3) The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A.
under a BSD-style license. Cryptographic attack detector for ssh - source code Copyright (c) 1998
CORE SDI S.A., Buenos Aires, Argentina.
All rights reserved. Redistribution and use in source and binary forms, with or without modification,
are permitted provided that this copyright notice is retained.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES ARE
DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES RESULTING FROM THE
USE OR MISUSE OF THIS SOFTWARE.
Ariel Futoransky <futo(at)core-sdi.com><http://www.core-sdi.com>
4) ssh-keygen was contributed by David Mazieres under a BSD-style license. Copyright 1995, 1996
by David Mazieres <dm(at)lcs.mit.edu>.
Modification and redistribution in source and binary forms is permitted provided that due credit is
given to the author and the OpenBSD project by leaving this copyright notice intact.
5) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is in the
public domain and distributed with the following license: (@)version 3.0 (December 2000) Optim-
ised ANSI C code for the Rijndael cipher (now AES) @author Vincent Rijmen
@author
Antoon
Bosselaers
@author Paulo Barreto <paulo.barreto(at)terra.com.br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
6) One component of the ssh source code is under a 4-clause BSD license, held by the University of
California, since we pulled these parts from original Berkeley code. The Regents of the University
of California have declared that term 3 is no longer enforceable on their source code, but we retain
that license as is.Copyright (c) 1983, 1990, 1992, 1993, 1995 The Regents of the University of Cali-
fornia. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the dis-
tribution.
VelaSync User's Manual
247
APPENDIX
Содержание VelaSync 1225
Страница 1: ...VelaSync User Manual Spectracom Part No 1232 5000 0050 Revision 3 Date 26 Oct 2018 spectracom com...
Страница 2: ......
Страница 4: ...Blank page II VelaSync User s Manual...
Страница 12: ...BLANK PAGE X VelaSync User s Manual TABLE OF CONTENTS...
Страница 28: ...16 CHAPTER 1 VelaSync User s Manual Rev 3 1 7 The VelaSync Web UI...
Страница 34: ...BLANK PAGE 1 9 Regulatory Compliance 22 CHAPTER 1 VelaSync User s Manual Rev 3...
Страница 104: ...BLANK PAGE 2 11 Configuring PTP 92 CHAPTER 2 VelaSync User s Manual Rev 3...
Страница 251: ...Server management System specifications VelaSync User s Manual 239 APPENDIX...
Страница 267: ...VelaSync User s Manual 255 APPENDIX...
Страница 268: ...BLANK PAGE 256 VelaSync User s Manual...