File: copyright

package info (click to toggle)
hashcash 1.22-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,232 kB
  • sloc: ansic: 8,565; perl: 925; sh: 297; makefile: 181; python: 41
file content (238 lines) | stat: -rw-r--r-- 10,364 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: hashcash
Upstream-Contact: Adam Back <adam@cypherspace.org>
Source: http://hashcash.org/source/
Comment:
 The following are not licensing requirements, just comments from the
 author:
 .
 - If you have to make changes to make this library work for your system or
   application it would be useful if you could tell me what you had to
   do, and optionally send me the source changes so I can include them
   or update the library.  The aim is to make a practically useful
   library.
 .
 - It would be useful if you could inform me if you use or distribute
   hashcash.  The intent here is to give me feedback and insight into the
   areas of application which people find useful in practice.
 .
 - If you are unclear on how to use hashcash there is a FAQ here:
   http://www.hashcash.org/faq.html.  If that doesn't answer your question or
   doesn't apply to your usage, feel free to discuss in email.
 .
 - It may help the deployment of hashcash as an anti-spam system if different
   systems based on hashcash were interoperable as far as that makes
   sense for your system.  To this end the FAQ
   http://www.hashcash.org/faq.html and Internet-Draft
   http://www.hashcash.org/draft-hashcash.txt document my
   thoughts in this area.  See also the hashcash home page
   http://www.hashcash.org and paper there as I update with links to deployed
   systems which it might be useful for you to interoperate with.

Files: *
Copyright: 1997-2006 Adam Back <adam@cypherspace.org>
License: GPL-2 or LGPL-2.1 or BSD-3-clause or Cypherpunks-CPL

Files: debian/*
Copyright: 2003-2006 Hubert Chan <hubert@uhoreg.ca>
           2012 Moritz Muehlenhoff <jmm@debian.org>
           2016 Giovani Augusto Ferreira <giovani@riseup.net>
           2022 Stefan Kangas <stefankangas@gmail.com>
	   2025 Simon Josefsson <simon@josefsson.org>
License: GPL-2+

Files: getopt.c
Copyright: 1987, 1988, 1989, 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
License: GPL-2+

Files: getopt.h
Copyright: 1989, 1990, 1991, 1992, 1993 Free Software Foundation, Inc.
License: GPL-2+

Files: contrib/hashcash-request contrib/hashcash-sendmail
Copyright: 2004 Kyle Hasselbacher <kyle@toehold.com>
License: GPL-2+

Files: contrib/hashfork.c
Copyright: 2005 Hubert Chan
License: GPL-2

Files: fip180-1.txt
Copyright: U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology
License: public-domain
 The source contains fip180-1.txt, written by the United States government, and
 is in the public domain.

License: GPL-2
 This program is free software; you can redistribute it and/or
 modify it under the terms of the GNU General Public License
 version 2 as published by the Free Software Foundation.
 .
 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.
 .
 You should have received a copy of the GNU General Public License
 along with this program; if not, write to the Free Software
 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 02110-1301 USA.
Comment:
 On Debian systems, the complete text of the GNU General Public
 License version 2 can be found in `/usr/share/common-licenses/GPL-2'.

License: GPL-2+
 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.
 .
 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.
 .
 You should have received a copy of the GNU General Public License
 along with this program; if not, write to the Free Software
 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 02110-1301 USA.
Comment:
 On Debian systems, the complete text of the GNU General Public
 License version 2 can be found in `/usr/share/common-licenses/GPL-2'.

License: LGPL-2.1
 This program is free software; you can redistribute it and/or
 modify it under the terms of the GNU Lesser General Public License
 version 2.1 as published by the Free Software Foundation.
 .
 This program is distributed in the hope that it will be useful, but
 WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 Lesser General Public License for more details.
 .
 You should have received a copy of the GNU Lesser General Public
 License along with this program; if not, write to the Free Software
 Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 02110-1301 USA.
Comment:
 On Debian systems, the complete text of the GNU Lesser General Public
 License version 2.1 can be found in `/usr/share/common-licenses/LGPL-2.1'.

