Marantz 541110297226M User Manual
Page 71
LICENSE
10
Individual source code files are copyright MIT, Cygnus
Support, OpenVision, Oracle, Sun Soft, FundsXpress, and
others.
Project Athena, Athena, Athena MUSE, Discuss,
Hesiod, Kerberos, Moira, and Zephyr are trademarks of
the Massachusetts Institute of Technology (MIT). No
commercial use of these trademarks may be made
without prior written permission of MIT.
“Commercial use” means use of a name in a product or
other for-profit manner. It does NOT prevent a commercial
firm from referring to the MIT trademarks in order to
convey information (although in doing so, recognition of
their trademark status should be given).
The following copyright and permission notice applies to
the OpenVision Kerberos Administration system located
in kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/
server, lib/kadm5, and portions of lib/rpc:
Copyright, OpenVision Technologies, Inc., 1996, All
Rights Reserved
WARNING: Retrieving the OpenVision Kerberos
Administration system source code, as described below,
indicates your acceptance of the following terms. If you
do not agree to the following terms, do not retrieve the
OpenVision Kerberos administration system.
You may freely use and distribute the Source Code
and Object Code compiled from it, with or without
modification, but this Source Code is provided to you
“AS IS” EXCLUSIVE OF ANY WARRANTY, INCLUDING,
WITHOUT LIMITATION, ANY WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE, OR ANY OTHER WARRANTY, WHETHER
EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION
HAVE ANY LIABILITY FOR ANY LOST PROFITS, LOSS OF
DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES, OR FOR ANY SPECIAL,
INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THIS AGREEMENT, INCLUDING, WITHOUT
LIMITATION, THOSE RESULTING FROM THE USE OF
THE SOURCE CODE, OR THE FAILURE OF THE SOURCE
CODE TO PERFORM, OR FOR ANY OTHER REASON.
OpenVision retains all copyrights in the donated Source
Code. OpenVision also retains copyright to derivative
works of the Source Code, whether created by
OpenVision or by a third party. The OpenVision copyright
notice must be preserved if derivative works are made
based on the donated Source Code.
OpenVision Technologies, Inc. has donated this
Kerberos Administration system to MIT for inclusion
in the standard Kerberos 5 distribution. This donation
underscores our commitment to continuing Kerberos
technology development and our gratitude for the
valuable work which has been performed by MIT and
the Kerberos community. gov> were work performed at Fermi National Accelerator Laboratory, which is operated by Universities Research Association, Inc., under contract DE-AC02-76CHO3000 with the U.S. Department of Energy. The implementation of the Yarrow pseudo-random number generator in src/lib/crypto/yarrow has the following copyright: Copyright 2000 by Zero-Knowledge Systems, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of Zero-Knowledge Systems, Inc. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. Zero-Knowledge Systems, Inc. makes no representations about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty. ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. src/lib/crypto/aes has the following copyright: Copyright (c) 2001, Dr Brian Gladman uk.net>, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that: 1. distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer; 2. distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials; 3. the copyright holder’s name is not used to endorse products built using this software without specific written permission. DISCLAIMER This software is provided “as is” with no explcit or implied warranties in respect of any properties, including, but not limited to, correctness and fitness for purpose. The implementation of the RPCSEC_GSS authentication flavor in src/lib/rpc has the following copyright: Copyright (c) 2000 The Regents of the University of Michigan. All rights reserved. Copyright (c) 2000 Dug Song <[email protected]>. All rights reserved, all wrongs reversed. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Acknowledgments Appreciation Time!!!! There are far too many people to try to thank them all; many people have contributed to the development of Kerberos V5. This is only a partial listing.... Thanks to Kevin Coffman and the CITI group at the University of Michigan for providing patches for implementing RPCSEC_GSS authentication in the RPC library. Thanks to Derrick Schommer for reporting multiple memory leaks. Thanks to Quanah Gibson-Mount of Stanford University for helping exercise the thread support code. Thanks to Michael Tautschnig for reporting the heap buffer overflow inthe password history mechanism. [MITKRB5- SA-2004-004] Thanks to Wyllys Ingersoll for finding a buffer-size problem in theRPCSEC_GSS implementation. Thanks to the members of the Kerberos V5 development team at MIT, both past and present: Danilo Almeida, Jeffrey Altman, Jay Berkenbilt, Richard Basch, Mitch Berger, John Carr, Don Davis, Alexandra Ellwood, Nancy Gilman, Matt Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King, John Kohl, Peter Litwack, Scott McGuire, Kevin Mitchell, Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano, Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad Thompson, Harry Tsai, Ted Ts’o, Marshall Vale, Tom Yu. Very special thanks go to Marshall Vale, our departing team leader. Over the past few years, Marshall has been extremely valuable to us as mentor, advisor, manager, and friend. Marshall’s devotion as a champion of Kerberos has helped our team immensely through many trials and hardships. We will miss him tremendously, and we wish him the best in his future endeavors. n Exhibit-U Copyright (c) 1989 The Regents of the University of California. All rights reserved. This code is derived from software contributed to Berkeley by Mike Muuss. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. License Information for the Software Used in the Unit License), LGPL (GNU Lesser General Public License) License This product uses GPL/LGPL software and software
Portions contributed by Matt Crawford
The implementation of the AES encryption algorithm in
About GPL (GNU-General Public
made by other companies.
After you purchase this product, you may procure,
modify or distribute the source code of the GPL/
LGPL software that is used in the product.
MARANTZ provides the source code based on the
GPL and LPGL licenses at the actual cost upon your
request to our customer service center. However,
note that we make no guarantees concerning the
source code. Please also understand that we do
not offer support for the contents of the source
code.