fatalfr fatalfr wrote:
> Thank you for your reply. Actually I use
> -passin (email editing problem ?)
> Complete command line working fine in cmd is
> the following one :
> openSSL> smime -decrypt -in OUT\TEST_OK.TXT -out OUT\OK.TXT
> -inkey SBE\sbe-test.key.pem -passin pass:tn!;bg+xy:tABrP1Y&ZK
> But I cannot have it working under windows shell =>
> no way to give the pass argument. The other commands of my
> workflow (encrypting, signing, verifying) are ok.
It sounds like you're not using appropriate armor. Your password contains
characters that are special to the shell.
> RetourRun = WshShell.Run("C:\OpenSSL\bin\openssl.exe smime
> -decrypt -in OUT\TEST_OK.TXT -out OUT\OK.TXT -inkey
> SBE\sbe-test.key.pem passin pass:" & MotDpass$, 1, True)
I don't see any code in there to make the password safe to pass to the
shell. What if the password is
"moose& rd /s c:\program files"? (DO NOT TEST THAT! It will destroy files.)
DS
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [email protected]
Automated List Manager [email protected]