The normal answer is PKCS#12 <https://en.wikipedia.org/wiki/PKCS_12>, 
Crypto++ -reference should be here  
https://www.cryptopp.com/docs/ref/class_p_k_c_s12___p_b_k_d_f.html

ELSE

*From a generic approach for file encryption:*

You take the DER of some RSA-key and encrypt it with some symmetric 
algorithm, 
e.g. AES-CBC with authentication, e.g. CMAC or HMAC, 
   or a Block-Cipher with conceptually built-in authentitation, e.g. 
AES-GCM, AES-CCM
The secret key pair (key,iv) is derived by PBKDF2 from static (password, 
salt).

Authentication is recommended to assert that the file has not been 
corrupted.
Authenticators CMAC or HMAC require another pre-shared key; here
the static pre-shared parameters are (password, KFD-salt, 
Authenticator-key) 

After decision about the actual algorithms, you should be able to realize 
the steps 
from Crypto++ examples,  which are currently found at
web.archive.org --> www.cryptopp.com 
<https://web.archive.org/web/20240000000000*/www.cryptopp.com>

Jeffrey Walton schrieb am Donnerstag, 16. November 2023 um 16:49:18 UTC+1:

> On Thursday, November 16, 2023 at 10:46:17 AM UTC-5 [email protected] 
> wrote:
>
> Humm almost 20 years later and I have the same question. And the FAQ does 
> not have the answer.
>
>  
> Yeah, the FAQ is kind of old. Use the wiki now: <
> https://www.cryptopp.com/wiki/Main_Page>.
>
> Actually, my case is a little bit more specific. I need to unlock a 
> private key that was locked somewhere else, using openSSL. The key usage is 
> for decrypting and unwrapping. 
>
>
> Try <https://www.cryptopp.com/wiki/PEM_Pack>.
>
> Jeff
>

-- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/cryptopp-users/72a63e16-d27f-41a9-be92-665b32806c30n%40googlegroups.com.

Reply via email to