| [1] | 1 | 
 | 
|---|
 | 2 | SAMHAIN distributed host monitoring system
 | 
|---|
 | 3 | ------------------------------------------
 | 
|---|
 | 4 | 
 | 
|---|
| [209] | 5 | Copyright (C) 1999-2009 Rainer Wichmann                                    
 | 
|---|
| [1] | 6 |                                                                       
 | 
|---|
 | 7 | This program is free software; you can redistribute it and/or modify
 | 
|---|
 | 8 | it under the terms of the GNU General Public License as published by
 | 
|---|
 | 9 | the Free Software Foundation; either version 2 of the License, or     
 | 
|---|
 | 10 | (at your option) any later version.                                   
 | 
|---|
 | 11 |                                                                       
 | 
|---|
 | 12 | This program is distributed in the hope that it will be useful,       
 | 
|---|
 | 13 | but WITHOUT ANY WARRANTY; without even the implied warranty of        
 | 
|---|
 | 14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         
 | 
|---|
 | 15 | GNU General Public License for more details.                          
 | 
|---|
 | 16 |                                                                       
 | 
|---|
 | 17 | You should have received a copy of the GNU General Public License     
 | 
|---|
 | 18 | along with this program; if not, write to the Free Software           
 | 
|---|
| [209] | 19 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| [1] | 20 | 
 | 
|---|
| [531] | 21 | On Debian-based systems, see /usr/share/common-licenses
 | 
|---|
| [1] | 22 | 
 | 
|---|
 | 23 | Incorporated code
 | 
|---|
 | 24 | -----------------
 | 
|---|
 | 25 | 
 | 
|---|
 | 26 |   (i) Support for the TIGER cryptographic checksum algorithm
 | 
|---|
 | 27 |   is provided by the reference implementation, which includes 
 | 
|---|
 | 28 |   the following statement:
 | 
|---|
 | 29 | 
 | 
|---|
 | 30 |          * Tiger: A Fast New Hash Function
 | 
|---|
 | 31 |          *
 | 
|---|
 | 32 |          * Ross Anderson and Eli Biham
 | 
|---|
 | 33 |          *
 | 
|---|
 | 34 |          * Tiger has no usage restrictions nor patents. It can be used freely, 
 | 
|---|
 | 35 |          * with the reference implementation, 
 | 
|---|
 | 36 |          * with other implementations or with 
 | 
|---|
 | 37 |          * a modification to the reference implementation (as long as it still 
 | 
|---|
 | 38 |          * implements Tiger). We only ask you to let us know about your 
 | 
|---|
 | 39 |          * implementation and to cite the origin of Tiger and of the reference 
 | 
|---|
 | 40 |          * implementation. 
 | 
|---|
 | 41 |          *
 | 
|---|
 | 42 |          * The authors' home pages can be found both in 
 | 
|---|
 | 43 |          * http://www.cs.technion.ac.il/~biham/ and in 
 | 
|---|
 | 44 |          * http://www.cl.cam.ac.uk/users/rja14/.
 | 
|---|
 | 45 |          * The authors' email addresses are biham@cs.technion.ac.il 
 | 
|---|
 | 46 |          * and rja14@cl.cam.ac.uk.
 | 
|---|
 | 47 | 
 | 
|---|
 | 48 | 
 | 
|---|
 | 49 | 
 | 
|---|
 | 50 |   (ii) Support for testing write access by untrusted users
 | 
|---|
 | 51 |   to any element in the path of a file is provided by the
 | 
|---|
 | 52 |   public domain trustfile library, which includes the following
 | 
|---|
 | 53 |   statement:
 | 
|---|
 | 54 | 
 | 
|---|
 | 55 |          * Author information:
 | 
|---|
 | 56 |          * Matt Bishop
 | 
|---|
 | 57 |          * Department of Computer Science
 | 
|---|
 | 58 |          * University of California at Davis
 | 
|---|
 | 59 |          * Davis, CA  95616-8562
 | 
|---|
 | 60 |          * phone (916) 752-8060
 | 
|---|
 | 61 |          * email bishop@cs.ucdavis.edu
 | 
|---|
 | 62 |          *
 | 
|---|
 | 63 |          * This code is placed in the public domain.  I do ask that
 | 
|---|
 | 64 |          * you keep my name associated with it, that you not represent
 | 
|---|
 | 65 |          * it as written by you, and that you preserve these comments.
