1 Kerberos Version 5, Release 1.7
6 Unpacking the Source Distribution
7 ---------------------------------
9 The source distribution of Kerberos 5 comes in a gzipped tarfile,
10 krb5-1.7.tar.gz. Instructions on how to extract the entire
13 If you have the GNU tar program and gzip installed, you can simply do:
15 gtar zxpf krb5-1.7.tar.gz
17 If you don't have GNU tar, you will need to get the FSF gzip
18 distribution and use gzcat:
20 gzcat krb5-1.7.tar.gz | tar xpf -
22 Both of these methods will extract the sources into krb5-1.7/src and
23 the documentation into krb5-1.7/doc.
25 Building and Installing Kerberos 5
26 ----------------------------------
28 The first file you should look at is doc/install-guide.ps; it contains
29 the notes for building and installing Kerberos 5. The info file
30 krb5-install.info has the same information in info file format. You
31 can view this using the GNU emacs info-mode, or by using the
32 standalone info file viewer from the Free Software Foundation. This
33 is also available as an HTML file, install.html.
35 Other good files to look at are admin-guide.ps and user-guide.ps,
36 which contain the system administrator's guide, and the user's guide,
37 respectively. They are also available as info files
38 kerberos-admin.info and krb5-user.info, respectively. These files are
39 also available as HTML files.
41 If you are attempting to build under Windows, please see the
42 src/windows/README file.
47 Please report any problems/bugs/comments using the krb5-send-pr
48 program. The krb5-send-pr program will be installed in the sbin
49 directory once you have successfully compiled and installed Kerberos
50 V5 (or if you have installed one of our binary distributions).
52 If you are not able to use krb5-send-pr because you haven't been able
53 compile and install Kerberos V5 on any platform, you may send mail to
56 You may view bug reports by visiting
58 http://krbdev.mit.edu/rt/
60 and logging in as "guest" with password "guest".
65 The Data Encryption Standard (DES) is widely recognized as weak. The
66 krb5-1.7 release will contain measures to encourage sites to migrate
67 away from using single-DES cryptosystems. Among these is a
68 configuration variable that enables "weak" enctypes, but will default
69 to "false" in the future. Depending on the outcome of ongoing
70 discussion on krbdev@mit.edu, this default could change prior to the
71 final release of krb5-1.7.
73 Additional measures to ease the transition away from DES are planned
74 for the final krb5-1.7 release.
79 * Remove support for version 4 of the Kerberos protocol (krb4).
81 * New libdefaults configuration variable "allow_weak_crypto". NOTE:
82 Currently defaults to "false", but may default to "true" in a future
83 release. Setting this variable to "false" will have the effect of
84 removing weak enctypes (currently defined to be all single-DES
85 enctypes) from permitted_enctypes, default_tkt_enctypes, and
88 * Client library now follows client principal referrals, for
89 compatibility with Windows.
91 * KDC can issue realm referrals for service principals based on domain
94 * Encryption algorithm negotiation (RFC 4537).
96 * In the replay cache, use a hash over the complete ciphertext to
97 avoid false-positive replay indications.
99 * Microsoft GSS_WrapEX, implemented using the gss_iov API, which is
100 similar to the equivalent SSPI functionality.
102 * DCE RPC, including three-leg GSS context setup and unencapsulated
105 * NTLM recognition support in GSS-API, to facilitate dropping in an
108 * KDC support for principal aliases, if the back end supports them.
110 * Microsoft set/change password (RFC 3244) protocol in kadmind.
112 * Master key rollover support.
117 Copyright and Other Legal Notices
118 ---------------------------------
120 Copyright (C) 1985-2009 by the Massachusetts Institute of Technology.
124 Export of this software from the United States of America may require
125 a specific license from the United States Government. It is the
126 responsibility of any person or organization contemplating export to
127 obtain such a license before exporting.
129 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
130 distribute this software and its documentation for any purpose and
131 without fee is hereby granted, provided that the above copyright
132 notice appear in all copies and that both that copyright notice and
133 this permission notice appear in supporting documentation, and that
134 the name of M.I.T. not be used in advertising or publicity pertaining
135 to distribution of the software without specific, written prior
136 permission. Furthermore if you modify this software you must label
137 your software as modified software and not distribute it in such a
138 fashion that it might be confused with the original MIT software.
139 M.I.T. makes no representations about the suitability of this software
140 for any purpose. It is provided "as is" without express or implied
143 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
144 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
145 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
147 Individual source code files are copyright MIT, Cygnus Support,
148 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
149 FundsXpress, and others.
151 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
152 and Zephyr are trademarks of the Massachusetts Institute of Technology
153 (MIT). No commercial use of these trademarks may be made without
154 prior written permission of MIT.
156 "Commercial use" means use of a name in a product or other for-profit
157 manner. It does NOT prevent a commercial firm from referring to the
158 MIT trademarks in order to convey information (although in doing so,
159 recognition of their trademark status should be given).
163 Portions of src/lib/crypto have the following copyright:
165 Copyright (C) 1998 by the FundsXpress, INC.
169 Export of this software from the United States of America may require
170 a specific license from the United States Government. It is the
171 responsibility of any person or organization contemplating export to
172 obtain such a license before exporting.
174 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
175 distribute this software and its documentation for any purpose and
176 without fee is hereby granted, provided that the above copyright
177 notice appear in all copies and that both that copyright notice and
178 this permission notice appear in supporting documentation, and that
179 the name of FundsXpress. not be used in advertising or publicity pertaining
180 to distribution of the software without specific, written prior
181 permission. FundsXpress makes no representations about the suitability of
182 this software for any purpose. It is provided "as is" without express
185 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
186 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
187 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
192 The following copyright and permission notice applies to the
193 OpenVision Kerberos Administration system located in kadmin/create,
194 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
197 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
199 WARNING: Retrieving the OpenVision Kerberos Administration system
200 source code, as described below, indicates your acceptance of the
201 following terms. If you do not agree to the following terms, do not
202 retrieve the OpenVision Kerberos administration system.
204 You may freely use and distribute the Source Code and Object Code
205 compiled from it, with or without modification, but this Source
206 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
207 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
208 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
209 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
210 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
211 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
212 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
213 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
214 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
217 OpenVision retains all copyrights in the donated Source Code. OpenVision
218 also retains copyright to derivative works of the Source Code, whether
219 created by OpenVision or by a third party. The OpenVision copyright
220 notice must be preserved if derivative works are made based on the
223 OpenVision Technologies, Inc. has donated this Kerberos
224 Administration system to MIT for inclusion in the standard
225 Kerberos 5 distribution. This donation underscores our
226 commitment to continuing Kerberos technology development
227 and our gratitude for the valuable work which has been
228 performed by MIT and the Kerberos community.
232 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
233 work performed at Fermi National Accelerator Laboratory, which is
234 operated by Universities Research Association, Inc., under
235 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
239 The implementation of the Yarrow pseudo-random number generator in
240 src/lib/crypto/yarrow has the following copyright:
242 Copyright 2000 by Zero-Knowledge Systems, Inc.
244 Permission to use, copy, modify, distribute, and sell this software
245 and its documentation for any purpose is hereby granted without fee,
246 provided that the above copyright notice appear in all copies and that
247 both that copyright notice and this permission notice appear in
248 supporting documentation, and that the name of Zero-Knowledge Systems,
249 Inc. not be used in advertising or publicity pertaining to
250 distribution of the software without specific, written prior
251 permission. Zero-Knowledge Systems, Inc. makes no representations
252 about the suitability of this software for any purpose. It is
253 provided "as is" without express or implied warranty.
