Following MC's comments at https://groups.google.com/d/msg/mailing.openssl.users/BETH6d-kS38/2BikoVnINp8J:
$ cat pkcs8.pod.diff diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod index e946cbd..59954de 100644 --- a/doc/apps/pkcs8.pod +++ b/doc/apps/pkcs8.pod @@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>. When creating new PKCS#8 containers, use a given number of iterations on the password in deriving the encryption key for the PKCS#8 output. High values increase the time -required to brute-force a PKCS#8 container. +required to brute-force a PKCS#8 container. B<note>: this option is available in +OpenSSL 1.1.0 and above. =item B<-nocrypt>
diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod index e946cbd..59954de 100644 --- a/doc/apps/pkcs8.pod +++ b/doc/apps/pkcs8.pod @@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>. When creating new PKCS#8 containers, use a given number of iterations on the password in deriving the encryption key for the PKCS#8 output. High values increase the time -required to brute-force a PKCS#8 container. +required to brute-force a PKCS#8 container. B<note>: this option is available in +OpenSSL 1.1.0 and above. =item B<-nocrypt>
