Thx. I'll read these documents. In my system the keys aren't generated in "instalation-time", but I have both the keys, private and public pre-generated.
Actually in my system the password based encrypt system works fine, and it's part of a larger subsystem. So the rsa idea has sounded good for me :-) Regards 2010/8/17 Wim Lewis <w...@omnigroup.com>: > > On Aug 17, 2010, at 3:19 PM, Wim Lewis wrote: >> But for any real-world application, you'll want to do the standard business >> of generating a session key, encrypting the message using conventional >> symmetric encryption, and encrypting the session key with the public key. >> Since that's a lot of hassle and it's very easy to write something that >> works but isn't secure, it's probably a good idea to just adopt one of the >> higher level cryptographic containers such as CMS: >> http://www.openssl.org/docs/crypto/CMS_encrypt.html >> >> even though this does mean you start having to deal with all the X.509 crud. > > Ah, I forgot about http://www.openssl.org/docs/crypto/EVP_SealInit.html and > friends, maybe that would be an easier approach. > > > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-us...@openssl.org > Automated List Manager majord...@openssl.org > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org