1 Kerberos Version 5, Release 1.9
6 Unpacking the Source Distribution
7 ---------------------------------
9 The source distribution of Kerberos 5 comes in a gzipped tarfile,
10 krb5-1.9.tar.gz. Instructions on how to extract the entire
13 If you have the GNU tar program and gzip installed, you can simply do:
15 gtar zxpf krb5-1.9.tar.gz
17 If you don't have GNU tar, you will need to get the FSF gzip
18 distribution and use gzcat:
20 gzcat krb5-1.9.tar.gz | tar xpf -
22 Both of these methods will extract the sources into krb5-1.9/src and
23 the documentation into krb5-1.9/doc.
25 Building and Installing Kerberos 5
26 ----------------------------------
28 The first file you should look at is doc/install-guide.ps; it contains
29 the notes for building and installing Kerberos 5. The info file
30 krb5-install.info has the same information in info file format. You
31 can view this using the GNU emacs info-mode, or by using the
32 standalone info file viewer from the Free Software Foundation. This
33 is also available as an HTML file, install.html.
35 Other good files to look at are admin-guide.ps and user-guide.ps,
36 which contain the system administrator's guide, and the user's guide,
37 respectively. They are also available as info files
38 kerberos-admin.info and krb5-user.info, respectively. These files are
39 also available as HTML files.
41 If you are attempting to build under Windows, please see the
42 src/windows/README file.
47 Please report any problems/bugs/comments using the krb5-send-pr
48 program. The krb5-send-pr program will be installed in the sbin
49 directory once you have successfully compiled and installed Kerberos
50 V5 (or if you have installed one of our binary distributions).
52 If you are not able to use krb5-send-pr because you haven't been able
53 compile and install Kerberos V5 on any platform, you may send mail to
56 You may view bug reports by visiting
58 http://krbdev.mit.edu/rt/
60 and logging in as "guest" with password "guest".
65 The Data Encryption Standard (DES) is widely recognized as weak. The
66 krb5-1.7 release contains measures to encourage sites to migrate away
67 from using single-DES cryptosystems. Among these is a configuration
68 variable that enables "weak" enctypes, which defaults to "false"
69 beginning with krb5-1.8.
74 krb5-1.9 changes by ticket ID
75 -----------------------------
77 Copyright and Other Legal Notices
78 ---------------------------------
80 Copyright (C) 1985-2010 by the Massachusetts Institute of Technology.
84 Export of this software from the United States of America may require
85 a specific license from the United States Government. It is the
86 responsibility of any person or organization contemplating export to
87 obtain such a license before exporting.
89 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
90 distribute this software and its documentation for any purpose and
91 without fee is hereby granted, provided that the above copyright
92 notice appear in all copies and that both that copyright notice and
93 this permission notice appear in supporting documentation, and that
94 the name of M.I.T. not be used in advertising or publicity pertaining
95 to distribution of the software without specific, written prior
96 permission. Furthermore if you modify this software you must label
97 your software as modified software and not distribute it in such a
98 fashion that it might be confused with the original MIT software.
99 M.I.T. makes no representations about the suitability of this software
100 for any purpose. It is provided "as is" without express or implied
103 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
104 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
105 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
107 Individual source code files are copyright MIT, Cygnus Support,
108 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
109 FundsXpress, and others.
111 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
112 and Zephyr are trademarks of the Massachusetts Institute of Technology
113 (MIT). No commercial use of these trademarks may be made without
114 prior written permission of MIT.
116 "Commercial use" means use of a name in a product or other for-profit
117 manner. It does NOT prevent a commercial firm from referring to the
118 MIT trademarks in order to convey information (although in doing so,
119 recognition of their trademark status should be given).
123 Portions of src/lib/crypto have the following copyright:
125 Copyright (C) 1998 by the FundsXpress, INC.
129 Export of this software from the United States of America may require
130 a specific license from the United States Government. It is the
131 responsibility of any person or organization contemplating export to
132 obtain such a license before exporting.
134 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
135 distribute this software and its documentation for any purpose and
136 without fee is hereby granted, provided that the above copyright
137 notice appear in all copies and that both that copyright notice and
138 this permission notice appear in supporting documentation, and that
139 the name of FundsXpress. not be used in advertising or publicity pertaining
140 to distribution of the software without specific, written prior
141 permission. FundsXpress makes no representations about the suitability of
142 this software for any purpose. It is provided "as is" without express
145 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
146 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
147 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
152 The following copyright and permission notice applies to the
153 OpenVision Kerberos Administration system located in kadmin/create,
154 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
157 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
159 WARNING: Retrieving the OpenVision Kerberos Administration system
160 source code, as described below, indicates your acceptance of the
161 following terms. If you do not agree to the following terms, do not
162 retrieve the OpenVision Kerberos administration system.