255 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
256 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
257 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
258 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
259 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
260 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
261 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
265 The implementation of the AES encryption algorithm in
266 src/lib/crypto/aes has the following copyright:
268 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
273 The free distribution and use of this software in both source and binary
274 form is allowed (with or without changes) provided that:
276 1. distributions of this source code include the above copyright
277 notice, this list of conditions and the following disclaimer;
279 2. distributions in binary form include the above copyright
280 notice, this list of conditions and the following disclaimer
281 in the documentation and/or other associated materials;
283 3. the copyright holder's name is not used to endorse products
284 built using this software without specific written permission.
288 This software is provided 'as is' with no explcit or implied warranties
289 in respect of any properties, including, but not limited to, correctness
290 and fitness for purpose.
294 Portions contributed by Red Hat, including the pre-authentication
295 plug-ins framework, contain the following copyright:
297 Copyright (c) 2006 Red Hat, Inc.
298 Portions copyright (c) 2006 Massachusetts Institute of Technology
301 Redistribution and use in source and binary forms, with or without
302 modification, are permitted provided that the following conditions
305 * Redistributions of source code must retain the above copyright
306 notice, this list of conditions and the following disclaimer.
308 * Redistributions in binary form must reproduce the above
309 copyright notice, this list of conditions and the following
310 disclaimer in the documentation and/or other materials provided
311 with the distribution.
313 * Neither the name of Red Hat, Inc., nor the names of its
314 contributors may be used to endorse or promote products derived
315 from this software without specific prior written permission.
317 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
318 IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
319 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
320 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
321 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
322 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
323 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
324 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
325 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
326 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
327 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
331 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
332 src/lib/gssapi, including the following files:
334 lib/gssapi/generic/gssapi_err_generic.et
335 lib/gssapi/mechglue/g_accept_sec_context.c
336 lib/gssapi/mechglue/g_acquire_cred.c
337 lib/gssapi/mechglue/g_canon_name.c
338 lib/gssapi/mechglue/g_compare_name.c
339 lib/gssapi/mechglue/g_context_time.c
340 lib/gssapi/mechglue/g_delete_sec_context.c
341 lib/gssapi/mechglue/g_dsp_name.c
342 lib/gssapi/mechglue/g_dsp_status.c
343 lib/gssapi/mechglue/g_dup_name.c
344 lib/gssapi/mechglue/g_exp_sec_context.c
345 lib/gssapi/mechglue/g_export_name.c
346 lib/gssapi/mechglue/g_glue.c
347 lib/gssapi/mechglue/g_imp_name.c
348 lib/gssapi/mechglue/g_imp_sec_context.c
349 lib/gssapi/mechglue/g_init_sec_context.c
350 lib/gssapi/mechglue/g_initialize.c
351 lib/gssapi/mechglue/g_inquire_context.c
352 lib/gssapi/mechglue/g_inquire_cred.c
353 lib/gssapi/mechglue/g_inquire_names.c
354 lib/gssapi/mechglue/g_process_context.c
355 lib/gssapi/mechglue/g_rel_buffer.c
356 lib/gssapi/mechglue/g_rel_cred.c
357 lib/gssapi/mechglue/g_rel_name.c
358 lib/gssapi/mechglue/g_rel_oid_set.c
359 lib/gssapi/mechglue/g_seal.c
360 lib/gssapi/mechglue/g_sign.c
361 lib/gssapi/mechglue/g_store_cred.c
362 lib/gssapi/mechglue/g_unseal.c
363 lib/gssapi/mechglue/g_userok.c
364 lib/gssapi/mechglue/g_utils.c
365 lib/gssapi/mechglue/g_verify.c
366 lib/gssapi/mechglue/gssd_pname_to_uid.c
367 lib/gssapi/mechglue/mglueP.h
368 lib/gssapi/mechglue/oid_ops.c
369 lib/gssapi/spnego/gssapiP_spnego.h
370 lib/gssapi/spnego/spnego_mech.c
372 and the initial implementation of incremental propagation, including
373 the following new or changed files:
376 kadmin/server/ipropd_svc.c
378 lib/kdb/kdb_convert.c
381 lib/krb5/error_tables/kdb5_err.et
385 and marked portions of the following files:
387 lib/krb5/os/hst_realm.c
389 are subject to the following license:
391 Copyright (c) 2004 Sun Microsystems, Inc.
393 Permission is hereby granted, free of charge, to any person obtaining a
394 copy of this software and associated documentation files (the
395 "Software"), to deal in the Software without restriction, including
396 without limitation the rights to use, copy, modify, merge, publish,
397 distribute, sublicense, and/or sell copies of the Software, and to
398 permit persons to whom the Software is furnished to do so, subject to
399 the following conditions:
401 The above copyright notice and this permission notice shall be included
402 in all copies or substantial portions of the Software.
