1 Copyright (C) 1985-2010 by the Massachusetts Institute of Technology.
5 Export of this software from the United States of America may require
6 a specific license from the United States Government. It is the
7 responsibility of any person or organization contemplating export to
8 obtain such a license before exporting.
10 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
11 distribute this software and its documentation for any purpose and
12 without fee is hereby granted, provided that the above copyright
13 notice appear in all copies and that both that copyright notice and
14 this permission notice appear in supporting documentation, and that
15 the name of M.I.T. not be used in advertising or publicity pertaining
16 to distribution of the software without specific, written prior
17 permission. Furthermore if you modify this software you must label
18 your software as modified software and not distribute it in such a
19 fashion that it might be confused with the original MIT software.
20 M.I.T. makes no representations about the suitability of this software
21 for any purpose. It is provided "as is" without express or implied
24 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
25 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
26 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
28 Individual source code files are copyright MIT, Cygnus Support,
29 Novell, OpenVision Technologies, Oracle, Red Hat, Sun Microsystems,
30 FundsXpress, and others.
32 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
33 and Zephyr are trademarks of the Massachusetts Institute of Technology
34 (MIT). No commercial use of these trademarks may be made without
35 prior written permission of MIT.
37 "Commercial use" means use of a name in a product or other for-profit
38 manner. It does NOT prevent a commercial firm from referring to the
39 MIT trademarks in order to convey information (although in doing so,
40 recognition of their trademark status should be given).
44 Portions of src/lib/crypto have the following copyright:
46 Copyright (C) 1998 by the FundsXpress, INC.
50 Export of this software from the United States of America may require
51 a specific license from the United States Government. It is the
52 responsibility of any person or organization contemplating export to
53 obtain such a license before exporting.
55 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
56 distribute this software and its documentation for any purpose and
57 without fee is hereby granted, provided that the above copyright
58 notice appear in all copies and that both that copyright notice and
59 this permission notice appear in supporting documentation, and that
60 the name of FundsXpress. not be used in advertising or publicity pertaining
61 to distribution of the software without specific, written prior
62 permission. FundsXpress makes no representations about the suitability of
63 this software for any purpose. It is provided "as is" without express
66 THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR
67 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
68 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
73 The following copyright and permission notice applies to the
74 OpenVision Kerberos Administration system located in kadmin/create,
75 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
78 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
80 WARNING: Retrieving the OpenVision Kerberos Administration system
81 source code, as described below, indicates your acceptance of the
82 following terms. If you do not agree to the following terms, do not
83 retrieve the OpenVision Kerberos administration system.
85 You may freely use and distribute the Source Code and Object Code
86 compiled from it, with or without modification, but this Source
87 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
88 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
89 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
90 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
91 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
92 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
93 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
94 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
95 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
98 OpenVision retains all copyrights in the donated Source Code. OpenVision
99 also retains copyright to derivative works of the Source Code, whether
100 created by OpenVision or by a third party. The OpenVision copyright
101 notice must be preserved if derivative works are made based on the
104 OpenVision Technologies, Inc. has donated this Kerberos
105 Administration system to MIT for inclusion in the standard
106 Kerberos 5 distribution. This donation underscores our
107 commitment to continuing Kerberos technology development
108 and our gratitude for the valuable work which has been
109 performed by MIT and the Kerberos community.
113 Portions contributed by Matt Crawford <crawdad@fnal.gov> were
114 work performed at Fermi National Accelerator Laboratory, which is
115 operated by Universities Research Association, Inc., under
116 contract DE-AC02-76CHO3000 with the U.S. Department of Energy.
120 The implementation of the Yarrow pseudo-random number generator in
121 src/lib/crypto/yarrow has the following copyright:
123 Copyright 2000 by Zero-Knowledge Systems, Inc.
125 Permission to use, copy, modify, distribute, and sell this software
126 and its documentation for any purpose is hereby granted without fee,
127 provided that the above copyright notice appear in all copies and that
128 both that copyright notice and this permission notice appear in
129 supporting documentation, and that the name of Zero-Knowledge Systems,
130 Inc. not be used in advertising or publicity pertaining to
131 distribution of the software without specific, written prior
132 permission. Zero-Knowledge Systems, Inc. makes no representations
133 about the suitability of this software for any purpose. It is
134 provided "as is" without express or implied warranty.
