| 1 | 
 | 
|---|
| 2 | SAMHAIN distributed host monitoring system
 | 
|---|
| 3 | ------------------------------------------
 | 
|---|
| 4 | 
 | 
|---|
| 5 | Copyright (C) 1999-2009 Rainer Wichmann                                    
 | 
|---|
| 6 |                                                                       
 | 
|---|
| 7 | This program is free software; you can redistribute it and/or modify
 | 
|---|
| 8 | it under the terms of the GNU General Public License as published by
 | 
|---|
| 9 | the Free Software Foundation; either version 2 of the License, or     
 | 
|---|
| 10 | (at your option) any later version.                                   
 | 
|---|
| 11 |                                                                       
 | 
|---|
| 12 | This program is distributed in the hope that it will be useful,       
 | 
|---|
| 13 | but WITHOUT ANY WARRANTY; without even the implied warranty of        
 | 
|---|
| 14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         
 | 
|---|
| 15 | GNU General Public License for more details.                          
 | 
|---|
| 16 |                                                                       
 | 
|---|
| 17 | You should have received a copy of the GNU General Public License     
 | 
|---|
| 18 | along with this program; if not, write to the Free Software           
 | 
|---|
| 19 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| 20 | 
 | 
|---|
| 21 | 
 | 
|---|
| 22 | Incorporated code
 | 
|---|
| 23 | -----------------
 | 
|---|
| 24 | 
 | 
|---|
| 25 |   (i) Support for the TIGER cryptographic checksum algorithm
 | 
|---|
| 26 |   is provided by the reference implementation, which includes 
 | 
|---|
| 27 |   the following statement:
 | 
|---|
| 28 | 
 | 
|---|
| 29 |          * Tiger: A Fast New Hash Function
 | 
|---|
| 30 |          *
 | 
|---|
| 31 |          * Ross Anderson and Eli Biham
 | 
|---|
| 32 |          *
 | 
|---|
| 33 |          * Tiger has no usage restrictions nor patents. It can be used freely, 
 | 
|---|
| 34 |          * with the reference implementation, 
 | 
|---|
| 35 |          * with other implementations or with 
 | 
|---|
| 36 |          * a modification to the reference implementation (as long as it still 
 | 
|---|
| 37 |          * implements Tiger). We only ask you to let us know about your 
 | 
|---|
| 38 |          * implementation and to cite the origin of Tiger and of the reference 
 | 
|---|
| 39 |          * implementation. 
 | 
|---|
| 40 |          *
 | 
|---|
| 41 |          * The authors' home pages can be found both in 
 | 
|---|
| 42 |          * http://www.cs.technion.ac.il/~biham/ and in 
 | 
|---|
| 43 |          * http://www.cl.cam.ac.uk/users/rja14/.
 | 
|---|
| 44 |          * The authors' email addresses are biham@cs.technion.ac.il 
 | 
|---|
| 45 |          * and rja14@cl.cam.ac.uk.
 | 
|---|
| 46 | 
 | 
|---|
| 47 | 
 | 
|---|
| 48 | 
 | 
|---|
| 49 |   (ii) Support for testing write access by untrusted users
 | 
|---|
| 50 |   to any element in the path of a file is provided by the
 | 
|---|
| 51 |   public domain trustfile library, which includes the following
 | 
|---|
| 52 |   statement:
 | 
|---|
| 53 | 
 | 
|---|
| 54 |          * Author information:
 | 
|---|
| 55 |          * Matt Bishop
 | 
|---|
| 56 |          * Department of Computer Science
 | 
|---|
| 57 |          * University of California at Davis
 | 
|---|
| 58 |          * Davis, CA  95616-8562
 | 
|---|
| 59 |          * phone (916) 752-8060
 | 
|---|
| 60 |          * email bishop@cs.ucdavis.edu
 | 
|---|
| 61 |          *
 | 
|---|
| 62 |          * This code is placed in the public domain.  I do ask that
 | 
|---|
| 63 |          * you keep my name associated with it, that you not represent
 | 
|---|
| 64 |          * it as written by you, and that you preserve these comments.
 | 
|---|
| 65 |          * This software is provided "as is" and without any guarantees
 | 
|---|
| 66 |          * of any sort.
 | 
|---|
| 67 | 
 | 
|---|
| 68 |   (iii) Support for big integer arithmetic is provided by the bignum
 | 
|---|
| 69 |   package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE, 
 | 
|---|
| 70 |   which includes the following statement:
 | 
|---|
| 71 | 
 | 
|---|
| 72 |         * Everyone is allowed to distribute this package to anyone
 | 
|---|
| 73 |         * else, as long as all changes are recorded and mentioned.
