1 Copyright @copyright{} 1985-2008 by the Massachusetts Institute of Technology.
4 Export of software employing encryption from the United States of
5 America may require a specific license from the United States
6 Government. It is the responsibility of any person or organization
7 contemplating export to obtain such a license before exporting.
10 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute
11 this software and its documentation for any purpose and without fee is
12 hereby granted, provided that the above copyright notice appear in all
13 copies and that both that copyright notice and this permission notice
14 appear in supporting documentation, and that the name of M.I.T. not be
15 used in advertising or publicity pertaining to distribution of the
16 software without specific, written prior permission. Furthermore if you
17 modify this software you must label your software as modified software
18 and not distribute it in such a fashion that it might be confused with
19 the original MIT software. M.I.T. makes no representations about the
20 suitability of this software for any purpose. It is provided ``as is''
21 without express or implied warranty.
23 Individual source code files are copyright MIT, Cygnus Support,
24 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
25 FundsXpress, and others.
27 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
28 and Zephyr are trademarks of the Massachusetts Institute of Technology
29 (MIT). No commercial use of these trademarks may be made without
30 prior written permission of MIT.
32 ``Commercial use'' means use of a name in a product or other for-profit
33 manner. It does NOT prevent a commercial firm from referring to the
34 MIT trademarks in order to convey information (although in doing so,
35 recognition of their trademark status should be given).
43 The following copyright and permission notice applies to the
44 OpenVision Kerberos Administration system located in
45 @code{kadmin/create}, @code{kadmin/dbutil}, @code{kadmin/passwd},
46 @code{kadmin/server}, @code{lib/kadm5}, and portions of
53 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
55 WARNING: Retrieving the OpenVision Kerberos Administration system source
56 code, as described below, indicates your acceptance of the following
57 terms. If you do not agree to the following terms, do not retrieve the
58 OpenVision Kerberos administration system.
60 You may freely use and distribute the Source Code and Object Code
61 compiled from it, with or without modification, but this Source Code is
62 provided to you ``AS IS'' EXCLUSIVE OF ANY WARRANTY, INCLUDING, WITHOUT
63 LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
64 PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER EXPRESS OR IMPLIED.
65 IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY FOR ANY LOST PROFITS,
66 LOSS OF DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR
67 FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS
68 AGREEMENT, INCLUDING, WITHOUT LIMITATION, THOSE RESULTING FROM THE USE
69 OF THE SOURCE CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR
72 OpenVision retains all copyrights in the donated Source Code. OpenVision
73 also retains copyright to derivative works of the Source Code, whether
74 created by OpenVision or by a third party. The OpenVision copyright
75 notice must be preserved if derivative works are made based on the
78 OpenVision Technologies, Inc. has donated this Kerberos Administration
79 system to MIT for inclusion in the standard Kerberos 5 distribution.
80 This donation underscores our commitment to continuing Kerberos
81 technology development and our gratitude for the valuable work which has
82 been performed by MIT and the Kerberos community.
92 Portions contributed by Matt Crawford @code{<crawdad@@fnal.gov>} were work
93 performed at Fermi National Accelerator Laboratory, which is operated
94 by Universities Research Association, Inc., under contract
95 DE-AC02-76CHO3000 with the U.S. Department of Energy.
104 Portions of @code{src/lib/crypto} have the following copyright:
110 Copyright @copyright{} 1998 by the FundsXpress, INC.
114 Export of this software from the United States of America may require
115 a specific license from the United States Government. It is the
116 responsibility of any person or organization contemplating export to
117 obtain such a license before exporting.
