English:
For Resellers: In
order to avoid infringements of the license conditions by the reseller or the
buyer these instructions and license conditions and accompanying CD – if
applicable - have to be forwarded to the buyers.
Deutsch:
An Wiederverkäufer: Diese
Hinweise und Lizenzbedingungen und beiliegende CD, falls anwendbar, müssen an
die Käufer weitergegeben werden, um Lizenzverstöße durch den Wiederverkäufer
und den Käufer zu vermeiden.
Français:
A l’attention des
revendeurs : ces informations, conditions de licence et, si applicable, le CD
joint doivent être remis aux clients afin d’éviter que le revendeur et
l’acheteur ne contreviennent aux dispositions de la licence.
Español:
A los revendedores:
Para prevenir violaciones de la licencia tanto por parte del revendedor como
del comprador, es obligatorio entregar al comprador estas indicaciones y
términos de licencia, así como el CD que se adjunta siempre que sea aplicable.
Italiano:
Ai rivenditori: queste
avvertenze, le condizioni di licenza e il CD allegato, se utilizzabile, devono
essere inoltrati agli acquirenti per evitare violazioni di licenze da parte dei
rivenditori e degli acquirenti.
中文:
适用于经销商:为避免经销商或买方违反许可条件,须将此说明和许可条件以及随附
CD(若适用)提供给买方。
1) Siemens License Conditions
Siemens Lizenzbedingungen
Conditions de licence Siemens
Términos de licencia de Siemens
Condizioni di licenza Siemens
西门子许可条件
General License Conditions for Software
Products for Automation and Drives
(2011-08-01)
1. Supply of Software to Licensee and
Granting of Rights to use the Software
1.1 These General License Conditions shall
exclusively apply to the delivery of Software for Automation and Drives to
the Licensee. General terms and conditions of the Licensee shall apply only
where expressly accepted in writing by us. The scope of delivery of the
Software shall be determined by the congruent mutual written declarations of
both parties. We shall grant the Licensee rights to use the software
specified in the Confirmation of Order or, if the Licensee does not receive a
Confirmation of Order, the software specified in the Certificate of License
or that specified in the Software Product Sheet, if the Licensee is instead
submitted a Software Product Sheet (hereinafter referred to as
"SW"). The Certificate of License and the Software Product Sheet
shall be collectively referred to as "CoL" hereinafter. The
Licensee shall be submitted the CoL when the SW is supplied or in conjunction
with the delivery bill. The way in which the SW is supplied is also derived
directly from the Confirmation of Order or from the SW purchase order number
contained in the Confirmation of Order, in conjunction with the associated
order data of our catalog valid at the time of the Confirmation of Order
(hereinafter collectively referred to as "Order Data"), or from the
CoL. If the Licensee does not receive a data medium, it shall be authorized
to copy the SW already available to it to the extent necessary to exercise
the rights to use the SW granted to it. The aforesaid shall apply, mutatis
mutandis, to electronic supply of the software (downloading). Where reference
is made to the Order Data or the CoL in these General License Conditions, the
reference to the CoL is of significance if the Licensee has not received a
Confirmation of Order. In any case, the data contained in the Order Data is
also contained in the CoL.
1.2 The Documentation relating to the SW
(hereinafter referred to as "Documentation") shall be purchased
separately, unless either the Order Data or CoL contains a stipulation
stating that it belongs to the scope of delivery. If the Licensee is
authorized to copy the SW in accordance with Clause 1.1, this shall also
apply to the Documentation provided that it is included in the scope of
delivery.
1.3 In the event that we submit a License
Key to the Licensee, which unlocks the SW (hereinafter referred to as
"License Key"), this License Key must also be installed.
1.4 The rights granted to the Licensee
with respect to the SW are based on the License Type (see Section 2) and the
Software Type (see Section 3). The license and Software Types are detailed in
the Order Data or CoL. If the SW is supplied electronically or if copying
rights are granted for it, the rights and duties specified in these General
License Conditions shall apply to the legitimately generated copies.
1.5 If the Licensee is legitimately in
possession of a previous SW version/release (hereinafter referred to as
"Previous Version"), the Licensee shall be authorized to exercise
the rights to use the SW granted to it either with respect to the SW or - if
this is intended from a technical point of view - to the Previous Version, at
its own discretion (downgrading). If the SW is an Upgrade or PowerPack in
accordance with Section 4, Section 4 shall apply additionally.
1.6 If Previous Versions are listed in the
Readme file of the SW under the category “parallel use”, the Licensee has the
right to exercise, alternatively to the user rights granted to him for the
SW, the user rights for the listed Previous Versions in one (1) Instance. If
the “Type of use” named in the Order Data or the CoL is: “Installation” or
“User”, the Licensee is entitled to the previously described right
additionally to and at the same time as the Previous Versions listed in one
Instance. An “Instance” in the context of these General License Conditions is
either an instance in a physical operating system environment or an instance
in a virtual operating system environment. The transferability of the user
rights onto Previous Versions is only permissible in conjunction with the
user rights for the SW in accordance with Clause 5.3.
1.7 In case the Licensee obtains only the
data media but no license as per the Order Data or the CoL, any use of the SW
by the Licensee is subject to the acquisition of a license according to
Section 2. Up to the acquisition of the license, the Licensee is not entitled
to supply the SW to third parties.
1.8 In case the SW contains Open Source
Software or any similar software of a third party (hereinafter referred to as
"OSS") the OSS is listed in the Readme_OSS-file of the SW. The
Licensee is entitled to use the OSS in accordance with the respective license
conditions of the OSS. The license conditions are provided on the same data
carrier as the SW. The license conditions of the respective OSS shall prevail
over these General License Conditions with respect to the OSS. If the license
conditions of the OSS require the distribution of the source code of such OSS
we shall provide such source code on request against payment of the shipping
and handling charges.