 | 
|---|
| 74 |         * If you are including this in a commercial product, be sure
 | 
|---|
| 75 |         * to distribute _all_ of the package with the product.
 | 
|---|
| 76 |         *
 | 
|---|
| 77 |         * (...writing more stuff here later, but I guess everyone
 | 
|---|
| 78 |         * knows the approximate contents of it - no warranty, no
 | 
|---|
| 79 |         * charge, and so on.  I guess it is like the GNU concept.
 | 
|---|
| 80 |         * Read that for further details...)
 | 
|---|
| 81 | 
 | 
|---|
| 82 |   (iv) Support for compression is provided by the (mini) LZO library,
 | 
|---|
| 83 |   which includes the following statement:
 | 
|---|
| 84 | 
 | 
|---|
| 85 |        * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
| 86 |        * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
| 87 |        * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
| 88 |        * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
| 89 |        * 
 | 
|---|
| 90 |        * The LZO library is free software; you can redistribute it and/or
 | 
|---|
| 91 |        * modify it under the terms of the GNU General Public License as
 | 
|---|
| 92 |        * published by the Free Software Foundation; either version 2 of
 | 
|---|
| 93 |        * the License, or (at your option) any later version.
 | 
|---|
| 94 |        * 
 | 
|---|
| 95 |        * The LZO library is distributed in the hope that it will be useful,
 | 
|---|
| 96 |        * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 97 |        * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
| 98 |        * GNU General Public License for more details.
 | 
|---|
| 99 |        * 
 | 
|---|
| 100 |        * You should have received a copy of the GNU General Public License
 | 
|---|
| 101 |        * along with the LZO library; see the file COPYING.
 | 
|---|
| 102 |        * If not, write to the Free Software Foundation, Inc.,
 | 
|---|
| 103 |        * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| 104 |        * 
 | 
|---|
| 105 |        * Markus F.X.J. Oberhumer
 | 
|---|
| 106 |        * <markus.oberhumer@jk.uni-linz.ac.at>
 | 
|---|
| 107 |        * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
 | 
|---|
| 108 | 
 | 
|---|
| 109 |   (v) Support for determining the type of a file system is provided by
 | 
|---|
| 110 |   code from the GNU find(1) utility which includes the following statement:
 | 
|---|
| 111 | 
 | 
|---|
| 112 |    /* fstype.c -- determine type of filesystems that files are on
 | 
|---|
| 113 |       Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
 | 
|---|
| 114 | 
 | 
|---|
| 115 |       This program is free software; you can redistribute it and/or modify
 | 
|---|
| 116 |       it under the terms of the GNU General Public License as published by
 | 
|---|
| 117 |       the Free Software Foundation; either version 2, or (at your option)
 | 
|---|
| 118 |       any later version.
 | 
|---|
| 119 | 
 | 
|---|
| 120 |       This program is distributed in the hope that it will be useful,
 | 
|---|
| 121 |       but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 122 |       MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
| 123 |       GNU General Public License for more details.
 | 
|---|
| 124 | 
 | 
|---|
| 125 |       You should have received a copy of the GNU General Public License
 | 
|---|
| 126 |       along with this program; if not, write to the Free Software
 | 
|---|
| 127 |       Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA  */
 | 
|---|
| 128 | 
 | 
|---|
| 129 |    /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
 | 
|---|
| 130 | 
 | 
|---|
| 131 | 
 | 
|---|
| 132 |   (vi) Support for the MD5 hash algorithm is provided by code
 | 
|---|
| 133 |   from busybox which is distributed under the GPL.
 | 
|---|
| 134 | 
 | 
|---|
| 135 |    /* md5.c - Functions to compute MD5 message digest of files or memory blocks
 | 
|---|
| 136 |     *         according to the definition of MD5 in RFC 1321 from April 1992.
 | 
|---|
| 137 |     * Copyright (C) 1995, 1996 Free Software Foundation, Inc.
 | 
|---|
| 138 |     *
 | 
|---|
| 139 |     * NOTE: The canonical source of this file is maintained with the GNU C
 | 
|---|
| 140 |     * Library.  Bugs can be reported to bug-glibc@prep.ai.mit.edu.
