Mercurial > hg4j
comparison LICENSE-TRILEAD.txt @ 696:5b5d199e2eb3
Replaced ganymed ssh2 library with trilead
author | Artem Tikhomirov <tikhomirov.artem@gmail.com> |
---|---|
date | Mon, 05 Aug 2013 19:03:22 +0200 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
695:053bb4397bf9 | 696:5b5d199e2eb3 |
---|---|
1 Copyright (c) 2007-2008 Trilead AG (http://www.trilead.com) | |
2 | |
3 All rights reserved. | |
4 | |
5 Redistribution and use in source and binary forms, with or without | |
6 modification, are permitted provided that the following conditions | |
7 are met: | |
8 | |
9 a.) Redistributions of source code must retain the above copyright | |
10 notice, this list of conditions and the following disclaimer. | |
11 b.) Redistributions in binary form must reproduce the above copyright | |
12 notice, this list of conditions and the following disclaimer in the | |
13 documentation and/or other materials provided with the distribution. | |
14 c.) Neither the name of Trilead nor the names of its contributors may | |
15 be used to endorse or promote products derived from this software | |
16 without specific prior written permission. | |
17 | |
18 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
19 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
20 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
21 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE | |
22 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
23 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
24 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
25 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
26 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
27 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
28 POSSIBILITY OF SUCH DAMAGE. | |
29 | |
30 Trilead SSH-2 for Java includes code that was written by Dr. Christian Plattner | |
31 during his PhD at ETH Zurich. The license states the following: | |
32 | |
33 Copyright (c) 2005 - 2006 Swiss Federal Institute of Technology (ETH Zurich), | |
34 Department of Computer Science (http://www.inf.ethz.ch), | |
35 Christian Plattner. All rights reserved. | |
36 | |
37 Redistribution and use in source and binary forms, with or without | |
38 modification, are permitted provided that the following conditions | |
39 are met: | |
40 | |
41 a.) Redistributions of source code must retain the above copyright | |
42 notice, this list of conditions and the following disclaimer. | |
43 b.) Redistributions in binary form must reproduce the above copyright | |
44 notice, this list of conditions and the following disclaimer in the | |
45 documentation and/or other materials provided with the distribution. | |
46 c.) Neither the name of ETH Zurich nor the names of its contributors may | |
47 be used to endorse or promote products derived from this software | |
48 without specific prior written permission. | |
49 | |
50 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
51 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
52 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
53 ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE | |
54 LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
55 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
56 SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
57 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
58 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
59 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
60 POSSIBILITY OF SUCH DAMAGE. | |
61 | |
62 The Java implementations of the AES, Blowfish and 3DES ciphers have been | |
63 taken (and slightly modified) from the cryptography package released by | |
64 "The Legion Of The Bouncy Castle". | |
65 | |
66 Their license states the following: | |
67 | |
68 Copyright (c) 2000 - 2004 The Legion Of The Bouncy Castle | |
69 (http://www.bouncycastle.org) | |
70 | |
71 Permission is hereby granted, free of charge, to any person obtaining a copy | |
72 of this software and associated documentation files (the "Software"), to deal | |
73 in the Software without restriction, including without limitation the rights | |
74 to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
75 copies of the Software, and to permit persons to whom the Software is | |
76 furnished to do so, subject to the following conditions: | |
77 | |
78 The above copyright notice and this permission notice shall be included in | |
79 all copies or substantial portions of the Software. | |
80 | |
81 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
82 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
83 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | |
84 AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
85 LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | |
86 OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN | |
87 THE SOFTWARE. | |
88 |