3 $FreeBSD: src/lib/libpam/modules/pam_krb5/COPYRIGHT,v 1.1.2.1 2001/06/07 09:37:05 markm Exp $
4 $DragonFly: src/lib/libpam/modules/pam_krb5/Attic/COPYRIGHT,v 1.2 2003/06/17 04:26:50 dillon Exp $
6 Copyright (c) Frank Cusack, 1999-2000.
10 Redistribution and use in source and binary forms, with or without
11 modification, are permitted provided that the following conditions
13 1. Redistributions of source code must retain the above copyright
14 notice, and the entire permission notice in its entirety,
15 including the disclaimer of warranties.
16 2. Redistributions in binary form must reproduce the above copyright
17 notice, this list of conditions and the following disclaimer in the
18 documentation and/or other materials provided with the distribution.
19 3. The name of the author may not be used to endorse or promote
20 products derived from this software without specific prior
23 ALTERNATIVELY, this product may be distributed under the terms of
24 the GNU Public License, in which case the provisions of the GPL are
25 required INSTEAD OF the above restrictions. (This clause is
26 necessary due to a potential bad interaction between the GPL and
27 the restrictions contained in a BSD-style copyright.)
29 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
30 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
31 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
32 DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
33 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
34 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
35 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
37 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
38 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
39 OF THE POSSIBILITY OF SUCH DAMAGE.
41 ---------------------------------------------------------------------------
43 This software may contain code from Naomaru Itoi:
45 PAM-kerberos5 module Copyright notice.
46 Naomaru Itoi <itoi@eecs.umich.edu>, June 24, 1997.
48 ----------------------------------------------------------------------------
50 THE REGENTS OF THE UNIVERSITY OF MICHIGAN
53 PERMISSION IS GRANTED TO USE, COPY, CREATE DERIVATIVE WORKS AND REDISTRIBUTE
54 THIS SOFTWARE AND SUCH DERIVATIVE WORKS FOR ANY PURPOSE, SO LONG AS THE NAME
55 OF THE UNIVERSITY OF MICHIGAN IS NOT USED IN ANY ADVERTISING OR PUBLICITY
56 PERTAINING TO THE USE OR DISTRIBUTION OF THIS SOFTWARE WITHOUT SPECIFIC,
57 WRITTEN PRIOR AUTHORIZATION. IF THE ABOVE COPYRIGHT NOTICE OR ANY OTHER
58 IDENTIFICATION OF THE UNIVERSITY OF MICHIGAN IS INCLUDED IN ANY COPY OF ANY
59 PORTION OF THIS SOFTWARE, THEN THE DISCLAIMER BELOW MUST ALSO BE INCLUDED.
61 THE SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION FROM THE UNIVERSITY OF
62 MICHIGAN AS TO ITS FITNESS FOR ANY PURPOSE, AND WITHOUT WARRANTY BY THE
63 UNIVERSITY OF MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
64 WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABITILY AND FITNESS FOR A
65 PARTICULAR PURPOSE. THE REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE
66 LIABLE FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
67 CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING OUT OF OR IN
68 CONNECTION WITH THE USE OF THE SOFTWARE, EVEN IF IT HAS BEEN OR IS HEREAFTER
69 ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
71 PAM-kerberos5 module is written based on PAM-kerberos4 module
72 by Derrick J. Brashear and kerberos5-1.0pl1 by M.I.T. kerberos team.
73 Permission to use, copy, modify, distribute this software is hereby
74 granted, as long as it is granted by Derrick J. Brashear and
75 M.I.T. kerberos team. Followings are their copyright information.
76 ----------------------------------------------------------------------------
78 This software may contain code from Derrick J. Brashear:
81 Copyright (c) Derrick J. Brashear, 1996. All rights reserved
83 Redistribution and use in source and binary forms, with or without
84 modification, are permitted provided that the following conditions
86 1. Redistributions of source code must retain the above copyright
87 notice, and the entire permission notice in its entirety,
88 including the disclaimer of warranties.
