©
本文档使用
php中文网手册 发布
(PHP 4 >= 4.2.0, PHP 5)
openssl_csr_sign — Sign a CSR with another certificate (or itself) and generate a certificate
$csr
, mixed $cacert
, mixed $priv_key
, int $days
[, array $configargs
[, int $serial = 0
]] )openssl_csr_sign() generates an x509 certificate resource from the given CSR.
Note: 必须安装有效的 openssl.cnf 以保证此函数正确运行。参考有关安装的说明以获得更多信息。
csr A CSR previously generated by openssl_csr_new() . It can also be the path to a PEM encoded CSR when specified as file://path/to/csr or an exported string generated by openssl_csr_export() .
cacert
The generated certificate will be signed by cacert.
If cacert is NULL , the generated certificate
will be a self-signed certificate.
priv_key priv_key is the private key that corresponds to
cacert.
days days specifies the length of time for which the
generated certificate will be valid, in days.
configargs
You can finetune the CSR signing by configargs.
See openssl_csr_new() for more information about
configargs.
serial An optional the serial number of issued certificate. If not specified it will default to 0.
Returns an x509 certificate resource on success, FALSE on failure.
Example #1 openssl_csr_sign() example - signing a CSR (how to implement your own CA)
<?php
// Let's assume that this script is set to receive a CSR that has
// been pasted into a textarea from another page
$csrdata = $_POST [ "CSR" ];
// We will sign the request using our own "certificate authority"
// certificate. You can use any certificate to sign another, but
// the process is worthless unless the signing certificate is trusted
// by the software/users that will deal with the newly signed certificate
// We need our CA cert and its private key
$cacert = "file://path/to/ca.crt" ;
$privkey = array( "file://path/to/ca.key" , "your_ca_key_passphrase" );
$usercert = openssl_csr_sign ( $csrdata , $cacert , $privkey , 365 );
// Now display the generated certificate so that the user can
// copy and paste it into their local configuration (such as a file
// to hold the certificate for their SSL server)
openssl_x509_export ( $usercert , $certout );
echo $certout ;
// Show any errors that occurred here
while (( $e = openssl_error_string ()) !== false ) {
echo $e . "\n" ;
}
?> [#1] Sriraam [2015-08-21 20:58:44]
config_section_section is incorrect. The correct keyword to use is "config_section_name".
[#2] Kai Sellgren [2009-02-20 11:05:33]
You can use file_get_contents() to directly pass the content instead of giving file paths.
Also, if you get an error "sec_error_reused_issuer_and_serial", put a serial into the last parameter:
<?php
$privkey = array(file_get_contents('ca.key'),"your_ca_key_passphrase");
$usercert = openssl_csr_sign($csrdata, file_get_contents('ca.crt'),$privkey,365,NULL,'06');
openssl_x509_export($usercert,$certout);
file_put_contents('serverCASigned.crt',$certout);
?>
In that above example the serial was "06".
[#3] thomas dot lussnig at bewegungsmelder dot de [2002-07-11 08:34:53]
Here is an sample how to create valid X.509 Public and Private Key (cert/key).
When not using self signed the 4.2.1 segault. You need the CVS code at least for openssl.
<?php
Header("Content-Type: text/plain");
$CA_CERT = "CA.cert.pem";
$CA_KEY = "CA.key.pem";
$req_key = openssl_pkey_new();
if(openssl_pkey_export ($req_key, $out_key)) {
$dn = array(
"countryName" => "DE",
"stateOrProvinceName" => "Frankfurt",
"organizationName" => "smcc.net",
"organizationalUnitName" => "E-Mail",
"commonName" => "Testcert"
);
$req_csr = openssl_csr_new ($dn, $req_key);
$req_cert = openssl_csr_sign($req_csr, "file://$CA_CERT", "file://$CA_KEY", 365);
if(openssl_x509_export ($req_cert, $out_cert)) {
echo "$out_key\n";
echo "$out_cert\n";
}
else echo "Failed Cert\n";
}
else echo "FailedKey\n";
?>
[#4] eric at ypass dot net [2002-06-13 16:13:30]
To generate a self-signed certificate, pass NULL as the signing certificate (2nd parameter). For example:
$req_key = openssl_pkey_new();
$dn = array(
"countryName" => "US",
"stateOrProvinceName" => "Colorado",
"organizationName" => "yPass.net",
"organizationalUnitName" => "yPass.net",
"commonName" => "yPass.net Root Certificate"
);
$req_csr = openssl_csr_new($dn, $req_key);
$req_cert = openssl_csr_sign($req_csr, NULL, $req_key, 365);