Marantz UD9004 Manual Del Usuario página 71

Tabla de contenido

Publicidad

Individual source code files are copyright MIT, Cygnus
Support, OpenVision, Oracle, Sun Soft, FundsXpress, and
others.
Project
Athena,
Athena,
Athena
MUSE,
Hesiod, Kerberos, Moira, and Zephyr are trademarks of
the Massachusetts Institute of Technology (MIT).
commercial use of these trademarks may be made
without prior written permission of MIT.
"Commercial use" means use of a name in a product or
other for-profit manner. It does NOT prevent a commercial
firm from referring to the MIT trademarks in order to
convey information (although in doing so, recognition of
their trademark status should be given).
The following copyright and permission notice applies to
the OpenVision Kerberos Administration system located
in kadmin/create, kadmin/dbutil, kadmin/passwd, kadmin/
server, lib/kadm5, and portions of lib/rpc:
Copyright, OpenVision Technologies, Inc., 1996, All
Rights Reserved
WARNING:
Retrieving
the
OpenVision
Administration system source code, as described below,
indicates your acceptance of the following terms. If you
do not agree to the following terms, do not retrieve the
OpenVision Kerberos administration system.
You may freely use and distribute the Source Code
and Object Code compiled from it, with or without
modification, but this Source Code is provided to you
"AS IS" EXCLUSIVE OF ANY WARRANTY, INCLUDING,
WITHOUT
LIMITATION,
ANY
WARRANTIES
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE, OR ANY OTHER WARRANTY, WHETHER
EXPRESS OR IMPLIED. IN NO EVENT WILL OPENVISION
HAVE ANY LIABILITY FOR ANY LOST PROFITS, LOSS OF
DATA OR COSTS OF PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES, OR FOR ANY SPECIAL,
INDIRECT, OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THIS AGREEMENT, INCLUDING, WITHOUT
LIMITATION, THOSE RESULTING FROM THE USE OF
THE SOURCE CODE, OR THE FAILURE OF THE SOURCE
CODE TO PERFORM, OR FOR ANY OTHER REASON.
OpenVision retains all copyrights in the donated Source
Code. OpenVision also retains copyright to derivative
works of the Source Code, whether created by
OpenVision or by a third party. The OpenVision copyright
notice must be preserved if derivative works are made
based on the donated Source Code.
OpenVision Technologies, Inc. has donated this
Kerberos Administration system to MIT for inclusion
in the standard Kerberos 5 distribution. This donation
underscores our commitment to continuing Kerberos
technology development and our gratitude for the
valuable work which has been performed by MIT and
the Kerberos community.
Portions contributed by Matt Crawford <crawdad@fnal.
gov> were work performed at Fermi National Accelerator
Laboratory, which is operated by Universities Research
Association, Inc., under contract DE-AC02-76CHO3000
with the U.S. Department of Energy.
The implementation of the Yarrow pseudo-random number
generator in src/lib/crypto/yarrow has the following
copyright:
Copyright 2000 by Zero-Knowledge Systems, Inc.
Permission to use, copy, modify, distribute, and sell this
software and its documentation for any purpose is hereby
granted without fee, provided that the above copyright
Discuss,
notice appear in all copies and that both that copyright
notice and this permission notice appear in supporting
No
documentation, and that the name of Zero-Knowledge
Systems, Inc. not be used in advertising or publicity
pertaining to distribution of the software without specific,
written prior permission. Zero-Knowledge Systems, Inc.
makes no representations about the suitability of this
software for any purpose. It is provided "as is" without
express or implied warranty.
ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL
WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING
ALL
IMPLIED
MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
Kerberos
OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in
src/lib/crypto/aes has the following copyright:
Copyright (c) 2001, Dr Brian Gladman <brg@gladman.
uk.net>, Worcester, UK.
All rights reserved.
OF
LICENSE TERMS
The free distribution and use of this software in both
source and binary form is allowed (with or without
changes) provided that:
1. distributions of this source code include the above
copyright notice, this list of conditions and the
following disclaimer;
2. distributions in binary form include the above
copyright notice, this list of conditions and the
following disclaimer in the documentation and/or
other associated materials;
3. the copyright holder's name is not used to endorse
products built using this software without specific
written permission.
DISCLAIMER
This software is provided "as is" with no explcit or implied
warranties in respect of any properties, including, but not
limited to, correctness and fitness for purpose.
The implementation of the RPCSEC_GSS authentication
flavor in src/lib/rpc has the following copyright:
Copyright (c) 2000 The Regents of the University of
Michigan.
All rights reserved.
Copyright (c) 2000 Dug Song <dugsong@UMICH.EDU>.
All rights reserved, all wrongs reversed.
Redistribution and use in source and binary forms, with
or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
WARRANTIES
OF
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
Acknowledgments
Appreciation Time!!!! There are far too many people to
try to thank them all; many people have contributed to
the development of Kerberos V5. This is only a partial
listing....
Thanks to Kevin Coffman and the CITI group at the
University of Michigan for providing patches for
implementing RPCSEC_GSS authentication in the RPC
library.
Thanks to Derrick Schommer for reporting multiple
memory leaks.
Thanks to Quanah Gibson-Mount of Stanford University
for helping exercise the thread support code.
Thanks to Michael Tautschnig for reporting the heap buffer
overflow inthe password history mechanism. [MITKRB5-
SA-2004-004]
Thanks to Wyllys Ingersoll for finding a buffer-size problem
in theRPCSEC_GSS implementation.
Thanks to the members of the Kerberos V5 development
team at MIT, both past and present: Danilo Almeida, Jeffrey
Altman, Jay Berkenbilt, Richard Basch, Mitch Berger, John
Carr, Don Davis, Alexandra Ellwood, Nancy Gilman, Matt
Hancher, Sam Hartman, Paul Hill, Marc Horowitz, Eva
Jacobus, Miroslav Jurisic, Barry Jaspan, Geoffrey King,
John Kohl, Peter Litwack, Scott McGuire, Kevin Mitchell,
Cliff Neuman, Paul Park, Ezra Peisach, Chris Provenzano,
Ken Raeburn, Jon Rochlis, Jeff Schiller, Jen Selby, Brad
Thompson, Harry Tsai, Ted Ts'o, Marshall Vale, Tom Yu.
Very special thanks go to Marshall Vale, our departing
team leader.
Over the past few years, Marshall has been extremely
valuable to us as mentor, advisor, manager, and friend.
Marshall's devotion as a champion of Kerberos has helped
our team immensely through many trials and hardships.
We will miss him tremendously, and we wish him the best
in his future endeavors.
n
Exhibit-U
Copyright (c) 1989 The Regents of the University of
California.
All rights reserved.
This code is derived from software contributed to Berkeley
by Mike Muuss.
Redistribution and use in source and binary forms, with
or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the
above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the
above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other
materials provided with the distribution.
3. All advertising materials mentioning features or
use of this software must display the following
acknowledgement:
This product includes software developed by the
University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of
its contributors may be used to endorse or promote
products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
License Information for the Software
Used in the Unit
About
GPL
(GNU-General
License), LGPL (GNU Lesser General
Public License) License
This product uses GPL/LGPL software and software
made by other companies.
After you purchase this product, you may procure,
modify or distribute the source code of the GPL/
LGPL software that is used in the product.
MARANTZ provides the source code based on the
GPL and LPGL licenses at the actual cost upon your
request to our customer service center. However,
note that we make no guarantees concerning the
source code. Please also understand that we do
not offer support for the contents of the source
code.
LICENSE
Public
10

Publicidad

Tabla de contenido
loading

Tabla de contenido