23
OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK
AS TO THE QUALITY AND PERFORMANCE OF
THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME
THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
IN N O E VE NT U N L E SS R EQ UI RE D B Y
AP PLI CA BL E L AW OR AG RE ED TO IN
WRITING WILL ANY COPYRIGHT HOLDER,
OR ANY OTHER PARTY WHO MAY MODIFY
AND/OR REDISTRIBUTE THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU
FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING
BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR
A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF
SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
2) The 32-bit CRC compensation attack detector
in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license.
Cryptographic attack detector for ssh - source
code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires,
Argentina.
All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are
permitted provided that this copyright notice is
retained.
THIS SOFTWARE IS PROVIDED "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI
S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR
CONSEQUENTIAL DAMAGES RESULTING FROM
THE USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3) ssh-keyscan was contributed by David Mazieres
under a BSD-style license.
Copyright 1995, 1996 by David Mazieres
<dm@lcs.mit.edu>.
Modification and redistribution in source and binary
forms is permitted provided that due credit is given
to the author and the Open BSD project by leaving
this copyright notice intact.
4) The Rijndael implementation by Vincent Rijmen,
Antoon Bosselaers and Paulo Barreto is in the
public domain and distributed with the following
license:
@version 3.0 (December 2000)
Optimised ANSI C code for the Rijndael cipher
(now AES)
@author Vincent Rijmen <vincent.rijmen@esat.
kuleuven.ac.be>
@a u t ho r A n to o n Bos s e la e rs < an t oo n .
bosselaers@esat.kuleuven.ac.be>
@author Paulo Barreto <paulo.barreto@terra.com.
br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE
AUTHORS ‘’AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHORS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
5) One component of the ssh source code is under
a 3-clause BSD license, held by the University of
California, since we pulled these parts from original
Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California. All
rights reserved.
Redistribution and use in source and binary
forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce
the above copyright notice, this list of conditions
and the following disclaimer in the documentation
and/or other materials provided with the
distribution.
3. Neither the name of the University nor the
names of its contributors may be used to endorse
or promote products derived from this software
without specific prior written permission.
Comentários a estes Manuais