summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorDr. David von Oheimb <David.von.Oheimb@siemens.com>2021-01-06 14:44:03 +0100
committerDr. David von Oheimb <dev@ddvo.net>2021-01-20 15:59:22 +0100
commitb9fbacaa7bdce2083186211b3cdf8511ad4cb91d (patch)
tree2b570aa53ff7b2b24658c92f3f08748a9fff9e14 /CHANGES.md
parent1d1d23128f2bfc24d98a973e48e4eb1555d24880 (diff)
apps/x509.c: Add -copy_extensions option, used when transforming x509 <-> req
Fixes #3638 Fixes #6481 Fixes #10458 Partly fixes #13708 Supersedes #9449 Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/13711)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md24
1 files changed, 15 insertions, 9 deletions
diff --git a/CHANGES.md b/CHANGES.md
index cd093491be..8ae1c7470a 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -929,19 +929,25 @@ OpenSSL 3.0
*Richard Levitte*
- * Added the `<-copy_extensions` option to the `req` command for use with `-x509`.
- When given with the `copy` or `copyall` argument,
- any extensions present in the certification request are copied to the certificate.
+ * Added the `-copy_extensions` option to the `x509` command for use with
+ `-req` and `-x509toreq`. When given with the `copy` or `copyall` argument,
+ all extensions in the request are copied to the certificate or vice versa.
+
+ *David von Oheimb*, *Kirill Stefanenkov <kirill_stefanenkov@rambler.ru>*
+
+ * Added the `-copy_extensions` option to the `req` command for use with
+ `-x509`. When given with the `copy` or `copyall` argument,
+ all extensions in the certification request are copied to the certificate.
*David von Oheimb*
- * The `x509`, `req`, and `ca` commands now make sure that certificates they
- generate are RFC 5280 compliant by default: For X.509 version 3 certs they ensure that
- a subjectKeyIdentifier extension is included containing a hash value of the public key
- and an authorityKeyIdentifier extension is included for not self-signed certs
- containing a keyIdentifier field with the hash value identifying the signing key.
+ * The `x509`, `req`, and `ca` commands now make sure that X.509v3 certificates
+ they generate are by default RFC 5280 compliant in the following sense:
+ There is a subjectKeyIdentifier extension with a hash value of the public key
+ and for not self-signed certs there is an authorityKeyIdentifier extension
+ with a keyIdentifier field or issuer information identifying the signing key.
This is done unless some configuration overrides the new default behavior,
- e.g. `authorityKeyIdentifier = none`.
+ such as `subjectKeyIdentifier = none` and `authorityKeyIdentifier = none`.
*David von Oheimb*