summaryrefslogtreecommitdiff
path: root/licenses/3proxy
diff options
context:
space:
mode:
authorA. Wilcox <AWilcox@Wilcox-Tech.com>2017-06-11 08:41:26 +0000
committerA. Wilcox <AWilcox@Wilcox-Tech.com>2017-06-11 08:41:26 +0000
commit2f6caac6019e3182486965f7f09baed7e93e1be9 (patch)
tree2d5d4350a1bbf9bafdb5f0a5260714a6190c668d /licenses/3proxy
parenta37f6bfc3fde25205ebac44b82f1586b924c61da (diff)
downloadpackages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.gz
packages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.bz2
packages-2f6caac6019e3182486965f7f09baed7e93e1be9.tar.xz
packages-2f6caac6019e3182486965f7f09baed7e93e1be9.zip
The New Plan
ebuild branch has old ebuilds. profiles dir still has CFLAGS. Everything else is removed or modified for changing of upstream to Alpine.
Diffstat (limited to 'licenses/3proxy')
-rw-r--r--licenses/3proxy59
1 files changed, 0 insertions, 59 deletions
diff --git a/licenses/3proxy b/licenses/3proxy
deleted file mode 100644
index 2c7449ee3..000000000
--- a/licenses/3proxy
+++ /dev/null
@@ -1,59 +0,0 @@
-3proxy 0.6 Public License Agreement
-
-(c) 2000-2009 by 3APA3A (3APA3A@security.nnov.ru)
-(c) 2000-2009 by SecurityVulns.com (http://3proxy.ru/)
-(c) 2000-2009 by Vladimir Dubrovin (vlad@sandy.ru)
-
-This software uses:
- RSA Data Security, Inc. MD4 Message-Digest Algorithm
- RSA Data Security, Inc. MD5 Message-Digest Algorithm
-
-THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
-"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
-LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
-A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
-CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
-EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
-PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
-LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
-SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-This software is FREEWARE.
-
-Redistribution and use in source and binary forms, with or without
-modification, are permitted provided that following conditions
-are met (BSD style license):
-
- * Redistributions of source code must retain the above copyright notice,
- this list of conditions and the following disclaimer.
- * Redistributions in binary form must reproduce the above copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
- * Neither the name of the SecurityVulns.COM nor the names of its
- contributors may be used to endorse or promote products derived from this
- software without specific prior written permission.
-
-
-Instead of this license, you can also use and redistribute this software under
-terms of compatible license, including:
-
-1. Apache License, Version 2.0
- You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
-2. GNU General Public License as published by
- the Free Software Foundation; either version 2 of the License, or
- (at your option) any later version.
- You may obtain a copy of the License at
-
- http://www.gnu.org/licenses/gpl.txt
-
-3. GNU Lesser General Public License as published by the
- Free Software Foundation; either version 2.1 of the License, or
- (at your option) any later version.
- You may obtain a copy of the License at
-
- http://www.gnu.org/licenses/lgpl.txt