File: copyright

package info (click to toggle)
donkey 0.5-18
  • links: PTS, VCS
  • area: main
  • in suites: squeeze
  • size: 252 kB
  • ctags: 365
  • sloc: ansic: 1,963; makefile: 54; sh: 29
file content (113 lines) | stat: -rw-r--r-- 4,262 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
Format-Specification: http://svn.debian.org/wsvn/dep/web/deps/dep5.mdwn?op=file&rev=59
Name: donkey

Files: *
Author: Kazuhiko Yamamoto <kazu@is.aist-nara.ac.jp>
Copyright: (C) 1995 Kazuhiko Yamamoto
License: GPL-2

Files: src/getopt.h
Copyright: (C) 1989, 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
License: GPL-2+

Files: src/md.c src/md4.c
Copyright: (C) 1990-2, RSA Data Security, Inc.
           (C) 1995 Kazuhiko Yamamoto
License: other
  All rights reserved.
  .
  License to copy and use this software is granted provided that it
  is identified as the "RSA Data Security, Inc. MD4 Message-Digest
  Algorithm" in all material mentioning or referencing this software
  or this function.
  .
  License is also granted to make and use derivative works provided
  that such works are identified as "derived from the RSA Data
  Security, Inc. MD4 Message-Digest Algorithm" in all material
  mentioning or referencing the derived work.
  .
  RSA Data Security, Inc. makes no representations concerning either
  the merchantability of this software or the suitability of this
  software for any particular purpose. It is provided "as is"
  without express or implied warranty of any kind.
  .
  These notices must be retained in any copies of any part of this
  documentation and/or software.

Files: src/md2.c
Copyright: (C) 1990-2, RSA Data Security, Inc.
           (C) 1995 Kazuhiko Yamamoto
License: other
  All rights reserved.
  .
  License to copy and use this software is granted for
  non-commercial Internet Privacy-Enhanced Mail provided that it is
  identified as the "RSA Data Security, Inc. MD2 Message Digest
  Algorithm" in all material mentioning or referencing this software
  or this function.
  .
  RSA Data Security, Inc. makes no representations concerning either
  the merchantability of this software or the suitability of this
  software for any particular purpose. It is provided "as is"
  without express or implied warranty of any kind.
  .
  These notices must be retained in any copies of any part of this
  documentation and/or software.

Files: src/md5.c
Copyright: (C) 1991-2, RSA Data Security, Inc.
           (C) 1995 Kazuhiko Yamamoto
License: other
  All rights reserved.
  .
  License to copy and use this software is granted provided that it
  is identified as the "RSA Data Security, Inc. MD5 Message-Digest
  Algorithm" in all material mentioning or referencing this software
  or this function.
  .
  License is also granted to make and use derivative works provided
  that such works are identified as "derived from the RSA Data
  Security, Inc. MD5 Message-Digest Algorithm" in all material
  mentioning or referencing the derived work.
  .
  RSA Data Security, Inc. makes no representations concerning either
  the merchantability of this software or the suitability of this
  software for any particular purpose. It is provided "as is"
  without express or implied warranty of any kind.
  .
  These notices must be retained in any copies of any part of this
  documentation and/or software.

Files: src/passphrase.c
Author: Mike Gleason, Kazuhiko Yamamoto
Copyright: (c) 1995 Mike Gleason, NCEMRSoft
           (C) 1995 Kazuhiko Yamamoto
License: other
  All rights reserved.
  .
  Redistribution and use in source and binary forms are permitted provided
  that: (1) source distributions retain this entire copyright notice and
  comment, and (2) distributions may not be sold for profit on physical
  media such as disks, tapes, and CD-ROMS, without expressed written
  permission.

Files: src/tailor.h
Author: (C) 1992-1993 Jean-loup Gailly
Copyright: (C) 1992-1993 Jean-loup Gailly
License: GPL-2+

Files: debian/*
Author: Fumitoshi UKAI <ukai@debian.or.jp>,
        Peter Pentchev <roam@ringlet.net>
Copyright: (C) 1997-1999, 2001, 2003  Fumitoshi UKAI
           (C) 2009  Peter Pentchev
License: GPL-2

License: GPL-2+
 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.
 .
 On Debian systems, the complete text of the GNU General Public License
 can be found in file "/usr/share/common-licenses/GPL-2".