1 This file is part of the ssh software, Copyright (c) 1995 Tatu Ylonen, Finland
   2 
   3 
   4 COPYING POLICY AND OTHER LEGAL ISSUES
   5 
   6 As far as I am concerned, the code I have written for this software
   7 can be used freely for any purpose.  Any derived versions of this
   8 software must be clearly marked as such, and if the derived work is
   9 incompatible with the protocol description in the RFC file, it must be
  10 called by a name other than "ssh" or "Secure Shell".
  11 
  12 However, I am not implying to give any licenses to any patents or
  13 copyrights held by third parties, and the software includes parts that
  14 are not under my direct control.  As far as I know, all included
  15 source code is used in accordance with the relevant license agreements
  16 and can be used freely for any purpose (the GNU license being the most
  17 restrictive); see below for details.
  18 
  19 [ RSA is no longer included. ]
  20 [ IDEA is no longer included. ]
  21 [ DES is now external. ]
  22 [ GMP is now external. No more GNU licence. ]
  23 [ Zlib is now external. ]
  24 [ The make-ssh-known-hosts script is no longer included. ]
  25 [ TSS has been removed. ]
  26 [ MD5 is now external. ]
  27 [ RC4 support has been removed (RC4 is used internally for arc4random). ]
  28 [ Blowfish is now external. ]
  29 
  30 The 32-bit CRC implementation in crc32.c is due to Gary S. Brown.
  31 Comments in the file indicate it may be used for any purpose without
  32 restrictions.
  33 
  34 The 32-bit CRC compensation attack detector in deattack.c was
  35 contributed by CORE SDI S.A. under a BSD-style license. See
  36 http://www.core-sdi.com/english/ssh/ for details.
  37 
  38 Note that any information and cryptographic algorithms used in this
  39 software are publicly available on the Internet and at any major
  40 bookstore, scientific library, and patent office worldwide.  More
  41 information can be found e.g. at "http://www.cs.hut.fi/crypto".
  42 
  43 The legal status of this program is some combination of all these
  44 permissions and restrictions.  Use only at your own responsibility.
  45 You will be responsible for any legal consequences yourself; I am not
  46 making any claims whether possessing or using this is legal or not in
  47 your country, and I am not taking any responsibility on your behalf.
  48 
  49 
  50                             NO WARRANTY
  51 
  52 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
  53 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
  54 OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
  55 PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
  56 OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  57 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
  58 TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
  59 PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
  60 REPAIR OR CORRECTION.
  61 
  62 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
  63 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
  64 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
  65 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
  66 OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
  67 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
  68 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
  69 PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
  70 POSSIBILITY OF SUCH DAMAGES.