 | 
|---|
 | 66 |          * This software is provided "as is" and without any guarantees
 | 
|---|
 | 67 |          * of any sort.
 | 
|---|
 | 68 | 
 | 
|---|
 | 69 |   (iii) Support for big integer arithmetic is provided by the bignum
 | 
|---|
 | 70 |   package (v. 1.2) by Henrik.Johansson@Nexus.Comm.SE, 
 | 
|---|
 | 71 |   which includes the following statement:
 | 
|---|
 | 72 | 
 | 
|---|
 | 73 |         * Everyone is allowed to distribute this package to anyone
 | 
|---|
 | 74 |         * else, as long as all changes are recorded and mentioned.
 | 
|---|
 | 75 |         * If you are including this in a commercial product, be sure
 | 
|---|
 | 76 |         * to distribute _all_ of the package with the product.
 | 
|---|
 | 77 |         *
 | 
|---|
 | 78 |         * (...writing more stuff here later, but I guess everyone
 | 
|---|
 | 79 |         * knows the approximate contents of it - no warranty, no
 | 
|---|
 | 80 |         * charge, and so on.  I guess it is like the GNU concept.
 | 
|---|
 | 81 |         * Read that for further details...)
 | 
|---|
 | 82 | 
 | 
|---|
 | 83 |   (iv) Support for compression is provided by the (mini) LZO library,
 | 
|---|
 | 84 |   which includes the following statement:
 | 
|---|
 | 85 | 
 | 
|---|
 | 86 |        * Copyright (C) 1999 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
 | 87 |        * Copyright (C) 1998 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
 | 88 |        * Copyright (C) 1997 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
 | 89 |        * Copyright (C) 1996 Markus Franz Xaver Johannes Oberhumer
 | 
|---|
 | 90 |        * 
 | 
|---|
 | 91 |        * The LZO library is free software; you can redistribute it and/or
 | 
|---|
 | 92 |        * modify it under the terms of the GNU General Public License as
 | 
|---|
 | 93 |        * published by the Free Software Foundation; either version 2 of
 | 
|---|
 | 94 |        * the License, or (at your option) any later version.
 | 
|---|
 | 95 |        * 
 | 
|---|
 | 96 |        * The LZO library is distributed in the hope that it will be useful,
 | 
|---|
 | 97 |        * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
 | 98 |        * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
 | 99 |        * GNU General Public License for more details.
 | 
|---|
 | 100 |        * 
 | 
|---|
 | 101 |        * You should have received a copy of the GNU General Public License
 | 
|---|
 | 102 |        * along with the LZO library; see the file COPYING.
 | 
|---|
 | 103 |        * If not, write to the Free Software Foundation, Inc.,
 | 
|---|
| [209] | 104 |        * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| [1] | 105 |        * 
 | 
|---|
 | 106 |        * Markus F.X.J. Oberhumer
 | 
|---|
 | 107 |        * <markus.oberhumer@jk.uni-linz.ac.at>
 | 
|---|
 | 108 |        * http://wildsau.idv.uni-linz.ac.at/mfx/lzo.html
 | 
|---|
 | 109 | 
 | 
|---|
 | 110 |   (v) Support for determining the type of a file system is provided by
 | 
|---|
 | 111 |   code from the GNU find(1) utility which includes the following statement:
 | 
|---|
 | 112 | 
 | 
|---|
 | 113 |    /* fstype.c -- determine type of filesystems that files are on
 | 
|---|
 | 114 |       Copyright (C) 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
 | 
|---|
 | 115 | 
 | 
|---|
 | 116 |       This program is free software; you can redistribute it and/or modify
 | 
|---|
 | 117 |       it under the terms of the GNU General Public License as published by
 | 
|---|
 | 118 |       the Free Software Foundation; either version 2, or (at your option)
 | 
|---|
 | 119 |       any later version.