 | 
|---|
| 141 |     *
 | 
|---|
| 142 |     * This program is free software; you can redistribute it and/or modify it
 | 
|---|
| 143 |     * under the terms of the GNU General Public License as published by the
 | 
|---|
| 144 |     * Free Software Foundation; either version 2, or (at your option) any
 | 
|---|
| 145 |     * later version.
 | 
|---|
| 146 |     *
 | 
|---|
| 147 |     * This program is distributed in the hope that it will be useful,
 | 
|---|
| 148 |     * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 149 |     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
| 150 |     * GNU General Public License for more details.
 | 
|---|
| 151 |     *
 | 
|---|
| 152 |     * You should have received a copy of the GNU General Public License
 | 
|---|
| 153 |     * along with this program; if not, write to the Free Software Foundation,
 | 
|---|
| 154 |     * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| 155 |     */
 | 
|---|
| 156 | 
 | 
|---|
| 157 |    /* Written by Ulrich Drepper <drepper@gnu.ai.mit.edu>, 1995.  */
 | 
|---|
| 158 | 
 | 
|---|
| 159 | 
 | 
|---|
| 160 |   (vi) Support for the SHA-1 hash algorithm is provided by code
 | 
|---|
| 161 |   from mhash which includes the following statement:
 | 
|---|
| 162 | 
 | 
|---|
| 163 |        /* sha.c - Implementation of the Secure Hash Algorithm
 | 
|---|
| 164 |         *
 | 
|---|
| 165 |         * Copyright (C) 1995, A.M. Kuchling
 | 
|---|
| 166 |         *
 | 
|---|
| 167 |         * Distribute and use freely; there are no restrictions on further
 | 
|---|
| 168 |         * dissemination and usage except those imposed by the laws of your
 | 
|---|
| 169 |         * country of residence.
 | 
|---|
| 170 |         *
 | 
|---|
| 171 |         * Adapted to pike and some cleanup by Niels Möller.
 | 
|---|
| 172 |         */
 | 
|---|
| 173 | 
 | 
|---|
| 174 |        /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
 | 
|---|
| 175 | 
 | 
|---|
| 176 |        /* SHA: NIST's Secure Hash Algorithm */
 | 
|---|
| 177 | 
 | 
|---|
| 178 |        /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
 | 
|---|
| 179 |           in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
 | 
|---|
| 180 |           Modified to test for endianness on creation of SHA objects by AMK.
 | 
|---|
| 181 |           Also, the original specification of SHA was found to have a weakness
 | 
|---|
| 182 |           by NSA/NIST.  This code implements the fixed version of SHA.
 | 
|---|
| 183 |        */
 | 
|---|
| 184 | 
 | 
|---|
| 185 |   (vii) Support for AVL Trees is provided by code
 | 
|---|
| 186 |   from AVLTree which includes the following statement:
 | 
|---|
| 187 | 
 | 
|---|
| 188 |     /* zAVLTree.h: Header file for zAVLTrees.
 | 
|---|
| 189 |      * Copyright (C) 1998,2001  Michael H. Buselli
 | 
|---|
| 190 |      * This is version 0.1.3 (alpha).
 | 
|---|
| 191 |      * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
 | 
|---|
| 192 |      *
 | 
|---|
| 193 |      * This library is free software; you can redistribute it and/or
 | 
|---|
| 194 |      * modify it under the terms of the GNU Library General Public
 | 
|---|
| 195 |      * License as published by the Free Software Foundation; either
 | 
|---|
| 196 |      * version 2 of the License, or (at your option) any later version.
 | 
|---|
| 197 |      *
 | 
|---|
| 198 |      * This library is distributed in the hope that it will be useful,
 | 
|---|
| 199 |      * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 200 |      * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
|---|
| 201 |      * Library General Public License for more details.
 | 
|---|
| 202 |      *
 | 
|---|
| 203 |      * You should have received a copy of the GNU Library General Public
 | 
|---|
| 204 |      * License along with this library; if not, write to the Free
 | 
|---|
| 205 |      * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| 206 |      *
 | 
|---|
| 207 |      * The author of this library can be reached at the following address:
 | 
|---|
| 208 |      * Michael H. Buselli
 | 
|---|
| 209 |      * 30051 N. Waukegan Rd. Apt. 103
 | 
|---|
| 210 |      * Lake Bluff, IL  60044-5412
 | 
|---|
| 211 |      *
 | 
|---|
| 212 |      * Or you can send email to <cosine@cosine.org>.
