summaryrefslogtreecommitdiff
path: root/yocto-poky/meta/files/common-licenses/AAL
diff options
context:
space:
mode:
Diffstat (limited to 'yocto-poky/meta/files/common-licenses/AAL')
-rw-r--r--yocto-poky/meta/files/common-licenses/AAL51
1 files changed, 0 insertions, 51 deletions
diff --git a/yocto-poky/meta/files/common-licenses/AAL b/yocto-poky/meta/files/common-licenses/AAL
deleted file mode 100644
index 54842265f..000000000
--- a/yocto-poky/meta/files/common-licenses/AAL
+++ /dev/null
@@ -1,51 +0,0 @@
-
-Attribution Assurance License
-Copyright (c) 2002 by AUTHOR
-PROFESSIONAL IDENTIFICATION * URL
-"PROMOTIONAL SLOGAN FOR AUTHOR`S PROFESSIONAL PRACTICE"
-
-All Rights Reserved
-ATTRIBUTION ASSURANCE LICENSE (adapted from the original BSD license)
-Redistribution and use in source and binary forms, with or without
-modification, are permitted provided that the conditions below are met.
-These conditions require a modest attribution to <AUTHOR> (the
-"Author"), who hopes that its promotional value may help justify the
-thousands of dollars in otherwise billable time invested in writing
-this and other freely available, open-source software.
-
-1. Redistributions of source code, in whole or part and with or without
-modification (the "Code"), must prominently display this GPG-signed
-text in verifiable form.
-2. Redistributions of the Code in binary form must be accompanied by
-this GPG-signed text in any documentation and, each time the resulting
-executable program or a program dependent thereon is launched, a
-prominent display (e.g., splash screen or banner text) of the Author`s
-attribution information, which includes:
-(a) Name ("AUTHOR"),
-(b) Professional identification ("PROFESSIONAL IDENTIFICATION"), and
-(c) URL ("URL").
-3. Neither the name nor any trademark of the Author may be used to
-endorse or promote products derived from this software without specific
-prior written permission.
-4. Users are entirely responsible, to the exclusion of the Author and
-any other persons, for compliance with (1) regulations set by owners or
-administrators of employed equipment, (2) licensing terms of any other
-software, and (3) local regulations regarding use, including those
-regarding import, export, and use of encryption software.
-
-THIS FREE SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND
-ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
-LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
-FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
-EVENT SHALL THE AUTHOR OR ANY CONTRIBUTOR BE LIABLE FOR
-ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
-CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
-EFFECTS OF UNAUTHORIZED OR MALICIOUS NETWORK ACCESS;
-PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
-AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
-ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
-IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---End of License
-