- Zlib is now external, in a library- The make-ssh-known-hosts script is no longer included- TSS has been removed- MD5 is now external, in the OpenSSL library- RC4 support has been replaced with ARC4 support from OpenSSL- Blowfish is now external, in the OpenSSL library[The licence continues]Note that any information and cryptographic algorithms used in this software are publicly available on theInternet and at any major bookstore, scientific library, and patent office worldwide. More information canbe found e.g. at "http://www.cs.hut.fi/crypto".The legal status of this program is some combination of all these permissions and restrictions. Use only atyour own responsibility. You will be responsible for any legal consequences yourself; I am not making anyclaims whether possessing or using this is legal or not in your country, and I am not taking any responsibilityon your behalf.NO WARRANTYBECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THEPROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATEDIN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS"WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOTLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITHYOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARYSERVICING, REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW ORAGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAYMODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FORDAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGESARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITEDTO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU ORTHIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVENIF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.2)The 32-bit CRC compensation attack detector in deattack.c was contributed by CORE SDI S.A. under aBSD-style license.Cryptographic attack detector for ssh - source codeCopyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.All rights reserved.Redistribution and use in source and binary forms, with or without modification, are permitted providedthat this copyright notice is retained.8. Appendix3788