 | 
|---|
 | 120 | 
 | 
|---|
 | 121 |       This program is distributed in the hope that it will be useful,
 | 
|---|
 | 122 |       but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
 | 123 |       MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
 | 124 |       GNU General Public License for more details.
 | 
|---|
 | 125 | 
 | 
|---|
 | 126 |       You should have received a copy of the GNU General Public License
 | 
|---|
 | 127 |       along with this program; if not, write to the Free Software
 | 
|---|
| [209] | 128 |       Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA  */
 | 
|---|
| [1] | 129 | 
 | 
|---|
 | 130 |    /* Written by David MacKenzie <djm@gnu.ai.mit.edu>. */
 | 
|---|
 | 131 | 
 | 
|---|
 | 132 | 
 | 
|---|
 | 133 |   (vi) Support for the MD5 hash algorithm is provided by code
 | 
|---|
| [30] | 134 |   from busybox which is distributed under the GPL.
 | 
|---|
| [1] | 135 | 
 | 
|---|
| [30] | 136 |    /* md5.c - Functions to compute MD5 message digest of files or memory blocks
 | 
|---|
 | 137 |     *         according to the definition of MD5 in RFC 1321 from April 1992.
 | 
|---|
 | 138 |     * Copyright (C) 1995, 1996 Free Software Foundation, Inc.
 | 
|---|
 | 139 |     *
 | 
|---|
 | 140 |     * NOTE: The canonical source of this file is maintained with the GNU C
 | 
|---|
 | 141 |     * Library.  Bugs can be reported to bug-glibc@prep.ai.mit.edu.
 | 
|---|
 | 142 |     *
 | 
|---|
 | 143 |     * This program is free software; you can redistribute it and/or modify it
 | 
|---|
 | 144 |     * under the terms of the GNU General Public License as published by the
 | 
|---|
 | 145 |     * Free Software Foundation; either version 2, or (at your option) any
 | 
|---|
 | 146 |     * later version.
 | 
|---|
 | 147 |     *
 | 
|---|
 | 148 |     * This program is distributed in the hope that it will be useful,
 | 
|---|
 | 149 |     * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
 | 150 |     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
|---|
 | 151 |     * GNU General Public License for more details.
 | 
|---|
 | 152 |     *
 | 
|---|
 | 153 |     * You should have received a copy of the GNU General Public License
 | 
|---|
 | 154 |     * along with this program; if not, write to the Free Software Foundation,
 | 
|---|
| [209] | 155 |     * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| [30] | 156 |     */
 | 
|---|
| [1] | 157 | 
 | 
|---|
| [30] | 158 |    /* Written by Ulrich Drepper <drepper@gnu.ai.mit.edu>, 1995.  */
 | 
|---|
 | 159 | 
 | 
|---|
 | 160 | 
 | 
|---|
| [1] | 161 |   (vi) Support for the SHA-1 hash algorithm is provided by code
 | 
|---|
 | 162 |   from mhash which includes the following statement:
 | 
|---|
 | 163 | 
 | 
|---|
 | 164 |        /* sha.c - Implementation of the Secure Hash Algorithm
 | 
|---|
 | 165 |         *
 | 
|---|
 | 166 |         * Copyright (C) 1995, A.M. Kuchling
 | 
|---|
 | 167 |         *
 | 
|---|
 | 168 |         * Distribute and use freely; there are no restrictions on further
 | 
|---|
 | 169 |         * dissemination and usage except those imposed by the laws of your
 | 
|---|
 | 170 |         * country of residence.
 | 
|---|
 | 171 |         *
 | 
|---|
| [209] | 172 |         * Adapted to pike and some cleanup by Niels Möller.
 | 
|---|
| [1] | 173 |         */
 | 
|---|
 | 174 | 
 | 
|---|
 | 175 |        /* $Id: sha1.c,v 1.2 2001/01/24 08:20:29 nmav Exp $ */
 | 
|---|
 | 176 | 
 | 
|---|
 | 177 |        /* SHA: NIST's Secure Hash Algorithm */
 | 
|---|
 | 178 | 
 | 
|---|
 | 179 |        /* Based on SHA code originally posted to sci.crypt by Peter Gutmann
 | 
|---|
 | 180 |           in message <30ajo5$oe8@ccu2.auckland.ac.nz>.
