lua-bcrypt

Secure password hashing for Lua
Log | Files | Refs | README | LICENSE

LICENSE (3044B)


      1 Copyright (c) 2021, Michael Savage <mike@mikejsavage.co.uk>
      2 
      3 Permission to use, copy, modify, and/or distribute this software for any
      4 purpose with or without fee is hereby granted, provided that the above
      5 copyright notice and this permission notice appear in all copies.
      6 
      7 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
      8 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
      9 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
     10 SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     11 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
     12 OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
     13 CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
     14 
     15 ---
     16 
     17 Copyright (c) 2014 Ted Unangst <tedu@openbsd.org>
     18 Copyright (c) 1997 Niels Provos <provos@umich.edu>
     19 
     20 Permission to use, copy, modify, and distribute this software for any
     21 purpose with or without fee is hereby granted, provided that the above
     22 copyright notice and this permission notice appear in all copies.
     23 
     24 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
     25 WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
     26 MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
     27 ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     28 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
     29 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
     30 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
     31 
     32 ---
     33 
     34 Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
     35 All rights reserved.
     36 
     37 Implementation advice by David Mazieres <dm@lcs.mit.edu>.
     38 
     39 Redistribution and use in source and binary forms, with or without
     40 modification, are permitted provided that the following conditions
     41 are met:
     42 1. Redistributions of source code must retain the above copyright
     43    notice, this list of conditions and the following disclaimer.
     44 2. Redistributions in binary form must reproduce the above copyright
     45    notice, this list of conditions and the following disclaimer in the
     46    documentation and/or other materials provided with the distribution.
     47 3. The name of the author may not be used to endorse or promote products
     48    derived from this software without specific prior written permission.
     49 
     50 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     51 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     52 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     53 IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     54 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     55 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     56 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     57 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     58 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     59 THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.