1This product includes software developed by Paul Mackerras <paulus@samba.org>
2This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/).
3This product includes software developed by Pedro Roque Marques <pedro_m@yahoo.com>
4This product includes software developed by Tommi Komulainen <Tommi.Komulainen@iki.fi>
5
6Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
7
8Redistribution and use in source and binary forms, with or without
9modification, are permitted provided that the following conditions
10are met:
11
121. Redistributions of source code must retain the above copyright
13   notice, this list of conditions and the following disclaimer.
14
152. Redistributions in binary form must reproduce the above copyright
16   notice, this list of conditions and the following disclaimer in
17   the documentation and/or other materials provided with the
18   distribution.
19
203. The name "Carnegie Mellon University" must not be used to
21   endorse or promote products derived from this software without
22   prior written permission. For permission or any legal
23   details, please contact
24     Office of Technology Transfer
25     Carnegie Mellon University
26     5000 Forbes Avenue
27     Pittsburgh, PA  15213-3890
28     (412) 268-4387, fax: (412) 268-7395
29     tech-transfer@andrew.cmu.edu
30
314. Redistributions of any form whatsoever must retain the following
32   acknowledgment:
33   "This product includes software developed by Computing Services
34    at Carnegie Mellon University (http://www.cmu.edu/computing/)."
35
36CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
37THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
38AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
39FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
40WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
41AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
42OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
43
44Copyright (c) 1995 Pedro Roque Marques.  All rights reserved.
45
46Redistribution and use in source and binary forms, with or without
47modification, are permitted provided that the following conditions
48are met:
49
501. Redistributions of source code must retain the above copyright
51   notice, this list of conditions and the following disclaimer.
52
532. Redistributions in binary form must reproduce the above copyright
54   notice, this list of conditions and the following disclaimer in
55   the documentation and/or other materials provided with the
56   distribution.
57
583. The names of the authors of this software must not be used to
59   endorse or promote products derived from this software without
60   prior written permission.
61
624. Redistributions of any form whatsoever must retain the following
63   acknowledgment:
64   "This product includes software developed by Pedro Roque Marques
65    <pedro_m@yahoo.com>"
66
67THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
68THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
69AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
70SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
71WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
72AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
73OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
74
75Copyright (C) 2000-2004 Paul Mackerras. All rights reserved.
76Copyright (c) 1994-2002 Paul Mackerras. All rights reserved.
77Copyright (c) 2003 Paul Mackerras. All rights reserved.
78Copyright (c) 1996-2002 Paul Mackerras. All rights reserved.
79Copyright (c) 1999-2004 Paul Mackerras. All rights reserved.
80Copyright (c) 2000-2002 Paul Mackerras. All rights reserved.
81Copyright (c) 1999-2002 Paul Mackerras. All rights reserved.
82
83Redistribution and use in source and binary forms, with or without
84modification, are permitted provided that the following conditions
85are met:
86
871. Redistributions of source code must retain the above copyright
88   notice, this list of conditions and the following disclaimer.
89
902. The name(s) of the authors of this software must not be used to
91   endorse or promote products derived from this software without
92   prior written permission.
93
943. Redistributions of any form whatsoever must retain the following
95   acknowledgment:
96   "This product includes software developed by Paul Mackerras
97    <paulus@samba.org>".
98
99THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
100THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
101AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
102SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
103WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
104AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
105OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
106
107Copyright (c) 1995 Eric Rosenquist.  All rights reserved.
108Copyright (c) 2002 The Android Open Source Project
109
110Redistribution and use in source and binary forms, with or without
111modification, are permitted provided that the following conditions
112are met:
113
1141. Redistributions of source code must retain the above copyright
115   notice, this list of conditions and the following disclaimer.
116
1172. Redistributions in binary form must reproduce the above copyright
118   notice, this list of conditions and the following disclaimer in
119   the documentation and/or other materials provided with the
120   distribution.
121
1223. The name(s) of the authors of this software must not be used to
123   endorse or promote products derived from this software without
124   prior written permission.
125
126THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
127THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
128AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
129SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
130WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
131AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
132OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
133
134
135Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.
136
137License to copy and use this software is granted provided that
138it is identified as the "RSA Data Security, Inc. MD5 Message-
139Digest Algorithm" in all material mentioning or referencing this
140software or this function.
141
142License is also granted to make and use derivative works
143provided that such works are identified as "derived from the RSA
144Data Security, Inc. MD5 Message-Digest Algorithm" in all
145material mentioning or referencing the derived work.
