> > If you dynamically > > link to OpenSSL, you may have no idea or control over what > > algorithms and > > key lengths you wind up using. This makes the form impossible > > to fill out. > > In my experience if you just refer to the SSL/TLS spec you're fine.
Really? Even if you don't specify any algorithms or key lengths in detail? > > If your product includes the OpenSSL libraries, you'd likely > > have to build > > a secure key length limitation into the version of the > > libraries that you > > ship. If your product dynamically links to the OpenSSL > > libraries or permits > > the user to supply his own version, you'd likely have to > > provide reasonable > > secure key length limitations in the application. > If your product doesn't supply crypto, there's no need to apply > for a license. > The old crypto-with-a-hole is dead. In my experiences, if you're > implementing > HTTPS, then just refer to the SSL/TLS spec. If you are implementing a > custom protocol, then you have to fill out all those key parameters. Where did you get that from? Maybe I'm out of the loop, but last I checked, a product with encryption hooks was an encryption product. > > Note that the BXA doesn't care how your code does what it does, > > whether it > > uses OpenSSL or code you wrote yourself or whatever. They just > > care *what* > > your code is capable of doing. > Not true. If you say "I'm just using OpenSSL to implement standard HTTPS" > then you're in lot simpler position than if you grew your own > from scratch. > These folks do understand the landscape out there. Wow, your experiences are totally different from mine. Or maybe I just did more than I had to. DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]