136 ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
137 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
138 FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR
139 ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
140 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
141 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT
142 OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
146 The implementation of the AES encryption algorithm in
147 src/lib/crypto/aes has the following copyright:
149 Copyright (c) 2001, Dr Brian Gladman <brg@gladman.uk.net>, Worcester, UK.
154 The free distribution and use of this software in both source and binary
155 form is allowed (with or without changes) provided that:
157 1. distributions of this source code include the above copyright
158 notice, this list of conditions and the following disclaimer;
160 2. distributions in binary form include the above copyright
161 notice, this list of conditions and the following disclaimer
162 in the documentation and/or other associated materials;
164 3. the copyright holder's name is not used to endorse products
165 built using this software without specific written permission.
169 This software is provided 'as is' with no explcit or implied warranties
170 in respect of any properties, including, but not limited to, correctness
171 and fitness for purpose.
175 Portions contributed by Red Hat, including the pre-authentication
176 plug-ins framework, contain the following copyright:
178 Copyright (c) 2006 Red Hat, Inc.
179 Portions copyright (c) 2006 Massachusetts Institute of Technology
182 Redistribution and use in source and binary forms, with or without
183 modification, are permitted provided that the following conditions
186 * Redistributions of source code must retain the above copyright
187 notice, this list of conditions and the following disclaimer.
189 * Redistributions in binary form must reproduce the above
190 copyright notice, this list of conditions and the following
191 disclaimer in the documentation and/or other materials provided
192 with the distribution.
194 * Neither the name of Red Hat, Inc., nor the names of its
195 contributors may be used to endorse or promote products derived
196 from this software without specific prior written permission.
198 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
199 IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
200 TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
201 PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
202 OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
203 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
204 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
205 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
206 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
207 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
208 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
212 The implementations of GSSAPI mechglue in GSSAPI-SPNEGO in
213 src/lib/gssapi, including the following files:
215 lib/gssapi/generic/gssapi_err_generic.et
216 lib/gssapi/mechglue/g_accept_sec_context.c
217 lib/gssapi/mechglue/g_acquire_cred.c
218 lib/gssapi/mechglue/g_canon_name.c
219 lib/gssapi/mechglue/g_compare_name.c
220 lib/gssapi/mechglue/g_context_time.c
221 lib/gssapi/mechglue/g_delete_sec_context.c
222 lib/gssapi/mechglue/g_dsp_name.c
223 lib/gssapi/mechglue/g_dsp_status.c
224 lib/gssapi/mechglue/g_dup_name.c
225 lib/gssapi/mechglue/g_exp_sec_context.c
226 lib/gssapi/mechglue/g_export_name.c
227 lib/gssapi/mechglue/g_glue.c
228 lib/gssapi/mechglue/g_imp_name.c
229 lib/gssapi/mechglue/g_imp_sec_context.c
230 lib/gssapi/mechglue/g_init_sec_context.c
231 lib/gssapi/mechglue/g_initialize.c
232 lib/gssapi/mechglue/g_inquire_context.c
233 lib/gssapi/mechglue/g_inquire_cred.c
234 lib/gssapi/mechglue/g_inquire_names.c
235 lib/gssapi/mechglue/g_process_context.c
236 lib/gssapi/mechglue/g_rel_buffer.c
237 lib/gssapi/mechglue/g_rel_cred.c
238 lib/gssapi/mechglue/g_rel_name.c
239 lib/gssapi/mechglue/g_rel_oid_set.c
240 lib/gssapi/mechglue/g_seal.c
241 lib/gssapi/mechglue/g_sign.c
242 lib/gssapi/mechglue/g_store_cred.c
243 lib/gssapi/mechglue/g_unseal.c
244 lib/gssapi/mechglue/g_userok.c
245 lib/gssapi/mechglue/g_utils.c
246 lib/gssapi/mechglue/g_verify.c
247 lib/gssapi/mechglue/gssd_pname_to_uid.c
248 lib/gssapi/mechglue/mglueP.h
249 lib/gssapi/mechglue/oid_ops.c
250 lib/gssapi/spnego/gssapiP_spnego.h
251 lib/gssapi/spnego/spnego_mech.c
253 and the initial implementation of incremental propagation, including
254 the following new or changed files:
257 kadmin/server/ipropd_svc.c
259 lib/kdb/kdb_convert.c
262 lib/krb5/error_tables/kdb5_err.et
266 and marked portions of the following files:
268 lib/krb5/os/hst_realm.c
270 are subject to the following license:
272 Copyright (c) 2004 Sun Microsystems, Inc.
274 Permission is hereby granted, free of charge, to any person obtaining a
275 copy of this software and associated documentation files (the
276 "Software"), to deal in the Software without restriction, including
277 without limitation the rights to use, copy, modify, merge, publish,
278 distribute, sublicense, and/or sell copies of the Software, and to
279 permit persons to whom the Software is furnished to do so, subject to
280 the following conditions:
282 The above copyright notice and this permission notice shall be included
283 in all copies or substantial portions of the Software.
285 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
286 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
287 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
288 IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
289 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
290 TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
291 SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
295 MIT Kerberos includes documentation and software developed at the
296 University of California at Berkeley, which includes this copyright
299 Copyright (C) 1983 Regents of the University of California.
302 Redistribution and use in source and binary forms, with or without
303 modification, are permitted provided that the following conditions
306 1. Redistributions of source code must retain the above copyright
307 notice, this list of conditions and the following disclaimer.
309 2. Redistributions in binary form must reproduce the above
310 copyright notice, this list of conditions and the following
311 disclaimer in the documentation and/or other materials provided
312 with the distribution.
314 3. Neither the name of the University nor the names of its
315 contributors may be used to endorse or promote products derived
316 from this software without specific prior written permission.
318 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS "AS IS" AND
319 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
320 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
321 ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
322 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
323 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
324 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
325 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
326 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
327 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
332 Portions contributed by Novell, Inc., including the LDAP database
333 backend, are subject to the following license:
335 Copyright (c) 2004-2005, Novell, Inc.
338 Redistribution and use in source and binary forms, with or without
339 modification, are permitted provided that the following conditions are met:
341 * Redistributions of source code must retain the above copyright notice,
342 this list of conditions and the following disclaimer.
343 * Redistributions in binary form must reproduce the above copyright
344 notice, this list of conditions and the following disclaimer in the
345 documentation and/or other materials provided with the distribution.
346 * The copyright holder's name is not used to endorse or promote products
347 derived from this software without specific prior written permission.
349 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
350 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
351 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
352 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
353 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
354 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
355 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
356 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
357 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
358 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
359 POSSIBILITY OF SUCH DAMAGE.
363 Portions funded by Sandia National Laboratory and developed by the
364 University of Michigan's Center for Information Technology
365 Integration, including the PKINIT implementation, are subject to the
368 COPYRIGHT (C) 2006-2007
369 THE REGENTS OF THE UNIVERSITY OF MICHIGAN
372 Permission is granted to use, copy, create derivative works
373 and redistribute this software and such derivative works
374 for any purpose, so long as the name of The University of
375 Michigan is not used in any advertising or publicity
376 pertaining to the use of distribution of this software
377 without specific, written prior authorization. If the
378 above copyright notice or any other identification of the
379 University of Michigan is included in any copy of any
380 portion of this software, then the disclaimer below must
383 THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
384 FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
385 PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
386 MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
387 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
388 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
389 REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
390 FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
391 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
392 OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
393 IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
398 The pkcs11.h file included in the PKINIT code has the following
401 Copyright 2006 g10 Code GmbH
402 Copyright 2006 Andreas Jellinghaus
404 This file is free software; as a special exception the author gives
405 unlimited permission to copy and/or distribute it, with or without
406 modifications, as long as this notice is preserved.
