-
-
Notifications
You must be signed in to change notification settings - Fork 9.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The hardcoded implication of -new with -x509 in openssl req command breaks some use-cases #3396
Comments
|
Ping, can you please at least tell whether you consider this breakage as a bug or not and the current behavior will be kept? |
|
Seems like a bug. A bit tricky to figure out the right thing to do tho. |
|
Ping @levitte. Thoughts? |
|
I don't think this was an intentional breakage... In other words, I'm inclined to see this as a bug that happened with the option processing changes about a year ago... So I'd say this is a bug and should be fixed. |
Allow conversion of existing requests to certificates again. Fixes the issue openssl#3396
Allow conversion of existing requests to certificates again. Fixes the issue openssl#3396
Allow conversion of existing requests to certificates again. Fixes the issue openssl#3396 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from openssl#3437) (cherry picked from commit 888adbe)
This commit
599e590
and equivalent on 1.0.2 branch broke legitimate use-case.
Namely you can generate a request with openssl req invocation and then later you want to convert it to self-signed x509 certificate via the openssl req -x509 command. The -new should not be implicitly set at least for the case the command line specifies -in <cert.req> option. There it is clear that user does not want to generate a new request but wants to read existing request file.
The text was updated successfully, but these errors were encountered: