openssl_csr_sign() generates an x509 certificate resource from the given CSR.
Note: You need to have a valid openssl.cnf installed for this function to operate correctly. See the notes under the installation section for more information.
A CSR previously generated by openssl_csr_new(). It can also be the path to a PEM encoded CSR when specified as file://path/to/csr or an exported string generated by openssl_csr_export().
The generated certificate will be signed by cacert
. If cacert
is NULL
, the generated certificate will be a self-signed certificate.
priv_key
is the private key that corresponds to cacert
.
days
specifies the length of time for which the generated certificate will be valid, in days.
You can finetune the CSR signing by configargs
. See openssl_csr_new() for more information about configargs
.
An optional the serial number of issued certificate. If not specified it will default to 0.
Returns an x509 certificate resource on success, FALSE
on failure.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 | <?php // Let's assume that this script is set to receive a CSR that has // been pasted into a textarea from another page $csrdata = $_POST [ "CSR" ]; // We will sign the request using our own "certificate authority" // certificate. You can use any certificate to sign another, but // the process is worthless unless the signing certificate is trusted // by the software/users that will deal with the newly signed certificate // We need our CA cert and its private key $usercert = openssl_csr_sign( $csrdata , $cacert , $privkey , 365); // Now display the generated certificate so that the user can // copy and paste it into their local configuration (such as a file // to hold the certificate for their SSL server) openssl_x509_export( $usercert , $certout ); echo $certout ; // Show any errors that occurred here while (( $e = openssl_error_string()) !== false) { echo $e . "\n" ; } ?> |
Please login to continue.