diff options
author | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2017-06-11 08:41:26 +0000 |
---|---|---|
committer | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2017-06-11 08:41:26 +0000 |
commit | 2f6caac6019e3182486965f7f09baed7e93e1be9 (patch) | |
tree | 2d5d4350a1bbf9bafdb5f0a5260714a6190c668d /licenses/3proxy | |
parent | a37f6bfc3fde25205ebac44b82f1586b924c61da (diff) | |
download | packages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.gz packages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.bz2 packages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.xz packages-2f6caac6019e3182486965f7f09baed7e93e1be9.zip |
The New Plan
ebuild branch has old ebuilds. profiles dir still has CFLAGS.
Everything else is removed or modified for changing of upstream to
Alpine.
Diffstat (limited to 'licenses/3proxy')
-rw-r--r-- | licenses/3proxy | 59 |
1 files changed, 0 insertions, 59 deletions
diff --git a/licenses/3proxy b/licenses/3proxy deleted file mode 100644 index 2c7449ee3..000000000 --- a/licenses/3proxy +++ /dev/null @@ -1,59 +0,0 @@ -3proxy 0.6 Public License Agreement - -(c) 2000-2009 by 3APA3A (3APA3A@security.nnov.ru) -(c) 2000-2009 by SecurityVulns.com (http://3proxy.ru/) -(c) 2000-2009 by Vladimir Dubrovin (vlad@sandy.ru) - -This software uses: - RSA Data Security, Inc. MD4 Message-Digest Algorithm - RSA Data Security, Inc. MD5 Message-Digest Algorithm - -THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS -"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT -LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR -CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, -EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, -PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR -PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF -LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING -NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS -SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - -This software is FREEWARE. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that following conditions -are met (BSD style license): - - * Redistributions of source code must retain the above copyright notice, - this list of conditions and the following disclaimer. - * Redistributions in binary form must reproduce the above copyright notice, - this list of conditions and the following disclaimer in the documentation - and/or other materials provided with the distribution. - * Neither the name of the SecurityVulns.COM nor the names of its - contributors may be used to endorse or promote products derived from this - software without specific prior written permission. - - -Instead of this license, you can also use and redistribute this software under -terms of compatible license, including: - -1. Apache License, Version 2.0 - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - -2. GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - You may obtain a copy of the License at - - http://www.gnu.org/licenses/gpl.txt - -3. GNU Lesser General Public License as published by the - Free Software Foundation; either version 2.1 of the License, or - (at your option) any later version. - You may obtain a copy of the License at - - http://www.gnu.org/licenses/lgpl.txt |