summaryrefslogtreecommitdiff
path: root/licenses/3proxy
diff options
context:
space:
mode:
authorAndrew Wilcox <AWilcox@Wilcox-Tech.com>2016-01-23 23:09:10 -0600
committerAndrew Wilcox <AWilcox@Wilcox-Tech.com>2016-01-23 23:09:10 -0600
commitac62118e2a032ed1c61161084da6ad2b6f9fb81b (patch)
treed3a708ff21765aad652bf675773a59267ed366d0 /licenses/3proxy
parent6a6063d47d5fec867e12c23aa636bbbab8e45865 (diff)
downloadpackages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.gz
packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.bz2
packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.xz
packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.zip
Add licenses, too
Diffstat (limited to 'licenses/3proxy')
-rw-r--r--licenses/3proxy59
1 files changed, 59 insertions, 0 deletions
diff --git a/licenses/3proxy b/licenses/3proxy
new file mode 100644
index 000000000..2c7449ee3
--- /dev/null
+++ b/licenses/3proxy
@@ -0,0 +1,59 @@
+3proxy 0.6 Public License Agreement
+
+(c) 2000-2009 by 3APA3A (3APA3A@security.nnov.ru)
+(c) 2000-2009 by SecurityVulns.com (http://3proxy.ru/)
+(c) 2000-2009 by Vladimir Dubrovin (vlad@sandy.ru)
+
+This software uses:
+ RSA Data Security, Inc. MD4 Message-Digest Algorithm
+ RSA Data Security, Inc. MD5 Message-Digest Algorithm
+
+THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
+CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+This software is FREEWARE.
+
+Redistribution and use in source and binary forms, with or without
+modification, are permitted provided that following conditions
+are met (BSD style license):
+
+ * Redistributions of source code must retain the above copyright notice,
+ this list of conditions and the following disclaimer.
+ * Redistributions in binary form must reproduce the above copyright notice,
+ this list of conditions and the following disclaimer in the documentation
+ and/or other materials provided with the distribution.
+ * Neither the name of the SecurityVulns.COM nor the names of its
+ contributors may be used to endorse or promote products derived from this
+ software without specific prior written permission.
+
+
+Instead of this license, you can also use and redistribute this software under
+terms of compatible license, including:
+
+1. Apache License, Version 2.0
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+2. GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+ You may obtain a copy of the License at
+
+ http://www.gnu.org/licenses/gpl.txt
+
+3. GNU Lesser General Public License as published by the
+ Free Software Foundation; either version 2.1 of the License, or
+ (at your option) any later version.
+ You may obtain a copy of the License at
+
+ http://www.gnu.org/licenses/lgpl.txt