diff options
Diffstat (limited to 'other/openssh-2.1.1p4/COPYING.Ylonen')
| -rw-r--r-- | other/openssh-2.1.1p4/COPYING.Ylonen | 70 |
1 files changed, 0 insertions, 70 deletions
diff --git a/other/openssh-2.1.1p4/COPYING.Ylonen b/other/openssh-2.1.1p4/COPYING.Ylonen deleted file mode 100644 index ad17df1..0000000 --- a/other/openssh-2.1.1p4/COPYING.Ylonen +++ /dev/null | |||
| @@ -1,70 +0,0 @@ | |||
| 1 | This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland | ||
| 2 | |||
| 3 | |||
| 4 | COPYING POLICY AND OTHER LEGAL ISSUES | ||
| 5 | |||
| 6 | As far as I am concerned, the code I have written for this software | ||
| 7 | can be used freely for any purpose. Any derived versions of this | ||
| 8 | software must be clearly marked as such, and if the derived work is | ||
| 9 | incompatible with the protocol description in the RFC file, it must be | ||
| 10 | called by a name other than "ssh" or "Secure Shell". | ||
| 11 | |||
| 12 | However, I am not implying to give any licenses to any patents or | ||
| 13 | copyrights held by third parties, and the software includes parts that | ||
| 14 | are not under my direct control. As far as I know, all included | ||
| 15 | source code is used in accordance with the relevant license agreements | ||
| 16 | and can be used freely for any purpose (the GNU license being the most | ||
| 17 | restrictive); see below for details. | ||
| 18 | |||
| 19 | [ RSA is no longer included. ] | ||
| 20 | [ IDEA is no longer included. ] | ||
| 21 | [ DES is now external. ] | ||
| 22 | [ GMP is now external. No more GNU licence. ] | ||
| 23 | [ Zlib is now external. ] | ||
| 24 | [ The make-ssh-known-hosts script is no longer included. ] | ||
| 25 | [ TSS has been removed. ] | ||
| 26 | [ MD5 is now external. ] | ||
| 27 | [ RC4 support has been removed (RC4 is used internally for arc4random). ] | ||
| 28 | [ Blowfish is now external. ] | ||
| 29 | |||
| 30 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | ||
| 31 | Comments in the file indicate it may be used for any purpose without | ||
| 32 | restrictions. | ||
| 33 | |||
| 34 | The 32-bit CRC compensation attack detector in deattack.c was | ||
| 35 | contributed by CORE SDI S.A. under a BSD-style license. See | ||
| 36 | http://www.core-sdi.com/english/ssh/ for details. | ||
| 37 | |||
| 38 | Note that any information and cryptographic algorithms used in this | ||
| 39 | software are publicly available on the Internet and at any major | ||
| 40 | bookstore, scientific library, and patent office worldwide. More | ||
| 41 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | ||
| 42 | |||
| 43 | The legal status of this program is some combination of all these | ||
| 44 | permissions and restrictions. Use only at your own responsibility. | ||
| 45 | You will be responsible for any legal consequences yourself; I am not | ||
| 46 | making any claims whether possessing or using this is legal or not in | ||
| 47 | your country, and I am not taking any responsibility on your behalf. | ||
| 48 | |||
| 49 | |||
| 50 | NO WARRANTY | ||
| 51 | |||
| 52 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | ||
| 53 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | ||
| 54 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | ||
| 55 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | ||
| 56 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | ||
| 57 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | ||
| 58 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | ||
| 59 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | ||
| 60 | REPAIR OR CORRECTION. | ||
| 61 | |||
| 62 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | ||
| 63 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | ||
| 64 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | ||
| 65 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | ||
| 66 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | ||
| 67 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | ||
| 68 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | ||
| 69 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | ||
| 70 | POSSIBILITY OF SUCH DAMAGES. | ||