 | 
|---|
 | 181 |           Modified to test for endianness on creation of SHA objects by AMK.
 | 
|---|
 | 182 |           Also, the original specification of SHA was found to have a weakness
 | 
|---|
 | 183 |           by NSA/NIST.  This code implements the fixed version of SHA.
 | 
|---|
 | 184 |        */
 | 
|---|
 | 185 | 
 | 
|---|
 | 186 |   (vii) Support for AVL Trees is provided by code
 | 
|---|
 | 187 |   from AVLTree which includes the following statement:
 | 
|---|
 | 188 | 
 | 
|---|
 | 189 |     /* zAVLTree.h: Header file for zAVLTrees.
 | 
|---|
 | 190 |      * Copyright (C) 1998,2001  Michael H. Buselli
 | 
|---|
 | 191 |      * This is version 0.1.3 (alpha).
 | 
|---|
 | 192 |      * Generated from $Id: xAVLTree.h.sh,v 1.5 2001/06/07 06:58:28 cosine Exp $
 | 
|---|
 | 193 |      *
 | 
|---|
 | 194 |      * This library is free software; you can redistribute it and/or
 | 
|---|
 | 195 |      * modify it under the terms of the GNU Library General Public
 | 
|---|
 | 196 |      * License as published by the Free Software Foundation; either
 | 
|---|
 | 197 |      * version 2 of the License, or (at your option) any later version.
 | 
|---|
 | 198 |      *
 | 
|---|
 | 199 |      * This library is distributed in the hope that it will be useful,
 | 
|---|
 | 200 |      * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
 | 201 |      * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
|---|
 | 202 |      * Library General Public License for more details.
 | 
|---|
 | 203 |      *
 | 
|---|
 | 204 |      * You should have received a copy of the GNU Library General Public
 | 
|---|
 | 205 |      * License along with this library; if not, write to the Free
 | 
|---|
| [209] | 206 |      * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
 | 
|---|
| [1] | 207 |      *
 | 
|---|
 | 208 |      * The author of this library can be reached at the following address:
 | 
|---|
 | 209 |      * Michael H. Buselli
 | 
|---|
 | 210 |      * 30051 N. Waukegan Rd. Apt. 103
 | 
|---|
 | 211 |      * Lake Bluff, IL  60044-5412
 | 
|---|
 | 212 |      *
 | 
|---|
 | 213 |      * Or you can send email to <cosine@cosine.org>.
 | 
|---|
 | 214 |      * The official web page for this product is:
 | 
|---|
 | 215 |      * http://www.cosine.org/project/AVLTree/
 | 
|---|
 | 216 |      */
 | 
|---|
 | 217 | 
 | 
|---|
 | 218 |    (viii) The modules sh_userfiles.c and sh_mounts.c have been
 | 
|---|
 | 219 |    contributed by Eircom Net Computer Incident Response Team and
 | 
|---|
 | 220 |    are authored by Jerry Connolly and Cian Synnott, respectively. 
 | 
|---|
 | 221 | 
 | 
|---|
 | 222 |    They are released under the terms of the GNU General Public 
 | 
|---|
 | 223 |    License as published by the Free Software Foundation; either
 | 
|---|
 | 224 |    version 2 of the License, or (at your option) any later version:
 | 
|---|
 | 225 |    
 | 
|---|
 | 226 |    "Feel free to GPL those files -
 | 
|---|
 | 227 |    they were fully released by our company to the project.
 | 
|---|
 | 228 |    
 | 
|---|
 | 229 |    Cian
 | 
|---|
 | 230 |    
 | 
|---|
 | 231 |    -- 
 | 
|---|
 | 232 |    Cian Synnott
 | 
|---|
 | 233 |    Eircom Net Computer Incident Response Team"
 | 
|---|
 | 234 | 
 | 
|---|
 | 235 |    (ix) Enhanced functionality for the SUID check has been
 | 
|---|
 | 236 |    contributed with a patch copyright by Rob Rati <rob.rati@motorola.com>.