1.9 The SW may be or contain licensed
software other than OSS, i.e. software which has not been developed by us
itself but which has been licensed to us by a third party (hereinafter
referred to as the "Licensor"), e.g. Microsoft Licensing Inc. If
the Licensee receives the terms and conditions stipulated by the relevant
Licensor together with the SW in the Readme_OSS file in this case, such terms
and conditions shall apply with respect to the Licensor's liability vis-à-vis
the Licensee. Our own liability vis-à-vis the Licensee shall be governed in
any case by these General License Conditions.
2. License Type
Depending on the License Type, the
Licensee shall be granted the following rights to the SW:
2.1 Single License (One Off License, Copy
License)
The term "One Off License" or
"Copy License" which may be used in the Software Product Sheet
corresponds to the term "Single License". The following regulation
shall apply to the full scope of the One Off License / Copy License. The
Licensee shall be granted the non-exclusive right, transferable in accordance
with Clause 5.3 and valid for an unlimited period of time, to install the SW
in one (1) Instance and to utilize the SW thus installed in the manner
specified in the Order Data or CoL (see "Type of Use").
2.2 Floating License
The Licensee shall be granted the
non-exclusive right, transferable in accordance with Clause 5.3 and valid for
an unlimited period of time, to install the SW on any desired number of the
Licensee's hardware devices. The number of objects (for example, users or
devices) permitted to utilize the SW at the same time can be derived from the
Order Data or CoL (see "Type of Use).
2.3 Rental License
The Licensee shall be granted the
non-exclusive right, transferable in accordance with Clause 5.3 and limited
in time as stipulated in the Order Data or CoL (see "Type of Use"),
to install and use the SW in one (1) Instance. If the period of use is
specified in hours, the usage decisive for the calculation of the time limit
commences with the software start-up and finishes with its shut-down. If the
period of usage is specified in days, weeks or months, the specified period,
which commences in conjunction with the first SW start-up, shall apply
independently of the actual time of usage. If the period of use is specified
with a date, the right of use ends on this date – regardless of the actual
period of use.
2.4 Rental Floating License
The Licensee shall be granted the
non-exclusive right, transferable in accordance with Clause 5.3 and limited
in time as stipulated in the Order Data or the CoL (s. “Type of use”), to
install the SW on any desired number of the Licensee's hardware devices. The
number of objects (for example, users or devices) permitted to utilize the SW
at the same time can be derived from the Order Data or CoL (see "Type of
Use) as well. If the period of use is specified in hours, the usage decisive
for the calculation of the time limit commences with the software start-up
and finishes with its shut-down. If the period of usage is specified in days,
weeks or months, the specified period, which commences in conjunction with
the first SW start-up, shall apply independently of the actual time of usage.
If the period of use is specified with a date, the right of use ends on this
date – regardless of the actual period of use.
2.5 Demo License
The Licensee shall be granted the
non-exclusive right, transferable in accordance with Clause 5.3 and limited
in time as stipulated in the Order Data or the CoL (s. “Type of use”), to
install the SW in one (1) Instance and to use it for validation purposes. If
the period of usage is specified in days, weeks or months, the specified
period, which commences in conjunction with the first SW start-up, shall
apply independently of the actual time of usage. If the period of use is
specified with a date, the right of use ends on this date – regardless of the
actual period of use.
2.6 Demo Floating License
The Licensee shall be granted the
non-exclusive right, transferable in accordance with Clause 5.3 and limited
in time as stipulated in the Order Data or the CoL (s. “Type of use”), to
install the SW on any desired number of the Licensee's hardware devices. The
number of objects (for example, users or devices) permitted to utilize the SW
at the same time can be derived from the Order Data or CoL (see "Type of
Use) as well. If the period of usage is specified in days, weeks or months,
the specified period, which commences in conjunction with the first SW
start-up, shall apply independently of the actual time of usage. If the
period of use is specified with a date, the right of use ends on this date –
regardless of the actual period of use.
2.7 Trial License
The Licensee shall be granted the
non-exclusive and non-transferable right to install the SW in one (1) Instance
and to use it for validation purposes in the manner specified in the Order
Data or CoL (see "Type of Use"). The period of usage is limited to
14 days and commences with the SW start-up, unless a different period of
usage is specified in the Order Data or CoL.
3. Software Type
If the Software Type is not specified in
the Order Data or CoL, the rights specified in Clause 3.2 (Runtime Software)
shall apply to the SW.
3.1 Engineering Software (hereinafter
referred to as "E-SW")
In the event that the Licensee uses E-SW
to generate its own programs or data containing parts of the E-SW, the
Licensee shall have the right, without having to pay any license fee, to copy
and to use these parts of the E-SW as a part of its own programs or data, or
to supply them to third parties for use. In the event that such parts are
supplied to third parties for use, these parties shall be bound in writing to
comply with stipulations corresponding to those in Clauses 5.1 and 5.2 with
respect to the above parts of the E-SW.
3.2 Runtime Software (hereinafter referred
to as "R-SW")
If the Licensee incorporates R-SW or any
parts thereof into its own programs or data, it shall purchase a license with
respect to the R-SW each time it installs or copies - depending on what is
done first - its own programs or data containing R-SW or parts thereof, in
accordance with the relevant intended Type of Use and on the basis of the
Siemens catalog valid at that time. In the event that the Licensee supplies
the specified programs or data to third parties for their use, these parties
shall be bound in writing to adhere to stipulations corresponding to those in
Section 5, with respect to the R-SW parts contained therein. The aforesaid
shall not affect the Licensee's obligation to purchase a license for the R-SW
if the R-SW original is copied. If the R-SW contains tools for
parameterization/configuration and extended rights have been granted in this
regard, this will be detailed in the readme file of the R-SW.
