Marantz UD9004 User Manual

Page 72

Advertising
background image

LICENSE

10

Individual source code files are copyright MIT, Cygnus

Support, OpenVision, Oracle, Sun Soft, FundsXpress, and

others.

Project Athena, Athena, Athena MUSE, Discuss,

Hesiod, Kerberos, Moira, and Zephyr are trademarks of

the Massachusetts Institute of Technology (MIT). No

commercial use of these trademarks may be made

without prior written permission of MIT.

“Commercial use” means use of a name in a product or

other for-profit manner. It does NOT prevent a commercial

firm from referring to the MIT trademarks in order to

convey information (although in doing so, recognition of

their trademark status should be given).
The following copyright and permission notice applies to

the OpenVision Kerberos Administration system located

in kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/

server, lib/kadm5, and portions of lib/rpc:

Copyright, OpenVision Technologies, Inc., 1996, All

Rights Reserved

WARNING: Retrieving the OpenVision Kerberos

Administration system source code, as described below,

indicates your acceptance of the following terms. If you

do not agree to the following terms, do not retrieve the

OpenVision Kerberos administration system.

You may freely use and distribute the Source Code

and Object Code compiled from it, with or without

modification, but this Source Code is provided to you

“AS IS” EXCLUSIVE OF ANY WARRANTY, INCLUDING,

WITHOUT LIMITATION, ANY WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR

PURPOSE, OR ANY OTHER WARRANTY, WHETHER

EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION

HAVE ANY LIABILITY FOR ANY LOST PROFITS, LOSS OF

DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE

GOODS OR SERVICES, OR FOR ANY SPECIAL,

INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING

OUT OF THIS AGREEMENT, INCLUDING, WITHOUT

LIMITATION, THOSE RESULTING FROM THE USE OF

THE SOURCE CODE, OR THE FAILURE OF THE SOURCE

CODE TO PERFORM, OR FOR ANY OTHER REASON.

OpenVision retains all copyrights in the donated Source

Code. OpenVision also retains copyright to derivative

works of the Source Code, whether created by

OpenVision or by a third party. The OpenVision copyright

notice must be preserved if derivative works are made

based on the donated Source Code.

OpenVision Technologies, Inc. has donated this

Kerberos Administration system to MIT for inclusion

in the standard Kerberos 5 distribution. This donation

underscores our commitment to continuing Kerberos

technology development and our gratitude for the

valuable work which has been performed by MIT and

the Kerberos community.
Portions contributed by Matt Crawford <crawdad@fnal.

gov> were work performed at Fermi National Accelerator

Laboratory, which is operated by Universities Research

Association, Inc., under contract DE-AC02-76CHO3000

with the U.S. Department of Energy.

The implementation of the Yarrow pseudo-random number

generator in src/lib/crypto/yarrow has the following

copyright:

Copyright 2000 by Zero-Knowledge Systems, Inc.

Permission to use, copy, modify, distribute, and sell this

software and its documentation for any purpose is hereby

granted without fee, provided that the above copyright

notice appear in all copies and that both that copyright

notice and this permission notice appear in supporting

documentation, and that the name of Zero-Knowledge

Systems, Inc. not be used in advertising or publicity

pertaining to distribution of the software without specific,

written prior permission. Zero-Knowledge Systems, Inc.

makes no representations about the suitability of this

software for any purpose. It is provided “as is” without

express or implied warranty.

ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL

WARRANTIES WITH REGARD TO THIS SOFTWARE,

INCLUDING

ALL

IMPLIED

WARRANTIES

OF

MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL

ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY

SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR

ANY DAMAGES WHATSOEVER RESULTING FROM LOSS

OF USE, DATA OR PROFITS, WHETHER IN AN ACTION

OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS

ACTION, ARISING OUT OF OR IN CONNECTION WITH

THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in

src/lib/crypto/aes has the following copyright:

Copyright (c) 2001, Dr Brian Gladman <brg@gladman.

uk.net>, Worcester, UK.

All rights reserved.

LICENSE TERMS

The free distribution and use of this software in both

source and binary form is allowed (with or without

changes) provided that:

1. distributions of this source code include the above

copyright notice, this list of conditions and the

following disclaimer;

2. distributions in binary form include the above

copyright notice, this list of conditions and the

following disclaimer in the documentation and/or

other associated materials;

3. the copyright holder’s name is not used to endorse

products built using this software without specific

written permission.

