Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Newer
Older
100644 161 lines (122 sloc) 7.384 kB
40342a9 @tbradshaw The Wolfenstein: Enemy Territory sources as originally released under…
tbradshaw authored
1 Wolfenstein: Enemy Territory GPL source release
2 ===============================================
3
4 This file contains the following sections:
5
6 GENERAL NOTES
7 LICENSE
8
9 GENERAL NOTES
10 =============
11
12 Game data and patching:
13 -----------------------
14
15 Wolfenstein: Enemy Territory is a free release, and can be downloaded from
16 http://www.splashdamage.com/content/wolfenstein-enemy-territory-barracks
17
18 This source release does not contain any game data, the game data is still
19 covered by the original EULA and must be obeyed as usual.
20
21 Install the latest version of the game for your platform to get the game data.
22
23 Compiling on win32:
24 -------------------
25
26 A Visual C++ 2008 project is provided in src\wolf.sln.
27 The solution file is compatible with the Express release of Visual C++.
28
29 In order to test your binaries, backup and remove Main\mp_bin.pk3, then replace
30 WolfMP.exe, Main\qagame_mp_x86.dll, Main\cgame_mp_x86.dll, Main\ui_mp_x86.dll
31 by your compiled versions. When starting the server make sure to specify
32 'Pure Server: No' in the advanced settings page.
33
34 Compiling on GNU/Linux x86:
35 ---------------------------
36
37 Get scons from http://scons.org/ if your favorite distribution doesn't
38 package it.
39
40 run scons from the src/ directory. see scons --help for build options
41
42 If any problems occur, consult the internet.
43
44 Other platforms, updated source code, security issues:
45 ------------------------------------------------------
46
47 If you have obtained this source code several weeks after the time of release
48 (August 2010), it is likely that you can find modified and improved
49 versions of the engine in various open source projects across the internet.
50 Depending what is your interest with the source code, those may be a better
51 starting point.
52
53
54 LICENSE
55 =======
56
57 See COPYING.txt for the GNU GENERAL PUBLIC LICENSE
58
59 ADDITIONAL TERMS: The Wolfenstein: Enemy Territory GPL Source Code is also subject to certain additional terms. You should have received a copy of these additional terms immediately following the terms and conditions of the GNU GPL which accompanied the Wolf ET Source Code. If not, please request a copy in writing from id Software at id Software LLC, c/o ZeniMax Media Inc., Suite 120, Rockville, Maryland 20850 USA.
60
61 EXCLUDED CODE: The code described below and contained in the Wolfenstein: Enemy Territory GPL Source Code release is not part of the Program covered by the GPL and is expressly excluded from its terms. You are solely responsible for obtaining from the copyright holder a license for such code and complying with the applicable license terms.
62
63 IO on .zip files using portions of zlib
64 ---------------------------------------------------------------------------
65 lines file(s)
66 4301 src/qcommon/unzip.c
67 Copyright (C) 1998 Gilles Vollant
68 zlib is Copyright (C) 1995-1998 Jean-loup Gailly and Mark Adler
69
70 This software is provided 'as-is', without any express or implied
71 warranty. In no event will the authors be held liable for any damages
72 arising from the use of this software.
73
74 Permission is granted to anyone to use this software for any purpose,
75 including commercial applications, and to alter it and redistribute it
76 freely, subject to the following restrictions:
77
78 1. The origin of this software must not be misrepresented; you must not
79 claim that you wrote the original software. If you use this software
80 in a product, an acknowledgment in the product documentation would be
81 appreciated but is not required.
82 2. Altered source versions must be plainly marked as such, and must not be
83 misrepresented as being the original software.
84 3. This notice may not be removed or altered from any source distribution.
85
86 MD4 Message-Digest Algorithm
87 -----------------------------------------------------------------------------
88 lines file(s)
89 289 src/qcommon/md4.c
90 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
91
92 License to copy and use this software is granted provided that it is identified
93 as the <93>RSA Data Security, Inc. MD4 Message-Digest Algorithm<94> in all mater
94 ial mentioning or referencing this software or this function.
95 License is also granted to make and use derivative works provided that such work
96 s are identified as <93>derived from the RSA Data Security, Inc. MD4 Message-Dig
97 est Algorithm<94> in all material mentioning or referencing the derived work.
98 RSA Data Security, Inc. makes no representations concerning either the merchanta
99 bility of this software or the suitability of this software for any particular p
100 urpose. It is provided <93>as is<94> without express or implied warranty of any
101 kind.
102
103 JPEG library
104 -----------------------------------------------------------------------------
105 src/jpeg-6
106 Copyright (C) 1991-1995, Thomas G. Lane
107
108 Permission is hereby granted to use, copy, modify, and distribute this
109 software (or portions thereof) for any purpose, without fee, subject to these
110 conditions:
111 (1) If any part of the source code for this software is distributed, then this
112 README file must be included, with this copyright and no-warranty notice
113 unaltered; and any additions, deletions, or changes to the original files
114 must be clearly indicated in accompanying documentation.
115 (2) If only executable code is distributed, then the accompanying
116 documentation must state that "this software is based in part on the work of
117 the Independent JPEG Group".
118 (3) Permission for use of this software is granted only if the user accepts
119 full responsibility for any undesirable consequences; the authors accept
120 NO LIABILITY for damages of any kind.
121
122 These conditions apply to any software derived from or based on the IJG code,
123 not just to the unmodified library. If you use our work, you ought to
124 acknowledge us.
125
126 NOTE: unfortunately the README that came with our copy of the library has
127 been lost, so the one from release 6b is included instead. There are a few
128 'glue type' modifications to the library to make it easier to use from
129 the engine, but otherwise the dependency can be easily cleaned up to a
130 better release of the library.
131
132 CURL library
133 -----------------------------------------------------------------------------
134 src/curl-7.12.2
135 COPYRIGHT AND PERMISSION NOTICE
136
137 Copyright (c) 1996 - 2004, Daniel Stenberg, <daniel@haxx.se>.
138
139 All rights reserved.
140
141 Permission to use, copy, modify, and distribute this software for any purpose
142 with or without fee is hereby granted, provided that the above copyright
143 notice and this permission notice appear in all copies.
144
145 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
146 IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
147 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN
148 NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
149 DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
150 OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
151 OR OTHER DEALINGS IN THE SOFTWARE.
152
153 Except as contained in this notice, the name of a copyright holder shall not
154 be used in advertising or otherwise to promote the sale, use or other dealings
155 in this Software without prior written authorization of the copyright holder.
156
157 FT2 library
158 -----------------------------------------------------------------------------
159 src/ft2
160 The FT2 library is being used under the GPL v2 as indicated by its LICENSE.txt
Something went wrong with that request. Please try again.