146
147RSA Data Security, Inc. makes no representations concerning
148either the merchantability of this software or the suitability
149of this software for any particular purpose.  It is provided "as
150is" without express or implied warranty of any kind.
151
152These notices must be retained in any copies of any part of this
153documentation and/or software.
154
155Copyright (c) 2001 by Sun Microsystems, Inc.
156All rights reserved.
157
158Non-exclusive rights to redistribute, modify, translate, and use
159this software in source and binary forms, in whole or in part, is
160hereby granted, provided that the above copyright notice is
161duplicated in any source form, and that neither the name of the
162copyright holder nor the author is used to endorse or promote
163products derived from this software.
164
165THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
166IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
167WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
168
169Copyright (c) 1999 Tommi Komulainen.  All rights reserved.
170
171Redistribution and use in source and binary forms, with or without
172modification, are permitted provided that the following conditions
173are met:
174
1751. Redistributions of source code must retain the above copyright
176   notice, this list of conditions and the following disclaimer.
177
1782. Redistributions in binary form must reproduce the above copyright
179   notice, this list of conditions and the following disclaimer in
180   the documentation and/or other materials provided with the
181   distribution.
182
1833. The name(s) of the authors of this software must not be used to
184   endorse or promote products derived from this software without
185   prior written permission.
186
1874. Redistributions of any form whatsoever must retain the following
188   acknowledgment:
189   "This product includes software developed by Tommi Komulainen
190    <Tommi.Komulainen@iki.fi>".
191
192THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
193THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
194AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
195SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
196WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
197AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
198OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
199
200Copyright (c) 1995, 1996, 1997 Francis.Dupont@inria.fr, INRIA Rocquencourt,
201Alain.Durand@imag.fr, IMAG,
202Jean-Luc.Richier@imag.fr, IMAG-LSR.
203
204Copyright (c) 1998, 1999 Francis.Dupont@inria.fr, GIE DYADE,
205Alain.Durand@imag.fr, IMAG,
206Jean-Luc.Richier@imag.fr, IMAG-LSR.
207
208Ce travail a �t� fait au sein du GIE DYADE (Groupement d'Int�r�t
209�conomique ayant pour membres BULL S.A. et l'INRIA).
210
211Ce logiciel informatique est disponible aux conditions
212usuelles dans la recherche, c'est-�-dire qu'il peut
213�tre utilis�, copi�, modifi�, distribu� � l'unique
214condition que ce texte soit conserv� afin que
215l'origine de ce logiciel soit reconnue.
216
217Le nom de l'Institut National de Recherche en Informatique
218et en Automatique (INRIA), de l'IMAG, ou d'une personne morale
219ou physique ayant particip� � l'�laboration de ce logiciel ne peut
220�tre utilis� sans son accord pr�alable explicite.
221
222Ce logiciel est fourni tel quel sans aucune garantie,
223support ou responsabilit� d'aucune sorte.
224Ce logiciel est d�riv� de sources d'origine
225"University of California at Berkeley" et
226"Digital Equipment Corporation" couvertes par des copyrights.
227
228L'Institut d'Informatique et de Math�matiques Appliqu�es de Grenoble (IMAG)
229est une f�d�ration d'unit�s mixtes de recherche du CNRS, de l'Institut National
230Polytechnique de Grenoble et de l'Universit� Joseph Fourier regroupant
231sept laboratoires dont le laboratoire Logiciels, Syst�mes, R�seaux (LSR).
232
233This work has been done in the context of GIE DYADE (joint R & D venture
234between BULL S.A. and INRIA).
235
236This software is available with usual "research" terms
237with the aim of retain credits of the software.
238Permission to use, copy, modify and distribute this software for any
239purpose and without fee is hereby granted, provided that the above
240copyright notice and this permission notice appear in all copies,
241and the name of INRIA, IMAG, or any contributor not be used in advertising
242or publicity pertaining to this material without the prior explicit
243permission. The software is provided "as is" without any
244warranties, support or liabilities of any kind.
245This software is derived from source code from
246"University of California at Berkeley" and
247"Digital Equipment Corporation" protected by copyrights.
248
249Grenoble's Institute of Computer Science and Applied Mathematics (IMAG)
250is a federation of seven research units funded by the CNRS, National
251Polytechnic Institute of Grenoble and University Joseph Fourier.
252The research unit in Software, Systems, Networks (LSR) is member of IMAG.
253