LICENSE
0
Individual source code les are copyright MIT , Cygnus
Support, OpenVision, Oracle, Sun Soft, FundsXpress, and
others.
P roject Athena, Athena, Athena MUSE, Discuss,
Hesiod, Kerberos, Moira, and Zephyr are trademarks of
the Massachusetts Institute of T echnology (MIT). No
commercial use of these trademarks may be made
without prior written permission of MIT .
“Commercial use” means use of a name in a product or
other for-prot manner . It does NO T prevent a commercial
rm from referring to the MIT trademarks in order to
convey information (although in doing so, recognition of
their trademark status should be given).
The following copyright and permission notice applies to
the OpenVision Kerberos Administration system located
in kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/
server , lib/kadm5, and portions of lib/rpc:
Copyright, OpenVision T echnologies, Inc., 1996, All
Rights Reserved
WARNING: Retrieving the OpenVision Kerberos
Administration system source code, as described below ,
indicates your acceptance of the following terms. If you
do not agree to the following terms, do not retrieve the
OpenVision Kerberos administration system.
Y ou may freely use and distribute the Source Code
and Object Code compiled from it, with or without
modication, but this Source Code is provided to you
“ AS IS” EX CL USIVE OF ANY WARRANTY , INCL UDING,
WITHOUT LIMIT A TION, ANY WARRANTIES OF
MERCHANT ABILITY OR FITNESS FOR A P AR TICULAR
PURPOSE, OR ANY O THER WARRANTY , WHETHER
EXPRESS OR IMPLIED . IN NO EVENT WILL OPENVISION
HA VE ANY LIABILITY FOR ANY LOST PROFITS , L OSS OF
DA T A OR COSTS OF PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES , OR FOR ANY SPECIAL,
INDIRECT , OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THIS AGREEMENT , INCLUDING, WITHOUT
LIMIT A TION , THOSE RESUL TING FROM THE USE OF
THE SOURCE CODE, OR THE F AILURE OF THE SOURCE
CODE T O PERFORM, OR FOR ANY O THER REASON .
OpenVision retains all copyrights in the donated Source
Code. OpenVision also retains copyright to derivative
works of the Source Code, whether created by
OpenVision or by a third party . The OpenVision copyright
notice must be preserved if derivative works are made
based on the donated Source Code.
OpenVision T echnologies, Inc. has donated this
Kerberos Administration system to MIT for inclusion
in the standard Kerberos 5 distribution. This donation
underscores our commitment to continuing Kerberos
technology development and our gratitude for the
valuable work which has been performed by MIT and
the Kerberos community .
P ortions contributed by Matt Crawford <crawdad@ fnal.
gov> were work performed at F ermi National Accelerator
Laboratory , which is operated by Universities Research
Association, Inc., under contract DE-AC02-76CHO3000
with the U .S. Department of Energy .
The implementation of the Y arrow pseudo -random number
generator in src/lib/crypto/yarrow has the following
copyright:
Copyright 2000 by Zero-Knowledge Systems, Inc.
P ermission to use, copy , modify , distribute, and sell this
software and its documentation for any purpose is hereby
granted without fee, provided that the above copyright
notice appear in all copies and that both that copyright
notice and this permission notice appear in supporting
documentation, and that the name of Zero-Knowledge
Systems, Inc. not be used in advertising or publicity
pertaining to distribution of the software without specic,
written prior permission. Zero-Knowledge Systems, Inc.
makes no representations about the suitability of this
software for any purpose. It is provided “as is” without
express or implied warranty .
ZERO-KNOWLEDGE SYSTEMS , INC. DISCLAIMS ALL
WARRANTIES WITH REGARD T O THIS SOFTW ARE,
INCL UDING ALL IMPLIED W ARRANTIES OF
MERCHANT ABILITY AND FITNESS, IN NO EVENT SHALL
ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMA GES OR
ANY D AMAGES WHA TSOEVER RESUL TING FROM L OSS
OF USE, D A T A OR PROFITS , WHETHER IN AN ACTION
OF CONTRA CT , NEGLIGENCE OR O THER TOR TUOUS
ACTION , ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in
src/lib/crypto/aes has the following copyright:
Copyright (c) 2001, Dr Brian Gladman <brg@ gladman.
uk.net>, W orcester , UK.
All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both
source and binary form is allowed (with or without
changes) provided that:
1. distributions of this source code include the above
copyright notice, this list of conditions and the
following disclaimer;
2. distributions in binary form include the above
copyright notice, this list of conditions and the
following disclaimer in the documentation and/or
other associated materials;
3. the copyright holder ’s name is not used to endorse
products built using this software without specic
written permission.
DISCLAIMER
This software is provided “as is” with no explcit or implied
warranties in respect of any properties, including , but not
limited to, correctness and tness for purpose.
The implementation of the RPCSEC_GSS authentication
avor in src/lib/rpc has the following copyright:
Copyright (c) 2000 The Regents of the University of
Michigan.
All rights reserved.
Copyright (c) 2000 Dug Song <dugsong@ UMICH.EDU>.
