Shane Ginnane wrote: >lol - I think this discussion just about lost interest for me when Greg posted >thus: ><quote> >Since a protected key begins life as a secure key, the operational key must >first be decrypted from under the master key (inside the CEX3) but then it is >wrapped using the wrapping key. ></quote>
Shane, just curious - why? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
