From: Dr. Stephen Henson Date: Fri, 4 Mar 2016 03:51:35 +0000 (+0000) Subject: Update documentation X-Git-Tag: OpenSSL_1_1_0-pre4~327 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=5596bda4fc372ca9528895e39db35425f9e28e83;p=oweals%2Fopenssl.git Update documentation Reviewed-by: Rich Salz --- diff --git a/doc/apps/pkcs8.pod b/doc/apps/pkcs8.pod index f3b20ff4b1..8d28a123a1 100644 --- a/doc/apps/pkcs8.pod +++ b/doc/apps/pkcs8.pod @@ -18,9 +18,6 @@ B B [B<-iter count>] [B<-noiter>] [B<-nocrypt>] -[B<-nooct>] -[B<-embed>] -[B<-nsdb>] [B<-v2 alg>] [B<-v2prf alg>] [B<-v1 alg>] @@ -101,26 +98,6 @@ This option does not encrypt private keys at all and should only be used when absolutely necessary. Certain software such as some versions of Java code signing software used unencrypted private keys. -=item B<-nooct> - -This option generates RSA private keys in a broken format that some software -uses. Specifically the private key should be enclosed in a OCTET STRING -but some software just includes the structure itself without the -surrounding OCTET STRING. - -=item B<-embed> - -This option generates DSA keys in a broken format. The DSA parameters are -embedded inside the PrivateKey structure. In this form the OCTET STRING -contains an ASN1 SEQUENCE consisting of two structures: a SEQUENCE containing -the parameters and an ASN1 INTEGER containing the private key. - -=item B<-nsdb> - -This option generates DSA keys in a broken format compatible with Netscape -private key databases. The PrivateKey contains a SEQUENCE consisting of -the public and private keys respectively. - =item B<-v2 alg> This option enables the use of PKCS#5 v2.0 algorithms. Normally PKCS#8