Chris,
you can use command asn1parse to analyze the s/mime data stream.
OpenSSL> asn1parse -inform DER -in C:\smime.p7m -out C:\text.txt
0:d=0 hl=4 l=2954 cons: SEQUENCE
4:d=1 hl=2 l= 9 prim: OBJECT :pkcs7-env
15:d=1 hl=4 l=2939 cons: cont [ 0 ]
19:d=2 hl=4 l=2935 cons: SEQUENCE
23:d=3 hl=2 l= 1 prim: INTEGER :00
26:d=3 hl=3 l= 200 cons: SET
29:d=4 hl=3 l= 197 cons: SEQUENCE
32:d=5 hl=2 l= 1 prim: INTEGER :00
35:d=5 hl=2 l= 46 cons: SEQUENCE
37:d=6 hl=2 l= 41 cons: SEQUENCE
39:d=7 hl=2 l= 19 cons: SET
41:d=8 hl=2 l= 17 cons: SEQUENCE
43:d=9 hl=2 l= 3 prim: OBJECT :organizat
48:d=9 hl=2 l= 10 prim: PRINTABLESTRING :IBM-TSMIM
60:d=7 hl=2 l= 18 cons: SET
62:d=8 hl=2 l= 16 cons: SEQUENCE
64:d=9 hl=2 l= 3 prim: OBJECT :commonNam
69:d=9 hl=2 l= 9 prim: UTF8STRING
80:d=6 hl=2 l= 1 prim: INTEGER :00
83:d=5 hl=2 l= 13 cons: SEQUENCE
85:d=6 hl=2 l= 9 prim: OBJECT :rsaEncryp
96:d=6 hl=2 l= 0 prim: NULL
98:d=5 hl=3 l= 128 prim: OCTET STRING
229:d=3 hl=4 l=2725 cons: SEQUENCE
233:d=4 hl=2 l= 9 prim: OBJECT :pkcs7-dat
244:d=4 hl=2 l= 20 cons: SEQUENCE
246:d=5 hl=2 l= 8 prim: OBJECT :des-ede3-
256:d=5 hl=2 l= 8 prim: OCTET STRING
266:d=4 hl=4 l=2688 prim: cont [ 0 ]
Chris <[email protected]>
Sent by: [email protected]
04.03.2009 03:40
Please respond to
[email protected]
To
[email protected]
cc
Subject
What S/MIME Algorithm was used?
I've been using openssl smime to learn a bit more about how it works
and have managed to decrypt and verify messages.
I was wondering if there's a way to feed openssl an S/MIME message and
get information about what encryption algorithm was used... Any help
appreciated.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [email protected]
Automated List Manager [email protected]