diff options
author | steve <steve> | 2012-03-12 16:31:39 +0000 |
---|---|---|
committer | steve <steve> | 2012-03-12 16:31:39 +0000 |
commit | cff3258dc810607224f155da353dd6a7e2695a64 (patch) | |
tree | 523f420ac2da43590816503b81e6ebb58339776e /crypto/cms/cms.h | |
parent | 03f0dbc8fded9cfcf8d954fd258eecb48bfd79f1 (diff) | |
download | openssl-cff3258dc810607224f155da353dd6a7e2695a64.tar.gz |
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
continue with symmetric decryption process to avoid leaking timing
information to an attacker.
Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
this issue. (CVE-2012-0884)
Diffstat (limited to 'crypto/cms/cms.h')
-rw-r--r-- | crypto/cms/cms.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/cms/cms.h b/crypto/cms/cms.h index c48c82863..36994fa6a 100644 --- a/crypto/cms/cms.h +++ b/crypto/cms/cms.h @@ -111,6 +111,7 @@ DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentInfo) #define CMS_PARTIAL 0x4000 #define CMS_REUSE_DIGEST 0x8000 #define CMS_USE_KEYID 0x10000 +#define CMS_DEBUG_DECRYPT 0x20000 const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms); |