119 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
120 distribute this software and its documentation for any purpose and
121 without fee is hereby granted, provided that the above copyright
122 notice appear in all copies and that both that copyright notice and
123 this permission notice appear in supporting documentation, and that
124 the name of FundsXpress. not be used in advertising or publicity pertaining
125 to distribution of the software without specific, written prior
126 permission. FundsXpress makes no representations about the suitability of
127 this software for any purpose. It is provided ``as is'' without express
130 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
131 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
132 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
142 The implementation of the Yarrow pseudo-random number generator
143 in @code{src/lib/crypto/yarrow} has the following copyright:
149 Copyright 2000 by Zero-Knowledge Systems, Inc.
151 Permission to use, copy, modify, distribute, and sell this software
152 and its documentation for any purpose is hereby granted without fee,
153 provided that the above copyright notice appear in all copies and that
154 both that copyright notice and this permission notice appear in
155 supporting documentation, and that the name of Zero-Knowledge Systems,
156 Inc. not be used in advertising or publicity pertaining to
157 distribution of the software without specific, written prior
158 permission. Zero-Knowledge Systems, Inc. makes no representations
159 about the suitability of this software for any purpose. It is
160 provided ``as is'' without express or implied warranty.
162 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
163 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
164 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
165 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
166 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
167 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
168 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
177 The implementation of the AES encryption algorithm in
178 @code{src/lib/crypto/aes} has the following copyright:
184 Copyright @copyright{} 2001, Dr Brian Gladman @code{<brg@@gladman.uk.net>},
190 The free distribution and use of this software in both source and binary
191 form is allowed (with or without changes) provided that:
195 distributions of this source code include the above copyright
196 notice, this list of conditions and the following disclaimer;
198 distributions in binary form include the above copyright
199 notice, this list of conditions and the following disclaimer
200 in the documentation and/or other associated materials;
202 the copyright holder's name is not used to endorse products
203 built using this software without specific written permission.
208 This software is provided 'as is' with no explcit or implied warranties
209 in respect of any properties, including, but not limited to, correctness
210 and fitness for purpose.
219 Portions contributed by Red Hat, including the pre-authentication
220 plug-in framework, contain the following copyright:
226 Copyright @copyright{} 2006 Red Hat, Inc.@*
227 Portions copyright @copyright{} 2006 Massachusetts Institute of Technology@*
228 All Rights Reserved.@*
230 Redistribution and use in source and binary forms, with or without
231 modification, are permitted provided that the following conditions are
237 Redistributions of source code must retain the above copyright
238 notice, this list of conditions and the following disclaimer.
240 Redistributions in binary form must reproduce the above copyright
241 notice, this list of conditions and the following disclaimer in the
242 documentation and/or other materials provided with the distribution.
244 Neither the name of Red Hat, Inc., nor the names of its contributors
245 may be used to endorse or promote products derived from this software
246 without specific prior written permission.
249 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS
250 IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
251 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
252 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
253 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
254 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
255 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
256 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
257 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
258 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
259 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
269 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
270 @code{src/lib/gssapi}, including the following files:
273 lib/gssapi/generic/gssapi_err_generic.et
274 lib/gssapi/mechglue/g_accept_sec_context.c
275 lib/gssapi/mechglue/g_acquire_cred.c
