1 This product includes software developed by Paul Mackerras <paulus@samba.org>
2 This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/).
3 This product includes software developed by Pedro Roque Marques <pedro_m@yahoo.com>
4 This product includes software developed by Tommi Komulainen <Tommi.Komulainen@iki.fi>
6 Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
8 Redistribution and use in source and binary forms, with or without
9 modification, are permitted provided that the following conditions
12 1. Redistributions of source code must retain the above copyright
13 notice, this list of conditions and the following disclaimer.
15 2. Redistributions in binary form must reproduce the above copyright
16 notice, this list of conditions and the following disclaimer in
17 the documentation and/or other materials provided with the
20 3. The name "Carnegie Mellon University" must not be used to
21 endorse or promote products derived from this software without
22 prior written permission. For permission or any legal
23 details, please contact
24 Office of Technology Transfer
25 Carnegie Mellon University
27 Pittsburgh, PA 15213-3890
28 (412) 268-4387, fax: (412) 268-7395
29 tech-transfer@andrew.cmu.edu
31 4. Redistributions of any form whatsoever must retain the following
33 "This product includes software developed by Computing Services
34 at Carnegie Mellon University (http://www.cmu.edu/computing/)."
36 CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
37 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
38 AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
39 FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
40 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
41 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
42 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
44 Copyright (c) 1995 Pedro Roque Marques. All rights reserved.
46 Redistribution and use in source and binary forms, with or without
47 modification, are permitted provided that the following conditions
50 1. Redistributions of source code must retain the above copyright
51 notice, this list of conditions and the following disclaimer.
53 2. Redistributions in binary form must reproduce the above copyright
54 notice, this list of conditions and the following disclaimer in
55 the documentation and/or other materials provided with the
58 3. The names of the authors of this software must not be used to
59 endorse or promote products derived from this software without
60 prior written permission.
62 4. Redistributions of any form whatsoever must retain the following
64 "This product includes software developed by Pedro Roque Marques
67 THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
68 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
69 AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
70 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
71 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
72 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
73 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
75 Copyright (C) 2000-2004 Paul Mackerras. All rights reserved.
76 Copyright (c) 1994-2002 Paul Mackerras. All rights reserved.
77 Copyright (c) 2003 Paul Mackerras. All rights reserved.
78 Copyright (c) 1996-2002 Paul Mackerras. All rights reserved.
79 Copyright (c) 1999-2004 Paul Mackerras. All rights reserved.
80 Copyright (c) 2000-2002 Paul Mackerras. All rights reserved.
81 Copyright (c) 1999-2002 Paul Mackerras. All rights reserved.
83 Redistribution and use in source and binary forms, with or without
84 modification, are permitted provided that the following conditions
87 1. Redistributions of source code must retain the above copyright
88 notice, this list of conditions and the following disclaimer.
90 2. The name(s) of the authors of this software must not be used to
91 endorse or promote products derived from this software without
92 prior written permission.
94 3. Redistributions of any form whatsoever must retain the following
96 "This product includes software developed by Paul Mackerras
99 THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
100 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
101 AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
102 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
103 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
104 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
105 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
107 Copyright (c) 1995 Eric Rosenquist. All rights reserved.
108 Copyright (c) 2002 The Android Open Source Project
110 Redistribution and use in source and binary forms, with or without
111 modification, are permitted provided that the following conditions
114 1. Redistributions of source code must retain the above copyright
115 notice, this list of conditions and the following disclaimer.
117 2. Redistributions in binary form must reproduce the above copyright
118 notice, this list of conditions and the following disclaimer in
119 the documentation and/or other materials provided with the
122 3. The name(s) of the authors of this software must not be used to
123 endorse or promote products derived from this software without
124 prior written permission.
126 THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
127 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
128 AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
129 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
130 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
131 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
132 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
135 Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.
137 License to copy and use this software is granted provided that
138 it is identified as the "RSA Data Security, Inc. MD5 Message-
139 Digest Algorithm" in all material mentioning or referencing this
140 software or this function.
142 License is also granted to make and use derivative works
143 provided that such works are identified as "derived from the RSA
144 Data Security, Inc. MD5 Message-Digest Algorithm" in all
145 material mentioning or referencing the derived work.
