From: Dr. Stephen Henson Date: Wed, 16 Apr 2014 11:15:43 +0000 (+0100) Subject: Document -debug_decrypt option. X-Git-Tag: master-post-reformat~864 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=0dd5b94aeb77c2982bdf6886962b7a8491c6c9ed;hp=300b9f0b704048f60776881f1d378c74d9c32fbd Document -debug_decrypt option. --- diff --git a/doc/apps/cms.pod b/doc/apps/cms.pod index cfdc4cb134..a1c896c1e3 100644 --- a/doc/apps/cms.pod +++ b/doc/apps/cms.pod @@ -92,6 +92,11 @@ decrypt mail using the supplied certificate and private key. Expects an encrypted mail message in MIME format for the input file. The decrypted mail is written to the output file. +=item B<-debug_decrypt> + +this option sets the B flag. This option should be used +with caution: see the notes section below. + =item B<-sign> sign mail using the supplied certificate and private key. Input file is @@ -469,6 +474,16 @@ Streaming is always used for the B<-sign> operation with detached data but since the content is no longer part of the CMS structure the encoding remains DER. +If the B<-decrypt> option is used without a recipient certificate then an +attempt is made to locate the recipient by trying each potential recipient +in turn using the supplied private key. To thwart the MMA attack +(Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) all recipients are +tried whether they succeed or not and if no recipients match the message +is "decrypted" using a random key which will typically output garbage. +The B<-debug_decrypt> option can be used to disable the MMA attack protection +and return an error if no recipient can be found: this option should be used +with caution. For a fuller description see L). + =head1 EXIT CODES =over 4