6 @macro copyrightstart{}
13 @node Copyrights and Licenses, , Acknowledgments, Top
14 @comment node-name, next, previous, up
15 @appendix Copyrights and Licenses
17 @heading Kungliga Tekniska Högskolan
22 Copyright (c) 1997-2011 Kungliga Tekniska Högskolan
23 (Royal Institute of Technology, Stockholm, Sweden).
26 Portions Copyright (c) 2009 Apple Inc. All rights reserved.
28 Redistribution and use in source and binary forms, with or without
29 modification, are permitted provided that the following conditions
32 1. Redistributions of source code must retain the above copyright
33 notice, this list of conditions and the following disclaimer.
35 2. Redistributions in binary form must reproduce the above copyright
36 notice, this list of conditions and the following disclaimer in the
37 documentation and/or other materials provided with the distribution.
39 3. Neither the name of the Institute nor the names of its contributors
40 may be used to endorse or promote products derived from this software
41 without specific prior written permission.
43 THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
44 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
47 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58 @heading Massachusetts Institute of Technology
60 The parts of the libtelnet that handle Kerberos.
64 Copyright (C) 1990 by the Massachusetts Institute of Technology
66 Export of this software from the United States of America may
67 require a specific license from the United States Government.
68 It is the responsibility of any person or organization contemplating
69 export to obtain such a license before exporting.
71 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
72 distribute this software and its documentation for any purpose and
73 without fee is hereby granted, provided that the above copyright
74 notice appear in all copies and that both that copyright notice and
75 this permission notice appear in supporting documentation, and that
76 the name of M.I.T. not be used in advertising or publicity pertaining
77 to distribution of the software without specific, written prior
78 permission. M.I.T. makes no representations about the suitability of
79 this software for any purpose. It is provided "as is" without express
85 @heading The Regents of the University of California
87 The parts of the libroken, most of libtelnet, telnet, ftp,
92 Copyright (c) 1988, 1990, 1993
93 The Regents of the University of California. All rights reserved.
95 Redistribution and use in source and binary forms, with or without
96 modification, are permitted provided that the following conditions
99 1. Redistributions of source code must retain the above copyright
100 notice, this list of conditions and the following disclaimer.
102 2. Redistributions in binary form must reproduce the above copyright
103 notice, this list of conditions and the following disclaimer in the
104 documentation and/or other materials provided with the distribution.
106 3. Neither the name of the University nor the names of its contributors
107 may be used to endorse or promote products derived from this software
108 without specific prior written permission.
110 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
111 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
112 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
113 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
114 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
115 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
116 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
117 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
118 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
119 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
125 @heading The Regents of the University of California.
131 Copyright (c) 1992, 1993
132 The Regents of the University of California. All rights reserved.
134 This code is derived from software contributed to Berkeley by
135 Christos Zoulas of Cornell University.
137 Redistribution and use in source and binary forms, with or without
138 modification, are permitted provided that the following conditions
140 1. Redistributions of source code must retain the above copyright
141 notice, this list of conditions and the following disclaimer.
142 2. Redistributions in binary form must reproduce the above copyright
143 notice, this list of conditions and the following disclaimer in the
144 documentation and/or other materials provided with the distribution.
145 3. Neither the name of the University nor the names of its contributors
146 may be used to endorse or promote products derived from this software
147 without specific prior written permission.
149 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
150 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
151 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
152 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
153 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
154 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
155 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
156 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
157 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
158 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
164 @heading TomsFastMath / LibTomMath
166 Tom's fast math (bignum support) and LibTomMath
170 LibTomMath is hereby released into the Public Domain.
178 GSS-API mechglue layer.
182 Copyright (c) 2005 Doug Rabson
185 Redistribution and use in source and binary forms, with or without
186 modification, are permitted provided that the following conditions
188 1. Redistributions of source code must retain the above copyright
189 notice, this list of conditions and the following disclaimer.
190 2. Redistributions in binary form must reproduce the above copyright
191 notice, this list of conditions and the following disclaimer in the
192 documentation and/or other materials provided with the distribution.
194 THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
195 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
196 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
197 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
198 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
199 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
200 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
201 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
202 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
203 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
209 @heading PADL Software Pty Ltd
212 @item GSS-API CFX, SPNEGO, naming extensions, API extensions.
213 @item KCM credential cache.
214 @item HDB LDAP backend.
219 Copyright (c) 2003-2011, PADL Software Pty Ltd.
222 Redistribution and use in source and binary forms, with or without
223 modification, are permitted provided that the following conditions
226 1. Redistributions of source code must retain the above copyright
227 notice, this list of conditions and the following disclaimer.
229 2. Redistributions in binary form must reproduce the above copyright
230 notice, this list of conditions and the following disclaimer in the
231 documentation and/or other materials provided with the distribution.
233 3. Neither the name of PADL Software nor the names of its contributors
234 may be used to endorse or promote products derived from this software
235 without specific prior written permission.
237 THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND
238 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
239 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
240 ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE
241 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
242 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
243 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
244 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
245 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
246 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
254 Fortuna in libhcrypto
258 Copyright (c) 2005 Marko Kreen
261 Redistribution and use in source and binary forms, with or without
262 modification, are permitted provided that the following conditions
264 1. Redistributions of source code must retain the above copyright
265 notice, this list of conditions and the following disclaimer.