All rights reserved, all wrongs reversed.
Redistribution and use in source and binary forms, with
or without modication, are permitted provided that the
following conditions are met:
1. R edistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer .
2. R edistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specic
prior written permission.
THIS SOFTW ARE IS PRO VIDED “ AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING ,
BUT NO T LIMITED T O, THE IMPLIED WARRANTIES OF
MERCHANT ABILITY AND FITNESS FOR A P ARTICULAR
PURPOSE ARE DISCLAIMED . IN NO EVENT SHALL THE
REGENTS OR CONTRIBUT ORS BE LIABLE FOR ANY
DIRECT , INDIRECT , INCIDENT AL, SPECIAL , EXEMPLARY ,
OR CONSEQUENTIAL DAMAGES (INCL UDING , BUT NOT
LIMITED T O , PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; L OSS OF USE , DA T A, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CA USED AND ON
ANY THEORY OF LIABILITY , WHETHER IN CONTRA CT ,
STRICT LIABILITY , OR T ORT (INCL UDING NEGLIGENCE
OR O THERWISE) ARISING IN ANY WA Y OUT OF THE
USE OF THIS SOFTW ARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMA GE.
Acknowledgments
Appreciation Time!!!! There are far too many people to
try to thank them all; many people have contributed to
the development of K erberos V5. This is only a partial
listing....
Thanks to Kevin Coffman and the CITI group at the
University of Michigan for providing patches for
implementing RPCSEC_GSS authentication in the RPC
library .
Thanks to Derrick Schommer for reporting multiple
memory leaks.
Thanks to Quanah Gibson-Mount of Stanford University
for helping exercise the thread support code.
Thanks to Michael T autschnig for reporting the heap buffer
overow inthe password history mechanism. [MITKRB5-
SA-2004-004]
Thanks to W yllys Ingersoll for nding a buffer -size problem
in theRPCSEC_GSS implementation.
Thanks to the members of the K erberos V5 development
team at MIT , both past and present: Danilo Almeida, Jeffrey
Altman, Jay Berk enbilt, Richard Basch, Mitch Berger , John
Carr , Don Davis, Alexandra Ellwood, Nancy Gilman, Matt
Hancher , Sam Hartman, P aul Hill, Marc Horowitz, Eva
Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King,
John Kohl, P eter Litwack, Scott McGuire, Kevin Mitchell,
Cliff Neuman, Paul P ark, Ezra P eisach, Chris Provenzano,
Ken R aeburn, Jon Rochlis, Jeff Schiller , Jen Selby , Brad
Thompson, Harry T sai, T ed T s’o, Marshall V ale, T om Y u.
V ery special thanks go to Marshall V ale, our departing
team leader .
Over the past few years, Marshall has been extremely
valuable to us as mentor , advisor , manager , and friend.
Marshall’s devotion as a champion of Kerberos has helped
our team immensely through many trials and hardships.
W e will miss him tremendously , and we wish him the best
in his future endeavors.
n
Exhibit-U
Copyright (c) 1989 The Regents of the University of
California.
All rights reserved.
This code is derived from software contributed to Berk eley
by Mike Muuss.
Redistribution and use in source and binary forms, with
or without modication, are permitted provided that the
following conditions are met:
1. R edistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer .
2. R edistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. All advertising materials mentioning features or
use of this software must display the following
acknowledgement:
This product includes software developed by the
University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specic
prior written permission.
THIS SOFTW ARE IS PROVIDED BY THE REGENTS AND
CONTRIBUT ORS “ AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES , INCL UDING , BUT NO T LIMITED T O, THE
IMPLIED W ARRANTIES OF MERCHANT ABILITY AND
FITNESS FOR A P AR TICULAR PURPOSE ARE DISCLAIMED .
IN NO EVENT SHALL THE REGENTS OR CONTRIBUT ORS
BE LIABLE FOR ANY DIRECT , INDIRECT , INCIDENT AL,
SPECIAL, EXEMPLAR Y , OR CONSEQUENTIAL DAMAGES
(INCL UDING, BUT NO T LIMITED T O , PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; L OSS OF USE, D A T A,
OR PROFITS ; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY , WHETHER
IN CONTRACT , STRICT LIABILITY , OR T ORT (INCL UDING
NEGLIGENCE OR O THERWISE) ARISING IN ANY W A Y
OUT OF THE USE OF THIS SOFTW ARE, EVEN IF AD VISED
OF THE POSSIBILITY OF SUCH DAMA GE.
License Information for the Software
Used in the Unit
About GPL (GNU -General Public
License), LGPL (GNU Lesser General
Public License) License
This product uses GPL/LGPL software and software
made by other companies.
After you purchase this product, you may procure,
modify or distribute the source code of the GPL/
LGPL software that is used in the product.
DENON provides the source code based on the
GPL and LPGL licenses at the actual cost upon your
request to our customer service center . However ,
note that we make no guarantees concerning the
source code. Please also understand that we do
not offer support for the contents of the source
code.