Following MC's comments at
https://groups.google.com/d/msg/mailing.openssl.users/BETH6d-kS38/2BikoVnINp8J:

$ cat pkcs8.pod.diff
diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod
index e946cbd..59954de 100644
--- a/doc/apps/pkcs8.pod
+++ b/doc/apps/pkcs8.pod
@@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in
L<openssl(1)|openssl(1)>.

 When creating new PKCS#8 containers, use a given number of iterations
on the password
 in deriving the encryption key for the PKCS#8 output. High values
increase the time
-required to brute-force a PKCS#8 container.
+required to brute-force a PKCS#8 container. B<note>: this option is
available in
+OpenSSL 1.1.0 and above.

 =item B<-nocrypt>

diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod
index e946cbd..59954de 100644
--- a/doc/apps/pkcs8.pod
+++ b/doc/apps/pkcs8.pod
@@ -81,7 +81,8 @@ see the B<PASS PHRASE ARGUMENTS> section in 
L<openssl(1)|openssl(1)>.
 
 When creating new PKCS#8 containers, use a given number of iterations on the 
password
 in deriving the encryption key for the PKCS#8 output. High values increase the 
time
-required to brute-force a PKCS#8 container.
+required to brute-force a PKCS#8 container. B<note>: this option is available 
in
+OpenSSL 1.1.0 and above.
 
 =item B<-nocrypt>
 

Reply via email to