If that were the case, he'd only want the password's owner to be able to
decrypt it. He has to clarify his requirements and what he's trying to do in
order for us to figure out what he wants. I invite the original author to
email me more details of exactly what he's trying to do and I'll be happy to
mail him back a summary of different encryption technologies and how they
could be used to meet his requirements.
DS
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu