1 Kerberos Version 5, Release 1.6
6 Unpacking the Source Distribution
7 ---------------------------------
9 The source distribution of Kerberos 5 comes in a gzipped tarfile,
10 krb5-1.6.tar.gz. Instructions on how to extract the entire
13 If you have the GNU tar program and gzip installed, you can simply do:
15 gtar zxpf krb5-1.6.tar.gz
17 If you don't have GNU tar, you will need to get the FSF gzip
18 distribution and use gzcat:
20 gzcat krb5-1.6.tar.gz | tar xpf -
22 Both of these methods will extract the sources into krb5-1.6/src and
23 the documentation into krb5-1.6/doc.
25 Building and Installing Kerberos 5
26 ----------------------------------
28 The first file you should look at is doc/install-guide.ps; it contains
29 the notes for building and installing Kerberos 5. The info file
30 krb5-install.info has the same information in info file format. You
31 can view this using the GNU emacs info-mode, or by using the
32 standalone info file viewer from the Free Software Foundation. This
33 is also available as an HTML file, install.html.
35 Other good files to look at are admin-guide.ps and user-guide.ps,
36 which contain the system administrator's guide, and the user's guide,
37 respectively. They are also available as info files
38 kerberos-admin.info and krb5-user.info, respectively. These files are
39 also available as HTML files.
41 If you are attempting to build under Windows, please see the
42 src/windows/README file.
47 Please report any problems/bugs/comments using the krb5-send-pr
48 program. The krb5-send-pr program will be installed in the sbin
49 directory once you have successfully compiled and installed Kerberos
50 V5 (or if you have installed one of our binary distributions).
52 If you are not able to use krb5-send-pr because you haven't been able
53 compile and install Kerberos V5 on any platform, you may send mail to
56 You may view bug reports by visiting
58 http://krbdev.mit.edu/rt/
60 and logging in as "guest" with password "guest".
63 ----------------------
65 * Partial client implementation to handle server name referrals.
67 * Pre-authentication plug-in framework, donated by Red Hat.
69 * LDAP KDB plug-in, donated by Novell.
71 krb5-1.6 changes by ticket ID
72 -----------------------------
74 Listed below are the RT tickets of bugs fixed in krb5-1.6. Please see
76 http://krbdev.mit.edu/rt/NoAuth/krb5-1.6/fixed-1.6.html
78 for a current listing with links to the complete tickets.
80 1204 Unable to get a TGT cross-realm referral
81 2087 undocumented options for kpropd
82 2240 krb5-config --cflags gssapi when used by OpenSSH-snap-20040212
83 2579 kdc: add_to_transited may reference off end of array...
84 2652 Add support for referrals
85 2876 Tree does not compile with GCC 4.0
87 3089 krb5_verify_init_creds() is not thread safe
88 3091 add krb5_cc_new_unique()
89 3276 local array of structures not declared static
90 3288 NetIdMgr cannot obtain Kerberos 5 tickets containing addresses
91 3322 get_cred_via_tkt() checks too strict on server principal
92 3522 Error code definitions are outside macros to prevent multiple
93 inclusion in public headers
94 3735 Add TCP change/set password support
95 3947 allow multiple calls to krb5_get_error_message to retrieve message
96 3955 check calling conventions specified for Windows
97 3961 fix stdcc.c to build without USE_CCAPI_V3
98 4021 use GSS_C_NO_CHANNEL_BINDINGS not NULL in lib/rpc/auth_gss.c
99 4023 Turn off KLL automatic prompting support in kadmin
100 4024 gss_acquire_cred auto prompt support shouldn't break
101 gss_krb5_ccache_name()
102 4025 need to look harder for tclConfig.sh
103 4055 remove unused Metrowerks support from yarrow
104 4056 g_canon_name.c if-statement warning cleanup
105 4057 GSSAPI opaque types should be pointers to opaque structs, not void*
106 4256 Make process error
107 4292 LDAP error prevents KfM 6.0 from building on Tiger
108 4294 Bad loop logic in krb5_mcc_generate_new
109 4304 audit referals merge (R18598)
110 4389 cursor for iterating over ccaches
111 4412 Don't segfault if a preauth plugin module fails to load
112 4455 IRIX build fails w/ GCC 4.0 (really GNU ld)
113 4482 enabling LDAP mix-in support for kdb5_util load
114 4488 osf1 -oldstyle_liblookup typo
115 4495 Avoid segfault in krb5_do_preauth_tryagain
116 4496 fix invalid access found by valgrind
117 4501 fix krb5_ldap_iterate to handle NULL match_expr and
118 open_db_and_mkey to use KRB5_KDB_SRV_TYPE_ADMIN
119 4534 don't confuse profile iterator in 425 princ conversion
120 4561 UC Berkeley BSD license change
121 4562 latest Novell ldap patches and kdb5_util dump support for ldap
122 4587 Change preauth plugin context scope and lifetimes
123 4624 remove t_prf and t_prf.o on make clean
124 4625 Make clean in lib/kdb leaves error table files
125 4657 krb5.h not C++-safe due to "struct krb5_cccol_cursor"
126 4683 Remove obsolete/conflicting prototype for krb524_convert_princs
127 4688 Add public function to get keylenth associated with an enctype
128 4689 Update minor version numbers for 1.6
129 4690 Add "get_data" function to the client preauth plugin interface
130 4692 Document changing the krbtgt key
131 4693 Delay kadmind random number initialization until after fork
132 4735 more Novell ldap patches from Nov 6 and Fix for wrong password
133 policy reference count
134 4737 correct client preauth plugin request_context
135 4738 allow server preauth plugin verify_padata function to return e-data
136 4739 cccursor backend for CCAPI
137 4755 update copyrights and acknowledgments
138 4770 Add macros for __attribute__((deprecated)) for krb4 and des APIs
139 4771 LDAP patch from Novell, 2006-10-13
140 4772 fix some warnings in ldap code
141 4774 avoid double frees in ccache manipulation around gen_new
142 4775 include realm in "can't resolve KDC" error message
143 4784 krb5_stdccv3_generate_new returns NULL ccache
144 4788 ccache double free in krb5_fcc_read_addrs().
145 4799 krb5_c_keylength -> krb5_c_keylengths; add krb5_c_random_to_key
146 4805 replace existing calls of cc_gen_new()
147 4841 free error message when freeing context
148 4846 clean up preauth2 salt debug code
149 4860 fix LDAP plugin Makefile.in lib frag substitutions
150 4928 krb5int_copy_data_contents shouldn't free memory it didn't allocate
151 4941 referrals changes to telnet have unconditional debugging printfs
152 4942 skip all modules in plugin if init function fails
153 4955 Referrals code breaks krb5_set_password_using_ccache to Active
155 4967 referrals support assumes all rewrites produce TGS principals
156 4972 return edata from non-PA_REQUIRED preauth types
157 4973 send a new request with the new padata returned by
158 krb5_do_preauth_tryagain()
160 Copyright and Other Legal Notices
161 ---------------------------------
163 Copyright (C) 1985-2007 by the Massachusetts Institute of Technology.
167 Export of this software from the United States of America may require
168 a specific license from the United States Government. It is the
169 responsibility of any person or organization contemplating export to
170 obtain such a license before exporting.
172 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
173 distribute this software and its documentation for any purpose and
174 without fee is hereby granted, provided that the above copyright
175 notice appear in all copies and that both that copyright notice and
176 this permission notice appear in supporting documentation, and that
177 the name of M.I.T. not be used in advertising or publicity pertaining
178 to distribution of the software without specific, written prior
179 permission. Furthermore if you modify this software you must label
180 your software as modified software and not distribute it in such a
181 fashion that it might be confused with the original MIT software.
182 M.I.T. makes no representations about the suitability of this software
183 for any purpose. It is provided "as is" without express or implied
186 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
187 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
188 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
190 Individual source code files are copyright MIT, Cygnus Support,
191 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
192 FundsXpress, and others.
194 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
195 and Zephyr are trademarks of the Massachusetts Institute of Technology
196 (MIT). No commercial use of these trademarks may be made without
197 prior written permission of MIT.
199 "Commercial use" means use of a name in a product or other for-profit
200 manner. It does NOT prevent a commercial firm from referring to the
201 MIT trademarks in order to convey information (although in doing so,
202 recognition of their trademark status should be given).
206 Portions of src/lib/crypto have the following copyright:
208 Copyright (C) 1998 by the FundsXpress, INC.
212 Export of this software from the United States of America may require
213 a specific license from the United States Government. It is the
214 responsibility of any person or organization contemplating export to
215 obtain such a license before exporting.
217 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
218 distribute this software and its documentation for any purpose and
219 without fee is hereby granted, provided that the above copyright
220 notice appear in all copies and that both that copyright notice and
221 this permission notice appear in supporting documentation, and that
222 the name of FundsXpress. not be used in advertising or publicity pertaining
223 to distribution of the software without specific, written prior
224 permission. FundsXpress makes no representations about the suitability of
225 this software for any purpose. It is provided "as is" without express
228 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
229 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
230 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
235 The following copyright and permission notice applies to the
236 OpenVision Kerberos Administration system located in kadmin/create,
237 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
240 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
242 WARNING: Retrieving the OpenVision Kerberos Administration system
243 source code, as described below, indicates your acceptance of the
244 following terms. If you do not agree to the following terms, do not
245 retrieve the OpenVision Kerberos administration system.
247 You may freely use and distribute the Source Code and Object Code
248 compiled from it, with or without modification, but this Source
249 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
250 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
251 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
252 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
253 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
254 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
255 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
256 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
257 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
260 OpenVision retains all copyrights in the donated Source Code. OpenVision
261 also retains copyright to derivative works of the Source Code, whether
262 created by OpenVision or by a third party. The OpenVision copyright
263 notice must be preserved if derivative works are made based on the
266 OpenVision Technologies, Inc. has donated this Kerberos
267 Administration system to MIT for inclusion in the standard
268 Kerberos 5 distribution. This donation underscores our
269 commitment to continuing Kerberos technology development
270 and our gratitude for the valuable work which has been
271 performed by MIT and the Kerberos community.
275 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
276 work performed at Fermi National Accelerator Laboratory, which is
277 operated by Universities Research Association, Inc., under
278 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
282 The implementation of the Yarrow pseudo-random number generator in
283 src/lib/crypto/yarrow has the following copyright:
285 Copyright 2000 by Zero-Knowledge Systems, Inc.
287 Permission to use, copy, modify, distribute, and sell this software
288 and its documentation for any purpose is hereby granted without fee,
289 provided that the above copyright notice appear in all copies and that
290 both that copyright notice and this permission notice appear in
291 supporting documentation, and that the name of Zero-Knowledge Systems,
292 Inc. not be used in advertising or publicity pertaining to
293 distribution of the software without specific, written prior
294 permission. Zero-Knowledge Systems, Inc. makes no representations
295 about the suitability of this software for any purpose. It is
296 provided "as is" without express or implied warranty.
298 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
299 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
300 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
301 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
302 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
303 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
304 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
308 The implementation of the AES encryption algorithm in
309 src/lib/crypto/aes has the following copyright:
311 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
316 The free distribution and use of this software in both source and binary
317 form is allowed (with or without changes) provided that:
319 1. distributions of this source code include the above copyright
320 notice, this list of conditions and the following disclaimer;
322 2. distributions in binary form include the above copyright
323 notice, this list of conditions and the following disclaimer
324 in the documentation and/or other associated materials;
326 3. the copyright holder's name is not used to endorse products
327 built using this software without specific written permission.
331 This software is provided 'as is' with no explcit or implied warranties
332 in respect of any properties, including, but not limited to, correctness
333 and fitness for purpose.
337 Portions contributed by Red Hat, including the pre-authentication
338 plug-ins framework, contain the following copyright:
340 Copyright (c) 2006 Red Hat, Inc.
341 Portions copyright (c) 2006 Massachusetts Institute of Technology
344 Redistribution and use in source and binary forms, with or without
345 modification, are permitted provided that the following conditions
348 * Redistributions of source code must retain the above copyright
349 notice, this list of conditions and the following disclaimer.
351 * Redistributions in binary form must reproduce the above
352 copyright notice, this list of conditions and the following
353 disclaimer in the documentation and/or other materials provided
354 with the distribution.
356 * Neither the name of Red Hat, Inc., nor the names of its
357 contributors may be used to endorse or promote products derived
358 from this software without specific prior written permission.
360 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
361 IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
362 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
363 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
364 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
365 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
366 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
367 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
368 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
369 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
370 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
374 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
375 src/lib/gssapi, including the following files:
377 lib/gssapi/generic/gssapi_err_generic.et
378 lib/gssapi/mechglue/g_accept_sec_context.c
379 lib/gssapi/mechglue/g_acquire_cred.c
380 lib/gssapi/mechglue/g_canon_name.c
381 lib/gssapi/mechglue/g_compare_name.c
382 lib/gssapi/mechglue/g_context_time.c
383 lib/gssapi/mechglue/g_delete_sec_context.c
384 lib/gssapi/mechglue/g_dsp_name.c
385 lib/gssapi/mechglue/g_dsp_status.c
386 lib/gssapi/mechglue/g_dup_name.c
387 lib/gssapi/mechglue/g_exp_sec_context.c
388 lib/gssapi/mechglue/g_export_name.c
389 lib/gssapi/mechglue/g_glue.c
390 lib/gssapi/mechglue/g_imp_name.c
391 lib/gssapi/mechglue/g_imp_sec_context.c
392 lib/gssapi/mechglue/g_init_sec_context.c
393 lib/gssapi/mechglue/g_initialize.c
394 lib/gssapi/mechglue/g_inquire_context.c
395 lib/gssapi/mechglue/g_inquire_cred.c
396 lib/gssapi/mechglue/g_inquire_names.c
397 lib/gssapi/mechglue/g_process_context.c
398 lib/gssapi/mechglue/g_rel_buffer.c
399 lib/gssapi/mechglue/g_rel_cred.c
400 lib/gssapi/mechglue/g_rel_name.c
401 lib/gssapi/mechglue/g_rel_oid_set.c
402 lib/gssapi/mechglue/g_seal.c
403 lib/gssapi/mechglue/g_sign.c
404 lib/gssapi/mechglue/g_store_cred.c
405 lib/gssapi/mechglue/g_unseal.c
406 lib/gssapi/mechglue/g_userok.c
407 lib/gssapi/mechglue/g_utils.c
408 lib/gssapi/mechglue/g_verify.c
409 lib/gssapi/mechglue/gssd_pname_to_uid.c
410 lib/gssapi/mechglue/mglueP.h
411 lib/gssapi/mechglue/oid_ops.c
412 lib/gssapi/spnego/gssapiP_spnego.h
413 lib/gssapi/spnego/spnego_mech.c
415 and the initial implementation of incremental propagation, including
416 the following new or changed files:
419 kadmin/server/ipropd_svc.c
421 lib/kdb/kdb_convert.c
424 lib/krb5/error_tables/kdb5_err.et
428 are subject to the following license:
430 Copyright (c) 2004 Sun Microsystems, Inc.
432 Permission is hereby granted, free of charge, to any person obtaining a
433 copy of this software and associated documentation files (the
434 "Software"), to deal in the Software without restriction, including
435 without limitation the rights to use, copy, modify, merge, publish,
436 distribute, sublicense, and/or sell copies of the Software, and to
437 permit persons to whom the Software is furnished to do so, subject to
438 the following conditions:
440 The above copyright notice and this permission notice shall be included
441 in all copies or substantial portions of the Software.
443 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
444 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
445 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
446 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
447 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
448 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
449 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
453 MIT Kerberos includes documentation and software developed at the
454 University of California at Berkeley, which includes this copyright
457 Copyright (C) 1983 Regents of the University of California.
460 Redistribution and use in source and binary forms, with or without
461 modification, are permitted provided that the following conditions
464 1. Redistributions of source code must retain the above copyright
465 notice, this list of conditions and the following disclaimer.