266 2. Redistributions in binary form must reproduce the above copyright
267 notice, this list of conditions and the following disclaimer in the
268 documentation and/or other materials provided with the distribution.
270 THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
271 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
272 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
273 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
274 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
275 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
276 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
277 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
278 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
279 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
285 @heading NTT (Nippon Telegraph and Telephone Corporation)
287 Camellia in libhcrypto
291 Copyright (c) 2006,2007
292 NTT (Nippon Telegraph and Telephone Corporation) . All rights reserved.
294 Redistribution and use in source and binary forms, with or without
295 modification, are permitted provided that the following conditions
297 1. Redistributions of source code must retain the above copyright
298 notice, this list of conditions and the following disclaimer as
299 the first lines of this file unmodified.
300 2. Redistributions in binary form must reproduce the above copyright
301 notice, this list of conditions and the following disclaimer in the
302 documentation and/or other materials provided with the distribution.
304 THIS SOFTWARE IS PROVIDED BY NTT ``AS IS'' AND ANY EXPRESS OR
305 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
306 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
307 IN NO EVENT SHALL NTT BE LIABLE FOR ANY DIRECT, INDIRECT,
308 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
309 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
310 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
311 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
312 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
313 THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
318 @heading The NetBSD Foundation, Inc.
324 Copyright (c) 1999, 2005 The NetBSD Foundation, Inc.
327 Redistribution and use in source and binary forms, with or without
328 modification, are permitted provided that the following conditions
330 1. Redistributions of source code must retain the above copyright
331 notice, this list of conditions and the following disclaimer.
332 2. Redistributions in binary form must reproduce the above copyright
333 notice, this list of conditions and the following disclaimer in the
334 documentation and/or other materials provided with the distribution.
336 THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
337 ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
338 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
339 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
340 BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
341 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
342 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
343 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
344 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
345 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
346 POSSIBILITY OF SUCH DAMAGE.
351 @heading Vincent Rijmen, Antoon Bosselaers, Paulo Barreto
359 @version 3.0 (December 2000)
361 Optimised ANSI C code for the Rijndael cipher (now AES)
363 @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
364 @author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be>
365 @author Paulo Barreto <paulo.barreto@terra.com.br>
367 This code is hereby placed in the public domain.
369 THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS
370 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
371 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
372 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE
373 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
374 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
375 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
376 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
377 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
378 OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
379 EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
390 Copyright (c) 2008 Apple Inc. All Rights Reserved.
392 Export of this software from the United States of America may require
393 a specific license from the United States Government. It is the
394 responsibility of any person or organization contemplating export to
395 obtain such a license before exporting.
397 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
398 distribute this software and its documentation for any purpose and
399 without fee is hereby granted, provided that the above copyright
400 notice appear in all copies and that both that copyright notice and
401 this permission notice appear in supporting documentation, and that
402 the name of Apple Inc. not be used in advertising or publicity pertaining
403 to distribution of the software without specific, written prior
404 permission. Apple Inc. makes no representations about the suitability of
405 this software for any purpose. It is provided "as is" without express
408 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
409 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
410 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
416 @heading Richard Outerbridge
418 DES core in libhcrypto
424 A portable, public domain, version of the Data Encryption Standard.
426 Written with Symantec's THINK (Lightspeed) C by Richard Outerbridge.
427 Thanks to: Dan Hoey for his excellent Initial and Inverse permutation
428 code; Jim Gillogly & Phil Karn for the DES key schedule code; Dennis
429 Ferguson, Eric Young and Dana How for comparing notes; and Ray Lau,
432 Copyright (c) 1988,1989,1990,1991,1992 by Richard Outerbridge.
433 (GEnie : OUTER; CIS : [71755,204]) Graven Imagery, 1992.
440 @heading Secure Endpoints Inc
446 Copyright (c) 2009, Secure Endpoints Inc.
449 Redistribution and use in source and binary forms, with or without
450 modification, are permitted provided that the following conditions
453 - Redistributions of source code must retain the above copyright
454 notice, this list of conditions and the following disclaimer.
456 - Redistributions in binary form must reproduce the above copyright
457 notice, this list of conditions and the following disclaimer in
458 the documentation and/or other materials provided with the
461 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
462 "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
463 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
464 FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
465 COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
466 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
467 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
468 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
469 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
470 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
471 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
472 OF THE POSSIBILITY OF SUCH DAMAGE.
480 lib/hcrypto/test_dh.c
484 Copyright (c) 2007, Novell, Inc.
485 Author: Matthias Koenig <mkoenig@suse.de>
489 Redistribution and use in source and binary forms, with or without
490 modification, are permitted provided that the following conditions are met:
492 * Redistributions of source code must retain the above copyright notice, this
493 list of conditions and the following disclaimer.
495 * Redistributions in binary form must reproduce the above copyright notice,
496 this list of conditions and the following disclaimer in the documentation
497 and/or other materials provided with the distribution.
499 * Neither the name of the Novell nor the names of its contributors may be used
500 to endorse or promote products derived from this software without specific
501 prior written permission.
503 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
504 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
505 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
506 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
507 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
508 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
509 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
510 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
511 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
512 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
513 POSSIBILITY OF SUCH DAMAGE.