3) The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license. Cryptographic attack detector for ssh - source code Copyright (c) 1998
CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or without modification,
are permitted provided that this copyright notice is retained.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE
USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo(at)core-sdi.com><http://www.core-sdi.com>
4) ssh-keygen was contributed by David Mazieres under a BSD-style license. Copyright 1995, 1996
by David Mazieres <dm(at)lcs.mit.edu>.
Modification and redistribution in source and binary forms is permitted provided that due credit is
given to the author and the OpenBSD project by leaving this copyright notice intact.
5) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the
public domain and distributed with the following license: (@)version 3.0 (December 2000) Optim-
ised ANSI C code for the Rijndael cipher (now AES) @author Vincent Rijmen
@author
Antoon
Bosselaers
@author Paulo Barreto <paulo.barreto(at)terra.com.br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
6) One component of the ssh source code is under a 4-clause BSD license, held by the University of
California, since we pulled these parts from original Berkeley code. The Regents of the University
of California have declared that term 3 is no longer enforceable on their source code, but we retain
that license as is.Copyright (c) 1983, 1990, 1992, 1993, 1995 The Regents of the University of Cali-
fornia. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the dis-
tribution.
VelaSync User's Manual
247
APPENDIX
Summary of Contents for VelaSync 1225
Page 2: ......
Page 4: ...Blank page II VelaSync User s Manual...
Page 12: ...BLANK PAGE X VelaSync User s Manual TABLE OF CONTENTS...
Page 28: ...16 CHAPTER 1 VelaSync User s Manual Rev 3 1 7 The VelaSync Web UI...
Page 34: ...BLANK PAGE 1 9 Regulatory Compliance 22 CHAPTER 1 VelaSync User s Manual Rev 3...
Page 104: ...BLANK PAGE 2 11 Configuring PTP 92 CHAPTER 2 VelaSync User s Manual Rev 3...
Page 251: ...Server management System specifications VelaSync User s Manual 239 APPENDIX...
Page 267: ...VelaSync User s Manual 255 APPENDIX...