Loading doc/apps/cms.pod +15 −0 Original line number Diff line number Diff line Loading @@ -92,6 +92,11 @@ decrypt mail using the supplied certificate and private key. Expects an encrypted mail message in MIME format for the input file. The decrypted mail is written to the output file. =item B<-debug_decrypt> this option sets the B<CMS_DEBUG_DECRYPT> flag. This option should be used with caution: see the notes section below. =item B<-sign> sign mail using the supplied certificate and private key. Input file is Loading Loading @@ -469,6 +474,16 @@ Streaming is always used for the B<-sign> operation with detached data but since the content is no longer part of the CMS structure the encoding remains DER. If the B<-decrypt> option is used without a recipient certificate then an attempt is made to locate the recipient by trying each potential recipient in turn using the supplied private key. To thwart the MMA attack (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) all recipients are tried whether they succeed or not and if no recipients match the message is "decrypted" using a random key which will typically output garbage. The B<-debug_decrypt> option can be used to disable the MMA attack protection and return an error if no recipient can be found: this option should be used with caution. For a fuller description see L<CMS_decrypt(3)|CMS_decrypt(3)>). =head1 EXIT CODES =over 4 Loading Loading
doc/apps/cms.pod +15 −0 Original line number Diff line number Diff line Loading @@ -92,6 +92,11 @@ decrypt mail using the supplied certificate and private key. Expects an encrypted mail message in MIME format for the input file. The decrypted mail is written to the output file. =item B<-debug_decrypt> this option sets the B<CMS_DEBUG_DECRYPT> flag. This option should be used with caution: see the notes section below. =item B<-sign> sign mail using the supplied certificate and private key. Input file is Loading Loading @@ -469,6 +474,16 @@ Streaming is always used for the B<-sign> operation with detached data but since the content is no longer part of the CMS structure the encoding remains DER. If the B<-decrypt> option is used without a recipient certificate then an attempt is made to locate the recipient by trying each potential recipient in turn using the supplied private key. To thwart the MMA attack (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) all recipients are tried whether they succeed or not and if no recipients match the message is "decrypted" using a random key which will typically output garbage. The B<-debug_decrypt> option can be used to disable the MMA attack protection and return an error if no recipient can be found: this option should be used with caution. For a fuller description see L<CMS_decrypt(3)|CMS_decrypt(3)>). =head1 EXIT CODES =over 4 Loading