diff options
author | Andrew Wilcox <AWilcox@Wilcox-Tech.com> | 2016-01-23 23:09:10 -0600 |
---|---|---|
committer | Andrew Wilcox <AWilcox@Wilcox-Tech.com> | 2016-01-23 23:09:10 -0600 |
commit | ac62118e2a032ed1c61161084da6ad2b6f9fb81b (patch) | |
tree | d3a708ff21765aad652bf675773a59267ed366d0 /licenses/3proxy | |
parent | 6a6063d47d5fec867e12c23aa636bbbab8e45865 (diff) | |
download | packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.gz packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.bz2 packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.tar.xz packages-ac62118e2a032ed1c61161084da6ad2b6f9fb81b.zip |
Add licenses, too
Diffstat (limited to 'licenses/3proxy')
-rw-r--r-- | licenses/3proxy | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/licenses/3proxy b/licenses/3proxy new file mode 100644 index 000000000..2c7449ee3 --- /dev/null +++ b/licenses/3proxy @@ -0,0 +1,59 @@ +3proxy 0.6 Public License Agreement + +(c) 2000-2009 by 3APA3A (3APA3A@security.nnov.ru) +(c) 2000-2009 by SecurityVulns.com (http://3proxy.ru/) +(c) 2000-2009 by Vladimir Dubrovin (vlad@sandy.ru) + +This software uses: + RSA Data Security, Inc. MD4 Message-Digest Algorithm + RSA Data Security, Inc. MD5 Message-Digest Algorithm + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR +CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +This software is FREEWARE. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that following conditions +are met (BSD style license): + + * Redistributions of source code must retain the above copyright notice, + this list of conditions and the following disclaimer. + * Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. + * Neither the name of the SecurityVulns.COM nor the names of its + contributors may be used to endorse or promote products derived from this + software without specific prior written permission. + + +Instead of this license, you can also use and redistribute this software under +terms of compatible license, including: + +1. Apache License, Version 2.0 + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +2. GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + You may obtain a copy of the License at + + http://www.gnu.org/licenses/gpl.txt + +3. GNU Lesser General Public License as published by the + Free Software Foundation; either version 2.1 of the License, or + (at your option) any later version. + You may obtain a copy of the License at + + http://www.gnu.org/licenses/lgpl.txt |