164 You may freely use and distribute the Source Code and Object Code
165 compiled from it, with or without modification, but this Source
166 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
167 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
168 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
169 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
170 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
171 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
172 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
173 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
174 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
177 OpenVision retains all copyrights in the donated Source Code. OpenVision
178 also retains copyright to derivative works of the Source Code, whether
179 created by OpenVision or by a third party. The OpenVision copyright
180 notice must be preserved if derivative works are made based on the
183 OpenVision Technologies, Inc. has donated this Kerberos
184 Administration system to MIT for inclusion in the standard
185 Kerberos 5 distribution. This donation underscores our
186 commitment to continuing Kerberos technology development
187 and our gratitude for the valuable work which has been
188 performed by MIT and the Kerberos community.
192 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
193 work performed at Fermi National Accelerator Laboratory, which is
194 operated by Universities Research Association, Inc., under
195 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
199 The implementation of the Yarrow pseudo-random number generator in
200 src/lib/crypto/yarrow has the following copyright:
202 Copyright 2000 by Zero-Knowledge Systems, Inc.
204 Permission to use, copy, modify, distribute, and sell this software
205 and its documentation for any purpose is hereby granted without fee,
206 provided that the above copyright notice appear in all copies and that
207 both that copyright notice and this permission notice appear in
208 supporting documentation, and that the name of Zero-Knowledge Systems,
209 Inc. not be used in advertising or publicity pertaining to
210 distribution of the software without specific, written prior
211 permission. Zero-Knowledge Systems, Inc. makes no representations
212 about the suitability of this software for any purpose. It is
213 provided "as is" without express or implied warranty.
215 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
216 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
217 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
218 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
219 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
220 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
221 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
225 The implementation of the AES encryption algorithm in
226 src/lib/crypto/aes has the following copyright:
228 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
233 The free distribution and use of this software in both source and binary
234 form is allowed (with or without changes) provided that:
236 1. distributions of this source code include the above copyright
237 notice, this list of conditions and the following disclaimer;
239 2. distributions in binary form include the above copyright
240 notice, this list of conditions and the following disclaimer
241 in the documentation and/or other associated materials;
243 3. the copyright holder's name is not used to endorse products
244 built using this software without specific written permission.
248 This software is provided 'as is' with no explcit or implied warranties
249 in respect of any properties, including, but not limited to, correctness
250 and fitness for purpose.
254 Portions contributed by Red Hat, including the pre-authentication
255 plug-ins framework, contain the following copyright:
257 Copyright (c) 2006 Red Hat, Inc.
258 Portions copyright (c) 2006 Massachusetts Institute of Technology
261 Redistribution and use in source and binary forms, with or without
262 modification, are permitted provided that the following conditions
265 * Redistributions of source code must retain the above copyright
266 notice, this list of conditions and the following disclaimer.
268 * Redistributions in binary form must reproduce the above
269 copyright notice, this list of conditions and the following
270 disclaimer in the documentation and/or other materials provided
271 with the distribution.
273 * Neither the name of Red Hat, Inc., nor the names of its
274 contributors may be used to endorse or promote products derived
275 from this software without specific prior written permission.
