I am not sure how to do it from the openssl comand line but it can be done in code. If you are encrypting an email the only information that can be pulled from the PKCS7 is the serial number of the cert that encrypted the message and the Issuer DN of the cert the encrypted it. You can then check this information agains your certificates to find out what cert was used to encrypted the message.
Perry > Lets say i use 2 certs/private keys (or more), and i > do not know which of my public keys was used to > encrypt a message to me. Is it possible to supply > multiple secret keys to the openssl smime -decrypt > command, and openssl will be "smart" enough to figure > out the correct key ? > > I tried to no avail, i even copy&pasted the secret > keys into one single file but openssl would refuse to > decrypt. > > i.e. > > openssl smime -decrypt -inkey all_my_secret_keys.pem > -in encrypted_message.txt > > Thanks > > > > > __________________________________ > Do you Yahoo!? > New and Improved Yahoo! Mail - 100MB free storage! > http://promotions.yahoo.com/new_mail > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]