The normal answer is PKCS#12 <https://en.wikipedia.org/wiki/PKCS_12>, Crypto++ -reference should be here https://www.cryptopp.com/docs/ref/class_p_k_c_s12___p_b_k_d_f.html
ELSE *From a generic approach for file encryption:* You take the DER of some RSA-key and encrypt it with some symmetric algorithm, e.g. AES-CBC with authentication, e.g. CMAC or HMAC, or a Block-Cipher with conceptually built-in authentitation, e.g. AES-GCM, AES-CCM The secret key pair (key,iv) is derived by PBKDF2 from static (password, salt). Authentication is recommended to assert that the file has not been corrupted. Authenticators CMAC or HMAC require another pre-shared key; here the static pre-shared parameters are (password, KFD-salt, Authenticator-key) After decision about the actual algorithms, you should be able to realize the steps from Crypto++ examples, which are currently found at web.archive.org --> www.cryptopp.com <https://web.archive.org/web/20240000000000*/www.cryptopp.com> Jeffrey Walton schrieb am Donnerstag, 16. November 2023 um 16:49:18 UTC+1: > On Thursday, November 16, 2023 at 10:46:17 AM UTC-5 [email protected] > wrote: > > Humm almost 20 years later and I have the same question. And the FAQ does > not have the answer. > > > Yeah, the FAQ is kind of old. Use the wiki now: < > https://www.cryptopp.com/wiki/Main_Page>. > > Actually, my case is a little bit more specific. I need to unlock a > private key that was locked somewhere else, using openSSL. The key usage is > for decrypting and unwrapping. > > > Try <https://www.cryptopp.com/wiki/PEM_Pack>. > > Jeff > -- You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion visit https://groups.google.com/d/msgid/cryptopp-users/72a63e16-d27f-41a9-be92-665b32806c30n%40googlegroups.com.
