Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: chrony Upstream-Contact: Miroslav Lichvar Source: http://download.tuxfamily.org/chrony/ Files: * Copyright: 2009-2014, Miroslav Lichvar 1997-2007, Richard P. Curnow License: GPL-2 Files: main.c sys_linux.c Copyright: 2009-2014, Miroslav Lichvar 2009, John G. Hasler 1997-2003, Richard P. Curnow License: GPL-2 Files: ntp_io.c Copyright: 2009-2014, Miroslav Lichvar 2009, Timo Teras 1997-2003, Richard P. Curnow License: GPL-2 Files: sys_netbsd.c sys_netbsd.h Copyright: 2001, J. Hannken-Illjes 1997-2001, Richard P. Curnow License: GPL-2 Files: contrib/DNSchrony/DNSchrony.pl Copyright: 2002, Paul Elliott License: GPL-2+ Files: debian/* Copyright: 2012-2014, Joachim Wiedorn 2000-2012, John Hasler License: GPL-2 Files: chrony_timex.h (modified copy of /usr/include/linux/timex.h) Copyright: 1993, David L. Mills License: Old Style MIT (no advertising without permission) Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty. Files: md5.* Copyright: 1990, RSA Data Security, Inc. All rights reserved. License: License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message- Digest Algorithm" in all material mentioning or referencing this software or this function. . License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. . RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. . These notices must be retained in any copies of any part of this documentation and/or software. License: GPL-2 This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation. . This package is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. . You should have received a copy of the GNU General Public License along with this program. If not, see . . On Debian systems, the complete text of the GNU General Public License version 2 can be found in the file `/usr/share/common-licenses/GPL-2'. License: GPL-2+ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. . This package is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. . You should have received a copy of the GNU General Public License along with this program. If not, see . . On Debian systems, the complete text of the GNU General Public License version 2 can be found in the file `/usr/share/common-licenses/GPL-2'.