Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/ Upstream-Name: nethack Source: http://sourceforge.net/projects/nethack/files/ Files: * Copyright: 2001-2003, Alex Kompel 2017, Alex Smith 1994-1996, Andrew Church 1998, Anthony Taylor 1989, Benson I. Margulies 1994, Boudewijn Wayers 1985-2018, By Stichting Mathematisch Centrum and M. Stephenson 1999-2002, Christian Bressler 1991-2006, David Cohrs 1993, David Hairston 1990-2002, Dean Luick 2015, Derek S. Ray 2002, Dylan Alex Simon 1989, Eric Raymond 1998, Erik Andersen 1991-1996, Gregg Wonderly 1992, Hao-Yang Wang 1989-1993, Izchak Miller 1989-1992, Janet Walz 2000, Janne Salmijärvi 1989-1996, Jean-Christophe Collet 1992-1993, Jon Watte 1992, Jonathan Handler 1987-1990, Ken Arromdee 1990-2015, Kenneth Lorber 1998-2004, Kevin Hugo 1992, MAXON-Computer 1993, Macintosh NetHack Port Team 2002, Mark Modrall 1997-2018, Michael Allison 1991, Michael Hamel 1985-2015, Mike Stephenson 1989, Mike Threepoint 1990-2018, NetHack Development Team 1989-1991, Network Computing Devices, Inc 1989, Norm Meluch 1988-1992, Olaf Seibert 1991-1993, P. Winner 2015-2018, Pasi Kallinen 2012-2016, Ray Chason 1983, Regents of the University of California 1991-2018, Robert Patrick Rankin 1986, Scott R. Turner 2015, Sean Hunt 2001, Slash'EM development team 1989, Stephen Spackman 1988, Steve Creps 1989, Steve Linhart 1985-2003, Stichting Mathematisch Centrum 1990-1996, Timo Hakulinen 1992-2000, Trolltech AS 1996-2004, Warwick Allison 1999-2006, Yitzhak Sapir License: NGPL Files: src/windows.c win/tty/termcap.c Copyright: 1993, David Cohrs 2018, Pasi Kallinen 2003-2005, Ryan Yeske 2003-2005, Shawn Betts 1985, Stichting Mathematisch Centrum License: NGPL and BSD-3-clause Files: win/X11/dialogs.c Copyright: 1991, University of Wisconsin-Madison License: NTP-Wisconsin-Madison Files: win/share/gifread.c Copyright: 1990, David Koblas License: NTP Files: debian/* Copyright: 1996-1997 Paul Haggart 1997-2003 Ben Gertzfield 2003-2009 Joshua Kwan 2012-2014 Vincent Cheng 2014 Josh Triplett 2016-2018 James Cowgill License: NGPL License: BSD-3-clause Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. . THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. License: NGPL NETHACK GENERAL PUBLIC LICENSE (Copyright 1989 M. Stephenson) . (Based on the BISON general public license, copyright 1988 Richard M. Stallman) . Everyone is permitted to copy and distribute verbatim copies of this license, but changing it is not allowed. You can also use this wording to make the terms for other programs. . The license agreements of most software companies keep you at the mercy of those companies. By contrast, our general public license is intended to give everyone the right to share NetHack. To make sure that you get the rights we want you to have, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. Hence this license agreement. . Specifically, we want to make sure that you have the right to give away copies of NetHack, that you receive source code or else can get it if you want it, that you can change NetHack or use pieces of it in new free programs, and that you know you can do these things. . To make sure that everyone has such rights, we have to forbid you to deprive anyone else of these rights. For example, if you distribute copies of NetHack, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their rights. . Also, for our own protection, we must make certain that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that what they have is not what we distributed. . Therefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say what you must do to be allowed to distribute or change NetHack. . . COPYING POLICIES . 1. You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium, provided that you keep intact the notices on all files that refer to copyrights, to this License Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a copy of this License Agreement along with the program. . 2. You may modify your copy or copies of NetHack or any portion of it, and copy and distribute such modifications under the terms of Paragraph 1 above (including distributing this License Agreement), provided that you also do the following: . a) cause the modified files to carry prominent notices stating that you changed the files and the date of any change; and . b) cause the whole of any work that you distribute or publish, that in whole or in part contains or is a derivative of NetHack or any part thereof, to be licensed at no charge to all third parties on terms identical to those contained in this License Agreement (except that you may choose to grant more extensive warranty protection to some or all third parties, at your option) . c) You may charge a distribution fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. . 3. You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following: . a) accompany it with the complete machine-readable source code, which must be distributed under the terms of Paragraphs 1 and 2 above; or, . b) accompany it with full information as to how to obtain the complete machine-readable source code from an appropriate archive site. (This alternative is allowed only for noncommercial distribution.) . For these purposes, complete source code means either the full source distribution as originally released over Usenet or updated copies of the files in this distribution used to create the object code or executable. . 4. You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void and your rights to use the program under this License agreement shall be automatically terminated. However, parties who have received computer software programs from you with this License Agreement will not have their licenses terminated so long as such parties remain in full compliance. . Stated plainly: You are prohibited by the terms of this License Agreement from using NetHack for gainful purposes. You are permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the conditions specified above; in particular, your modified NetHack or program containing parts of NetHack must remain freely available as provided in this License Agreement. In other words, go ahead and share NetHack, but don't try to stop anyone else from sharing it farther. License: NTP Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. This software is provided "as is" without express or implied warranty. License: NTP-Wisconsin-Madison Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of the University of Wisconsin-Madison not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Wisconsin-Madison makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. . THE UNIVERSITY OF WISCONSIN-MADISON DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE UNIVERSITY OF WISCONSIN-MADISON BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.