[BACK]Return to COPYING.Ylonen CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/COPYING.Ylonen, Revision 1.6

1.1       deraadt     1: This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
                      2:
                      3:
                      4: COPYING POLICY AND OTHER LEGAL ISSUES
                      5:
                      6: As far as I am concerned, the code I have written for this software
                      7: can be used freely for any purpose.  Any derived versions of this
                      8: software must be clearly marked as such, and if the derived work is
                      9: incompatible with the protocol description in the RFC file, it must be
                     10: called by a name other than "ssh" or "Secure Shell".
                     11:
                     12: However, I am not implying to give any licenses to any patents or
                     13: copyrights held by third parties, and the software includes parts that
                     14: are not under my direct control.  As far as I know, all included
                     15: source code is used in accordance with the relevant license agreements
                     16: and can be used freely for any purpose (the GNU license being the most
                     17: restrictive); see below for details.
                     18:
1.3       deraadt    19: [ RSA is no longer included. ]
1.2       deraadt    20: [ IDEA is no longer included. ]
                     21: [ DES is now external. ]
1.3       deraadt    22: [ GMP is now external. No more GNU licence. ]
1.2       deraadt    23: [ Zlib is now external. ]
                     24: [ The make-ssh-known-hosts script is no longer included. ]
                     25: [ TSS has been removed. ]
1.4       deraadt    26: [ MD5 is now external. ]
1.6     ! dugsong    27: [ RC4 support has been removed. ]
1.5       deraadt    28: [ Blowfish is now external. ]
1.1       deraadt    29:
                     30: The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
                     31: Comments in the file indicate it may be used for any purpose without
                     32: restrictions.
1.6     ! dugsong    33:
        !            34: The 32-bit CRC compensation attack detector in deattack.c was
        !            35: contributed by CORE SDI S.A. under a BSD-style license. See
        !            36: http://www.core-sdi.com/english/ssh/ for details.
1.1       deraadt    37:
                     38: Note that any information and cryptographic algorithms used in this
                     39: software are publicly available on the Internet and at any major
                     40: bookstore, scientific library, and patent office worldwide.  More
                     41: information can be found e.g. at "http://www.cs.hut.fi/crypto".
                     42:
                     43: The legal status of this program is some combination of all these
                     44: permissions and restrictions.  Use only at your own responsibility.
                     45: You will be responsible for any legal consequences yourself; I am not
                     46: making any claims whether possessing or using this is legal or not in
                     47: your country, and I am not taking any responsibility on your behalf.
                     48:
                     49:
                     50:                            NO WARRANTY
                     51:
                     52: BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
                     53: FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
                     54: OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
                     55: PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
                     56: OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
                     57: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
                     58: TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
                     59: PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
                     60: REPAIR OR CORRECTION.
                     61:
                     62: IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
                     63: WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
                     64: REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
                     65: INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
                     66: OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
                     67: TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
                     68: YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
                     69: PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
                     70: POSSIBILITY OF SUCH DAMAGES.