Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: nethack
Source: http://sourceforge.net/projects/nethack/files/

Files: *
Copyright: 2001-2003, Alex Kompel
           2017, Alex Smith
           1994-1996, Andrew Church
           1998, Anthony Taylor <tonyt@ptialaska.net>
           1989, Benson I. Margulies
           1994, Boudewijn Wayers
           1985-2018, By Stichting Mathematisch Centrum and M. Stephenson
           1999-2002, Christian Bressler
           1991-2006, David Cohrs
           1993, David Hairston
           1990-2002, Dean Luick
           2015, Derek S. Ray
           2002, Dylan Alex Simon
           1989, Eric Raymond
           1998, Erik Andersen <andersee@debian.org>
           1991-1996, Gregg Wonderly
           1992, Hao-Yang Wang
           1989-1993, Izchak Miller
           1989-1992, Janet Walz
           2000, Janne Salmijärvi
           1989-1996, Jean-Christophe Collet
           1992-1993, Jon Watte
           1992, Jonathan Handler
           1987-1990, Ken Arromdee
           1990-2015, Kenneth Lorber
           1998-2004, Kevin Hugo
           1992, MAXON-Computer
           1993, Macintosh NetHack Port Team
           2002, Mark Modrall
           1997-2018, Michael Allison
           1991, Michael Hamel
           1985-2015, Mike Stephenson
           1989, Mike Threepoint
           1990-2018, NetHack Development Team
           1989-1991, Network Computing Devices, Inc
           1989, Norm Meluch
           1988-1992, Olaf Seibert
           1991-1993, P. Winner
           2015-2018, Pasi Kallinen
           2012-2016, Ray Chason
           1983, Regents of the University of California
           1991-2018, Robert Patrick Rankin
           1986, Scott R. Turner <srt@ucla>
           2015, Sean Hunt
           2001, Slash'EM development team
           1989, Stephen Spackman
           1988, Steve Creps
           1989, Steve Linhart
           1985-2003, Stichting Mathematisch Centrum
           1990-1996, Timo Hakulinen
           1992-2000, Trolltech AS
           1996-2004, Warwick Allison <warwick@troll.no>
           1999-2006, Yitzhak Sapir
License: NGPL

Files: src/windows.c
       win/tty/termcap.c
Copyright: 1993, David Cohrs
           2018, Pasi Kallinen
           2003-2005, Ryan Yeske <rcyeske@gmail.com>
           2003-2005, Shawn Betts <sabetts@vcn.bc.ca>
           1985, Stichting Mathematisch Centrum
License: NGPL and BSD-3-clause

Files: win/X11/dialogs.c
Copyright: 1991, University of Wisconsin-Madison
License: NTP-Wisconsin-Madison

Files: win/share/gifread.c
Copyright: 1990, David Koblas
License: NTP

Files: debian/*
Copyright: 1996-1997 Paul Haggart <phaggart@debian.org>
           1997-2003 Ben Gertzfield <che@debian.org>
           2003-2009 Joshua Kwan <joshk@triplehelix.org>
           2012-2014 Vincent Cheng <vcheng@debian.org>
           2014 Josh Triplett <josh@joshtriplett.org>
           2016-2018 James Cowgill <jcowgill@debian.org>
License: NGPL

License: BSD-3-clause
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions are met:
     * Redistributions of source code must retain the above copyright
       notice, this list of conditions and the following disclaimer.
     * Redistributions in binary form must reproduce the above copyright
       notice, this list of conditions and the following disclaimer in the
       documentation and/or other materials provided with the distribution.
     * Neither the name of the <organization> nor the
       names of its contributors may be used to endorse or promote products
       derived from this software without specific prior written permission.
 .
 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 DISCLAIMED. IN NO EVENT SHALL <COPYRIGHT HOLDER> BE LIABLE FOR ANY
 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
 ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

