DES is now external, in the OpenSSL library
GMP is no longer used, and instead we call BN code from OpenSSL
Zlib is now external, in a library
The make-ssh-known-hosts script is no longer included
TSS has been removed
MD5 is now external, in the OpenSSL library
RC4 support has been replaced with ARC4 support from OpenSSL
Blowfish is now external, in the OpenSSL library
Note that any information and cryptographic algorithms used in this software are publicly available on
the Internet and at any major bookstore, scientific library, and patent office worldwide. More inform-
ation can be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these permissions and restrictions. Use
only at your own responsibility. You will be responsible for any legal consequences yourself; I am not
making any claims whether possessing or using this is legal or not in your country, and I am not taking
any responsibility on your behalf.
NO WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2) The 32-bit CRC implementation in crc32.c is due to Gary S. Brown. Comments in the file indicate it
may be used for any purpose without restrictions: COPYRIGHT (C) 1986 Gary S. Brown. You may use
this program, or code or tables extracted from it, as desired without restriction.
3) The 32- bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license. Cryptographic attack detector for ssh - source code Copyright (c) 1998
CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or without modification,
are permitted provided that this copyright notice is retained.
VelaSync 1232 User Manual
243
APPENDIX
Summary of Contents for Spectracom VelaSync 1232
Page 2: ......
Page 4: ...Blank page II VelaSync 1232 User Manual...
Page 12: ...BLANK PAGE X VelaSync 1232 User Manual TABLE OF CONTENTS...
Page 28: ...16 CHAPTER 1 VelaSync 1232 User Manual Rev 4 1 7 The VelaSync Web UI...
Page 34: ...BLANK PAGE 1 9 Regulatory Compliance 22 CHAPTER 1 VelaSync 1232 User Manual Rev 4...