On Aug 17, 2010, at 3:19 PM, Wim Lewis wrote:
> But for any real-world application, you'll want to do the standard business 
> of generating a session key, encrypting the message using conventional 
> symmetric encryption, and encrypting the session key with the public key. 
> Since that's a lot of hassle and it's very easy to write something that works 
> but isn't secure, it's probably a good idea to just adopt one of the higher 
> level cryptographic containers such as CMS:
>   http://www.openssl.org/docs/crypto/CMS_encrypt.html
> 
> even though this does mean you start having to deal with all the X.509 crud.

Ah, I forgot about http://www.openssl.org/docs/crypto/EVP_SealInit.html and 
friends, maybe that would be an easier approach.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to