ca['crt'])); } $res_crt = openssl_x509_read(base64_decode($a_cert[$id]['crt'])); $res_key = openssl_pkey_get_private(array(0 => base64_decode($a_cert[$id]['prv']) , 1 => "")); $exp_data = ""; openssl_pkcs12_export($res_crt, $exp_data, $res_key, null, $args); $exp_size = strlen($exp_data); header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename={$exp_name}"); header("Content-Length: $exp_size"); echo $exp_data; exit; } if ($act == "csr") { if (!$a_cert[$id]) { pfSenseHeader("system_certmanager.php"); exit; } $pconfig['descr'] = $a_cert[$id]['descr']; $pconfig['csr'] = base64_decode($a_cert[$id]['csr']); } if ($_POST['save']) { // This is just the blank alternate name that is added for display purposes. We don't want to validate/save it if ($_POST['altname_value0'] == "") { unset($_POST['altname_type0']); unset($_POST['altname_value0']); } if ($_POST['save'] == gettext("Save")) { $input_errors = array(); $pconfig = $_POST; /* input validation */ if ($pconfig['method'] == "sign") { $reqdfields = explode(" ", "descr catosignwith"); $reqdfieldsn = array( gettext("Descriptive name"), gettext("CA to sign with")); if (($_POST['csrtosign'] === "new") && (!strstr($_POST['csrpaste'], "BEGIN CERTIFICATE REQUEST") || !strstr($_POST['csrpaste'], "END CERTIFICATE REQUEST"))) { $input_errors[] = gettext("This signing request does not appear to be valid."); } if ( (($_POST['csrtosign'] === "new") && (strlen($_POST['keypaste']) > 0)) && (!strstr($_POST['keypaste'], "BEGIN PRIVATE KEY") || !strstr($_POST['keypaste'], "END PRIVATE KEY"))) { $input_errors[] = gettext("This private does not appear to be valid."); $input_errors[] = gettext("Key data field should be blank, or a valid x509 private key"); } } if ($pconfig['method'] == "import") { $reqdfields = explode(" ", "descr cert key"); $reqdfieldsn = array( gettext("Descriptive name"), gettext("Certificate data"), gettext("Key data")); if ($_POST['cert'] && (!strstr($_POST['cert'], "BEGIN CERTIFICATE") || !strstr($_POST['cert'], "END CERTIFICATE"))) { $input_errors[] = gettext("This certificate does not appear to be valid."); } if (cert_get_publickey($_POST['cert'], false) != cert_get_publickey($_POST['key'], false, 'prv')) { $input_errors[] = gettext("The submitted private key does not match the submitted certificate data."); } } if ($pconfig['method'] == "internal") { $reqdfields = explode(" ", "descr caref keylen type lifetime dn_country dn_state dn_city ". "dn_organization dn_email dn_commonname"); $reqdfieldsn = array( gettext("Descriptive name"), gettext("Certificate authority"), gettext("Key length"), gettext("Certificate Type"), gettext("Lifetime"), gettext("Distinguished name Country Code"), gettext("Distinguished name State or Province"), gettext("Distinguished name City"), gettext("Distinguished name Organization"), gettext("Distinguished name Email Address"), gettext("Distinguished name Common Name")); } if ($pconfig['method'] == "external") { $reqdfields = explode(" ", "descr csr_keylen csr_dn_country csr_dn_state csr_dn_city ". "csr_dn_organization csr_dn_email csr_dn_commonname"); $reqdfieldsn = array( gettext("Descriptive name"), gettext("Key length"), gettext("Distinguished name Country Code"), gettext("Distinguished name State or Province"), gettext("Distinguished name City"), gettext("Distinguished name Organization"), gettext("Distinguished name Email Address"), gettext("Distinguished name Common Name")); } if ($pconfig['method'] == "existing") { $reqdfields = array("certref"); $reqdfieldsn = array(gettext("Existing Certificate Choice")); } $altnames = array(); do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors); if ($pconfig['method'] != "import" && $pconfig['method'] != "existing") { /* subjectAltNames */ foreach ($_POST as $key => $value) { $entry = ''; if (!substr_compare('altname_type', $key, 0, 12)) { $entry = substr($key, 12); $field = 'type'; } elseif (!substr_compare('altname_value', $key, 0, 13)) { $entry = substr($key, 13); $field = 'value'; } if (ctype_digit($entry)) { $entry++; // Pre-bootstrap code is one-indexed, but the bootstrap code is 0-indexed $altnames[$entry][$field] = $value; } } $pconfig['altnames']['item'] = $altnames; /* Input validation for subjectAltNames */ foreach ($altnames as $idx => $altname) { switch ($altname['type']) { case "DNS": if (!is_hostname($altname['value'], true)) { array_push($input_errors, "DNS subjectAltName values must be valid hostnames, FQDNs or wildcard domains."); } break; case "IP": if (!is_ipaddr($altname['value'])) { array_push($input_errors, "IP subjectAltName values must be valid IP Addresses"); } break; case "email": if (empty($altname['value'])) { array_push($input_errors, "An e-mail address must be provided for this type of subjectAltName"); } if (preg_match("/[\!\#\$\%\^\(\)\~\?\>\<\&\/\\\,\"\']/", $altname['value'])) { array_push($input_errors, "The e-mail provided in a subjectAltName contains invalid characters."); } break; case "URI": /* Close enough? */ if (!is_URL($altname['value'])) { $input_errors[] = "URI subjectAltName types must be a valid URI"; } break; default: $input_errors[] = "Unrecognized subjectAltName type."; } } /* Make sure we do not have invalid characters in the fields for the certificate */ if (preg_match("/[\?\>\<\&\/\\\"\']/", $_POST['descr'])) { array_push($input_errors, "The field 'Descriptive Name' contains invalid characters."); } for ($i = 0; $i < count($reqdfields); $i++) { if (preg_match('/email/', $reqdfields[$i])) { /* dn_email or csr_dn_name */ if (preg_match("/[\!\#\$\%\^\(\)\~\?\>\<\&\/\\\,\"\']/", $_POST[$reqdfields[$i]])) { array_push($input_errors, gettext("The field 'Distinguished name Email Address' contains invalid characters.")); } } } if (($pconfig['method'] != "external") && isset($_POST["keylen"]) && !in_array($_POST["keylen"], $cert_keylens)) { array_push($input_errors, gettext("Please select a valid Key Length.")); } if (($pconfig['method'] != "external") && !in_array($_POST["digest_alg"], $openssl_digest_algs)) { array_push($input_errors, gettext("Please select a valid Digest Algorithm.")); } if (($pconfig['method'] == "external") && isset($_POST["csr_keylen"]) && !in_array($_POST["csr_keylen"], $cert_keylens)) { array_push($input_errors, gettext("Please select a valid Key Length.")); } if (($pconfig['method'] == "external") && !in_array($_POST["csr_digest_alg"], $openssl_digest_algs)) { array_push($input_errors, gettext("Please select a valid Digest Algorithm.")); } } /* save modifications */ if (!