4. Upgrade and PowerPack
If it is apparent from the Order Data or
CoL, e.g. by the addition "Upgrade" or “PowerPack” after the SW
product name, that the SW is an upgrade for another software item
(hereinafter referred to as "Source License"), the rights
originally granted to the Licensee to use the Source License end in
conjunction with the upgrade measure. The rights of use in accordance with Clause
1.6 remain unaffected by this. However, the Licensee is entitled to undo the
upgrading (downgrading) - if this is intended from a technical point of view
- and to exercise the rights to use the SW granted to it with respect to the
Source Version in accordance with Clause 1.5.
5. Further Rights and Duties of the
Licensee
5.1 Unless a stipulation to the contrary
relating to a specific number of copies is contained on the data medium or in
the readme file of the SW, the Licensee may generate an appropriate number of
copies of every item of SW which it is authorized to use in accordance with
these General License Conditions, where such copies shall be used exclusively
for data backup purposes. Furthermore the Licensee may only copy the SW if
and insofar as it has been granted copying rights by us in writing.
5.2 The Licensee shall not be entitled to
modify, decompile or reverse engineer the SW. Nor may it extract any
individual parts unless this is permitted by mandatory copyright law.
Furthermore, the Licensee shall not be entitled to remove any alphanumeric
identifiers, trademarks or copyright notices from the SW or the data medium
and, insofar as it is entitled to make copies of the SW, shall copy them
without alteration. The aforementioned regulation shall apply accordingly to
the Documentation supplied in accordance with Section 1.
5.3 The Licensee shall be entitled to
completely transfer the right to use the SW granted to it to a third party,
provided that it concludes a written agreement with the third party in conformance
with all of the conditions contained in this Section 5 and on the proviso
that it does not retain any copies of the SW. If the Licensee has received a
License Key for the SW, this key shall be supplied to the third party
together with the SW. Furthermore, the third party shall be submitted the CoL together with these General License Conditions. The Licensee shall submit the CoL received for the SW to us at any time, if requested.
5.4 If the SW is a PowerPack or an
Upgrade, the Licensee shall keep the CoL of the Source License and submit it
to us at any time, if requested, together with the CoL for the SW. In the
event that the Licensee transfers its right to use the PowerPack SW or
Upgrade SW in accordance with Clause 5.3, it shall also submit the CoL of the Source License to the third party.
5.5 If the Licensee receives a data medium
which, in addition to the SW, contains further software products which are
released for use, then it shall have the right to use these released software
products exclusively for validation purposes, for a limited period of time
and free of charge. The period of use shall be limited to 14 days, commencing
with the first start-up of the relevant software program unless a different
period is specified e.g. in the readme file of the relevant software product.
These software products supplied exclusively for validation purposes shall be
governed, mutatis mutandis, by the stipulations contained in these General
License Conditions. The Licensee shall not be authorized to pass on these
software products separately, i.e. without the SW, to a third party.
The
conditions of the purchase contract apply if not otherwise stipulated
hereafter for the Open Source Software.
|
Allgemeine Bedingungen
zur Überlassung von Software für Automatisierungs- und Antriebstechnik
(2011-08-01)
1. Überlassung der Software an Lizenznehmer und
Einräumung von Nutzungsrechten an der Software
1.1 Für die Überlassung von Software für
Automatisierungs- und Antriebstechnik durch uns an den Lizenznehmer gelten
ausschließlich diese Allgemeinen Bedingungen. Allgemeine Geschäftsbedingungen
des Lizenznehmers gelten nur insoweit, als wir ihnen ausdrücklich schriftlich
zugestimmt haben. Für den Umfang der Überlassung der Software sind die
beiderseitigen übereinstimmenden schriftlichen Erklärungen maßgebend. Wir
räumen dem Lizenznehmer Nutzungsrechte an der in der Auftragsbestätigung oder
- falls der Lizenznehmer keine Auftragsbestätigung erhält - an der im
Certificate of License oder - falls der Lizenznehmer anstelle des Certificate
of License einen Softwareproduktschein erhält - an der im
Softwareproduktschein genannten Software (nachfolgend "SW" genannt)
ein. Das Certificate of License und der Softwareproduktschein werden
nachfolgend zusammenfassend "CoL" genannt. Der Lizenznehmer erhält
das CoL mit der Überlassung der SW bzw. des Lieferscheins. Die Form der
Überlassung der SW ergibt sich ebenfalls direkt aus der Auftragsbestätigung
oder aus der in der Auftragsbestätigung enthaltenen Bestellnummer der SW in
Verbindung mit den dazugehörigen Bestelldaten unseres zum Zeitpunkt der
Auftragsbestätigung gültigen Katalogs (nachfolgend zusammenfassend
"Auftragsdaten" genannt) bzw. aus dem CoL. Erhält der Lizenznehmer keinen
Datenträger, ist er berechtigt, die bei ihm bereits vorhandene SW in dem zur
Ausübung der ihm eingeräumten Nutzungsrechte erforderlichen Umfang zu
vervielfältigen. Dies gilt entsprechend bei elektronischer Überlassung der SW
(downloading). Soweit in diesen Allgemeinen Bedingungen auf die Auftragsdaten
bzw. das CoL verwiesen wird, ist der Verweis auf das CoL dann von Bedeutung,
wenn der Lizenznehmer keine Auftragsbestätigung erhält. In jedem Fall sind
die in den Auftragsdaten enthaltenen Daten auch im CoL enthalten.
1.2 Die zu
der SW gehörende Dokumentation (nachfolgend "Dokumentation"
genannt) ist getrennt zu erwerben, es sei denn, es ergibt sich aus den
Auftragsdaten bzw. dem CoL, dass diese zum Lieferumfang gehört. Ist der
Lizenznehmer nach Ziffer 1.1 zum Vervielfältigen der SW berechtigt, so gilt
dies entsprechend für die Dokumentation, soweit diese zum Lieferumfang
gehört.