404 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
405 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
406 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
407 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
408 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
409 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
410 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
414 MIT Kerberos includes documentation and software developed at the
415 University of California at Berkeley, which includes this copyright
418 Copyright (C) 1983 Regents of the University of California.
421 Redistribution and use in source and binary forms, with or without
422 modification, are permitted provided that the following conditions
425 1. Redistributions of source code must retain the above copyright
426 notice, this list of conditions and the following disclaimer.
428 2. Redistributions in binary form must reproduce the above
429 copyright notice, this list of conditions and the following
430 disclaimer in the documentation and/or other materials provided
431 with the distribution.
433 3. Neither the name of the University nor the names of its
434 contributors may be used to endorse or promote products derived
435 from this software without specific prior written permission.
437 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND
438 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
439 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
440 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
441 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
442 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
443 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
444 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
445 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
446 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
451 Portions contributed by Novell, Inc., including the LDAP database
452 backend, are subject to the following license:
454 Copyright (c) 2004-2005, Novell, Inc.
457 Redistribution and use in source and binary forms, with or without
458 modification, are permitted provided that the following conditions are met:
460 * Redistributions of source code must retain the above copyright notice,
461 this list of conditions and the following disclaimer.
462 * Redistributions in binary form must reproduce the above copyright
463 notice, this list of conditions and the following disclaimer in the
464 documentation and/or other materials provided with the distribution.
465 * The copyright holder's name is not used to endorse or promote products
466 derived from this software without specific prior written permission.
468 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
469 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
470 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
471 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
472 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
473 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
474 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
475 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
476 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
477 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
478 POSSIBILITY OF SUCH DAMAGE.
482 Portions funded by Sandia National Laboratory and developed by the
483 University of Michigan's Center for Information Technology
484 Integration, including the PKINIT implementation, are subject to the
487 COPYRIGHT (C) 2006-2007
488 THE REGENTS OF THE UNIVERSITY OF MICHIGAN
491 Permission is granted to use, copy, create derivative works
492 and redistribute this software and such derivative works
493 for any purpose, so long as the name of The University of
494 Michigan is not used in any advertising or publicity
495 pertaining to the use of distribution of this software
496 without specific, written prior authorization. If the
497 above copyright notice or any other identification of the
498 University of Michigan is included in any copy of any
499 portion of this software, then the disclaimer below must
502 THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
503 FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
504 PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
505 MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
506 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
507 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
508 REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
509 FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
510 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
511 OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
512 IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
517 The pkcs11.h file included in the PKINIT code has the following
520 Copyright 2006 g10 Code GmbH
521 Copyright 2006 Andreas Jellinghaus
523 This file is free software; as a special exception the author gives
524 unlimited permission to copy and/or distribute it, with or without
525 modifications, as long as this notice is preserved.
527 This file is distributed in the hope that it will be useful, but
528 WITHOUT ANY WARRANTY, to the extent permitted by law; without even
529 the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
534 Portions contributed by Apple Inc. are subject to the following license:
536 Copyright 2004-2008 Apple Inc. All Rights Reserved.
538 Export of this software from the United States of America may require
539 a specific license from the United States Government. It is the
540 responsibility of any person or organization contemplating export to
541 obtain such a license before exporting.