$input_errors) { if ($pconfig['method'] == "existing") { $cert = lookup_cert($pconfig['certref']); if ($cert && $a_user) { $a_user[$userid]['cert'][] = $cert['refid']; } } else if ($pconfig['method'] == "sign") { // Sign a CSR $csrid = lookup_cert($pconfig['csrtosign']); $caid = lookup_ca($pconfig['catosignwith']); // Read the CSR from $config, or if a new one, from the textarea if ($pconfig['csrtosign'] === "new") { $csr = $pconfig['csrpaste']; } else { $csr = base64_decode($csrid['csr']); } $old_err_level = error_reporting(0); // Gather the information required for signed cert $ca = base64_decode($caid['crt']); $key = base64_decode($caid['prv']); $duration = $pconfig['duration']; $caref = $pconfig['catosignwith']; $type = (cert_get_purpose($csrid)['server'] === "Yes") ? "server":"user"; // Sign the new cert and export it in x509 format openssl_x509_export(openssl_csr_sign($csr, $ca, $key, $duration, ['x509_extensions' => 'v3_req']), $n509); // Gather the details required to save the new cert $newcert = array(); $newcert['refid'] = uniqid(); $newcert['caref'] = $caref; $newcert['descr'] = $pconfig['descr']; $newcert['type'] = $type; $newcert['crt'] = base64_encode($n509); if ($pconfig['csrtosign'] === "new") { $newcert['prv'] = base64_encode($pconfig['keypaste']); } else { $newcert['prv'] = $csrid['prv']; } // Add it to the config file $config['cert'][] = $newcert; error_reporting($old_err_level); } else { $cert = array(); $cert['refid'] = uniqid(); if (isset($id) && $a_cert[$id]) { $cert = $a_cert[$id]; } $cert['descr'] = $pconfig['descr']; $old_err_level = error_reporting(0); /* otherwise openssl_ functions throw warnings directly to a page screwing menu tab */ if ($pconfig['method'] == "import") { cert_import($cert, $pconfig['cert'], $pconfig['key']); } if ($pconfig['method'] == "internal") { $dn = array( 'countryName' => $pconfig['dn_country'], 'stateOrProvinceName' => cert_escape_x509_chars($pconfig['dn_state']), 'localityName' => cert_escape_x509_chars($pconfig['dn_city']), 'organizationName' => cert_escape_x509_chars($pconfig['dn_organization']), 'emailAddress' => cert_escape_x509_chars($pconfig['dn_email']), 'commonName' => cert_escape_x509_chars($pconfig['dn_commonname'])); if (!empty($pconfig['dn_organizationalunit'])) { $dn['organizationalUnitName'] = cert_escape_x509_chars($pconfig['dn_organizationalunit']); } $altnames_tmp = array(cert_add_altname_type($pconfig['dn_commonname'])); if (count($altnames)) { foreach ($altnames as $altname) { // The CN is added as a SAN automatically, do not add it again. if ($altname['value'] != $pconfig['dn_commonname']) { $altnames_tmp[] = "{$altname['type']}:" . cert_escape_x509_chars($altname['value']); } } } if (!empty($altnames_tmp)) { $dn['subjectAltName'] = implode(",", $altnames_tmp); } if (!cert_create($cert, $pconfig['caref'], $pconfig['keylen'], $pconfig['lifetime'], $dn, $pconfig['type'], $pconfig['digest_alg'])) { $input_errors = array(); while ($ssl_err = openssl_error_string()) { if (strpos($ssl_err, 'NCONF_get_string:no value') === false) { array_push($input_errors, "openssl library returns: " . $ssl_err); } } } } if ($pconfig['method'] == "external") { $dn = array( 'countryName' => $pconfig['csr_dn_country'], 'stateOrProvinceName' => cert_escape_x509_chars($pconfig['csr_dn_state']), 'localityName' => cert_escape_x509_chars($pconfig['csr_dn_city']), 'organizationName' => cert_escape_x509_chars($pconfig['csr_dn_organization']), 'emailAddress' => cert_escape_x509_chars($pconfig['csr_dn_email']), 'commonName' => cert_escape_x509_chars($pconfig['csr_dn_commonname'])); if (!empty($pconfig['csr_dn_organizationalunit'])) { $dn['organizationalUnitName'] = cert_escape_x509_chars($pconfig['csr_dn_organizationalunit']); } if (count($altnames)) { $altnames_tmp = ""; foreach ($altnames as $altname) { $altnames_tmp[] = "{$altname['type']}:{$altname['value']}"; } $dn['subjectAltName'] = implode(",", $altnames_tmp); } if (!csr_generate($cert, $pconfig['csr_keylen'], $dn, $pconfig['csr_digest_alg'])) { $input_errors = array(); while ($ssl_err = openssl_error_string()) { if (strpos($ssl_err, 'NCONF_get_string:no value') === false) { array_push($input_errors, "openssl library returns: " . $ssl_err); } } } } error_reporting($old_err_level); if (isset($id) && $a_cert[$id]) { $a_cert[$id] = $cert; } else { $a_cert[] = $cert; } if (isset($a_user) && isset($userid)) { $a_user[$userid]['cert'][] = $cert['refid']; } } if (!$input_errors) { write_config(); } if ($userid && !$input_errors) { post_redirect("system_usermanager.php", array('act' => 'edit', 'userid' => $userid)); exit; } } } if ($_POST['save'] == gettext("Update")) { unset($input_errors); $pconfig = $_POST; /* input validation */ $reqdfields = explode(" ", "descr cert"); $reqdfieldsn = array( gettext("Descriptive name"), gettext("Final Certificate data")); do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors); if (preg_match("/[\?\>\<\&\/\\\"\']/", $_POST['descr'])) { array_push($input_errors, "The field 'Descriptive Name' contains invalid characters."); } // old way /* make sure this csr and certificate subjects match */ // $subj_csr = csr_get_subject($pconfig['csr'], false); // $subj_cert = cert_get_subject($pconfig['cert'], false); // // if (!isset($_POST['ignoresubjectmismatch']) && !($_POST['ignoresubjectmismatch'] == "yes")) { // if (strcmp($subj_csr, $subj_cert)) { // $input_errors[] = sprintf(gettext("The certificate subject '%s' does not match the signing request subject."), $subj_cert); // $subject_mismatch = true; // } // } $mod_csr = cert_get_publickey($pconfig['csr'], false, 'csr'); $mod_cert = cert_get_publickey($pconfig['cert'], false); if (strcmp($mod_csr, $mod_cert)) { // simply: if the moduli don't match, then the private key and public key won't match $input_errors[] = sprintf(gettext("The certificate public key does not match the signing request public key."), $subj_cert); $subject_mismatch = true; } /* save modifications */ if (!$input_errors) { $cert = $a_cert[$id]; $cert['descr'] = $pconfig['descr']; csr_complete($cert, $pconfig['cert']); $a_cert[$id] = $cert; write_config(); pfSenseHeader("system_certmanager.php"); } } } $pgtitle = array(gettext("System"), gettext("Certificate Manager"), gettext("Certificates")); $pglinks = array("", "system_camanager.php", "system_certmanager.php"); if (($act == "new" || ($_POST['save'] == gettext("Save") && $input_errors)) || ($act == "csr" || ($_POST['save'] == gettext("Update") && $input_errors))) { $pgtitle[] = gettext('Edit'); $pglinks[] = "@self"; } include("head.inc"); if ($input_errors) { print_input_errors($input_errors); } if ($savemsg) { print_info_box($savemsg, 'success'); } $tab_array = array(); $tab_array[] = array(gettext("CAs"), false, "system_camanager.php"); $tab_array[] = array(gettext("Certificates"), true, "system_certmanager.php"); $tab_array[] = array(gettext("Certificate Revocation"), false, "system_crlmanager.php"); display_top_tabs($tab_array); // Load valid country codes $dn_cc = array(); if (file_exists("/etc/ca_countries")) { $dn_cc_file=file("/etc/ca_countries"); foreach ($dn_cc_file as $line) { if (preg_match('/^(\S*)\s(.