1.3 Erhält
der Lizenznehmer von uns für die SW einen License Key, der zur technischen
Freischaltung der SW dient (nachfolgend "License Key" genannt), so
ist dieser mit zu installieren.
1.4 Die
dem Lizenznehmer an der SW eingeräumten Rechte ergeben sich aus dem
Lizenz-Typ (siehe Abschnitt 2) und dem Software-Typ (siehe Abschnitt 3).
Lizenz-Typ und Software-Typ ergeben sich aus den Auftragsdaten bzw. aus dem
CoL. Erfolgt die Überlassung der SW elektronisch oder durch die Einräumung
von Vervielfältigungsrechten, beziehen sich die in diesen Allgemeinen
Bedingungen genannten Rechte und Pflichten auf die rechtmäßig erstellten
Kopien.
1.5 Ist
der Lizenznehmer berechtigt im Besitz einer früheren Version/Release der SW
(nachfolgend "Frühere Version" genannt ), hat der Lizenznehmer das
Recht, die an der SW eingeräumten Nutzungsrechte nach seiner Wahl entweder an
der SW oder - soweit dies technisch vorgesehen ist - an der Früheren Version
auszuüben (downgrading). Wenn die SW ein Upgrade oder PowerPack gemäß
Abschnitt 4 ist, gilt ergänzend Abschnitt 4.
1.6 Sofern
in der Readme-Datei der SW unter der Rubrik "Parallele Nutzung"
Frühere Versionen aufgeführt sind, hat der Lizenznehmer das Recht, die an
der SW eingeräumten Nutzungsrechte alternativ auch an den dort aufgelisteten
Früheren Versionen in einer (1) Instanz auszuüben. Lautet die in den
Auftragsdaten bzw. im CoL genannte "Art der Nutzung":
"Installation" oder "User", so steht dem Lizenznehmer das
zuvor beschriebene Recht zusätzlich und gleichzeitig an den dort
aufgelisteten Früheren Versionen in einer Instanz zu. Eine
"Instanz" im Sinne dieser Allgemeinen Bedingungen ist entweder eine
Instanz in einer physischen Betriebssystem-Umgebung oder eine Instanz in
einer virtuellen Betriebsystem-Umgebung. Die Übertragbarkeit der
Nutzungsrechte an den Früheren Versionen ist nur gemeinsam mit den
Nutzungsrechten an der SW gem. Ziffer 5.3 zulässig.
1.7 Ergibt
sich aus den Auftragsdaten bzw. dem CoL, dass der Lizenznehmer nur den
Datenträger aber keine Lizenz erhält, so ist der Lizenznehmer zur Nutzung der
SW erst berechtigt, wenn er eine Lizenz entsprechend Abschnitt 2 erwirbt. Bis
zum Erwerb der Lizenz ist der Lizenznehmer auch nicht zur Weitergabe der SW
an Dritte berechtigt.
1.8 Soweit
die SW Open Source Software oder ähnliche Software Dritter (nachfolgend
"OSS" genannt) enthält, ist diese in der Readme_OSS-Datei der SW
aufgeführt. Der Lizenznehmer ist berechtigt, die OSS gemäß den jeweils
einschlägigen, für die OSS geltenden Lizenzbedingungen zu nutzen. Diese sind
auf dem Datenträger, mit dem der Lizenznehmer die SW erhält, enthalten. Für
OSS gelten vorrangig vor den vorliegenden Allgemeinen Bedingungen die Lizenzbedingungen,
denen die jeweilige OSS unterliegt. Soweit die Lizenzbedingungen für die OSS
eine Herausgabe des Quellcodes vorsehen, werden wir diesen auf Verlangen des
Lizenznehmers gegen entsprechenden Aufwendungsersatz zur Verfügung stellen.
1.9 Die SW
kann neben OSS auch andere Lizenzsoftware sein oder enthalten, d. h.
Software, die nicht von uns selbst entwickelt wurde, sondern die wir von
Dritten (nachfolgend "Lizenzgeber" genannt), z. B. Microsoft
Licensing Inc., lizenziert bekommen haben. Erhält der Lizenznehmer in diesem
Fall mit der SW in der Readme_OSS-Datei Bedingungen des jeweiligen
Lizenzgebers, so gelten diese im Hinblick auf die Haftung des Lizenzgebers
dem Lizenznehmer gegenüber. Für unsere Haftung dem Lizenznehmer gegenüber
gelten in jedem Fall diese Allgemeinen Bedingungen.
2. Lizenz-Typ
Je nach Lizenz-Typ werden dem Lizenznehmer an der SW
die folgenden Rechte eingeräumt:
2.1 Single License (One Off License, Copy License)
Der etwaig im Softwareproduktschein verwendete
Begriff One Off License oder Copy License entspricht der Single License. Die
folgende Regelung gilt für die One Off License/Copy License voll umfänglich.
Der Lizenznehmer erhält das nicht-ausschließliche, zeitlich unbegrenzte,
gemäß Ziffer 5.3 übertragbare Recht, die SW in einer (1) Instanz zu
installieren und die so installierte SW auf die in den Auftragsdaten bzw. im
CoL genannte Art (s. "Art der Nutzung") zu nutzen.
2.2 Floating License
Der Lizenznehmer erhält das nicht-ausschließliche,
zeitlich unbegrenzte, gemäß Ziffer 5.3 übertragbare Recht, die SW auf
beliebig vielen Geräten des Lizenznehmers zu installieren. Die Anzahl der
Objekte (z.B. Benutzer oder Geräte), die die SW zeitgleich benutzen dürfen
ergibt sich aus den Auftragsdaten bzw. dem CoL (s. "Art der Nutzung").