 | 
|---|
| 213 |      * The official web page for this product is:
 | 
|---|
| 214 |      * http://www.cosine.org/project/AVLTree/
 | 
|---|
| 215 |      */
 | 
|---|
| 216 | 
 | 
|---|
| 217 |    (viii) The modules sh_userfiles.c and sh_mounts.c have been
 | 
|---|
| 218 |    contributed by Eircom Net Computer Incident Response Team and
 | 
|---|
| 219 |    are authored by Jerry Connolly and Cian Synnott, respectively. 
 | 
|---|
| 220 | 
 | 
|---|
| 221 |    They are released under the terms of the GNU General Public 
 | 
|---|
| 222 |    License as published by the Free Software Foundation; either
 | 
|---|
| 223 |    version 2 of the License, or (at your option) any later version:
 | 
|---|
| 224 |    
 | 
|---|
| 225 |    "Feel free to GPL those files -
 | 
|---|
| 226 |    they were fully released by our company to the project.
 | 
|---|
| 227 |    
 | 
|---|
| 228 |    Cian
 | 
|---|
| 229 |    
 | 
|---|
| 230 |    -- 
 | 
|---|
| 231 |    Cian Synnott
 | 
|---|
| 232 |    Eircom Net Computer Incident Response Team"
 | 
|---|
| 233 | 
 | 
|---|
| 234 |    (ix) Enhanced functionality for the SUID check has been
 | 
|---|
| 235 |    contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
 | 
|---|
| 236 |    The patch is licensed under the GPL with the following statement:
 | 
|---|
| 237 | 
 | 
|---|
| 238 |    "Here is the patch with the aforementioned feature enhancements, and I 
 | 
|---|
| 239 |    license all changes within this patch under the GNU Public License (GPL) 
 | 
|---|
| 240 |    GNU General Public License as published by the Free Software Foundation; 
 | 
|---|
| 241 |    either version 2 of the License, or (at your option) any later version."
 | 
|---|
| 242 | 
 | 
|---|
| 243 |    (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
 | 
|---|
| 244 |    CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
 | 
|---|
| 245 | 
 | 
|---|
| 246 |      * Copyright (c) 2003 Asim Jalis
 | 
|---|
| 247 |      *
 | 
|---|
| 248 |      * This software is provided 'as-is', without any express or implied
 | 
|---|
| 249 |      * warranty. In no event will the authors be held liable for any damages
 | 
|---|
| 250 |      * arising from the use of this software.
 | 
|---|
| 251 |      *
 | 
|---|
| 252 |      * Permission is granted to anyone to use this software for any purpose,
 | 
|---|
| 253 |      * including commercial applications, and to alter it and redistribute it
 | 
|---|
| 254 |      * freely, subject to the following restrictions:
 | 
|---|
| 255 |      *
 | 
|---|
| 256 |      * 1. The origin of this software must not be misrepresented; you must not
 | 
|---|
| 257 |      * claim that you wrote the original software. If you use this software in
 | 
|---|
| 258 |      * a product, an acknowledgment in the product documentation would be
 | 
|---|
| 259 |      * appreciated but is not required.
 | 
|---|
| 260 |      *
 | 
|---|
| 261 |      * 2. Altered source versions must be plainly marked as such, and must not
 | 
|---|
| 262 |      * be misrepresented as being the original software.
 | 
|---|
| 263 |      *
 | 
|---|
| 264 |      * 3. This notice may not be removed or altered from any source
 | 
|---|
| 265 |      * distribution.
 | 
|---|
| 266 | 
 | 
|---|
| 267 |    (xi) The dnmalloc library used by samhain is Copyright (C) 2005, Yves Younan, 
 | 
|---|
| 268 |    Wouter Joosen and Frank Piessens, and licensed under the LGPL:
 | 
|---|
| 269 | 
 | 
|---|
| 270 |      *   This library is free software; you can redistribute it and/or
 | 
|---|
| 271 |      *   modify it under the terms of the GNU Lesser General Public
 | 
|---|
| 272 |      *   License as published by the Free Software Foundation; either
 | 
|---|
| 273 |      *   version 2.1 of the License, or (at your option) any later version.
 | 
|---|
| 274 |      *
 | 
|---|
| 275 |      *   This library is distributed in the hope that it will be useful,
 | 
|---|
| 276 |      *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
| 277 |      *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
|---|
| 278 |      *   Lesser General Public License for more details.
