You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

license_3rd.txt 3.7KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283
  1. 3rd party components used by the RDP Web Control:
  2. 1) RDP Web Control contains SWFObject library <http://code.google.com/p/swfobject/>
  3. which is released under the MIT License <http://www.opensource.org/licenses/mit-license.php>
  4. 2) RDP Web Control contains code from as3crypto library which is
  5. covered under the following copyright:
  6. /*
  7. * Copyright (c) 2007 Henri Torgemane
  8. * All Rights Reserved.
  9. *
  10. * BigInteger, RSA, Random and ARC4 are derivative works of the jsbn library
  11. * (http://www-cs-students.stanford.edu/~tjw/jsbn/)
  12. * The jsbn library is Copyright (c) 2003-2005 Tom Wu (tjw@cs.Stanford.EDU)
  13. *
  14. * MD5, SHA1, and SHA256 are derivative works (http://pajhome.org.uk/crypt/md5/)
  15. * Those are Copyright (c) 1998-2002 Paul Johnston & Contributors (paj@pajhome.org.uk)
  16. *
  17. * SHA256 is a derivative work of jsSHA2 (http://anmar.eu.org/projects/jssha2/)
  18. * jsSHA2 is Copyright (c) 2003-2004 Angel Marin (anmar@gmx.net)
  19. *
  20. * AESKey is a derivative work of aestable.c (http://www.geocities.com/malbrain/aestable_c.html)
  21. * aestable.c is Copyright (c) Karl Malbrain (malbrain@yahoo.com)
  22. *
  23. * BlowFishKey, DESKey and TripeDESKey are derivative works of the Bouncy Castle Crypto Package (http://www.bouncycastle.org)
  24. * Those are Copyright (c) 2000-2004 The Legion Of The Bouncy Castle
  25. *
  26. * Base64 is copyright (c) 2006 Steve Webster (http://dynamicflash.com/goodies/base64)
  27. *
  28. * Redistribution and use in source and binary forms, with or without modification,
  29. * are permitted provided that the following conditions are met:
  30. *
  31. * Redistributions of source code must retain the above copyright notice, this list
  32. * of conditions and the following disclaimer. Redistributions in binary form must
  33. * reproduce the above copyright notice, this list of conditions and the following
  34. * disclaimer in the documentation and/or other materials provided with the distribution.
  35. *
  36. * Neither the name of the author nor the names of its contributors may be used to endorse
  37. * or promote products derived from this software without specific prior written permission.
  38. *
  39. * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
  40. * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
  41. * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  42. *
  43. * IN NO EVENT SHALL TOM WU BE LIABLE FOR ANY SPECIAL, INCIDENTAL,
  44. * INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER
  45. * RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF
  46. * THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT
  47. * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  48. *
  49. */
  50. Address all questions regarding this license to:
  51. Henri Torgemane
  52. henri_torgemane@yahoo.com
  53. Additionally, the MD5 algorithm is covered by the following notice:
  54. /* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
  55. *
  56. * License to copy and use this software is granted provided that it
  57. * is identified as the "RSA Data Security, Inc. MD5 Message-Digest
  58. * Algorithm" in all material mentioning or referencing this software
  59. * or this function.
  60. *
  61. * License is also granted to make and use derivative works provided
  62. * that such works are identified as "derived from the RSA Data
  63. * Security, Inc. MD5 Message-Digest Algorithm" in all material
  64. * mentioning or referencing the derived work.
  65. *
  66. * RSA Data Security, Inc. makes no representations concerning either
  67. * the merchantability of this software or the suitability of this
  68. * software for any particular purpose. It is provided "as is"
  69. * without express or implied warranty of any kind.
  70. *
  71. * These notices must be retained in any copies of any part of this
  72. * documentation and/or software.
  73. */