2.3 Rental License
Der Lizenznehmer erhält das nicht-ausschließliche,
zeitlich gemäß den Auftragsdaten bzw. dem CoL (s. "Art der
Nutzung") begrenzte, gemäß Ziffer 5.3 übertragbare Recht, die SW in
einer (1) Instanz zu installieren und zu nutzen. Ist die Nutzungsdauer in
Stunden angegeben, beginnt die für die Berechnung der zeitlichen Begrenzung
maßgebliche Nutzung jeweils mit dem Starten und endet mit dem Schließen der
SW. Ist die Nutzungsdauer in Tagen, Wochen oder Monaten angegeben, so gilt
der angegebene Zeitraum - beginnend mit dem erstmaligen Starten der SW -
unabhängig von der tatsächlichen Nutzung.
Ist die Nutzungsdauer mit einem Datum
angegeben, endet das Nutzungsrecht mit diesem Datum - unabhängig von der
tatsächlichen Nutzung.
2.4 Rental Floating License
Der Lizenznehmer erhält das nicht-ausschließliche,
zeitlich gemäß den Auftragsdaten bzw. dem CoL (s. "Art der
Nutzung") begrenzte, gemäß Ziffer 5.3 übertragbare Recht, die SW auf
beliebig vielen Geräten des Lizenznehmers zu installieren. Die Anzahl der
Objekte (z.B. Benutzer oder Geräte), die die SW zeitgleich benutzen dürfen,
ergibt sich ebenfalls aus den Auftragsdaten bzw. dem CoL (s. "Art der
Nutzung"). Ist die Nutzungsdauer in Stunden angegeben, beginnt die für
die Berechnung der zeitlichen Begrenzung maßgebliche Nutzung jeweils mit dem
Starten und endet mit dem Schließen der SW. Ist die Nutzungsdauer in Tagen,
Wochen oder Monaten angegeben, so gilt der angegebene Zeitraum – beginnend
mit dem erstmaligen Starten der SW – unabhängig von der tatsächlichen
Nutzung. Ist die Nutzungsdauer mit einem Datum angegeben, endet das
Nutzungsrecht mit diesem Datum - unabhängig von der tatsächlichen Nutzung.
2.5 Demo License
Der Lizenznehmer erhält das nicht-ausschließliche,
zeitlich gemäß den Auftragsdaten bzw. dem CoL (s. "Art der
Nutzung") begrenzte, gemäß Ziffer 5.3 übertragbare Recht, die SW in
einer (1) Instanz zu installieren und zu Validierungszwecken zu nutzen. Ist
die Nutzungsdauer in Tagen, Wochen oder Monaten angegeben, so gilt der
angegebene Zeitraum – beginnend mit dem erstmaligen Starten der SW –
unabhängig von der tatsächlichen Nutzung. Ist die Nutzungsdauer mit einem
Datum angegeben, endet das Nutzungsrecht mit diesem Datum - unabhängig von
der tatsächlichen Nutzung.
2.6 Demo Floating License
Der Lizenznehmer erhält das nicht-ausschließliche,
zeitlich gemäß den Auftragsdaten bzw. dem CoL (s. "Art der
Nutzung") begrenzte, gemäß Ziffer 5.3 übertragbare Recht, die SW auf
beliebig vielen Geräten des Lizenznehmers zu installieren. Die Anzahl der
Objekte (z.B. Benutzer oder Geräte), die die SW zeitgleich zu
Validierungszwecken benutzen dürfen, ergibt sich ebenfalls aus den
Auftragsdaten bzw. dem CoL (s. "Art der Nutzung"). Ist die
Nutzungsdauer in Tagen, Wochen oder Monaten angegeben, so gilt der angegebene
Zeitraum – beginnend mit dem erstmaligen Starten der SW – unabhängig von der
tatsächlichen Nutzung. Ist die Nutzungsdauer mit einem Datum angegeben, endet
das Nutzungsrecht mit diesem Datum - unabhängig von der tatsächlichen
Nutzung.
2.7 Trial License
Der Lizenznehmer erhält das nicht-ausschließliche,
nicht-übertragbare Recht, die SW in einer (1) Instanz zu installieren und zu
Validierungszwecken auf die in den Auftragsdaten bzw. im CoL genannte Art (s.
"Art der Nutzung") zu nutzen. Die Nutzungsdauer ist auf 14 Tage -
beginnend mit dem erstmaligen Starten der SW - begrenzt, es sei denn, aus den
Auftragsdaten bzw. dem CoL ergibt sich eine andere Nutzungsdauer.
3. Software-Typ
Ist der Software-Typ weder in den Auftragsdaten, noch
im CoL angegeben, so gelten für die SW die Rechte nach Ziffer 3.2 (Runtime
Software).
3.1 Engineering Software (nachfolgend
"E-SW" genannt)
Erzeugt der Lizenznehmer mit E-SW eigene Programme
oder Daten, die Teile der E-SW enthalten, so hat der Lizenznehmer das
lizenzgebührenfreie Recht, diese Teile der E-SW als Bestandteil seiner
eigenen Programme oder Daten zu vervielfältigen, zu nutzen oder Dritten zur
Nutzung zu überlassen. Bei der Überlassung an Dritte sind diesen hinsichtlich
der o.g. Teile der E-SW den Ziffern 5.1. und 5.2. entsprechende Bestimmungen
schriftlich aufzuerlegen.