License: BSD-3-clause
 Redistribution and use in source and binary forms, with or
 without modification, are permitted provided that the following
 conditions are met:
 .
    1. Redistributions of source code must retain the above
       copyright notice, this list of conditions and the
       following disclaimer.
 .
    2. Redistributions in binary form must reproduce the above
       copyright notice, this list of conditions and the
       following disclaimer in the documentation and/or other
       materials provided with the distribution.
 .
    3. Neither the name of the copyright holder nor the names of
       its contributors may be used to endorse or promote
       products derived from this software without specific
       prior written permission.
 .
 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
 CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
 INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
 CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
 USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
 AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
 IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
 THE POSSIBILITY OF SUCH DAMAGE.

License: Cypherpunks-CPL
 Cypherpunks anti-License
 .
 Intent
 .
 The intent of the Cypherpunks anti-License (CPL) is to inform users that they
 are free to use and redistribute the indicated work or any derived or modified
 work in any manner they choose. Works distributed under the CPL are in the
 Public Domain.
 .
 Licensing
 .
 The CPL is not a license, it does not require the user to do or not do
 anything; the user does not agree to any terms, because there are no terms, and
 the user does not need to do anything to indicate acceptance or rejection of
 the CPL.
 .
 Non Litigation
 .
 The CPL serves to pledge to the user that the distributors will behave in a
 manner consistent with the non-existance of Intellectual Property (IP) laws as
 far as they are able. The distributors will not use or participate as far as
 they are able to government legal systems to attempt to enforce requests
 restricting the use, modifications, or redistribution of the work for
 perpetuity. The distributor may prefer to be anonymous to preclude attempts to
 coerce them into enforcing IP laws relating to this work against their will.
 .
 Requests
 .
 The work may be distributed with some distributor requests in addition to the
 CPL. The distributor pledges similarly to not attempt to use IP laws to enforce
 these requests.
 .
 Redistribution
 .
 Users choosing to redistribute this work may change anything about the work,
 including distributing it under a different license, and adding or removing
 previous distributors requests.
 .
 Interpretation
 .
 The CPL is completely liberal. Here are some examples of implications of this
 which are not true for many licenses. The user can redistribute the work or a
 derived or modified work
 .
     * under a different license of their choosing
     * with or without source code as they choose
     * without acknowledging the distributors or authors
     * with false or innaccurate claims about authorship of the work
     * advertise without acknowledging the authors
 .
 Requests can be arbitrary, but are requests only. Example of requests that the
 distributor may choose to make:
 .
     * that improvements to the work be drawn to the distributors attention
     * that improvements to the work be released back to the distributor under
       the CPL
     * that the distributors name not be used to advertise derived works without
       the distributors approval
 .
 Legacy Considerations
 .
 The distributor may choose to inform the user of his opinion of the IP status
 of the work, for example by identifying any IP law restricted aspects such as
 the copyright holders of parts or the whole of the work, trademark owners of
 trademarks used in the work, potentially applicable patents on algorithms or
 ideas contained in the work, but the distributor is not obliged to do so and
 takes no responsibility for the accuracy of such information.
 .
 Background
 .
 The CPL is written from a mindset which derides the very concept of
 Intellectual Property restrictions as being incompatible with a free society.
 .
 Cryptographically assured anonymity and anonymous use of Internet resources
 mean that denizens of cypherspace can ignore copyright, licenses attempting to
 control use and distribution of works, and patents on ideas. It is not possible
 to enforce IP laws by calls to government legal systems when the flaunter is
 strongly anonymous.
 .
 The enforcement of IP law and anonymity are in direct conflict. To fully
 enforce IP laws, anonymity would have to be outlawed. Cypherpunks believe this
 would be a bad thing, because control of information imparts power, and
 anonymity gives individuals control over disclosure of information about
 themselves and their actions.