diff options
Diffstat (limited to 'other/ssharp/LICENCE')
| -rw-r--r-- | other/ssharp/LICENCE | 136 |
1 files changed, 136 insertions, 0 deletions
diff --git a/other/ssharp/LICENCE b/other/ssharp/LICENCE new file mode 100644 index 0000000..f60f502 --- /dev/null +++ b/other/ssharp/LICENCE | |||
| @@ -0,0 +1,136 @@ | |||
| 1 | This file is part of the OpenSSH software. | ||
| 2 | |||
| 3 | The licences which components of this software fall under are as | ||
| 4 | follows. First, we will summarize and say that all components | ||
| 5 | are under a BSD licence, or a licence more free than that. | ||
| 6 | |||
| 7 | OpenSSH contains no GPL code. | ||
| 8 | |||
| 9 | 1) | ||
| 10 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||
| 11 | * All rights reserved | ||
| 12 | * | ||
| 13 | * As far as I am concerned, the code I have written for this software | ||
| 14 | * can be used freely for any purpose. Any derived versions of this | ||
| 15 | * software must be clearly marked as such, and if the derived work is | ||
| 16 | * incompatible with the protocol description in the RFC file, it must be | ||
| 17 | * called by a name other than "ssh" or "Secure Shell". | ||
| 18 | |||
| 19 | [Tatu continues] | ||
| 20 | * However, I am not implying to give any licenses to any patents or | ||
| 21 | * copyrights held by third parties, and the software includes parts that | ||
| 22 | * are not under my direct control. As far as I know, all included | ||
| 23 | * source code is used in accordance with the relevant license agreements | ||
| 24 | * and can be used freely for any purpose (the GNU license being the most | ||
| 25 | * restrictive); see below for details. | ||
| 26 | |||
| 27 | [However, none of that term is relevant at this point in time. All of | ||
| 28 | these restrictively licenced software components which he talks about | ||
| 29 | have been removed from OpenSSH, ie. | ||
| 30 | |||
| 31 | - RSA is no longer included, found in the OpenSSL library | ||
| 32 | - IDEA is no longer included, its use is deprecated | ||
| 33 | - DES is now external, in the OpenSSL library | ||
| 34 | - GMP is no longer used, and instead we call BN code from OpenSSL | ||
| 35 | - Zlib is now external, in a library | ||
| 36 | - The make-ssh-known-hosts script is no longer included | ||
| 37 | - TSS has been removed | ||
| 38 | - MD5 is now external, in the OpenSSL library | ||
| 39 | - RC4 support has been replaced with ARC4 support from OpenSSL | ||
| 40 | - Blowfish is now external, in the OpenSSL library | ||
| 41 | |||
| 42 | [The licence continues] | ||
| 43 | |||
| 44 | Note that any information and cryptographic algorithms used in this | ||
| 45 | software are publicly available on the Internet and at any major | ||
| 46 | bookstore, scientific library, and patent office worldwide. More | ||
| 47 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | ||
| 48 | |||
| 49 | The legal status of this program is some combination of all these | ||
| 50 | permissions and restrictions. Use only at your own responsibility. | ||
| 51 | You will be responsible for any legal consequences yourself; I am not | ||
| 52 | making any claims whether possessing or using this is legal or not in | ||
| 53 | your country, and I am not taking any responsibility on your behalf. | ||
| 54 | |||
| 55 | |||
| 56 | NO WARRANTY | ||
| 57 | |||
| 58 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | ||
| 59 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | ||
| 60 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | ||
| 61 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | ||
| 62 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | ||
| 63 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | ||
| 64 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | ||
| 65 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | ||
| 66 | REPAIR OR CORRECTION. | ||
| 67 | |||
| 68 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | ||
| 69 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | ||
| 70 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | ||
| 71 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | ||
| 72 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | ||
| 73 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | ||
| 74 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | ||
| 75 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | ||
| 76 | POSSIBILITY OF SUCH DAMAGES. | ||
| 77 | |||
| 78 | 2) | ||
| 79 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | ||
| 80 | Comments in the file indicate it may be used for any purpose without | ||
| 81 | restrictions: | ||
| 82 | |||
| 83 | * COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or | ||
| 84 | * code or tables extracted from it, as desired without restriction. | ||
| 85 | |||
| 86 | 3) | ||
| 87 | The 32-bit CRC compensation attack detector in deattack.c was | ||
| 88 | contributed by CORE SDI S.A. under a BSD-style license. See | ||
| 89 | http://www.core-sdi.com/english/ssh/ for details. | ||
| 90 | |||
| 91 | * Cryptographic attack detector for ssh - source code | ||
| 92 | * | ||
| 93 | * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. | ||
| 94 | * | ||
| 95 | * All rights reserved. Redistribution and use in source and binary | ||
| 96 | * forms, with or without modification, are permitted provided that | ||
| 97 | * this copyright notice is retained. | ||
| 98 | * | ||
| 99 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED | ||
| 100 | * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE | ||
| 101 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR | ||
| 102 | * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS | ||
| 103 | * SOFTWARE. | ||
| 104 | * | ||
| 105 | * Ariel Futoransky <futo@core-sdi.com> | ||
| 106 | * <http://www.core-sdi.com> | ||
| 107 | |||
| 108 | 4) | ||
| 109 | Remaining components of the software are provided under a standard | ||
| 110 | 2-term BSD licence with the following names as copyright holders: | ||
| 111 | |||
| 112 | Markus Friedl | ||
| 113 | Theo de Raadt | ||
| 114 | Niels Provos | ||
| 115 | Dug Song | ||
| 116 | Aaron Campbell | ||
| 117 | |||
| 118 | * Redistribution and use in source and binary forms, with or without | ||
| 119 | * modification, are permitted provided that the following conditions | ||
| 120 | * are met: | ||
| 121 | * 1. Redistributions of source code must retain the above copyright | ||
| 122 | * notice, this list of conditions and the following disclaimer. | ||
| 123 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 124 | * notice, this list of conditions and the following disclaimer in the | ||
| 125 | * documentation and/or other materials provided with the distribution. | ||
| 126 | * | ||
| 127 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR | ||
| 128 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES | ||
| 129 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. | ||
| 130 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, | ||
| 131 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 132 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | ||
| 133 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | ||
| 134 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | ||
| 135 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | ||
| 136 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | ||