License: NGPL
                    NETHACK GENERAL PUBLIC LICENSE
                    (Copyright 1989 M. Stephenson)
 .
               (Based on the BISON general public license,
                   copyright 1988 Richard M. Stallman)
 .
 Everyone is permitted to copy and distribute verbatim copies of this
 license, but changing it is not allowed.  You can also use this wording to
 make the terms for other programs.
 .
 The license agreements of most software companies keep you at the mercy of
 those companies.  By contrast, our general public license is intended to give
 everyone the right to share NetHack.  To make sure that you get the rights we
 want you to have, we need to make restrictions that forbid anyone to deny you
 these rights or to ask you to surrender the rights.  Hence this license
 agreement.
 .
 Specifically, we want to make sure that you have the right to give away
 copies of NetHack, that you receive source code or else can get it if you
 want it, that you can change NetHack or use pieces of it in new free
 programs, and that you know you can do these things.
 .
 To make sure that everyone has such rights, we have to forbid you to
 deprive anyone else of these rights.  For example, if you distribute copies
 of NetHack, you must give the recipients all the rights that you have.  You
 must make sure that they, too, receive or can get the source code.  And you
 must tell them their rights.
 .
 Also, for our own protection, we must make certain that everyone finds out
 that there is no warranty for NetHack.  If NetHack is modified by someone
 else and passed on, we want its recipients to know that what they have is
 not what we distributed.
 .
 Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
 the following terms which say what you must do to be allowed to distribute or
 change NetHack.
 .
 .
                        COPYING POLICIES
 .
 1. You may copy and distribute verbatim copies of NetHack source code as
 you receive it, in any medium, provided that you keep intact the notices on
 all files that refer to copyrights, to this License Agreement, and to the
 absence of any warranty; and give any other recipients of the NetHack
 program a copy of this License Agreement along with the program.
 .
 2. You may modify your copy or copies of NetHack or any portion of it, and
 copy and distribute such modifications under the terms of Paragraph 1 above
 (including distributing this License Agreement), provided that you also do the
 following:
 .
    a) cause the modified files to carry prominent notices stating that you
    changed the files and the date of any change; and
 .
    b) cause the whole of any work that you distribute or publish, that in
    whole or in part contains or is a derivative of NetHack or any part
    thereof, to be licensed at no charge to all third parties on terms
    identical to those contained in this License Agreement (except that you
    may choose to grant more extensive warranty protection to some or all
    third parties, at your option)
 .
    c) You may charge a distribution fee for the physical act of
    transferring a copy, and you may at your option offer warranty protection
    in exchange for a fee.
 .
 3. You may copy and distribute NetHack (or a portion or derivative of it,
 under Paragraph 2) in object code or executable form under the terms of
 Paragraphs 1 and 2 above provided that you also do one of the following:
 .
    a) accompany it with the complete machine-readable source code, which
    must be distributed under the terms of Paragraphs 1 and 2 above; or,
 .
    b) accompany it with full information as to how to obtain the complete
    machine-readable source code from an appropriate archive site.  (This
    alternative is allowed only for noncommercial distribution.)
 .
 For these purposes, complete source code means either the full source
 distribution as originally released over Usenet or updated copies of the
 files in this distribution used to create the object code or executable.
 .
 4. You may not copy, sublicense, distribute or transfer NetHack except as
 expressly provided under this License Agreement.  Any attempt otherwise to
 copy, sublicense, distribute or transfer NetHack is void and your rights to
 use the program under this License agreement shall be automatically
 terminated.  However, parties who have received computer software programs
 from you with this License Agreement will not have their licenses terminated
 so long as such parties remain in full compliance.
 .
 Stated plainly:  You are prohibited by the terms of this License Agreement
 from using NetHack for gainful purposes.  You are permitted to modify
 NetHack, or otherwise use parts of NetHack, provided that you comply with
 the conditions specified above; in particular, your modified NetHack or
 program containing parts of NetHack must remain freely available as provided
 in this License Agreement.  In other words, go ahead and share NetHack, but
 don't try to stop anyone else from sharing it farther.

License: NTP
 Permission to use, copy, modify, and distribute this software and its
 documentation for any purpose and without fee is hereby granted,
 provided that the above copyright notice appear in all copies and
 that both that copyright notice and this permission notice appear in
 supporting documentation.  This software is provided "as is" without
 express or implied warranty.

License: NTP-Wisconsin-Madison
 Permission to use, copy, modify, distribute, and sell this software and
 its documentation for any purpose is hereby granted without fee, provided
 that the above copyright notice appear in all copies and that both that
 copyright notice and this permission notice appear in supporting
 documentation, and that the name of the University of Wisconsin-Madison
 not be used in advertising or publicity pertaining to distribution of the
 software without specific, written prior permission.  The University of
 Wisconsin-Madison makes no representations about the suitability of this
 software for any purpose.  It is provided "as is" without express or
 implied warranty.
 .
 THE UNIVERSITY OF WISCONSIN-MADISON DISCLAIMS ALL WARRANTIES WITH REGARD
 TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
 FITNESS, IN NO EVENT SHALL THE UNIVERSITY OF WISCONSIN-MADISON BE LIABLE
 FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.