You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 

117 regels
4.8 KiB

  1. .. -*- restructuredtext -*-
  2. =====================
  3. Copyrights & Licenses
  4. =====================
  5. Credits
  6. =======
  7. Passlib is primarily developed by Eli Collins.
  8. Special thanks to Darin Gordon for testing and
  9. feedback on the :mod:`passlib.totp` module.
  10. License for Passlib
  11. ===================
  12. Passlib is (c) `Assurance Technologies <http://www.assurancetechnologies.com>`_,
  13. and is released under the `BSD license <http://www.opensource.org/licenses/bsd-license.php>`_::
  14. Passlib
  15. Copyright (c) 2008-2020 Assurance Technologies, LLC.
  16. All rights reserved.
  17. Redistribution and use in source and binary forms, with or without
  18. modification, are permitted provided that the following conditions are
  19. met:
  20. * Redistributions of source code must retain the above copyright
  21. notice, this list of conditions and the following disclaimer.
  22. * Redistributions in binary form must reproduce the above copyright
  23. notice, this list of conditions and the following disclaimer in the
  24. documentation and/or other materials provided with the distribution.
  25. * Neither the name of Assurance Technologies, nor the names of the
  26. contributors may be used to endorse or promote products derived
  27. from this software without specific prior written permission.
  28. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  29. "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  30. LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  31. A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  32. OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  33. SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  34. LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  35. DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  36. THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  37. (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  38. OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  39. Licenses for incorporated software
  40. ==================================
  41. Passlib contains some code derived from the following sources:
  42. MD5-Crypt
  43. ---------
  44. The source file ``passlib/handlers/md5_crypt.py`` contains code derived from the original
  45. `FreeBSD md5-crypt implementation <http://www.freebsd.org/cgi/cvsweb.cgi/~checkout~/src/lib/libcrypt/crypt.c?rev=1.2>`_,
  46. which is available under the following license::
  47. "THE BEER-WARE LICENSE" (Revision 42):
  48. <phk@login.dknet.dk> wrote this file. As long as you retain this notice you
  49. can do whatever you want with this stuff. If we meet some day, and you think
  50. this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
  51. converted to python May 2008
  52. by Eli Collins
  53. DES
  54. ---
  55. The source file ``passlib/crypto/des.py`` contains code derived from
  56. `UnixCrypt.java <http://www.dynamic.net.au/christos/crypt/UnixCrypt2.txt>`_,
  57. a pure-java implementation of the historic unix-crypt password hash algorithm.
  58. It is available under the following license::
  59. UnixCrypt.java 0.9 96/11/25
  60. Copyright (c) 1996 Aki Yoshida. All rights reserved.
  61. Permission to use, copy, modify and distribute this software
  62. for non-commercial or commercial purposes and without fee is
  63. hereby granted provided that this copyright notice appears in
  64. all copies.
  65. modified April 2001
  66. by Iris Van den Broeke, Daniel Deville
  67. modified Aug 2005
  68. by Greg Wilkins (gregw)
  69. converted to python Jun 2009
  70. by Eli Collins
  71. jBCrypt
  72. -------
  73. The source file ``passlib/crypto/_blowfish/base.py`` contains code derived
  74. from `jBcrypt 0.2 <http://www.mindrot.org/projects/jBCrypt/>`_, a Java
  75. implementation of the BCrypt password hash algorithm. It is available under
  76. a BSD/ISC license::
  77. Copyright (c) 2006 Damien Miller <djm@mindrot.org>
  78. Permission to use, copy, modify, and distribute this software for any
  79. purpose with or without fee is hereby granted, provided that the above
  80. copyright notice and this permission notice appear in all copies.
  81. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  82. WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  83. MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  84. ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  85. WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  86. ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF
  87. OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  88. Wordsets
  89. --------
  90. The EFF wordsets in ``passlib/_data/wordsets`` are (c) 2016 the Electronic Freedom Foundation.
  91. They were downloaded from `<https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases>`_,
  92. and are released under the `Creative Commons License <https://www.eff.org/copyright>`_.