*)$/', $line, $matches)) { $dn_cc[$matches[1]] = $matches[1]; } } } if ($act == "new" || (($_POST['save'] == gettext("Save")) && $input_errors)) { $form = new Form(); $form->setAction('system_certmanager.php?act=edit'); if (isset($userid) && $a_user) { $form->addGlobal(new Form_Input( 'userid', null, 'hidden', $userid )); } if (isset($id) && $a_cert[$id]) { $form->addGlobal(new Form_Input( 'id', null, 'hidden', $id )); } $section = new Form_Section('Add/Sign a New Certificate'); if (!isset($id)) { $section->addInput(new Form_Select( 'method', '*Method', $pconfig['method'], $cert_methods ))->toggles(); } $section->addInput(new Form_Input( 'descr', '*Descriptive name', 'text', ($a_user && empty($pconfig['descr'])) ? $a_user[$userid]['name'] : $pconfig['descr'] ))->addClass('toggle-existing'); $form->add($section); // Return an array containing the IDs od all CAs function list_cas() { global $a_ca; $allCas = array(); foreach ($a_ca as $ca) { if ($ca['prv']) { $allCas[$ca['refid']] = $ca['descr']; } } return $allCas; } // Return an array containing the IDs od all CSRs function list_csrs() { global $config; $allCsrs = array(); foreach ($config['cert'] as $cert) { if ($cert['csr']) { $allCsrs[$cert['refid']] = $cert['descr']; } } return ['new' => gettext('New CSR (Paste below)')] + $allCsrs; } $section = new Form_Section('Sign CSR'); $section->addClass('toggle-sign collapse'); $section->AddInput(new Form_Select( 'catosignwith', '*CA to sign with', $pconfig['catosignwith'], list_cas() )); $section->AddInput(new Form_Select( 'csrtosign', '*CSR to sign', isset($pconfig['csrtosign']) ? $pconfig['csrtosign'] : 'new', list_csrs() )); $section->addInput(new Form_Input( 'duration', '*Certificate duration (days)', 'number', $pconfig['duration'] ? $pconfig['duration']:'3650' )); $section->addInput(new Form_Textarea( 'csrpaste', 'CSR data', $pconfig['csrpaste'] ))->setHelp('Paste a Certificate Signing Request in X.509 PEM format here.'); $section->addInput(new Form_Textarea( 'keypaste', 'Key data', $pconfig['keypaste'] ))->setHelp('Optionally paste a private key here. The key will be associated with the newly signed certificate in pfSense'); $form->add($section); $section = new Form_Section('Import Certificate'); $section->addClass('toggle-import collapse'); $section->addInput(new Form_Textarea( 'cert', '*Certificate data', $pconfig['cert'] ))->setHelp('Paste a certificate in X.509 PEM format here.'); $section->addInput(new Form_Textarea( 'key', '*Private key data', $pconfig['key'] ))->setHelp('Paste a private key in X.509 PEM format here.'); $form->add($section); $section = new Form_Section('Internal Certificate'); $section->addClass('toggle-internal collapse'); if (!$internal_ca_count) { $section->addInput(new Form_StaticText( '*Certificate authority', gettext('No internal Certificate Authorities have been defined. ') . gettext('An internal CA must be defined in order to create an internal certificate. ') . sprintf(gettext('%1$sCreate%2$s an internal CA.'), ' ', '') )); } else { $allCas = array(); foreach ($a_ca as $ca) { if (!$ca['prv']) { continue; } $allCas[ $ca['refid'] ] = $ca['descr']; } $section->addInput(new Form_Select( 'caref', '*Certificate authority', $pconfig['caref'], $allCas )); } $section->addInput(new Form_Select( 'keylen', '*Key length', $pconfig['keylen'], array_combine($cert_keylens, $cert_keylens) )); $section->addInput(new Form_Select( 'digest_alg', '*Digest Algorithm', $pconfig['digest_alg'], array_combine($openssl_digest_algs, $openssl_digest_algs) ))->setHelp('NOTE: It is recommended to use an algorithm stronger than '. 