[BACK]Return to COPYING.Ylonen CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/COPYING.Ylonen, Revision 1.5

1.1       deraadt     1: This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
                      2:
                      3:
                      4: COPYING POLICY AND OTHER LEGAL ISSUES
                      5:
                      6: As far as I am concerned, the code I have written for this software
                      7: can be used freely for any purpose.  Any derived versions of this
                      8: software must be clearly marked as such, and if the derived work is
                      9: incompatible with the protocol description in the RFC file, it must be
                     10: called by a name other than "ssh" or "Secure Shell".
                     11:
                     12: However, I am not implying to give any licenses to any patents or
                     13: copyrights held by third parties, and the software includes parts that
                     14: are not under my direct control.  As far as I know, all included
                     15: source code is used in accordance with the relevant license agreements
                     16: and can be used freely for any purpose (the GNU license being the most
                     17: restrictive); see below for details.
                     18:
1.3       deraadt    19: [ RSA is no longer included. ]
1.2       deraadt    20: [ IDEA is no longer included. ]
                     21: [ DES is now external. ]
1.3       deraadt    22: [ GMP is now external. No more GNU licence. ]
1.2       deraadt    23: [ Zlib is now external. ]
                     24: [ The make-ssh-known-hosts script is no longer included. ]
                     25: [ TSS has been removed. ]
1.4       deraadt    26: [ MD5 is now external. ]
                     27: [ RC4 support bas been removed. ]
1.5     ! deraadt    28: [ Blowfish is now external. ]
1.1       deraadt    29:
                     30: The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
                     31: Comments in the file indicate it may be used for any purpose without
                     32: restrictions.
                     33:
                     34: Note that any information and cryptographic algorithms used in this
                     35: software are publicly available on the Internet and at any major
                     36: bookstore, scientific library, and patent office worldwide.  More
                     37: information can be found e.g. at "http://www.cs.hut.fi/crypto".
                     38:
                     39: The legal status of this program is some combination of all these
                     40: permissions and restrictions.  Use only at your own responsibility.
                     41: You will be responsible for any legal consequences yourself; I am not
                     42: making any claims whether possessing or using this is legal or not in
                     43: your country, and I am not taking any responsibility on your behalf.
                     44:
                     45:
                     46:                            NO WARRANTY
                     47:
                     48: BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
                     49: FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
                     50: OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
                     51: PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
                     52: OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
                     53: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
                     54: TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
                     55: PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
                     56: REPAIR OR CORRECTION.
                     57:
                     58: IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
                     59: WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
                     60: REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
                     61: INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
                     62: OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
                     63: TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
                     64: YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
                     65: PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
                     66: POSSIBILITY OF SUCH DAMAGES.