543 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
544 distribute this software and its documentation for any purpose and
545 without fee is hereby granted, provided that the above copyright
546 notice appear in all copies and that both that copyright notice and
547 this permission notice appear in supporting documentation, and that
548 the name of Apple Inc. not be used in advertising or publicity pertaining
549 to distribution of the software without specific, written prior
550 permission. Apple Inc. makes no representations about the suitability of
551 this software for any purpose. It is provided "as is" without express
554 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
555 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
556 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
560 The implementations of strlcpy and strlcat in
561 src/util/support/strlcat.c have the following copyright and permission
564 Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
566 Permission to use, copy, modify, and distribute this software for any
567 purpose with or without fee is hereby granted, provided that the above
568 copyright notice and this permission notice appear in all copies.
570 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
571 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
572 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
573 ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
574 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
575 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
576 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
580 The implementations of UTF-8 string handling in src/util/support and
581 src/lib/krb5/unicode are subject to the following copyright and
584 The OpenLDAP Public License
585 Version 2.8, 17 August 2003
587 Redistribution and use of this software and associated documentation
588 ("Software"), with or without modification, are permitted provided
589 that the following conditions are met:
591 1. Redistributions in source form must retain copyright statements
594 2. Redistributions in binary form must reproduce applicable copyright
595 statements and notices, this list of conditions, and the following
596 disclaimer in the documentation and/or other materials provided
597 with the distribution, and
599 3. Redistributions must contain a verbatim copy of this document.
601 The OpenLDAP Foundation may revise this license from time to time.
602 Each revision is distinguished by a version number. You may use
603 this Software under terms of this license revision or under the
604 terms of any subsequent revision of the license.
606 THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS
607 CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
608 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
609 AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
610 SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S)
611 OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
612 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
613 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
614 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
615 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
616 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
617 ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
618 POSSIBILITY OF SUCH DAMAGE.
620 The names of the authors and copyright holders must not be used in
621 advertising or otherwise to promote the sale, use or other dealing
622 in this Software without specific, written prior permission. Title
623 to copyright in this Software shall at all times remain with copyright
626 OpenLDAP is a registered trademark of the OpenLDAP Foundation.
628 Copyright 1999-2003 The OpenLDAP Foundation, Redwood City,
629 California, USA. All Rights Reserved. Permission to copy and
630 distribute verbatim copies of this document is granted.
634 Marked test programs in src/lib/krb5/krb have the following copyright:
636 Copyright (c) 2006 Kungliga Tekniska Högskolan
637 (Royal Institute of Technology, Stockholm, Sweden).
640 Redistribution and use in source and binary forms, with or without
641 modification, are permitted provided that the following conditions
644 1. Redistributions of source code must retain the above copyright
645 notice, this list of conditions and the following disclaimer.
647 2. Redistributions in binary form must reproduce the above copyright
648 notice, this list of conditions and the following disclaimer in the
649 documentation and/or other materials provided with the distribution.
651 3. Neither the name of KTH nor the names of its contributors may be
652 used to endorse or promote products derived from this software without
653 specific prior written permission.
655 THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
656 EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
657 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
658 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
659 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
660 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
661 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
662 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
663 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
664 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
665 ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
670 Thanks to Red Hat for donating the pre-authentication plug-in
673 Thanks to Novell for donating the KDB abstraction layer and the LDAP
676 Thanks to Sun Microsystems for donating their implementations of
677 mechglue, SPNEGO, and incremental propagation.
679 Thanks to the members of the Kerberos V5 development team at MIT, both
680 past and present: Danilo Almeida, Jeffrey Altman, Justin Anderson,
681 Richard Basch, Jay Berkenbilt, Mitch Berger, Andrew Boardman, Joe
682 Calzaretta, John Carr, Don Davis, Alexandra Ellwood, Nancy Gilman,
683 Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus,
684 Miroslav Jurisic, Barry Jaspan, Geoffrey King, Kevin Koch, John Kohl,
685 Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park,
686 Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff
687 Schiller, Jen Selby, Robert Silk, Brad Thompson, Harry Tsai, Zhanna
688 Tsitkova, Ted Ts'o, Marshall Vale, Tom Yu.