|author||Remko Tronçon <firstname.lastname@example.org>||2013-04-26 20:07:58 (GMT)|
|committer||Remko Tronçon <email@example.com>||2013-04-27 11:02:06 (GMT)|
Removing third-party hash implementations.
Using library/platform implementation instead. Change-Id: I2457c2dad80e6fdda023a7f31c3906ff10fe09ed
Diffstat (limited to 'COPYING.thirdparty')
1 files changed, 0 insertions, 45 deletions
diff --git a/COPYING.thirdparty b/COPYING.thirdparty
index 1ab927d..aeaf066 100644
@@ -756,48 +756,3 @@ necessary. Here is a sample; alter the names:
Ty Coon, President of Vice
That's all there is to it!
-Swiften contains adapted code from LibTomCrypt by Tom St Denis
-LibTomCrypt is free for all purposes under the public domain.
-Swiften contains adapted code from L. Peter Deutsch's
-MD5 implementation. Original license below.
-Copyright (C) 1999, 2002 Aladdin Enterprises. All rights reserved.
-This software is provided 'as-is', without any express or implied
-warranty. In no event will the authors be held liable for any damages
-arising from the use of this software.
-Permission is granted to anyone to use this software for any purpose,
-including commercial applications, and to alter it and redistribute it
-freely, subject to the following restrictions:
-1. The origin of this software must not be misrepresented; you must not
- claim that you wrote the original software. If you use this software
- in a product, an acknowledgment in the product documentation would be
- appreciated but is not required.
-2. Altered source versions must be plainly marked as such, and must not be
- misrepresented as being the original software.
-3. This notice may not be removed or altered from any source distribution.
-L. Peter Deutsch
-Swiften contains adapted code from Steve Reid's SHA-1 implementation in C.
-This code is in the public domain. \ No newline at end of file