147 RSA Data Security, Inc. makes no representations concerning
148 either the merchantability of this software or the suitability
149 of this software for any particular purpose. It is provided "as
150 is" without express or implied warranty of any kind.
152 These notices must be retained in any copies of any part of this
153 documentation and/or software.
155 Copyright (c) 2001 by Sun Microsystems, Inc.
158 Non-exclusive rights to redistribute, modify, translate, and use
159 this software in source and binary forms, in whole or in part, is
160 hereby granted, provided that the above copyright notice is
161 duplicated in any source form, and that neither the name of the
162 copyright holder nor the author is used to endorse or promote
163 products derived from this software.
165 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
166 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
167 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
169 Copyright (c) 1999 Tommi Komulainen. All rights reserved.
171 Redistribution and use in source and binary forms, with or without
172 modification, are permitted provided that the following conditions
175 1. Redistributions of source code must retain the above copyright
176 notice, this list of conditions and the following disclaimer.
178 2. Redistributions in binary form must reproduce the above copyright
179 notice, this list of conditions and the following disclaimer in
180 the documentation and/or other materials provided with the
183 3. The name(s) of the authors of this software must not be used to
184 endorse or promote products derived from this software without
185 prior written permission.
187 4. Redistributions of any form whatsoever must retain the following
189 "This product includes software developed by Tommi Komulainen
190 <Tommi.Komulainen@iki.fi>".
192 THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
193 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
194 AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
195 SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
196 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
197 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
198 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
200 Copyright (c) 1995, 1996, 1997 Francis.Dupont@inria.fr, INRIA Rocquencourt,
201 Alain.Durand@imag.fr, IMAG,
202 Jean-Luc.Richier@imag.fr, IMAG-LSR.
204 Copyright (c) 1998, 1999 Francis.Dupont@inria.fr, GIE DYADE,
205 Alain.Durand@imag.fr, IMAG,
206 Jean-Luc.Richier@imag.fr, IMAG-LSR.
208 Ce travail a été fait au sein du GIE DYADE (Groupement d'Intérêt
209 Économique ayant pour membres BULL S.A. et l'INRIA).
211 Ce logiciel informatique est disponible aux conditions
212 usuelles dans la recherche, c'est-à-dire qu'il peut
213 être utilisé, copié, modifié, distribué à l'unique
214 condition que ce texte soit conservé afin que
215 l'origine de ce logiciel soit reconnue.
217 Le nom de l'Institut National de Recherche en Informatique
218 et en Automatique (INRIA), de l'IMAG, ou d'une personne morale
219 ou physique ayant participé à l'élaboration de ce logiciel ne peut
220 être utilisé sans son accord préalable explicite.
222 Ce logiciel est fourni tel quel sans aucune garantie,
223 support ou responsabilité d'aucune sorte.
224 Ce logiciel est dérivé de sources d'origine
225 "University of California at Berkeley" et
226 "Digital Equipment Corporation" couvertes par des copyrights.
228 L'Institut d'Informatique et de Mathématiques Appliquées de Grenoble (IMAG)
229 est une fédération d'unités mixtes de recherche du CNRS, de l'Institut National
230 Polytechnique de Grenoble et de l'Université Joseph Fourier regroupant
231 sept laboratoires dont le laboratoire Logiciels, Systèmes, Réseaux (LSR).
233 This work has been done in the context of GIE DYADE (joint R & D venture
234 between BULL S.A. and INRIA).
236 This software is available with usual "research" terms
237 with the aim of retain credits of the software.
238 Permission to use, copy, modify and distribute this software for any
239 purpose and without fee is hereby granted, provided that the above
240 copyright notice and this permission notice appear in all copies,
241 and the name of INRIA, IMAG, or any contributor not be used in advertising
242 or publicity pertaining to this material without the prior explicit
243 permission. The software is provided "as is" without any
244 warranties, support or liabilities of any kind.
245 This software is derived from source code from
246 "University of California at Berkeley" and
247 "Digital Equipment Corporation" protected by copyrights.
249 Grenoble's Institute of Computer Science and Applied Mathematics (IMAG)
250 is a federation of seven research units funded by the CNRS, National
251 Polytechnic Institute of Grenoble and University Joseph Fourier.
252 The research unit in Software, Systems, Networks (LSR) is member of IMAG.