summaryrefslogtreecommitdiffstats
path: root/doc/apps/pkcs12.pod
diff options
context:
space:
mode:
authorRich Salz <rsalz@akamai.com>2015-10-27 13:40:11 -0400
committerRich Salz <rsalz@openssl.org>2015-10-28 17:23:51 -0400
commita528d4f0a9a71405f3ca06e20cbd27aa1b8c0df9 (patch)
tree302c2c6dd2accf5ba1a928862f1367e394779962 /doc/apps/pkcs12.pod
parent6f5c03032080aa35e2ad5765b7243b8c75305611 (diff)
Remove SSLeay history, etc., from docs
If something was "present in all versions" of SSLeay, or if it was added to a version of SSLeay (and therefore predates OpenSSL), remove mention of it. Documentation history now starts with OpenSSL. Remove mention of all history before OpenSSL 0.9.8, inclusive. Remove all AUTHOR sections. Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'doc/apps/pkcs12.pod')
-rw-r--r--doc/apps/pkcs12.pod24
1 files changed, 0 insertions, 24 deletions
diff --git a/doc/apps/pkcs12.pod b/doc/apps/pkcs12.pod
index f8162d0c1c..811b8222be 100644
--- a/doc/apps/pkcs12.pod
+++ b/doc/apps/pkcs12.pod
@@ -348,30 +348,6 @@ Include some extra certificates:
openssl pkcs12 -export -in file.pem -out file.p12 -name "My Certificate" \
-certfile othercerts.pem
-=head1 BUGS
-
-Some would argue that the PKCS#12 standard is one big bug :-)
-
-Versions of OpenSSL before 0.9.6a had a bug in the PKCS#12 key generation
-routines. Under rare circumstances this could produce a PKCS#12 file encrypted
-with an invalid key. As a result some PKCS#12 files which triggered this bug
-from other implementations (MSIE or Netscape) could not be decrypted
-by OpenSSL and similarly OpenSSL could produce PKCS#12 files which could
-not be decrypted by other implementations. The chances of producing such
-a file are relatively small: less than 1 in 256.
-
-A side effect of fixing this bug is that any old invalidly encrypted PKCS#12
-files cannot no longer be parsed by the fixed version. Under such circumstances
-the B<pkcs12> utility will report that the MAC is OK but fail with a decryption
-error when extracting private keys.
-
-This problem can be resolved by extracting the private keys and certificates
-from the PKCS#12 file using an older version of OpenSSL and recreating the PKCS#12
-file from the keys and certificates using a newer version of OpenSSL. For example:
-
- old-openssl -in bad.p12 -out keycerts.pem
- openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12
-
=head1 SEE ALSO
L<pkcs8(1)>