This file is indexed.

/usr/share/doc/chrony/copyright is in chrony 2.1.1-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
Format: http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: chrony
Upstream-Contact: Miroslav Lichvar <mlichvar@redhat.com>
Source: http://download.tuxfamily.org/chrony/

Files: *
Copyright: 2009-2015, Miroslav Lichvar
           1997-2007, Richard P. Curnow
License: GPL-2

Files: main.c
       sys_linux.c
Copyright: 2009-2014, Miroslav Lichvar
           2009, John G. Hasler
           1997-2003, Richard P. Curnow
License: GPL-2

Files: ntp_io.c
Copyright: 2009-2015, Miroslav Lichvar
           2009, Timo Teras
           1997-2003, Richard P. Curnow
License: GPL-2

Files: sys_macosx.?
Copyright: 2015, Bryan Christianson
           2001, J. Hannken-Illjes
           1997-2001, Richard P. Curnow
License: GPL-2

Files: sys_netbsd.?
Copyright: 2001, J. Hannken-Illjes
           1997-2001, Richard P. Curnow
License: GPL-2

Files: debian/*
Copyright: 2015, Vincent Blut
           2012-2014, Joachim Wiedorn
           2000-2012, John Hasler
License: GPL-2

Files: test/simulation/test.common
Copyright: 2013-2014, Miroslav Lichvar
License: GPL-2+

Files: md5.*
Copyright: 1990, RSA Data Security, Inc. All rights reserved.
License: RSA-MD
  License to copy and use this software is granted provided that
  it is identified as the "RSA Data Security, Inc. MD5 Message-
  Digest Algorithm" in all material mentioning or referencing this
  software or this function.
  .
  License is also granted to make and use derivative works
  provided that such works are identified as "derived from the RSA
  Data Security, Inc. MD5 Message-Digest Algorithm" in all
  material mentioning or referencing the derived work.
  .
  RSA Data Security, Inc. makes no representations concerning
  either the merchantability of this software or the suitability
  of this software for any particular purpose.  It is provided "as
  is" without express or implied warranty of any kind.
  .
  These notices must be retained in any copies of any part of this
  documentation and/or software.

License: GPL-2
  This program is free software: you can redistribute it and/or modify
  it under the terms of the GNU General Public License version 2 as
  published by the Free Software Foundation.
  .
  This package is distributed in the hope that it will be useful,
  but WITHOUT ANY WARRANTY; without even the implied warranty of
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  GNU General Public License for more details.
  .
  You should have received a copy of the GNU General Public License
  along with this program.  If not, see <http://www.gnu.org/licenses/>.
  .
  On Debian systems, the complete text of the GNU General Public License
  version 2 can be found in the file `/usr/share/common-licenses/GPL-2'.

License: GPL-2+
  This package is free software; you can redistribute it and/or modify
  it under the terms of the GNU General Public License as published by
  the Free Software Foundation; either version 2 of the License, or
  (at your option) any later version.
  .
  This package is distributed in the hope that it will be useful,
  but WITHOUT ANY WARRANTY; without even the implied warranty of
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  GNU General Public License for more details.
  .
  You should have received a copy of the GNU General Public License
  along with this program. If not, see <http://www.gnu.org/licenses/>
  .
  On Debian systems, the complete text of the GNU General Public License
  version 2 can be found in `/usr/share/common-licenses/GPL-2'.