'SHA1 when possible.'); $section->addInput(new Form_Select( 'type', '*Certificate Type', $pconfig['type'], $cert_types ))->setHelp('Type of certificate to generate. Used for placing '. 'restrictions on the usage of the generated certificate.'); $section->addInput(new Form_Input( 'lifetime', '*Lifetime (days)', 'number', $pconfig['lifetime'] )); $section->addInput(new Form_Select( 'dn_country', '*Country Code', $pconfig['dn_country'], $dn_cc )); $section->addInput(new Form_Input( 'dn_state', '*State or Province', 'text', $pconfig['dn_state'], ['placeholder' => 'e.g. Texas'] )); $section->addInput(new Form_Input( 'dn_city', '*City', 'text', $pconfig['dn_city'], ['placeholder' => 'e.g. Austin'] )); $section->addInput(new Form_Input( 'dn_organization', '*Organization', 'text', $pconfig['dn_organization'], ['placeholder' => 'e.g. My Company Inc'] )); $section->addInput(new Form_Input( 'dn_organizationalunit', 'Organizational Unit', 'text', $pconfig['dn_organizationalunit'], ['placeholder' => 'e.g. My Department Name (optional)'] )); $section->addInput(new Form_Input( 'dn_email', '*Email Address', 'text', $pconfig['dn_email'], ['placeholder' => 'e.g. admin@mycompany.com'] )); $section->addInput(new Form_Input( 'dn_commonname', '*Common Name', 'text', $pconfig['dn_commonname'], ['placeholder' => 'e.g. www.example.com'] )); if (empty($pconfig['altnames']['item'])) { $pconfig['altnames']['item'] = array( array('type' => null, 'value' => null) ); } $counter = 0; $numrows = count($pconfig['altnames']['item']) - 1; foreach ($pconfig['altnames']['item'] as $item) { $group = new Form_Group($counter == 0 ? 'Alternative Names':''); $group->add(new Form_Select( 'altname_type' . $counter, 'Type', $item['type'], $cert_altname_types ))->setHelp(($counter == $numrows) ? 'Type':null); $group->add(new Form_Input( 'altname_value' . $counter, null, 'text', $item['value'] ))->setHelp(($counter == $numrows) ? 'Value':null); $group->add(new Form_Button( 'deleterow' . $counter, 'Delete', null, 'fa-trash' ))->addClass('btn-warning'); $group->addClass('repeatable'); $group->setHelp('Enter additional identifiers for the certificate in this list. The Common Name field is automatically added to the certificate as an Alternative Name.'); $section->add($group); $counter++; } $section->addInput(new Form_Button( 'addrow', 'Add', null, 'fa-plus' ))->addClass('btn-success'); $form->add($section); $section = new Form_Section('External Signing Request'); $section->addClass('toggle-external collapse'); $section->addInput(new Form_Select( 'csr_keylen', '*Key length', $pconfig['csr_keylen'], array_combine($cert_keylens, $cert_keylens) )); $section->addInput(new Form_Select( 'csr_digest_alg', '*Digest Algorithm', $pconfig['csr_digest_alg'], array_combine($openssl_digest_algs, $openssl_digest_algs) ))->setHelp('NOTE: It is recommended to use an algorithm stronger than '. 'SHA1 when possible'); $section->addInput(new Form_Select( 'csr_dn_country', '*Country Code', $pconfig['csr_dn_country'], $dn_cc )); $section->addInput(new Form_Input( 'csr_dn_state', '*State or Province', 'text', $pconfig['csr_dn_state'], ['placeholder' => 'e.g. Texas'] )); $section->addInput(new Form_Input( 'csr_dn_city', '*City', 'text', $pconfig['csr_dn_city'], ['placeholder' => 'e.g. Austin'] )); $section->addInput(new Form_Input( 'csr_dn_organization', '*Organization', 'text', $pconfig['csr_dn_organization'], ['placeholder' => 'e.g. My Company Inc'] )); $section->addInput(new Form_Input( 