[openssl.org #3472] PATCH: Update info on PKCS8 command and -iter option

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[openssl.org #3472] PATCH: Update info on PKCS8 command and -iter option

Rich Salz via RT
Following MC's comments at
https://groups.google.com/d/msg/mailing.openssl.users/BETH6d-kS38/2BikoVnINp8J:

$ cat pkcs8.pod.diff
diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod
index e946cbd..59954de 100644
--- a/doc/apps/pkcs8.pod
+++ b/doc/apps/pkcs8.pod
@@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in
L<openssl(1)|openssl(1)>.

 When creating new PKCS#8 containers, use a given number of iterations
on the password
 in deriving the encryption key for the PKCS#8 output. High values
increase the time
-required to brute-force a PKCS#8 container.
+required to brute-force a PKCS#8 container. B<note>: this option is
available in
+OpenSSL 1.1.0 and above.

 =item B<-nocrypt>


diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod
index e946cbd..59954de 100644
--- a/doc/apps/pkcs8.pod
+++ b/doc/apps/pkcs8.pod
@@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.
 
 When creating new PKCS#8 containers, use a given number of iterations on the password
 in deriving the encryption key for the PKCS#8 output. High values increase the time
-required to brute-force a PKCS#8 container.
+required to brute-force a PKCS#8 container. B<note>: this option is available in
+OpenSSL 1.1.0 and above.
 
 =item B<-nocrypt>