summaryrefslogtreecommitdiff
path: root/crypto/cms/cms.h
diff options
context:
space:
mode:
authorsteve <steve>2012-03-12 16:31:39 +0000
committersteve <steve>2012-03-12 16:31:39 +0000
commitcff3258dc810607224f155da353dd6a7e2695a64 (patch)
tree523f420ac2da43590816503b81e6ebb58339776e /crypto/cms/cms.h
parent03f0dbc8fded9cfcf8d954fd258eecb48bfd79f1 (diff)
downloadopenssl-cff3258dc810607224f155da353dd6a7e2695a64.tar.gz
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
continue with symmetric decryption process to avoid leaking timing information to an attacker. Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this issue. (CVE-2012-0884)
Diffstat (limited to 'crypto/cms/cms.h')
-rw-r--r--crypto/cms/cms.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/cms/cms.h b/crypto/cms/cms.h
index c48c82863..36994fa6a 100644
--- a/crypto/cms/cms.h
+++ b/crypto/cms/cms.h
@@ -111,6 +111,7 @@ DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentInfo)
#define CMS_PARTIAL 0x4000
#define CMS_REUSE_DIGEST 0x8000
#define CMS_USE_KEYID 0x10000
+#define CMS_DEBUG_DECRYPT 0x20000
const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms);