1This product includes software developed by Paul Mackerras <paulus@samba.org> 2This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/). 3This product includes software developed by Pedro Roque Marques <pedro_m@yahoo.com> 4This product includes software developed by Tommi Komulainen <Tommi.Komulainen@iki.fi> 5 6Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved. 7 8Redistribution and use in source and binary forms, with or without 9modification, are permitted provided that the following conditions 10are met: 11 121. Redistributions of source code must retain the above copyright 13 notice, this list of conditions and the following disclaimer. 14 152. Redistributions in binary form must reproduce the above copyright 16 notice, this list of conditions and the following disclaimer in 17 the documentation and/or other materials provided with the 18 distribution. 19 203. The name "Carnegie Mellon University" must not be used to 21 endorse or promote products derived from this software without 22 prior written permission. For permission or any legal 23 details, please contact 24 Office of Technology Transfer 25 Carnegie Mellon University 26 5000 Forbes Avenue 27 Pittsburgh, PA 15213-3890 28 (412) 268-4387, fax: (412) 268-7395 29 tech-transfer@andrew.cmu.edu 30 314. Redistributions of any form whatsoever must retain the following 32 acknowledgment: 33 "This product includes software developed by Computing Services 34 at Carnegie Mellon University (http://www.cmu.edu/computing/)." 35 36CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO 37THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 38AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE 39FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 40WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN 41AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 42OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 43 44Copyright (c) 1995 Pedro Roque Marques. All rights reserved. 45 46Redistribution and use in source and binary forms, with or without 47modification, are permitted provided that the following conditions 48are met: 49 501. Redistributions of source code must retain the above copyright 51 notice, this list of conditions and the following disclaimer. 52 532. Redistributions in binary form must reproduce the above copyright 54 notice, this list of conditions and the following disclaimer in 55 the documentation and/or other materials provided with the 56 distribution. 57 583. The names of the authors of this software must not be used to 59 endorse or promote products derived from this software without 60 prior written permission. 61 624. Redistributions of any form whatsoever must retain the following 63 acknowledgment: 64 "This product includes software developed by Pedro Roque Marques 65 <pedro_m@yahoo.com>" 66 67THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO 68THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 69AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY 70SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 71WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN 72AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 73OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 74 75Copyright (C) 2000-2004 Paul Mackerras. All rights reserved. 76Copyright (c) 1994-2002 Paul Mackerras. All rights reserved. 77Copyright (c) 2003 Paul Mackerras. All rights reserved. 78Copyright (c) 1996-2002 Paul Mackerras. All rights reserved. 79Copyright (c) 1999-2004 Paul Mackerras. All rights reserved. 80Copyright (c) 2000-2002 Paul Mackerras. All rights reserved. 81Copyright (c) 1999-2002 Paul Mackerras. All rights reserved. 82 83Redistribution and use in source and binary forms, with or without 84modification, are permitted provided that the following conditions 85are met: 86 871. Redistributions of source code must retain the above copyright 88 notice, this list of conditions and the following disclaimer. 89 902. The name(s) of the authors of this software must not be used to 91 endorse or promote products derived from this software without 92 prior written permission. 93 943. Redistributions of any form whatsoever must retain the following 95 acknowledgment: 96 "This product includes software developed by Paul Mackerras 97 <paulus@samba.org>". 98 99THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO 100THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 101AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY 102SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 103WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN 104AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 105OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 106 107Copyright (c) 1995 Eric Rosenquist. All rights reserved. 108Copyright (c) 2002 The Android Open Source Project 109 110Redistribution and use in source and binary forms, with or without 111modification, are permitted provided that the following conditions 112are met: 113 1141. Redistributions of source code must retain the above copyright 115 notice, this list of conditions and the following disclaimer. 116 1172. Redistributions in binary form must reproduce the above copyright 118 notice, this list of conditions and the following disclaimer in 119 the documentation and/or other materials provided with the 120 distribution. 121 1223. The name(s) of the authors of this software must not be used to 123 endorse or promote products derived from this software without 124 prior written permission. 