276 lib/gssapi/mechglue/g_canon_name.c
277 lib/gssapi/mechglue/g_compare_name.c
278 lib/gssapi/mechglue/g_context_time.c
279 lib/gssapi/mechglue/g_delete_sec_context.c
280 lib/gssapi/mechglue/g_dsp_name.c
281 lib/gssapi/mechglue/g_dsp_status.c
282 lib/gssapi/mechglue/g_dup_name.c
283 lib/gssapi/mechglue/g_exp_sec_context.c
284 lib/gssapi/mechglue/g_export_name.c
285 lib/gssapi/mechglue/g_glue.c
286 lib/gssapi/mechglue/g_imp_name.c
287 lib/gssapi/mechglue/g_imp_sec_context.c
288 lib/gssapi/mechglue/g_init_sec_context.c
289 lib/gssapi/mechglue/g_initialize.c
290 lib/gssapi/mechglue/g_inquire_context.c
291 lib/gssapi/mechglue/g_inquire_cred.c
292 lib/gssapi/mechglue/g_inquire_names.c
293 lib/gssapi/mechglue/g_process_context.c
294 lib/gssapi/mechglue/g_rel_buffer.c
295 lib/gssapi/mechglue/g_rel_cred.c
296 lib/gssapi/mechglue/g_rel_name.c
297 lib/gssapi/mechglue/g_rel_oid_set.c
298 lib/gssapi/mechglue/g_seal.c
299 lib/gssapi/mechglue/g_sign.c
300 lib/gssapi/mechglue/g_store_cred.c
301 lib/gssapi/mechglue/g_unseal.c
302 lib/gssapi/mechglue/g_userok.c
303 lib/gssapi/mechglue/g_utils.c
304 lib/gssapi/mechglue/g_verify.c
305 lib/gssapi/mechglue/gssd_pname_to_uid.c
306 lib/gssapi/mechglue/mglueP.h
307 lib/gssapi/mechglue/oid_ops.c
308 lib/gssapi/spnego/gssapiP_spnego.h
309 lib/gssapi/spnego/spnego_mech.c
312 and the initial implementation of incremental propagation, including
313 the following new or changed files:
317 kadmin/server/ipropd_svc.c
319 lib/kdb/kdb_convert.c
322 lib/krb5/error_tables/kdb5_err.et
327 are subject to the following license:
333 Copyright @copyright{} 2004 Sun Microsystems, Inc.
335 Permission is hereby granted, free of charge, to any person obtaining a
336 copy of this software and associated documentation files (the
337 ``Software''), to deal in the Software without restriction, including
338 without limitation the rights to use, copy, modify, merge, publish,
339 distribute, sublicense, and/or sell copies of the Software, and to
340 permit persons to whom the Software is furnished to do so, subject to
341 the following conditions:
343 The above copyright notice and this permission notice shall be included
344 in all copies or substantial portions of the Software.
346 THE SOFTWARE IS PROVIDED ``AS IS'', WITHOUT WARRANTY OF ANY KIND, EXPRESS
347 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
348 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
349 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
350 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
351 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
352 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
361 @value{PRODUCT} includes documentation and software developed at the
362 University of California at Berkeley, which includes this copyright
369 Copyright @copyright{} 1983 Regents of the University of California.@*
372 Redistribution and use in source and binary forms, with or without
373 modification, are permitted provided that the following conditions are
377 Redistributions of source code must retain the above copyright
378 notice, this list of conditions and the following disclaimer.
380 Redistributions in binary form must reproduce the above copyright
381 notice, this list of conditions and the following disclaimer in the
382 documentation and/or other materials provided with the distribution.
384 Neither the name of the University nor the names of its contributors
385 may be used to endorse or promote products derived from this software
386 without specific prior written permission.
389 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
390 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
391 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
392 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
393 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
394 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
395 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
396 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
397 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
398 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
408 Portions contributed by Novell, Inc., including the LDAP database
409 backend, are subject to the following license:
415 Copyright (c) 2004-2005, Novell, Inc.
418 Redistribution and use in source and binary forms, with or without
419 modification, are permitted provided that the following conditions are met:
423 Redistributions of source code must retain the above copyright notice,
424 this list of conditions and the following disclaimer.
426 Redistributions in binary form must reproduce the above copyright
427 notice, this list of conditions and the following disclaimer in the
428 documentation and/or other materials provided with the distribution.
430 The copyright holder's name is not used to endorse or promote products
431 derived from this software without specific prior written permission.