277 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
278 IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
279 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
280 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
281 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
282 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
283 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
284 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
285 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
286 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
287 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
291 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
292 src/lib/gssapi, including the following files:
294 lib/gssapi/generic/gssapi_err_generic.et
295 lib/gssapi/mechglue/g_accept_sec_context.c
296 lib/gssapi/mechglue/g_acquire_cred.c
297 lib/gssapi/mechglue/g_canon_name.c
298 lib/gssapi/mechglue/g_compare_name.c
299 lib/gssapi/mechglue/g_context_time.c
300 lib/gssapi/mechglue/g_delete_sec_context.c
301 lib/gssapi/mechglue/g_dsp_name.c
302 lib/gssapi/mechglue/g_dsp_status.c
303 lib/gssapi/mechglue/g_dup_name.c
304 lib/gssapi/mechglue/g_exp_sec_context.c
305 lib/gssapi/mechglue/g_export_name.c
306 lib/gssapi/mechglue/g_glue.c
307 lib/gssapi/mechglue/g_imp_name.c
308 lib/gssapi/mechglue/g_imp_sec_context.c
309 lib/gssapi/mechglue/g_init_sec_context.c
310 lib/gssapi/mechglue/g_initialize.c
311 lib/gssapi/mechglue/g_inquire_context.c
312 lib/gssapi/mechglue/g_inquire_cred.c
313 lib/gssapi/mechglue/g_inquire_names.c
314 lib/gssapi/mechglue/g_process_context.c
315 lib/gssapi/mechglue/g_rel_buffer.c
316 lib/gssapi/mechglue/g_rel_cred.c
317 lib/gssapi/mechglue/g_rel_name.c
318 lib/gssapi/mechglue/g_rel_oid_set.c
319 lib/gssapi/mechglue/g_seal.c
320 lib/gssapi/mechglue/g_sign.c
321 lib/gssapi/mechglue/g_store_cred.c
322 lib/gssapi/mechglue/g_unseal.c
323 lib/gssapi/mechglue/g_userok.c
324 lib/gssapi/mechglue/g_utils.c
325 lib/gssapi/mechglue/g_verify.c
326 lib/gssapi/mechglue/gssd_pname_to_uid.c
327 lib/gssapi/mechglue/mglueP.h
328 lib/gssapi/mechglue/oid_ops.c
329 lib/gssapi/spnego/gssapiP_spnego.h
330 lib/gssapi/spnego/spnego_mech.c
332 and the initial implementation of incremental propagation, including
333 the following new or changed files:
336 kadmin/server/ipropd_svc.c
338 lib/kdb/kdb_convert.c
341 lib/krb5/error_tables/kdb5_err.et
345 and marked portions of the following files:
347 lib/krb5/os/hst_realm.c
349 are subject to the following license:
351 Copyright (c) 2004 Sun Microsystems, Inc.
353 Permission is hereby granted, free of charge, to any person obtaining a
354 copy of this software and associated documentation files (the
355 "Software"), to deal in the Software without restriction, including
356 without limitation the rights to use, copy, modify, merge, publish,
357 distribute, sublicense, and/or sell copies of the Software, and to
358 permit persons to whom the Software is furnished to do so, subject to
359 the following conditions:
361 The above copyright notice and this permission notice shall be included
362 in all copies or substantial portions of the Software.
364 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
365 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
366 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
367 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
368 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
369 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
370 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
374 MIT Kerberos includes documentation and software developed at the
375 University of California at Berkeley, which includes this copyright
378 Copyright (C) 1983 Regents of the University of California.
381 Redistribution and use in source and binary forms, with or without
382 modification, are permitted provided that the following conditions
385 1. Redistributions of source code must retain the above copyright
386 notice, this list of conditions and the following disclaimer.
388 2. Redistributions in binary form must reproduce the above
389 copyright notice, this list of conditions and the following
390 disclaimer in the documentation and/or other materials provided
391 with the distribution.
393 3. Neither the name of the University nor the names of its
394 contributors may be used to endorse or promote products derived
395 from this software without specific prior written permission.
397 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND
398 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
399 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
400 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
401 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
402 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
403 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
404 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
405 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
406 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
411 Portions contributed by Novell, Inc., including the LDAP database
412 backend, are subject to the following license:
414 Copyright (c) 2004-2005, Novell, Inc.
417 Redistribution and use in source and binary forms, with or without
418 modification, are permitted provided that the following conditions are met:
420 * Redistributions of source code must retain the above copyright notice,
421 this list of conditions and the following disclaimer.
422 * Redistributions in binary form must reproduce the above copyright
423 notice, this list of conditions and the following disclaimer in the
424 documentation and/or other materials provided with the distribution.
425 * The copyright holder's name is not used to endorse or promote products
426 derived from this software without specific prior written permission.
428 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
429 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
430 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
431 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
432 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
433 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
434 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
435 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
436 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
437 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
438 POSSIBILITY OF SUCH DAMAGE.
442 Portions funded by Sandia National Laboratory and developed by the
443 University of Michigan's Center for Information Technology
444 Integration, including the PKINIT implementation, are subject to the
447 COPYRIGHT (C) 2006-2007
448 THE REGENTS OF THE UNIVERSITY OF MICHIGAN
451 Permission is granted to use, copy, create derivative works
452 and redistribute this software and such derivative works
453 for any purpose, so long as the name of The University of
454 Michigan is not used in any advertising or publicity
455 pertaining to the use of distribution of this software
456 without specific, written prior authorization. If the
457 above copyright notice or any other identification of the
458 University of Michigan is included in any copy of any
459 portion of this software, then the disclaimer below must
462 THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
463 FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
464 PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
465 MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
466 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
467 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
468 REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
469 FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
470 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
471 OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
472 IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
477 The pkcs11.h file included in the PKINIT code has the following
480 Copyright 2006 g10 Code GmbH
481 Copyright 2006 Andreas Jellinghaus
483 This file is free software; as a special exception the author gives
484 unlimited permission to copy and/or distribute it, with or without
485 modifications, as long as this notice is preserved.
487 This file is distributed in the hope that it will be useful, but
488 WITHOUT ANY WARRANTY, to the extent permitted by law; without even
489 the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
494 Portions contributed by Apple Inc. are subject to the following license:
496 Copyright 2004-2008 Apple Inc. All Rights Reserved.
498 Export of this software from the United States of America may require
499 a specific license from the United States Government. It is the
500 responsibility of any person or organization contemplating export to
501 obtain such a license before exporting.
503 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
504 distribute this software and its documentation for any purpose and
505 without fee is hereby granted, provided that the above copyright
506 notice appear in all copies and that both that copyright notice and
507 this permission notice appear in supporting documentation, and that
508 the name of Apple Inc. not be used in advertising or publicity pertaining
509 to distribution of the software without specific, written prior
510 permission. Apple Inc. makes no representations about the suitability of
511 this software for any purpose. It is provided "as is" without express
514 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
515 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
516 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
520 The implementations of strlcpy and strlcat in
521 src/util/support/strlcat.c have the following copyright and permission
524 Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
526 Permission to use, copy, modify, and distribute this software for any
527 purpose with or without fee is hereby granted, provided that the above
528 copyright notice and this permission notice appear in all copies.
530 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
531 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
532 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
533 ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
534 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
535 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
536 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
540 The implementations of UTF-8 string handling in src/util/support and
541 src/lib/krb5/unicode are subject to the following copyright and
544 The OpenLDAP Public License
545 Version 2.8, 17 August 2003
547 Redistribution and use of this software and associated documentation
548 ("Software"), with or without modification, are permitted provided
549 that the following conditions are met:
551 1. Redistributions in source form must retain copyright statements
554 2. Redistributions in binary form must reproduce applicable copyright
555 statements and notices, this list of conditions, and the following
556 disclaimer in the documentation and/or other materials provided
557 with the distribution, and
559 3. Redistributions must contain a verbatim copy of this document.
561 The OpenLDAP Foundation may revise this license from time to time.
562 Each revision is distinguished by a version number. You may use
563 this Software under terms of this license revision or under the
564 terms of any subsequent revision of the license.
566 THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS
567 CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
568 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
569 AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
570 SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S)
571 OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
572 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
573 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
574 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
575 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
576 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
577 ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
578 POSSIBILITY OF SUCH DAMAGE.
580 The names of the authors and copyright holders must not be used in
581 advertising or otherwise to promote the sale, use or other dealing
582 in this Software without specific, written prior permission. Title
583 to copyright in this Software shall at all times remain with copyright
586 OpenLDAP is a registered trademark of the OpenLDAP Foundation.
588 Copyright 1999-2003 The OpenLDAP Foundation, Redwood City,
589 California, USA. All Rights Reserved. Permission to copy and
590 distribute verbatim copies of this document is granted.
594 Marked test programs in src/lib/krb5/krb have the following copyright:
596 Copyright (c) 2006 Kungliga Tekniska Högskolan
597 (Royal Institute of Technology, Stockholm, Sweden).
600 Redistribution and use in source and binary forms, with or without
601 modification, are permitted provided that the following conditions
604 1. Redistributions of source code must retain the above copyright
605 notice, this list of conditions and the following disclaimer.
607 2. Redistributions in binary form must reproduce the above copyright
608 notice, this list of conditions and the following disclaimer in the
609 documentation and/or other materials provided with the distribution.
611 3. Neither the name of KTH nor the names of its contributors may be
612 used to endorse or promote products derived from this software without
613 specific prior written permission.
615 THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
616 EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
617 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
618 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
619 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
620 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
621 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
622 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
623 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
624 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
625 ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
627 Acknowledgements for krb5-1.9
628 -----------------------------
630 Thanks to the members of the Kerberos V5 development team at MIT, both
631 past and present: Danilo Almeida, Jeffrey Altman, Justin Anderson,
632 Richard Basch, Jay Berkenbilt, Mitch Berger, Andrew Boardman, Joe
633 Calzaretta, John Carr, Don Davis, Alexandra Ellwood, Nancy Gilman,
634 Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus,
635 Miroslav Jurisic, Barry Jaspan, Geoffrey King, Kevin Koch, John Kohl,
636 Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park,
637 Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff
638 Schiller, Jen Selby, Robert Silk, Brad Thompson, Harry Tsai, Zhanna
639 Tsitkova, Ted Ts'o, Marshall Vale, Tom Yu.