408 This file is distributed in the hope that it will be useful, but
409 WITHOUT ANY WARRANTY, to the extent permitted by law; without even
410 the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
415 Portions contributed by Apple Inc. are subject to the following license:
417 Copyright 2004-2008 Apple Inc. All Rights Reserved.
419 Export of this software from the United States of America may require
420 a specific license from the United States Government. It is the
421 responsibility of any person or organization contemplating export to
422 obtain such a license before exporting.
424 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
425 distribute this software and its documentation for any purpose and
426 without fee is hereby granted, provided that the above copyright
427 notice appear in all copies and that both that copyright notice and
428 this permission notice appear in supporting documentation, and that
429 the name of Apple Inc. not be used in advertising or publicity pertaining
430 to distribution of the software without specific, written prior
431 permission. Apple Inc. makes no representations about the suitability of
432 this software for any purpose. It is provided "as is" without express
435 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
436 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
437 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
441 The implementations of strlcpy and strlcat in
442 src/util/support/strlcat.c have the following copyright and permission
445 Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
447 Permission to use, copy, modify, and distribute this software for any
448 purpose with or without fee is hereby granted, provided that the above
449 copyright notice and this permission notice appear in all copies.
451 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
452 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
453 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
454 ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
455 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
456 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
457 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
461 The implementations of UTF-8 string handling in src/util/support and
462 src/lib/krb5/unicode are subject to the following copyright and
465 The OpenLDAP Public License
466 Version 2.8, 17 August 2003
468 Redistribution and use of this software and associated documentation
469 ("Software"), with or without modification, are permitted provided
470 that the following conditions are met:
472 1. Redistributions in source form must retain copyright statements
475 2. Redistributions in binary form must reproduce applicable copyright
476 statements and notices, this list of conditions, and the following
477 disclaimer in the documentation and/or other materials provided
478 with the distribution, and
480 3. Redistributions must contain a verbatim copy of this document.
482 The OpenLDAP Foundation may revise this license from time to time.
483 Each revision is distinguished by a version number. You may use
484 this Software under terms of this license revision or under the
485 terms of any subsequent revision of the license.
487 THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND ITS
488 CONTRIBUTORS ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
489 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
490 AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
491 SHALL THE OPENLDAP FOUNDATION, ITS CONTRIBUTORS, OR THE AUTHOR(S)
492 OR OWNER(S) OF THE SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
493 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
494 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
495 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
496 CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
497 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
498 ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
499 POSSIBILITY OF SUCH DAMAGE.
501 The names of the authors and copyright holders must not be used in
502 advertising or otherwise to promote the sale, use or other dealing
503 in this Software without specific, written prior permission. Title
504 to copyright in this Software shall at all times remain with copyright
507 OpenLDAP is a registered trademark of the OpenLDAP Foundation.
509 Copyright 1999-2003 The OpenLDAP Foundation, Redwood City,
510 California, USA. All Rights Reserved. Permission to copy and
511 distribute verbatim copies of this document is granted.
515 Marked test programs in src/lib/krb5/krb have the following copyright:
517 Copyright (c) 2006 Kungliga Tekniska Högskolan
518 (Royal Institute of Technology, Stockholm, Sweden).
521 Redistribution and use in source and binary forms, with or without
522 modification, are permitted provided that the following conditions
525 1. Redistributions of source code must retain the above copyright
526 notice, this list of conditions and the following disclaimer.
528 2. Redistributions in binary form must reproduce the above copyright
529 notice, this list of conditions and the following disclaimer in the
530 documentation and/or other materials provided with the distribution.
532 3. Neither the name of KTH nor the names of its contributors may be
533 used to endorse or promote products derived from this software without
534 specific prior written permission.
536 THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
537 EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
538 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
539 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
540 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
541 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
542 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
543 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
544 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
545 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
546 ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.