Konstantin Ivanov wrote: > What would be an approach then to implement such functionality. > I just asked another question on Attribute certificates, > but maybe you can comment on that.
This really is a "how do I build a bridge" type of question. It depends on exactly what kind of bridge you need, and it's not exactly something that can be answered in a sentence or two. The biggest thing it depends on is whether you need to resist attempts to modify the application binary or share (or publicly distribute) licenses. There is no one trick that does this. It requires a combination of techniques to defeat verious things that might be done. Encyrption is one tool you can use, but obfuscation is usually the primary tool. DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org