'csr_dn_organizationalunit', 'Organizational Unit', 'text', $pconfig['csr_dn_organizationalunit'], ['placeholder' => 'e.g. My Department Name (optional)'] )); $section->addInput(new Form_Input( 'csr_dn_email', '*Email Address', 'text', $pconfig['csr_dn_email'], ['placeholder' => 'e.g. admin@mycompany.com'] )); $section->addInput(new Form_Input( 'csr_dn_commonname', '*Common Name', 'text', $pconfig['csr_dn_commonname'], ['placeholder' => 'e.g. internal-ca'] )); $form->add($section); $section = new Form_Section('Choose an Existing Certificate'); $section->addClass('toggle-existing collapse'); $existCerts = array(); foreach ($config['cert'] as $cert) { if (is_array($config['system']['user'][$userid]['cert'])) { // Could be MIA! if (isset($userid) && in_array($cert['refid'], $config['system']['user'][$userid]['cert'])) { continue; } } $ca = lookup_ca($cert['caref']); if ($ca) { $cert['descr'] .= " (CA: {$ca['descr']})"; } if (cert_in_use($cert['refid'])) { $cert['descr'] .= " (In Use)"; } if (is_cert_revoked($cert)) { $cert['descr'] .= " (Revoked)"; } $existCerts[ $cert['refid'] ] = $cert['descr']; } $section->addInput(new Form_Select( 'certref', '*Existing Certificates', $pconfig['certref'], $existCerts )); $form->add($section); print $form; } else if ($act == "csr" || (($_POST['save'] == gettext("Update")) && $input_errors)) { $form = new Form(false); $form->setAction('system_certmanager.php?act=csr'); $section = new Form_Section("Complete Signing Request for " . $pconfig['descr']); $section->addInput(new Form_Input( 'descr', '*Descriptive name', 'text', $pconfig['descr'] )); $section->addInput(new Form_Textarea( 'csr', 'Signing request data', $pconfig['csr'] ))->setReadonly() ->setWidth(7) ->setHelp('Copy the certificate signing data from here and forward it to a certificate authority for signing.'); $section->addInput(new Form_Textarea( 'cert', '*Final certificate data', $pconfig['cert'] ))->setWidth(7) ->setHelp('Paste the certificate received from the certificate authority here.'); if (isset($id) && $a_cert[$id]) { $section->addInput(new Form_Input( 'id', null, 'hidden', $id )); $section->addInput(new Form_Input( 'act', null, 'hidden', 'csr' )); } $form->add($section); $form->addGlobal(new Form_Button( 'save', 'Update', null, 'fa-save' ))->addClass('btn-primary'); print($form); } else { ?>
=gettext("Name")?> | =gettext("Issuer")?> | =gettext("Distinguished Name")?> | =gettext("In Use")?> | =gettext("Actions")?> |
---|---|---|---|---|
=$name?> =$cert_types[$cert['type']]?> CA: =$purpose['ca']?> =gettext("Server")?>: =$purpose['server']?> |
=$caname?> |
=$subj?>
' . gettext("SAN: ") . ' ';
$certextinfo .= htmlspecialchars(implode(', ', cert_escape_x509_chars($sans, true)));
$certextinfo .= ' '; } if (is_array($purpose) && !empty($purpose['ku'])) { $certextinfo .= '' . gettext("KU: ") . ' '; $certextinfo .= htmlspecialchars(implode(', ', $purpose['ku'])); $certextinfo .= ' '; } if (is_array($purpose) && !empty($purpose['eku'])) { $certextinfo .= '' . gettext("EKU: ") . ' '; $certextinfo .= htmlspecialchars(implode(', ', $purpose['eku'])); } ?>
print_info_box($certextinfo, 'info', false); ?>
=gettext("Valid From")?>: =$startdate ?> =gettext("Valid Until")?>: =$enddate ?> |
=gettext("Revoked")?> =gettext("webConfigurator")?> =gettext("User Cert")?> =gettext("OpenVPN Server")?> =gettext("OpenVPN Client")?> =gettext("IPsec Tunnel")?> =gettext("Captive Portal")?> | "> "> "> "> "> "> " usepost> |