DISCLAIMER

This software is provided “as is” with no explcit or implied

warranties in respect of any properties, including, but not

limited to, correctness and fitness for purpose.

The implementation of the RPCSEC_GSS authentication

flavor in src/lib/rpc has the following copyright:

Copyright (c) 2000 The Regents of the University of

Michigan.

All rights reserved.

Copyright (c) 2000 Dug Song <[email protected]>.

All rights reserved, all wrongs reversed.

Redistribution and use in source and binary forms, with

or without modification, are permitted provided that the

following conditions are met:

1. Redistributions of source code must retain the

above copyright notice, this list of conditions and the

following disclaimer.

2. Redistributions in binary form must reproduce the

above copyright notice, this list of conditions and the

following disclaimer in the documentation and/or other

materials provided with the distribution.

3. Neither the name of the University nor the names of

its contributors may be used to endorse or promote

products derived from this software without specific

prior written permission.

THIS SOFTWARE IS PROVIDED “AS IS” AND ANY

EXPRESS OR IMPLIED WARRANTIES, INCLUDING,

BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF

MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE

REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY

DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,

OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT

LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS

OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR

BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON

ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,

STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE

OR OTHERWISE) ARISING IN ANY WAY OUT OF THE

USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

Acknowledgments

Appreciation Time!!!! There are far too many people to

try to thank them all; many people have contributed to

the development of Kerberos V5. This is only a partial

listing....

Thanks to Kevin Coffman and the CITI group at the

University of Michigan for providing patches for

implementing RPCSEC_GSS authentication in the RPC

library.

Thanks to Derrick Schommer for reporting multiple

memory leaks.

Thanks to Quanah Gibson-Mount of Stanford University

for helping exercise the thread support code.

Thanks to Michael Tautschnig for reporting the heap buffer

overflow inthe password history mechanism. [MITKRB5-

SA-2004-004]

Thanks to Wyllys Ingersoll for finding a buffer-size problem

in theRPCSEC_GSS implementation.

Thanks to the members of the Kerberos V5 development

team at MIT, both past and present: Danilo Almeida, Jeffrey

Altman, Jay Berkenbilt, Richard Basch, Mitch Berger, John

Carr, Don Davis, Alexandra Ellwood, Nancy Gilman, Matt

Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva

Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King,

John Kohl, Peter Litwack, Scott McGuire, Kevin Mitchell,

Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano,

Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad

Thompson, Harry Tsai, Ted Ts’o, Marshall Vale, Tom Yu.

Very special thanks go to Marshall Vale, our departing

team leader.

Over the past few years, Marshall has been extremely

valuable to us as mentor, advisor, manager, and friend.

Marshall’s devotion as a champion of Kerberos has helped

our team immensely through many trials and hardships.

We will miss him tremendously, and we wish him the best

in his future endeavors.

n

Exhibit-U

Copyright (c) 1989 The Regents of the University of

California.

All rights reserved.

This code is derived from software contributed to Berkeley

by Mike Muuss.

Redistribution and use in source and binary forms, with

or without modification, are permitted provided that the

following conditions are met:

1. Redistributions of source code must retain the

above copyright notice, this list of conditions and the

following disclaimer.

2. Redistributions in binary form must reproduce the

above copyright notice, this list of conditions and the

following disclaimer in the documentation and/or other

materials provided with the distribution.

3. All advertising materials mentioning features or

use of this software must display the following

acknowledgement:

This product includes software developed by the

University of California, Berkeley and its contributors.

4. Neither the name of the University nor the names of

its contributors may be used to endorse or promote

products derived from this software without specific

prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND

CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED

WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND

FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS

BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,

SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES

(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,

OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER

CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER

IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY

OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED

OF THE POSSIBILITY OF SUCH DAMAGE.

License Information for the Software

Used in the Unit
About GPL (GNU-General Public

License), LGPL (GNU Lesser General

Public License) License

This product uses GPL/LGPL software and software
made by other companies.
After you purchase this product, you may procure,
modify or distribute the source code of the GPL/
LGPL software that is used in the product.
MARANTZ provides the source code based on the
GPL and LPGL licenses at the actual cost upon your
request to our customer service center. However,
note that we make no guarantees concerning the
source code. Please also understand that we do
not offer support for the contents of the source
code.

Advertising