467 2. Redistributions in binary form must reproduce the above
468 copyright notice, this list of conditions and the following
469 disclaimer in the documentation and/or other materials provided
470 with the distribution.
472 3. Neither the name of the University nor the names of its
473 contributors may be used to endorse or promote products derived
474 from this software without specific prior written permission.
476 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND
477 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
478 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
479 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
480 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
481 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
482 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
483 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
484 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
485 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
490 Portions contributed by Novell, Inc., including the LDAP database
491 backend, are subject to the following license:
493 Copyright (c) 2004-2005, Novell, Inc.
496 Redistribution and use in source and binary forms, with or without
497 modification, are permitted provided that the following conditions are met:
499 * Redistributions of source code must retain the above copyright notice,
500 this list of conditions and the following disclaimer.
501 * Redistributions in binary form must reproduce the above copyright
502 notice, this list of conditions and the following disclaimer in the
503 documentation and/or other materials provided with the distribution.
504 * The copyright holder's name is not used to endorse or promote products
505 derived from this software without specific prior written permission.
507 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
508 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
509 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
510 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
511 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
512 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
513 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
514 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
515 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
516 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
517 POSSIBILITY OF SUCH DAMAGE.
521 Portions funded by Sandia National Laboratory and developed by the
522 University of Michigan's Center for Information Technology
523 Integration, including the PKINIT implementation, are subject to the
526 COPYRIGHT (C) 2006-2007
527 THE REGENTS OF THE UNIVERSITY OF MICHIGAN
530 Permission is granted to use, copy, create derivative works
531 and redistribute this software and such derivative works
532 for any purpose, so long as the name of The University of
533 Michigan is not used in any advertising or publicity
534 pertaining to the use of distribution of this software
535 without specific, written prior authorization. If the
536 above copyright notice or any other identification of the
537 University of Michigan is included in any copy of any
538 portion of this software, then the disclaimer below must
541 THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
542 FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
543 PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
544 MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
545 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
546 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
547 REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
548 FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
549 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
550 OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
551 IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
556 The pkcs11.h file included in the PKINIT code has the following
559 Copyright 2006 g10 Code GmbH
560 Copyright 2006 Andreas Jellinghaus
562 This file is free software; as a special exception the author gives
563 unlimited permission to copy and/or distribute it, with or without
564 modifications, as long as this notice is preserved.
566 This file is distributed in the hope that it will be useful, but
567 WITHOUT ANY WARRANTY, to the extent permitted by law; without even
568 the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
573 Portions contributed by Apple Inc. are subject to the following license:
575 Copyright 2004-2008 Apple Inc. All Rights Reserved.
577 Export of this software from the United States of America may require
578 a specific license from the United States Government. It is the
579 responsibility of any person or organization contemplating export to
580 obtain such a license before exporting.
582 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
583 distribute this software and its documentation for any purpose and
584 without fee is hereby granted, provided that the above copyright
585 notice appear in all copies and that both that copyright notice and
586 this permission notice appear in supporting documentation, and that
587 the name of Apple Inc. not be used in advertising or publicity pertaining
588 to distribution of the software without specific, written prior
589 permission. Apple Inc. makes no representations about the suitability of
590 this software for any purpose. It is provided "as is" without express
593 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
594 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
595 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
601 Thanks to Red Hat for donating the pre-authentication plug-in
604 Thanks to Novell for donating the KDB abstraction layer and the LDAP
607 Thanks to Sun Microsystems for donating their implementations of
608 mechglue, SPNEGO, and incremental propagation.
610 Thanks to the members of the Kerberos V5 development team at MIT, both
611 past and present: Danilo Almeida, Jeffrey Altman, Justin Anderson,
612 Richard Basch, Jay Berkenbilt, Mitch Berger, Andrew Boardman, Joe
613 Calzaretta, John Carr, Don Davis, Alexandra Ellwood, Nancy Gilman,
614 Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus,
615 Miroslav Jurisic, Barry Jaspan, Geoffrey King, Kevin Koch, John Kohl,
616 Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park,
617 Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff
618 Schiller, Jen Selby, Brad Thompson, Harry Tsai, Ted Ts'o, Marshall