On Aug 17, 2010, at 3:19 PM, Wim Lewis wrote: > But for any real-world application, you'll want to do the standard business > of generating a session key, encrypting the message using conventional > symmetric encryption, and encrypting the session key with the public key. > Since that's a lot of hassle and it's very easy to write something that works > but isn't secure, it's probably a good idea to just adopt one of the higher > level cryptographic containers such as CMS: > http://www.openssl.org/docs/crypto/CMS_encrypt.html > > even though this does mean you start having to deal with all the X.509 crud.
Ah, I forgot about http://www.openssl.org/docs/crypto/EVP_SealInit.html and friends, maybe that would be an easier approach. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org