 | 
|---|
| 279 |      *
 | 
|---|
| 280 |      *   You should have received a copy of the GNU Lesser General Public
 | 
|---|
| 281 |      *   License along with this library; if not, write to the Free Software
 | 
|---|
| 282 |      *   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 | 
|---|
| 283 |   
 | 
|---|
| 284 | 
 | 
|---|
| 285 | Other
 | 
|---|
| 286 | -----
 | 
|---|
| 287 | 
 | 
|---|
| 288 |   Depending on the compilation options used, samhain may use the 
 | 
|---|
| 289 |   SRP authentication algorithm (in an independent implementation,
 | 
|---|
| 290 |   without any use of code from the SRP software).
 | 
|---|
| 291 |   The original SRP software contains the following license statement:
 | 
|---|
| 292 | 
 | 
|---|
| 293 |     The SRP License
 | 
|---|
| 294 |     ---------------
 | 
|---|
| 295 |   
 | 
|---|
| 296 |     SRP and all related technologies are free for both commercial and
 | 
|---|
| 297 |     non-commercial use.  They are distributed under a standard
 | 
|---|
| 298 |     X11-style Open Source license which is shown below.
 | 
|---|
| 299 |     
 | 
|---|
| 300 |     The SRP distribution contains parts from various freeware
 | 
|---|
| 301 |     packages; these parts fall under both the SRP Open Source license
 | 
|---|
| 302 |     and any existing licenses.  Care has been taken to ensure that
 | 
|---|
| 303 |     these licenses are compatible with Open Source distribution,
 | 
|---|
| 304 |     but it is the responsibility of the licensee to comply with these
 | 
|---|
| 305 |     licenses.  The file "Copyrights" contains a list of the copyrights
 | 
|---|
| 306 |     incorporated by portions of the software.
 | 
|---|
| 307 |     
 | 
|---|
| 308 |     This software is covered under the following copyright:
 | 
|---|
| 309 |   
 | 
|---|
| 310 |     /*
 | 
|---|
| 311 |      * Copyright (c) 1997-1999  The Stanford SRP Authentication Project
 | 
|---|
| 312 |      * All Rights Reserved.
 | 
|---|
| 313 |      *
 | 
|---|
| 314 |      * Permission is hereby granted, free of charge, to any person obtaining
 | 
|---|
| 315 |      * a copy of this software and associated documentation files (the
 | 
|---|
| 316 |      * "Software"), to deal in the Software without restriction, including
 | 
|---|
| 317 |      * without limitation the rights to use, copy, modify, merge, publish,
 | 
|---|
| 318 |      * distribute, sublicense, and/or sell copies of the Software, and to
 | 
|---|
| 319 |      * permit persons to whom the Software is furnished to do so, subject to
 | 
|---|
| 320 |      * the following conditions:
 | 
|---|
| 321 |      *
 | 
|---|
| 322 |      * The above copyright notice and this permission notice shall be
 | 
|---|
| 323 |      * included in all copies or substantial portions of the Software.
 | 
|---|
| 324 |      *
 | 
|---|
| 325 |      * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, 
 | 
|---|
| 326 |      * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY 
 | 
|---|
| 327 |      * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.  
 | 
|---|
| 328 |      *
 | 
|---|
| 329 |      * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
 | 
|---|
| 330 |      * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
 | 
|---|
| 331 |      * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
 | 
|---|
| 332 |      * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
 | 
|---|
| 333 |      * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 | 
|---|
| 334 |      *
 | 
|---|
| 335 |      * In addition, the following conditions apply:
 | 
|---|
| 336 |      *
 | 
|---|
| 337 |      * 1. Any software that incorporates the SRP authentication technology
 | 
|---|
| 338 |      *    must display the following acknowlegment:
 | 
|---|
| 339 |      *    "This product uses the 'Secure Remote Password' cryptographic
 | 
|---|
| 340 |      *     authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
 | 
|---|
| 341 |      *
 | 
|---|
| 342 |      * 2. Any software that incorporates all or part of the SRP distribution
 | 
|---|
| 343 |      *    itself must also display the following acknowledgment:
 | 
|---|
| 344 |      *    "This product includes software developed by Tom Wu and Eugene
 | 
|---|
| 345 |      *     Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
 | 
|---|
| 346 |      *
 | 
|---|
| 347 |      * 3. Redistributions in source or binary form must retain an intact copy
 | 
|---|
| 348 |      *    of this copyright notice and list of conditions.
 | 
|---|
| 349 |      */
 | 
|---|