3.2 Runtime Software (nachfolgend "R-SW"
genannt)
Bindet der Lizenznehmer R-SW oder Teile davon in
eigene Programme oder Daten ein, so muss der Lizenznehmer vor jeder
Installation oder Vervielfältigung - je nachdem, was früher erfolgt - der
eigenen Programme oder Daten, die R-SW oder Teile davon enthalten, eine
Lizenz an der R-SW entsprechend der beabsichtigten Nutzungsart gemäß dem dann
gültigen Siemens-Katalog erwerben. Überlässt der Lizenznehmer die genannten
Programme oder Daten Dritten zur Nutzung, so sind diesen hinsichtlich der
darin enthaltenen Teile der R-SW dem Abschnitt 5 entsprechende Bestimmungen
schriftlich aufzuerlegen. Davon unberührt bleibt die Verpflichtung des
Lizenznehmers, eine Lizenz an der R-SW zu erwerben, wenn diese im Original
vervielfältigt wird. Sofern in der R-SW Tools zur
Parametrierung/Konfiguration enthalten und für diese erweiterte Rechte
eingeräumt sind, ergibt sich dies aus der Readme-Datei der R-SW.
4. Upgrade und PowerPack
Ergibt sich aus den Auftragsdaten bzw. dem CoL, z.B.
durch den Zusatz "Upgrade" oder "PowerPack" beim
Produktnamen der SW, dass die SW der Hochrüstung einer anderen Software dient
(nachfolgend "Ursprungslizenz" genannt), enden mit der Hochrüstung
die dem Lizenznehmer an der Ursprungslizenz ursprünglich eingeräumten
Nutzungsrechte. Die Nutzungsrechte gem. Ziffer 1.6 bleiben hiervon unberührt.
Der Lizenznehmer ist jedoch berechtigt, jederzeit die Hochrüstung - soweit
dies technisch vorgesehen ist - rückgängig zu machen (downgrading) und die
ihm eingeräumten Nutzungsrechte an der SW an der Ursprungslizenz in
entsprechender Anwendung von Ziffer 1.5 auszuüben.
5. Weitere Rechte und Pflichten des Lizenznehmers
5.1 Wenn auf dem Datenträger oder der Readme-Datei
der SW kein gegenteiliger Vermerk über eine bestimmte Anzahl von Kopien
enthalten ist, darf der Lizenznehmer von jedem Exemplar der SW, zu dessen
Nutzung er nach diesen Allgemeinen Bedingungen berechtigt ist, eine
angemessene Anzahl von Kopien anfertigen, die ausschließlich für
Datensicherungszwecke verwendet werden dürfen. Im Übrigen darf der
Lizenznehmer die SW nur vervielfältigen, wenn und soweit ihm von uns
schriftlich Vervielfältigungsrechte eingeräumt sind.
5.2 Der Lizenznehmer darf die SW nicht ändern, nicht
zurückentwickeln oder übersetzen und er darf keine Teile herauslösen, soweit
dies nicht nach den Bestimmungen des Urheberrechtsgesetzes zwingend erlaubt
ist. Der Lizenznehmer darf ferner alpha-numerische Kennungen, Marken und
Urheberrechtsvermerke von der SW oder dem Datenträger nicht entfernen und
wird sie, soweit er zur Vervielfältigung berechtigt ist, bei dieser
unverändert mit vervielfältigen. Die vorstehende Regelung gilt entsprechend
für die gemäß Abschnitt 1 überlassene Dokumentation.
5.3 Der Lizenznehmer ist berechtigt, das ihm
eingeräumte Nutzungsrecht komplett auf einen Dritten zu übertragen,
vorausgesetzt er trifft mit dem Dritten eine schriftliche Vereinbarung, die
allen Bestimmungen dieses Abschnitts 5 entspricht und er keine Kopien der SW
behält. Hat der Lizenznehmer für die SW einen License Key erhalten, so ist
dieser dem Dritten zusammen mit der SW zu überlassen. Ferner ist dem Dritten
das CoL zusammen mit diesen Allgemeinen Bedingungen zu übergeben. Der
Lizenznehmer wird uns auf unseren Wunsch jederzeit das für die SW erhaltene
CoL vorlegen.
5.4 Ist die SW ein PowerPack oder ein Upgrade, wird
der Lizenznehmer das CoL der Ursprungslizenz aufbewahren und auf Wunsch von
uns jederzeit zusammen mit dem CoL der SW vorlegen. Überträgt der
Lizenznehmer sein Nutzungsrecht an der PowerPack SW bzw. Upgrade SW gemäß
Ziffer 5.3, wird er dem Dritten auch das CoL der Ursprungslizenz übergeben.
5.5 Erhält der Lizenznehmer einen Datenträger, der
neben der SW weitere Software-Produkte enthält, die zur Nutzung
freigeschaltet sind, so hat er an diesen freigeschalteten Software-Produkten
ein zeitlich begrenztes, unentgeltliches Recht, sie ausschließlich für
Validierungszwecke zu nutzen. Die zeitliche Begrenzung beträgt 14 Tage,
beginnend mit dem erstmaligen Starten des jeweiligen Software-Programms,
soweit nicht, z.B. in der Readme-Datei des jeweiligen Software-Produkts, ein
anderer Zeitraum genannt ist. Für diese ausschließlich zu Validierungszwecken
überlassenen Software- Produkte gelten die Bestimmungen dieser Allgemeinen
Bedingungen entsprechend. Der Lizenznehmer ist nicht berechtigt, diese
Software-Produkte getrennt, d.h. ohne die SW an einen Dritten weiterzugeben.
