Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
commitfc5eca05e7811e9ba7e5dd0762b3772728e4a459
authorsteve <steve>
Mon, 12 Mar 2012 14:51:43 +0000 (12 14:51 +0000)
committersteve <steve>
Mon, 12 Mar 2012 14:51:43 +0000 (12 14:51 +0000)
tree74f3fc17373af0053ce855a061fb9bb9defa622b
parent4ee64c237652f88aa3576fe3b5e92ccd2cec8452
Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
continue with symmetric decryption process to avoid leaking timing
information to an attacker.

Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
this issue. (CVE-2012-0884)
CHANGES
apps/cms.c
crypto/cms/cms.h
crypto/cms/cms_enc.c
crypto/cms/cms_env.c
crypto/cms/cms_lcl.h
crypto/cms/cms_smime.c
crypto/pkcs7/pk7_doit.c