I am not sure how to do it from the openssl comand line but it can be done
in code. If you are encrypting an email the only information that can be
pulled from the PKCS7 is the serial number of the cert that encrypted the
message and the Issuer DN of the cert the encrypted it.  You can then
check this information agains your certificates to find out what cert was
used to encrypted the message.

Perry

> Lets say i use 2 certs/private keys (or more), and i
> do not know which of my public keys was used to
> encrypt a message to me. Is it possible to supply
> multiple secret keys to the openssl smime -decrypt
> command, and openssl will be "smart" enough to figure
> out the correct key ?
>
> I tried to no avail, i even copy&pasted the secret
> keys into one single file but openssl would refuse to
> decrypt.
>
> i.e.
>
> openssl smime -decrypt -inkey all_my_secret_keys.pem
> -in encrypted_message.txt
>
> Thanks
>
>
>
>
> __________________________________
> Do you Yahoo!?
> New and Improved Yahoo! Mail - 100MB free storage!
> http://promotions.yahoo.com/new_mail
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to