125 126THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO 127THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 128AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY 129SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 130WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN 131AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 132OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 133 134 135Copyright (C) 1990, RSA Data Security, Inc. All rights reserved. 136 137License to copy and use this software is granted provided that 138it is identified as the "RSA Data Security, Inc. MD5 Message- 139Digest Algorithm" in all material mentioning or referencing this 140software or this function. 141 142License is also granted to make and use derivative works 143provided that such works are identified as "derived from the RSA 144Data Security, Inc. MD5 Message-Digest Algorithm" in all 145material mentioning or referencing the derived work. 146 147RSA Data Security, Inc. makes no representations concerning 148either the merchantability of this software or the suitability 149of this software for any particular purpose. It is provided "as 150is" without express or implied warranty of any kind. 151 152These notices must be retained in any copies of any part of this 153documentation and/or software. 154 155Copyright (c) 2001 by Sun Microsystems, Inc. 156All rights reserved. 157 158Non-exclusive rights to redistribute, modify, translate, and use 159this software in source and binary forms, in whole or in part, is 160hereby granted, provided that the above copyright notice is 161duplicated in any source form, and that neither the name of the 162copyright holder nor the author is used to endorse or promote 163products derived from this software. 164 165THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 166IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 167WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 168 169Copyright (c) 1999 Tommi Komulainen. All rights reserved. 170 171Redistribution and use in source and binary forms, with or without 172modification, are permitted provided that the following conditions 173are met: 174 1751. Redistributions of source code must retain the above copyright 176 notice, this list of conditions and the following disclaimer. 177 1782. Redistributions in binary form must reproduce the above copyright 179 notice, this list of conditions and the following disclaimer in 180 the documentation and/or other materials provided with the 181 distribution. 182 1833. The name(s) of the authors of this software must not be used to 184 endorse or promote products derived from this software without 185 prior written permission. 186 1874. Redistributions of any form whatsoever must retain the following 188 acknowledgment: 189 "This product includes software developed by Tommi Komulainen 190 <Tommi.Komulainen@iki.fi>". 191 192THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO 193THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 194AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY 195SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 196WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN 197AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 198OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 199 200Copyright (c) 1995, 1996, 1997 Francis.Dupont@inria.fr, INRIA Rocquencourt, 201Alain.Durand@imag.fr, IMAG, 202Jean-Luc.Richier@imag.fr, IMAG-LSR. 203 204Copyright (c) 1998, 1999 Francis.Dupont@inria.fr, GIE DYADE, 205Alain.Durand@imag.fr, IMAG, 206Jean-Luc.Richier@imag.fr, IMAG-LSR. 207 208Ce travail a �t� fait au sein du GIE DYADE (Groupement d'Int�r�t 209�conomique ayant pour membres BULL S.A. et l'INRIA). 210 211Ce logiciel informatique est disponible aux conditions 212usuelles dans la recherche, c'est-�-dire qu'il peut 213�tre utilis�, copi�, modifi�, distribu� � l'unique 214condition que ce texte soit conserv� afin que 215l'origine de ce logiciel soit reconnue. 216 217Le nom de l'Institut National de Recherche en Informatique 218et en Automatique (INRIA), de l'IMAG, ou d'une personne morale 219ou physique ayant particip� � l'�laboration de ce logiciel ne peut 220�tre utilis� sans son accord pr�alable explicite. 221 222Ce logiciel est fourni tel quel sans aucune garantie, 223support ou responsabilit� d'aucune sorte. 224Ce logiciel est d�riv� de sources d'origine 225"University of California at Berkeley" et 226"Digital Equipment Corporation" couvertes par des copyrights. 227 228L'Institut d'Informatique et de Math�matiques Appliqu�es de Grenoble (IMAG) 229est une f�d�ration d'unit�s mixtes de recherche du CNRS, de l'Institut National 230Polytechnique de Grenoble et de l'Universit� Joseph Fourier regroupant 231sept laboratoires dont le laboratoire Logiciels, Syst�mes, R�seaux (LSR). 232 233This work has been done in the context of GIE DYADE (joint R & D venture 234between BULL S.A. and INRIA). 235 236This software is available with usual "research" terms 237with the aim of retain credits of the software. 238Permission to use, copy, modify and distribute this software for any 239purpose and without fee is hereby granted, provided that the above 240copyright notice and this permission notice appear in all copies, 241and the name of INRIA, IMAG, or any contributor not be used in advertising 242or publicity pertaining to this material without the prior explicit 243permission. The software is provided "as is" without any 244warranties, support or liabilities of any kind. 245This software is derived from source code from 246"University of California at Berkeley" and 247"Digital Equipment Corporation" protected by copyrights. 248 249Grenoble's Institute of Computer Science and Applied Mathematics (IMAG) 250is a federation of seven research units funded by the CNRS, National 251Polytechnic Institute of Grenoble and University Joseph Fourier. 252The research unit in Software, Systems, Networks (LSR) is member of IMAG. 253