Deleted Added
full compact
pkcs12.pod (68651) pkcs12.pod (76866)
1
2=pod
3
4=head1 NAME
5
6pkcs12 - PKCS#12 file utility
7
8=head1 SYNOPSIS

--- 290 unchanged lines hidden (view full) ---

299
300 openssl pkcs12 -export -in file.pem -out file.p12 -name "My Certificate" \
301 -certfile othercerts.pem
302
303=head1 BUGS
304
305Some would argue that the PKCS#12 standard is one big bug :-)
306
1
2=pod
3
4=head1 NAME
5
6pkcs12 - PKCS#12 file utility
7
8=head1 SYNOPSIS

--- 290 unchanged lines hidden (view full) ---

299
300 openssl pkcs12 -export -in file.pem -out file.p12 -name "My Certificate" \
301 -certfile othercerts.pem
302
303=head1 BUGS
304
305Some would argue that the PKCS#12 standard is one big bug :-)
306
307Versions of OpenSSL before 0.9.6a had a bug in the PKCS#12 key generation
308routines. Under rare circumstances this could produce a PKCS#12 file encrypted
309with an invalid key. As a result some PKCS#12 files which triggered this bug
310from other implementations (MSIE or Netscape) could not be decrypted
311by OpenSSL and similarly OpenSSL could produce PKCS#12 files which could
312not be decrypted by other implementations. The chances of producing such
313a file are relatively small: less than 1 in 256.
314
315A side effect of fixing this bug is that any old invalidly encrypted PKCS#12
316files cannot no longer be parsed by the fixed version. Under such circumstances
317the B<pkcs12> utility will report that the MAC is OK but fail with a decryption
318error when extracting private keys.
319
320This problem can be resolved by extracting the private keys and certificates
321from the PKCS#12 file using an older version of OpenSSL and recreating the PKCS#12
322file from the keys and certificates using a newer version of OpenSSL. For example:
323
324 old-openssl -in bad.p12 -out keycerts.pem
325 openssl -in keycerts.pem -export -name "My PKCS#12 file" -out fixed.p12
326
307=head1 SEE ALSO
308
309L<pkcs8(1)|pkcs8(1)>
310
327=head1 SEE ALSO
328
329L<pkcs8(1)|pkcs8(1)>
330