434 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS''
435 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
436 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
437 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
438 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
439 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
440 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
441 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
442 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
443 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
444 POSSIBILITY OF SUCH DAMAGE.
453 Portions funded by Sandia National Laboratory
454 and developed by the University of Michigan's
455 Center for Information Technology Integration,
456 including the PKINIT implementation, are subject
457 to the following license:
464 COPYRIGHT @copyright{} 2006-2007@*
465 THE REGENTS OF THE UNIVERSITY OF MICHIGAN@*
468 Permission is granted to use, copy, create derivative works
469 and redistribute this software and such derivative works
470 for any purpose, so long as the name of The University of
471 Michigan is not used in any advertising or publicity
472 pertaining to the use of distribution of this software
473 without specific, written prior authorization. If the
474 above copyright notice or any other identification of the
475 University of Michigan is included in any copy of any
476 portion of this software, then the disclaimer below must
479 THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
480 FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
481 PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
482 MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
483 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
484 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
485 REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
486 FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
487 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
488 OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
489 IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
493 The pkcs11.h file included in the PKINIT code has the
501 Copyright 2006 g10 Code GmbH
502 Copyright 2006 Andreas Jellinghaus
504 This file is free software; as a special exception the author gives
505 unlimited permission to copy and/or distribute it, with or without
506 modifications, as long as this notice is preserved.
508 This file is distributed in the hope that it will be useful, but
509 WITHOUT ANY WARRANTY, to the extent permitted by law; without even
510 the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
520 Portions contributed by Apple Inc. are subject to the following license:
527 Copyright 2004-2008 Apple Inc. All Rights Reserved.
529 Export of this software from the United States of America may require
530 a specific license from the United States Government. It is the
531 responsibility of any person or organization contemplating export to
532 obtain such a license before exporting.
534 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
535 distribute this software and its documentation for any purpose and
536 without fee is hereby granted, provided that the above copyright
537 notice appear in all copies and that both that copyright notice and
538 this permission notice appear in supporting documentation, and that
539 the name of Apple Inc. not be used in advertising or publicity pertaining
540 to distribution of the software without specific, written prior
541 permission. Apple Inc. makes no representations about the suitability of
542 this software for any purpose. It is provided "as is" without express
545 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
546 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
547 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
556 The implementations of UTF-8 string handling in src/util/support and
557 src/lib/krb5/unicode are subject to the following copyright and
565 The OpenLDAP Public License
566 Version 2.8, 17 August 2003
568 Redistribution and use of this software and associated documentation
569 ("Software"), with or without modification, are permitted provided
570 that the following conditions are met:
572 1. Redistributions in source form must retain copyright statements
575 2. Redistributions in binary form must reproduce applicable copyright
576 statements and notices, this list of conditions, and the following
577 disclaimer in the documentation and/or other materials provided
578 with the distribution, and
580 3. Redistributions must contain a verbatim copy of this document.
582 The OpenLDAP Foundation may revise this license from time to time.
583 Each revision is distinguished by a version number. You may use
584 this Software under terms of this license revision or under the
585 terms of any subsequent revision of the license.
587 THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS
588 CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
589 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
590 AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
591 SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S)
592 OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
593 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
594 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
595 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
596 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
597 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
598 ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
599 POSSIBILITY OF SUCH DAMAGE.
601 The names of the authors and copyright holders must not be used in
602 advertising or otherwise to promote the sale, use or other dealing
603 in this Software without specific, written prior permission. Title
604 to copyright in this Software shall at all times remain with copyright
607 OpenLDAP is a registered trademark of the OpenLDAP Foundation.
609 Copyright 1999-2003 The OpenLDAP Foundation, Redwood City,
610 California, USA. All Rights Reserved. Permission to copy and
611 distribute verbatim copies of this document is granted.
612 Permission is granted to make and distribute verbatim copies of this
613 manual provided the copyright notices and this permission notice are
614 preserved on all copies.
624 Permission is granted to process this file through TeX and print the
625 results, provided the printed document carries a copying permission
626 notice identical to this one except for the removal of this paragraph
627 (this paragraph not being relevant to the printed manual).
630 Permission is granted to copy and distribute modified versions of this
631 manual under the conditions for verbatim copying, provided also that the
632 entire resulting derived work is distributed under the terms of a
633 permission notice identical to this one.
635 Permission is granted to copy and distribute translations of this manual
636 into another language, under the above conditions for modified versions.