openssl/crypto/pkcs7
Dr. Stephen Henson 4f2fc3c2dd Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and
continue with symmetric decryption process to avoid leaking timing
information to an attacker.

Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering
this issue. (CVE-2012-0884)
2012-03-12 14:51:45 +00:00
..
p7
t
.cvsignore Add emacs cache files to .cvsignore. 2005-04-11 14:17:07 +00:00
bio_ber.c make sure error queue is totally emptied 2005-04-07 22:53:35 +00:00
dec.c
des.pem
doc
enc.c
es1.pem
example.c Correct constness problems. 2004-03-24 10:50:42 +00:00
example.h
info.pem
infokey.pem
Makefile Make update: delete duplicate error code. 2008-09-17 17:11:09 +00:00
pk7_asn1.c Change old obsolete email address... 2008-11-05 18:36:57 +00:00
pk7_attr.c Change old obsolete email address... 2008-11-05 18:36:57 +00:00
pk7_dgst.c
pk7_doit.c Fix for CMS/PKCS7 MMA. If RSA decryption fails use a random key and 2012-03-12 14:51:45 +00:00
pk7_enc.c
pk7_lib.c Fix gcc 4.6 warnings. Check TLS server hello extension length. 2010-06-12 13:18:58 +00:00
pk7_mime.c Fix gcc 4.6 warnings. Check TLS server hello extension length. 2010-06-12 13:18:58 +00:00
pk7_smime.c check return value of BIO_write in PKCS7_decrypt 2012-03-08 14:01:44 +00:00
pkcs7.h Allow PKCS7_decrypt() to work if no cert supplied. 2005-08-04 22:10:05 +00:00
pkcs7err.c Rebuild error file C source files. 2006-11-21 20:14:46 +00:00
server.pem
sign.c
verify.c