Well, as long as the documentation at
http://www.gsmworld.com/technicalprojects/wp-content/uploads/2012/04/snow3gspec.doc
is sufficient to do an actual implementation, it shouldn't be too hard to write 
the
necessary code with a GPLv2+ compatible license - the actual spec is very short
(6 pages).

Ciao
    Jörg

On Wed, Jan 15, 2014 at 03:32:43PM -0800, Guy Harris wrote:
> 
> On Jan 15, 2014, at 3:17 PM, Pascal Quantin <[email protected]> wrote:
> 
> > I don't know if it matters or not (as I'm not a lawyer and barely know 
> > anything about GPLv2 requirements) but the algorithm source code is 
> > available from here: 
> > http://www.gsma.com/technicalprojects/fraud-security/security-algorithms
> 
> ...under terms that probably aren't GPL compatible.
> 
> 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
> 
>       ...
> 
> Individuals or companies intending to implement and/or use the 128-EEA3 & 
> 128-EIA3 Algorithms will be required to sign a Restricted Usage Undertaking 
> with an appointed custodian, such as the GSM Association. Commercial 
> implementors of the algorithms will need to demonstrate that they satisfy 
> approval criteria specified in the Restricted Usage Undertaking and formal 
> permission to use the algorithms will need to be obtained by way of signing 
> the Restricted Usage Undertaking and paying the EUR4,000 administrative 
> charges that applies to non-members of the GSMA.
> 
> The 128-EEA3 & 128-EIA3 algorithms are based on the ZUC algorithm, for which 
> the DCS Centre holds essential patents. Beneficiaries of the 128-EEA3 & 
> 128-EIA3 algorithms must also be licensed by DACAS. DACAS grants royalty-free 
> licenses under those patents under separate written license agreements and 
> subject to other terms and conditions which are believed fair and 
> commercially reasonable. DACAS reserves the right to refuse or withdraw the 
> license to/from the parties that refuse to license, or claim unfair, 
> unreasonable or discriminatory royalty rates for their essential IPR. 
> Implementors can apply for the ZUC patent license here.
> 
>       ...
> 
> Every Beneficiary must send to the GSM Association two signed paper copies of 
> the Restricted Usage Undertaking – one copy will be countersigned and 
> returned. Non-GSM Association members must also enclose the Administrative 
> Charge of € 4,000.
> 
> 3GPP Confidentiality and Integrity Algorithms UEA2 and UIA2
> The GSMA , having cooperated in the development of the 3GPP Confidentiality 
> and Integrity Algorithms UEA2 and UIA2 ("The UEA2 & UIA2 Algorithm"), has 
> been granted distribution rights to the Algorithms that have been developed 
> through the collaborative efforts of the 3GPP Organisational Partners.
> 
> The UEA2 and UIA2 Algorithm specifications are available below and may be 
> used only for the development and operation of equipment conforming to the 
> UEA2 & UIA2 Algorithm or standards based on it. Every Beneficiary intending 
> to implement and/or use the UEA2 & UIA2 Algorithm must sign a Restricted 
> Usage Undertaking with a Custodian and demonstrate that they satisfy the 
> approval criteria specified in the Restricted Usage Undertaking. A fee of 
> EUR4,000 is chargeable to non-members of the GSMA  wishing to implement 
> and/or use the UEA2 and UIA2 Algorithm.
> 
>       ...
> 
> Every Beneficiary must send to the GSM Association two signed paper copies of 
> the Restricted Usage Undertaking – one copy will be countersigned and 
> returned. Non-GSM Association members must also enclose the Administrative 
> Charge of € 4,000.
> ___________________________________________________________________________
> Sent via:    Wireshark-dev mailing list <[email protected]>
> Archives:    http://www.wireshark.org/lists/wireshark-dev
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
>              mailto:[email protected]?subject=unsubscribe

-- 
Joerg Mayer                                           <[email protected]>
We are stuck with technology when what we really want is just stuff that
works. Some say that should read Microsoft instead of technology.
___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <[email protected]>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:[email protected]?subject=unsubscribe

Reply via email to