On Thu, Nov 26, 2009 at 7:59 PM, Dr. Stephen Henson <st...@openssl.org> wrote: > On Mon, Nov 23, 2009, Mathieu Malaterre wrote: > >> Steve, >> >> >> Do you have a sample PBE blob you want to decrypt? >> > >> > Here is one: >> > >> > $ wget http://idisk.mac.com/dclunie-Public/securedicomfileset.tar.bz2 >> > $ openssl asn1parse -in DICOMDIR -inform DER >> > >> > It was generated using Bouncy Castle >> >> I forgot to mention, if you need help from me, do not hesitate ! >> > > I've added experimental support to HEAD. This seems to decrypt the example OK > and can decrypt its own output. It adds a new option -pwri_password to the > cms utility (will need something better at some point).
EXCELLENT ! This works on my machine: tar xvfz openssl-SNAP-20091127.tar.gz cd openssl-SNAP-20091127/ ./config --prefix=$HOME/local --openssldir=$HOME/local/openssl make make install /home/mathieu/local/bin/openssl cms -decrypt -in DICOMDIR -pwri_password password -inform DER > out.dcm Thanks so much :) -- Mathieu ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org