]>
Commit | Line | Data |
---|---|---|
8efc0c15 | 1 | This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland |
2 | ||
3 | ||
4 | COPYING POLICY AND OTHER LEGAL ISSUES | |
5 | ||
6 | As far as I am concerned, the code I have written for this software | |
7 | can be used freely for any purpose. Any derived versions of this | |
8 | software must be clearly marked as such, and if the derived work is | |
9 | incompatible with the protocol description in the RFC file, it must be | |
10 | called by a name other than "ssh" or "Secure Shell". | |
11 | ||
12 | However, I am not implying to give any licenses to any patents or | |
13 | copyrights held by third parties, and the software includes parts that | |
14 | are not under my direct control. As far as I know, all included | |
15 | source code is used in accordance with the relevant license agreements | |
16 | and can be used freely for any purpose (the GNU license being the most | |
17 | restrictive); see below for details. | |
18 | ||
19 | [ RSA is no longer included. ] | |
20 | [ IDEA is no longer included. ] | |
21 | [ DES is now external. ] | |
22 | [ GMP is now external. No more GNU licence. ] | |
23 | [ Zlib is now external. ] | |
24 | [ The make-ssh-known-hosts script is no longer included. ] | |
25 | [ TSS has been removed. ] | |
26 | [ MD5 is now external. ] | |
38393fc0 | 27 | [ RC4 support has been removed (RC4 is used internally for arc4random). ] |
8efc0c15 | 28 | [ Blowfish is now external. ] |
29 | ||
30 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | |
31 | Comments in the file indicate it may be used for any purpose without | |
32 | restrictions. | |
33 | ||
34 | The 32-bit CRC compensation attack detector in deattack.c was | |
35 | contributed by CORE SDI S.A. under a BSD-style license. See | |
36 | http://www.core-sdi.com/english/ssh/ for details. | |
37 | ||
38 | Note that any information and cryptographic algorithms used in this | |
39 | software are publicly available on the Internet and at any major | |
40 | bookstore, scientific library, and patent office worldwide. More | |
41 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | |
42 | ||
43 | The legal status of this program is some combination of all these | |
44 | permissions and restrictions. Use only at your own responsibility. | |
45 | You will be responsible for any legal consequences yourself; I am not | |
46 | making any claims whether possessing or using this is legal or not in | |
47 | your country, and I am not taking any responsibility on your behalf. | |
48 | ||
49 | ||
50 | NO WARRANTY | |
51 | ||
52 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | |
53 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | |
54 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | |
55 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | |
56 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |
57 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | |
58 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | |
59 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | |
60 | REPAIR OR CORRECTION. | |
61 | ||
62 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | |
63 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | |
64 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | |
65 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | |
66 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | |
67 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | |
68 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | |
69 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | |
70 | POSSIBILITY OF SUCH DAMAGES. |