89 2. Redistributions in binary form must reproduce the above copyright
90 notice, this list of conditions and the following disclaimer in the
91 documentation and/or other materials provided with the distribution.
92 3. The name of the author may not be used to endorse or promote
93 products derived from this software without specific prior
96 ALTERNATIVELY, this product may be distributed under the terms of
97 the GNU Public License, in which case the provisions of the GPL are
98 required INSTEAD OF the above restrictions. (This clause is
99 necessary due to a potential bad interaction between the GPL and
100 the restrictions contained in a BSD-style copyright.)
102 THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
103 WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
104 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
105 DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
106 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
107 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
108 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
109 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
110 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
111 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
112 OF THE POSSIBILITY OF SUCH DAMAGE.
114 ----------------------------------------------------------------------------
116 This software may contain code from MIT Kerberos 5:
118 Copyright Notice and Legal Administrivia
119 ----------------------------------------
121 Copyright (C) 1996 by the Massachusetts Institute of Technology.
125 Export of this software from the United States of America may require
126 a specific license from the United States Government. It is the
127 responsibility of any person or organization contemplating export to
128 obtain such a license before exporting.
130 WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
131 distribute this software and its documentation for any purpose and
132 without fee is hereby granted, provided that the above copyright
133 notice appear in all copies and that both that copyright notice and
134 this permission notice appear in supporting documentation, and that
135 the name of M.I.T. not be used in advertising or publicity pertaining
136 to distribution of the software without specific, written prior
137 permission. M.I.T. makes no representations about the suitability of
138 this software for any purpose. It is provided "as is" without express
141 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
142 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
143 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
145 Individual source code files are copyright MIT, Cygnus Support,
146 OpenVision, Oracle, Sun Soft, and others.
148 Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos, Moira,
149 and Zephyr are trademarks of the Massachusetts Institute of Technology
150 (MIT). No commercial use of these trademarks may be made without
151 prior written permission of MIT.
153 "Commercial use" means use of a name in a product or other for-profit
154 manner. It does NOT prevent a commercial firm from referring to the
155 MIT trademarks in order to convey information (although in doing so,
156 recognition of their trademark status should be given).
158 The following copyright and permission notice applies to the
159 OpenVision Kerberos Administration system located in kadmin/create,
160 kadmin/dbutil, kadmin/passwd, kadmin/server, lib/kadm5, and portions
163 Copyright, OpenVision Technologies, Inc., 1996, All Rights Reserved
165 WARNING: Retrieving the OpenVision Kerberos Administration system
166 source code, as described below, indicates your acceptance of the
167 following terms. If you do not agree to the following terms, do not
168 retrieve the OpenVision Kerberos administration system.
170 You may freely use and distribute the Source Code and Object Code
171 compiled from it, with or without modification, but this Source
172 Code is provided to you "AS IS" EXCLUSIVE OF ANY WARRANTY,
173 INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY OR
174 FITNESS FOR A PARTICULAR PURPOSE, OR ANY OTHER WARRANTY, WHETHER
175 EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION HAVE ANY LIABILITY
176 FOR ANY LOST PROFITS, LOSS OF DATA OR COSTS OF PROCUREMENT OF
177 SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR
178 CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, INCLUDING,
179 WITHOUT LIMITATION, THOSE RESULTING FROM THE USE OF THE SOURCE
180 CODE, OR THE FAILURE OF THE SOURCE CODE TO PERFORM, OR FOR ANY
183 OpenVision retains all copyrights in the donated Source Code. OpenVision
184 also retains copyright to derivative works of the Source Code, whether
185 created by OpenVision or by a third party. The OpenVision copyright
186 notice must be preserved if derivative works are made based on the
189 OpenVision Technologies, Inc. has donated this Kerberos
190 Administration system to MIT for inclusion in the standard
191 Kerberos 5 distribution. This donation underscores our
192 commitment to continuing Kerberos technology development
193 and our gratitude for the valuable work which has been
194 performed by MIT and the Kerberos community.