On Jan 15, 2014, at 3:17 PM, Pascal Quantin <[email protected]> wrote:

> I don't know if it matters or not (as I'm not a lawyer and barely know 
> anything about GPLv2 requirements) but the algorithm source code is available 
> from here: 
> http://www.gsma.com/technicalprojects/fraud-security/security-algorithms

...under terms that probably aren't GPL compatible.

3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3

        ...

Individuals or companies intending to implement and/or use the 128-EEA3 & 
128-EIA3 Algorithms will be required to sign a Restricted Usage Undertaking 
with an appointed custodian, such as the GSM Association. Commercial 
implementors of the algorithms will need to demonstrate that they satisfy 
approval criteria specified in the Restricted Usage Undertaking and formal 
permission to use the algorithms will need to be obtained by way of signing the 
Restricted Usage Undertaking and paying the EUR4,000 administrative charges 
that applies to non-members of the GSMA.

The 128-EEA3 & 128-EIA3 algorithms are based on the ZUC algorithm, for which 
the DCS Centre holds essential patents. Beneficiaries of the 128-EEA3 & 
128-EIA3 algorithms must also be licensed by DACAS. DACAS grants royalty-free 
licenses under those patents under separate written license agreements and 
subject to other terms and conditions which are believed fair and commercially 
reasonable. DACAS reserves the right to refuse or withdraw the license to/from 
the parties that refuse to license, or claim unfair, unreasonable or 
discriminatory royalty rates for their essential IPR. Implementors can apply 
for the ZUC patent license here.

        ...

Every Beneficiary must send to the GSM Association two signed paper copies of 
the Restricted Usage Undertaking – one copy will be countersigned and returned. 
Non-GSM Association members must also enclose the Administrative Charge of € 
4,000.

3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2
The GSMA , having cooperated in the development of the 3GPP Confidentiality and 
Integrity Algorithms UEA2 and UIA2 ("The UEA2 & UIA2 Algorithm"), has been 
granted distribution rights to the Algorithms that have been developed through 
the collaborative efforts of the 3GPP Organisational Partners.

The UEA2 and UIA2 Algorithm specifications are available below and may be used 
only for the development and operation of equipment conforming to the UEA2 & 
UIA2 Algorithm or standards based on it. Every Beneficiary intending to 
implement and/or use the UEA2 & UIA2 Algorithm must sign a Restricted Usage 
Undertaking with a Custodian and demonstrate that they satisfy the approval 
criteria specified in the Restricted Usage Undertaking. A fee of EUR4,000 is 
chargeable to non-members of the GSMA  wishing to implement and/or use the UEA2 
and UIA2 Algorithm.

        ...

Every Beneficiary must send to the GSM Association two signed paper copies of 
the Restricted Usage Undertaking – one copy will be countersigned and returned. 
Non-GSM Association members must also enclose the Administrative Charge of € 
4,000.
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <[email protected]>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:[email protected]?subject=unsubscribe

Reply via email to