Es gelten die
Bedingungen des Kaufvertrags, soweit nachfolgend für die Open Source Software
nicht anders geregelt.
|
Conditions générales de licence pour logiciels de
systèmes d'automatisation et d'entraînement
(2011-08-01)
1. Cession du logiciel au preneur de licence
et concession de droits d'utilisation du logiciel
1.1 Seules les présentes conditions générales sont
valables pour la cession de notre part de licences pour logiciels de systèmes
d'automatisation et d'entraînement. Les Conditions Générales du preneur de
licence ne seront toutefois applicables que dans la mesure où nous les aurons
expressément acceptées par écrit. Les déclarations écrites concordantes des
deux parties sont déterminantes pour le nombre de licences pour logiciels
accordées. Nous concédons au preneur de licence des droits d'utilisation sur
le logiciel (dénommé ci-après « SW ») mentionné dans la
confirmation de commande ou dans le certificat de licence (si le preneur ne
reçoit pas de confirmation de commande) ou sur la carte d'identification du
produit logiciel (si le preneur de licence reçoit une carte d'identification
du produit logiciel au lieu du certificat de licence). Le certificat de
licence et la carte d'identification du produit logiciel sont regroupés
ci-après sous la dénomination « CoL ». Le preneur de licence reçoit
le Col à la remise du SW ou du bordereau de livraison. De même, la forme de
la cession du SW ressortira directement de la confirmation de commande ou du
numéro de commande du SW figurant sur la confirmation de commande en liaison
avec les références de commande correspondantes de notre catalogue en vigueur
au moment de la confirmation de commande (désignées ci-après en abrégé par « Références
de commande »), ou encore du CoL. Si le preneur de licence ne reçoit pas
de support de données, il sera en droit de copier le SW déjà en sa possession
et ce, dans l'étendue nécessaire à l'exercice des droits d'utilisation qui
lui ont été accordés. Cette règle s'appliquera mutatis mutandis en cas de
remise du SW par voie électronique (téléchargement). Dans la mesure où les
présentes Conditions Générales renvoient aux références de commande ou au
CoL, le renvoi au CoL ne sera important que si le preneur de licence ne
reçoit pas de confirmation de commande. Dans tous les cas, les données
incluses dans les références de commande seront également incluses dans le
CoL.
1.2 La documentation associée au SW (appelée par la
suite « Documentation ») devra être acquise séparément, sauf s'il
est indiqué dans les références de commande ou dans le CoL qu'elle ferait
partie intégrante de la livraison. Si le preneur de licence est en droit de
copier le SW comme indiqué au paragraphe 1.1, ce droit sera applicable
mutatis mutandis à la documentation, si tant est qu'elle fasse partie
intégrante de la livraison.
1.3 Si le preneur de licence reçoit de notre part une
clé de licence (License Key) servant à la validation technique du logiciel
(appelée par la suite « Clé de licence »)
pour le SW, il devra l'installer conjointement.
1.4 Les droits concédés sur le SW au preneur de
licence découlent du type de licence (voir paragraphe 2) et du type de
logiciel (voir paragraphe 3). Le type de licence et le type de logiciel
découlent des références de commande ou du CoL. Si la cession du SW a lieu
par voie électronique ou par la concession de droits de reproduction, les
droits et les obligations cités dans les présentes Conditions Générales
s'étendront aux copies exécutées de manière légale.
1.5 Si le preneur de licence détient à juste titre
une ancienne version (release) du SW (dénommée ci-après « Version
antérieure »), il pourra choisir d'exercer les droits d'utilisation
concédés pour le SW soit sur le SW, soit (si tant est que ceci soit
techniquement prévu) sur la Version antérieure (downgrading). Si le SW est un
Upgrade ou un PowerPack comme indiqué au paragraphe 4, le
paragraphe 4 sera applicable en complément.
1.6 Dans la mesure où les versions antérieures
figurent dans le fichier Readme du SW sous la rubrique « Utilisation
conjointe », le preneur de licence peut également exercer au sein d'une
(1) instance les droits d'utilisations concédés pour le SW sur les versions
antérieures reprises dans ledit fichier. Si le « type d'utilisation »
mentionné dans les références de commande ou dans le CoL s'avère être « Installation »
ou « User/Utilisateur », le preneur de licence peut jouir de
manière simultanée et complémentaire du droit d'utilisation dont il est
question ci-dessus sur les versions antérieures figurant dans ces documents,
et ce, au sein d'une instance. Une " Instance " au vu de ces
conditions générales représente soit une instance au sein d'un système d'exploitation
s'exécutant dans un environnement physique, soit une instance au sein d'un
système d'exploitation s'exécutant dans un environnement virtuel. La
cessibilité des droits d'utilisation sur les versions antérieures n'est
autorisée que conjointement avec les droits d'utilisation sur le SW aux
termes du paragraphe 5.3.
1,7 S'il résulte des références de commande ou du CoL
que le preneur de licence ne reçoit que le support de données mais aucune
licence, le preneur de licence ne sera en droit d'utiliser le SW que s'il
fait l'acquisition d'une licence conformément au paragraphe 2. Jusqu'à
l'acquisition de ladite licence, le preneur de licence ne sera pas non plus
habilité à transférer le SW à des tiers.
1,8 Si le logiciel contient un Open Source Software
ou un logiciel tiers similaire (appelé par la suite « OSS »), il
figure dans le fichier Readme_OSS du logiciel. Le preneur de licence est
autorisé à utiliser l'OSS selon les conditions de licence correspondantes
valables pour l'OSS. Elles figurent sur le support de données sur lequel le
preneur de licence reçoit le logiciel. Les conditions de licence respectives
de l'OSS sont prépondérantes par rapport aux présentes conditions générales.
Dans la mesure où les conditions de licence prévoient une impression du code
source de l'OSS, nous vous mettrons celui-ci à disposition sur demande du
preneur de licence contre rétribution.
1.9 Outre l'OSS, le logiciel peut constituer ou
contenir un autre logiciel sous licence, c'est-à-dire un logiciel que nous
n'avons pas développé nous-mêmes mais dont nous avons reçu la licence par un
tiers (appelé par la suite « Donneur de licence »), par ex.
Microsoft Licensing Inc. Le cas échéant, si le preneur de licence reçoit dans
le fichier Readme_OSS la licence avec les conditions de logiciel du donneur
de licence respectif, celles-ci règlent la responsabilité du donneur de
licence vis-à-vis du preneur de licence. Les conditions générales
s'appliquent systématiquement pour ce qui est de notre responsabilité
vis-à-vis du preneur de licence.