 | 
|---|
 | 237 |    The patch is licensed under the GPL with the following statement:
 | 
|---|
 | 238 | 
 | 
|---|
 | 239 |    "Here is the patch with the aforementioned feature enhancements, and I 
 | 
|---|
 | 240 |    license all changes within this patch under the GNU Public License (GPL) 
 | 
|---|
 | 241 |    GNU General Public License as published by the Free Software Foundation; 
 | 
|---|
 | 242 |    either version 2 of the License, or (at your option) any later version."
 | 
|---|
 | 243 | 
 | 
|---|
| [18] | 244 |    (x) Unit testing uses the 'cutest' framework by Asim Jalis, (files
 | 
|---|
 | 245 |    CuTest.h, CuTest.c, make-tests.sh) which is licensed under the zlib license:
 | 
|---|
| [1] | 246 | 
 | 
|---|
| [18] | 247 |      * Copyright (c) 2003 Asim Jalis
 | 
|---|
 | 248 |      *
 | 
|---|
 | 249 |      * This software is provided 'as-is', without any express or implied
 | 
|---|
 | 250 |      * warranty. In no event will the authors be held liable for any damages
 | 
|---|
 | 251 |      * arising from the use of this software.
 | 
|---|
 | 252 |      *
 | 
|---|
 | 253 |      * Permission is granted to anyone to use this software for any purpose,
 | 
|---|
 | 254 |      * including commercial applications, and to alter it and redistribute it
 | 
|---|
 | 255 |      * freely, subject to the following restrictions:
 | 
|---|
 | 256 |      *
 | 
|---|
 | 257 |      * 1. The origin of this software must not be misrepresented; you must not
 | 
|---|
 | 258 |      * claim that you wrote the original software. If you use this software in
 | 
|---|
 | 259 |      * a product, an acknowledgment in the product documentation would be
 | 
|---|
 | 260 |      * appreciated but is not required.
 | 
|---|
 | 261 |      *
 | 
|---|
 | 262 |      * 2. Altered source versions must be plainly marked as such, and must not
 | 
|---|
 | 263 |      * be misrepresented as being the original software.
 | 
|---|
 | 264 |      *
 | 
|---|
 | 265 |      * 3. This notice may not be removed or altered from any source
 | 
|---|
 | 266 |      * distribution.
 | 
|---|
 | 267 | 
 | 
|---|
| [171] | 268 |    (xi) The dnmalloc library used by samhain is Copyright (C) 2005, Yves Younan, 
 | 
|---|
 | 269 |    Wouter Joosen and Frank Piessens, and licensed under the LGPL:
 | 
|---|
| [18] | 270 | 
 | 
|---|
| [171] | 271 |      *   This library is free software; you can redistribute it and/or
 | 
|---|
 | 272 |      *   modify it under the terms of the GNU Lesser General Public
 | 
|---|
 | 273 |      *   License as published by the Free Software Foundation; either
 | 
|---|
 | 274 |      *   version 2.1 of the License, or (at your option) any later version.
 | 
|---|
 | 275 |      *
 | 
|---|
 | 276 |      *   This library is distributed in the hope that it will be useful,
 | 
|---|
 | 277 |      *   but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
|---|
 | 278 |      *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | 
|---|
 | 279 |      *   Lesser General Public License for more details.
 | 
|---|
 | 280 |      *
 | 
|---|
 | 281 |      *   You should have received a copy of the GNU Lesser General Public
 | 
|---|
 | 282 |      *   License along with this library; if not, write to the Free Software
 | 
|---|
 | 283 |      *   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 | 
|---|
 | 284 |   
 | 
|---|
 | 285 | 
 | 
|---|
| [1] | 286 | Other
 | 
|---|
 | 287 | -----
 | 
|---|
 | 288 | 
 | 
|---|
 | 289 |   Depending on the compilation options used, samhain may use the 
 | 
|---|
 | 290 |   SRP authentication algorithm (in an independent implementation,
 | 
|---|
 | 291 |   without any use of code from the SRP software).
