Crypt algorithm status.. one more time
Doug Gwyn
gwyn at brl-smoke.ARPA
Thu Jun 9 11:48:06 AEST 1988
In article <5776 at megaron.arizona.edu> lm at megaron.arizona.edu (Larry McVoy) writes:
>you may reimplement the idea contained in the code and further more, you may
>do so by sitting down with the, say, unix code as your guide. You could not
>copy the code but you could look at the code to see how they did it.
That might be true of copyright but it's definitely not true for UNIX
source, which is protected as a "trade secret". Read your license.
More information about the Comp.unix.wizards
mailing list