Konstantin Ivanov wrote:

> What would be an approach then to implement such functionality.
> I just asked another question on Attribute certificates,
> but maybe you can comment on that.

This really is a "how do I build a bridge" type of question. It depends on
exactly what kind of bridge you need, and it's not exactly something that
can be answered in a sentence or two. The biggest thing it depends on is
whether you need to resist attempts to modify the application binary or
share (or publicly distribute) licenses.

There is no one trick that does this. It requires a combination of
techniques to defeat verious things that might be done.

Encyrption is one tool you can use, but obfuscation is usually the primary
tool.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to