 | 
|---|
 | 292 |   The original SRP software contains the following license statement:
 | 
|---|
 | 293 | 
 | 
|---|
 | 294 |     The SRP License
 | 
|---|
 | 295 |     ---------------
 | 
|---|
 | 296 |   
 | 
|---|
 | 297 |     SRP and all related technologies are free for both commercial and
 | 
|---|
 | 298 |     non-commercial use.  They are distributed under a standard
 | 
|---|
 | 299 |     X11-style Open Source license which is shown below.
 | 
|---|
 | 300 |     
 | 
|---|
 | 301 |     The SRP distribution contains parts from various freeware
 | 
|---|
 | 302 |     packages; these parts fall under both the SRP Open Source license
 | 
|---|
 | 303 |     and any existing licenses.  Care has been taken to ensure that
 | 
|---|
 | 304 |     these licenses are compatible with Open Source distribution,
 | 
|---|
 | 305 |     but it is the responsibility of the licensee to comply with these
 | 
|---|
 | 306 |     licenses.  The file "Copyrights" contains a list of the copyrights
 | 
|---|
 | 307 |     incorporated by portions of the software.
 | 
|---|
 | 308 |     
 | 
|---|
 | 309 |     This software is covered under the following copyright:
 | 
|---|
 | 310 |   
 | 
|---|
 | 311 |     /*
 | 
|---|
 | 312 |      * Copyright (c) 1997-1999  The Stanford SRP Authentication Project
 | 
|---|
 | 313 |      * All Rights Reserved.
 | 
|---|
 | 314 |      *
 | 
|---|
 | 315 |      * Permission is hereby granted, free of charge, to any person obtaining
 | 
|---|
 | 316 |      * a copy of this software and associated documentation files (the
 | 
|---|
 | 317 |      * "Software"), to deal in the Software without restriction, including
 | 
|---|
 | 318 |      * without limitation the rights to use, copy, modify, merge, publish,
 | 
|---|
 | 319 |      * distribute, sublicense, and/or sell copies of the Software, and to
 | 
|---|
 | 320 |      * permit persons to whom the Software is furnished to do so, subject to
 | 
|---|
 | 321 |      * the following conditions:
 | 
|---|
 | 322 |      *
 | 
|---|
 | 323 |      * The above copyright notice and this permission notice shall be
 | 
|---|
 | 324 |      * included in all copies or substantial portions of the Software.
 | 
|---|
 | 325 |      *
 | 
|---|
 | 326 |      * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, 
 | 
|---|
 | 327 |      * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY 
 | 
|---|
 | 328 |      * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.  
 | 
|---|
 | 329 |      *
 | 
|---|
 | 330 |      * IN NO EVENT SHALL STANFORD BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
 | 
|---|
 | 331 |      * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
 | 
|---|
 | 332 |      * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
 | 
|---|
 | 333 |      * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
 | 
|---|
 | 334 |      * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 | 
|---|
 | 335 |      *
 | 
|---|
 | 336 |      * In addition, the following conditions apply:
 | 
|---|
 | 337 |      *
 | 
|---|
 | 338 |      * 1. Any software that incorporates the SRP authentication technology
 | 
|---|
 | 339 |      *    must display the following acknowlegment:
 | 
|---|
 | 340 |      *    "This product uses the 'Secure Remote Password' cryptographic
 | 
|---|
 | 341 |      *     authentication system developed by Tom Wu (tjw@CS.Stanford.EDU)."
 | 
|---|
 | 342 |      *
 | 
|---|
 | 343 |      * 2. Any software that incorporates all or part of the SRP distribution
 | 
|---|
 | 344 |      *    itself must also display the following acknowledgment:
 | 
|---|
 | 345 |      *    "This product includes software developed by Tom Wu and Eugene
 | 
|---|
 | 346 |      *     Jhong for the SRP Distribution (http://srp.stanford.edu/srp/)."
 | 
|---|
 | 347 |      *
 | 
|---|
 | 348 |      * 3. Redistributions in source or binary form must retain an intact copy
 | 
|---|
 | 349 |      *    of this copyright notice and list of conditions.
 | 
|---|
 | 350 |      */
 | 
|---|