diff options
Diffstat (limited to 'COPYING.Ylonen')
-rw-r--r-- | COPYING.Ylonen | 70 |
1 files changed, 0 insertions, 70 deletions
diff --git a/COPYING.Ylonen b/COPYING.Ylonen deleted file mode 100644 index ad17df17a..000000000 --- a/COPYING.Ylonen +++ /dev/null | |||
@@ -1,70 +0,0 @@ | |||
1 | This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland | ||
2 | |||
3 | |||
4 | COPYING POLICY AND OTHER LEGAL ISSUES | ||
5 | |||
6 | As far as I am concerned, the code I have written for this software | ||
7 | can be used freely for any purpose. Any derived versions of this | ||
8 | software must be clearly marked as such, and if the derived work is | ||
9 | incompatible with the protocol description in the RFC file, it must be | ||
10 | called by a name other than "ssh" or "Secure Shell". | ||
11 | |||
12 | However, I am not implying to give any licenses to any patents or | ||
13 | copyrights held by third parties, and the software includes parts that | ||
14 | are not under my direct control. As far as I know, all included | ||
15 | source code is used in accordance with the relevant license agreements | ||
16 | and can be used freely for any purpose (the GNU license being the most | ||
17 | restrictive); see below for details. | ||
18 | |||
19 | [ RSA is no longer included. ] | ||
20 | [ IDEA is no longer included. ] | ||
21 | [ DES is now external. ] | ||
22 | [ GMP is now external. No more GNU licence. ] | ||
23 | [ Zlib is now external. ] | ||
24 | [ The make-ssh-known-hosts script is no longer included. ] | ||
25 | [ TSS has been removed. ] | ||
26 | [ MD5 is now external. ] | ||
27 | [ RC4 support has been removed (RC4 is used internally for arc4random). ] | ||
28 | [ Blowfish is now external. ] | ||
29 | |||
30 | The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. | ||
31 | Comments in the file indicate it may be used for any purpose without | ||
32 | restrictions. | ||
33 | |||
34 | The 32-bit CRC compensation attack detector in deattack.c was | ||
35 | contributed by CORE SDI S.A. under a BSD-style license. See | ||
36 | http://www.core-sdi.com/english/ssh/ for details. | ||
37 | |||
38 | Note that any information and cryptographic algorithms used in this | ||
39 | software are publicly available on the Internet and at any major | ||
40 | bookstore, scientific library, and patent office worldwide. More | ||
41 | information can be found e.g. at "http://www.cs.hut.fi/crypto". | ||
42 | |||
43 | The legal status of this program is some combination of all these | ||
44 | permissions and restrictions. Use only at your own responsibility. | ||
45 | You will be responsible for any legal consequences yourself; I am not | ||
46 | making any claims whether possessing or using this is legal or not in | ||
47 | your country, and I am not taking any responsibility on your behalf. | ||
48 | |||
49 | |||
50 | NO WARRANTY | ||
51 | |||
52 | BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY | ||
53 | FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN | ||
54 | OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES | ||
55 | PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED | ||
56 | OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | ||
57 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS | ||
58 | TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE | ||
59 | PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, | ||
60 | REPAIR OR CORRECTION. | ||
61 | |||
62 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING | ||
63 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR | ||
64 | REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, | ||
65 | INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING | ||
66 | OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED | ||
67 | TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY | ||
68 | YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER | ||
69 | PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE | ||
70 | POSSIBILITY OF SUCH DAMAGES. | ||