Chris, you can use command asn1parse to analyze the s/mime data stream.
OpenSSL> asn1parse -inform DER -in C:\smime.p7m -out C:\text.txt 0:d=0 hl=4 l=2954 cons: SEQUENCE 4:d=1 hl=2 l= 9 prim: OBJECT :pkcs7-env 15:d=1 hl=4 l=2939 cons: cont [ 0 ] 19:d=2 hl=4 l=2935 cons: SEQUENCE 23:d=3 hl=2 l= 1 prim: INTEGER :00 26:d=3 hl=3 l= 200 cons: SET 29:d=4 hl=3 l= 197 cons: SEQUENCE 32:d=5 hl=2 l= 1 prim: INTEGER :00 35:d=5 hl=2 l= 46 cons: SEQUENCE 37:d=6 hl=2 l= 41 cons: SEQUENCE 39:d=7 hl=2 l= 19 cons: SET 41:d=8 hl=2 l= 17 cons: SEQUENCE 43:d=9 hl=2 l= 3 prim: OBJECT :organizat 48:d=9 hl=2 l= 10 prim: PRINTABLESTRING :IBM-TSMIM 60:d=7 hl=2 l= 18 cons: SET 62:d=8 hl=2 l= 16 cons: SEQUENCE 64:d=9 hl=2 l= 3 prim: OBJECT :commonNam 69:d=9 hl=2 l= 9 prim: UTF8STRING 80:d=6 hl=2 l= 1 prim: INTEGER :00 83:d=5 hl=2 l= 13 cons: SEQUENCE 85:d=6 hl=2 l= 9 prim: OBJECT :rsaEncryp 96:d=6 hl=2 l= 0 prim: NULL 98:d=5 hl=3 l= 128 prim: OCTET STRING 229:d=3 hl=4 l=2725 cons: SEQUENCE 233:d=4 hl=2 l= 9 prim: OBJECT :pkcs7-dat 244:d=4 hl=2 l= 20 cons: SEQUENCE 246:d=5 hl=2 l= 8 prim: OBJECT :des-ede3- 256:d=5 hl=2 l= 8 prim: OCTET STRING 266:d=4 hl=4 l=2688 prim: cont [ 0 ] Chris <c...@viptalk.net> Sent by: owner-openssl-us...@openssl.org 04.03.2009 03:40 Please respond to openssl-users@openssl.org To openssl-users@openssl.org cc Subject What S/MIME Algorithm was used? I've been using openssl smime to learn a bit more about how it works and have managed to decrypt and verify messages. I was wondering if there's a way to feed openssl an S/MIME message and get information about what encryption algorithm was used... Any help appreciated. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org