19
- RC4 support has been replaced with ARC4
support from OpenSSL
- Blowfish is now external, in the OpenSSL library
[The licence continues]
Note that any information and cryptographic
algorithms used in this software are publicly
available on the Internet and at any major
bookstore, scientific library, and patent office
worldwide. More information can be found e.g. at
"http://www.cs.hut.fi/crypto".
The legal status of this program is some
combination of all these permissions and
restrictions. Use only at your own responsibility.
You will be responsible for any legal consequences
yourself; I am not making any claims whether
possessing or using this is legal or not in your
country, and I am not taking any responsibility on
your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE
OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS
AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE.
THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROG R AM PROVE
DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
I N NO EV E N T UN L E S S RE Q UI R E D BY
APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY
OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED
ABOVE, BE LIABLE TO YOU FOR DAMAGES,
IN C L U D I NG AN Y G E NE R AL , S P E CI A L,
INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE
THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED
INACCURATE OR LOSSES SUSTAINED BY YOU
OR THIRD PARTIES OR A FAILURE OF THE
PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR
OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
2) The 32-bit CRC compensation attack detector
in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license.
Cryptographic attack detector for ssh - source
code
Copyright (c) 1998 CORE SDI S.A., Buenos Aires,
Argentina.
All rights reserved. Redistribution and use in source
and binary forms, with or without modification, are
permitted provided that this copyright notice is
retained.
THIS SOFTWARE IS PROVIDED "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI
S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR
CONSEQUENTIAL DAMAGES RESULTING FROM
THE USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo@core-sdi.com>
<http://www.core-sdi.com>
3) ssh-keyscan was contributed by David Mazieres
under a BSD-style license.
Copyright 1995, 1996 by David Mazieres <dm@lcs.
mit.edu>.
Modification and redistribution in source and binary
forms is permitted provided that due credit is given
to the author and the Open BSD project by leaving
this copyright notice intact.
4) The Rijndael implementation by Vincent Rijmen,
Antoon Bosselaers and Paulo Barreto is in the
public domain and distributed with the following
license:
@version 3.0 (December 2000)
Optimised ANSI C code for the Rijndael cipher (now
AES)
@author Vincent Rijmen <vincent.rijmen@esat.
kuleuven.ac.be>
@ a u t h o r A n t o o n B o s s e l a e r s <a n t o o n .
bosselaers@esat.kuleuven.ac.be>
@author Paulo Barreto <paulo.barreto@terra.com.
br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE
AUTHORS ‘’AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHORS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS
OF USE, DATA, OR PROFITS; OR BUSINESS
@AIM-D00_IB_31461A(2)_コホキマ.indd 19 2010-07-22 ソタタ・10:42:56
Comments to this Manuals