2. Type de licence
Selon le type de la licence, le preneur de licence se
voit concéder sur le SW les droits suivants :
2.1 Single License (One Off License, Copy
License)
Le terme « One Off License » ou « Copy
License » éventuellement utilisé dans la carte d'identification du
produit logiciel correspond à la Single License. La disposition suivante est
applicable dans toute son étendue à la One Off License/Copy License. Le
preneur de licence obtient le droit non exclusif, non limité dans le temps et
cessible aux termes du paragraphe 5.3, d'installer le SW dans une (1)
instance et d'utiliser le SW ainsi installé de la manière indiquée dans les
références de commande ou dans le CoL (voir « Type d'utilisation »).
2.2 Floating License
Le preneur de licence obtient le droit non exclusif,
non limité dans le temps et cessible comme indiqué au paragraphe 5.3,
d'installer le SW sur un nombre quelconque d'appareils lui appartenant. Le
nombre d'objets, par exemple des personnes ou des appareils, autorisés à
utiliser simultanément le SW découle des références de commande ou du CoL
(voir « Type d'utilisation »).
2.3 Rental License
Le preneur de licence obtient le droit non exclusif,
limité dans le temps comme indiqué dans les références de commande ou dans le
CoL (voir « Type d'utilisation » et cessible aux termes du
paragraphe 5.3, d'installer et d'utiliser le SW dans une (1) instance.
Si la durée d'utilisation est indiquée en heures, l'utilisation déterminante
pour le calcul de la limite horaire débutera avec le démarrage et se
terminera avec la fermeture du SW. Si la durée d'utilisation est indiquée en
jours, en semaines ou en mois, la période indiquée prendra effet à dater du
premier démarrage du SW, indépendamment de l'utilisation effective. Si la
durée d'utilisation est indiquée par une date, le droit d'utilisation prendra
fin à cette date, indépendamment de l'utilisation effective.
2.4 Rental Floating License
Le preneur de licence obtient le droit non exclusif,
limité dans le temps comme indiqué dans les références de commande ou dans le
CoL (voir « Type d'utilisation » et cessible aux termes du
paragraphe 5.3, d'installer le SW sur un nombre illimité d'appareils
appartenant au preneur de licence. Le nombre d'objets, par exemple des
personnes ou des appareils, autorisés à utiliser simultanément le SW découle
également des références de commande ou du CoL (voir « Type
d'utilisation »). Si la durée d'utilisation est indiquée en heures,
l'utilisation déterminante pour le calcul de la limite horaire débutera avec
le démarrage et se terminera avec la fermeture du SW. Si la durée
d'utilisation est indiquée en jours, en semaines ou en mois, la période
indiquée prendra effet à dater du premier démarrage du SW, indépendamment de
l'utilisation effective. Si la durée d'utilisation est indiquée par une date,
le droit d'utilisation prendra fin à cette date, indépendamment de
l'utilisation effective.
2.5 Demo License
Le preneur de licence obtient le droit non exclusif,
limité dans le temps comme indiqué dans les références de commande ou dans le
CoL (voir « Type d'utilisation » et cessible aux termes du
paragraphe 5.3, d'installer et d'utiliser le SW dans une (1) instance à
des fins de validation. Si la durée d'utilisation est indiquée en jours, en
semaines ou en mois, la période indiquée prendra effet à dater du premier
démarrage du SW, indépendamment de l'utilisation effective. Si la durée
d'utilisation est indiquée par une date, le droit d'utilisation prendra fin à
cette date, indépendamment de l'utilisation effective.
2.6 Demo Floating License
Le preneur de licence obtient le droit non exclusif,
limité dans le temps comme indiqué dans les références de commande ou dans le
CoL (voir « Type d'utilisation » et cessible aux termes du
paragraphe 5.3, d'installer le SW sur un nombre illimité d'appareils
appartenant au preneur de licence. Le nombre d'objets, par exemple des
personnes ou des appareils, autorisés à utiliser simultanément le SW à des
fins de validation découle également des références de commande ou du CoL
(voir « Type d'utilisation »). Si la durée d'utilisation est
indiquée en jours, en semaines ou en mois, la période indiquée prendra effet
à dater du premier démarrage du SW, indépendamment de l'utilisation
effective. Si la durée d'utilisation est indiquée par une date, le droit
d'utilisation prendra fin à cette date, indépendamment de l'utilisation
effective.
2.7 Trial License
Le preneur de licence obtient le droit non exclusif
et non cessible d'installer le SW dans une (1) instance et de l'utiliser à
des fins de validation de la manière indiquée dans les références de commande
ou dans le CoL (voir « Type d'utilisation »). La durée
d'utilisation est limitée à 14 jours à dater du premier démarrage du SW, sauf
si une autre durée d'utilisation ressort des références de commande ou du
CoL.
3. Type de logiciel
Si le type de logiciel n'est indiqué ni dans les
références de commande ni dans le CoL, les droits concernant le SW sont ceux
cités au paragraphe 3.2 (Runtime Software).
3.1 Engineering Software (ci-après dénommé « E-SW »)
Si le preneur de licence crée ses propres programmes
ou ses propres données incluant des éléments du E-SW, il aura le droit, sans
avoir à affranchir de droits de licence, de copier, d'utiliser ou de laisser
utiliser par des tiers lesdits éléments du E-SW au titre de partie intégrante
de ses propres programmes ou données. En cas de remise à des tiers, il devra
imposer à ceux-ci, pour les éléments susvisés du E-SW, des dispositions
écrites conformes à celles des paragraphes 5.1 et 5.2.
3.2 Runtime Software (ci-après dénommé « R-SW »)
Si le preneur de licence intègre le R-SW ou des
éléments du R-SW dans ses propres programmes ou données, il devra, avant
toute installation ou copie (selon l'ordre chronologique) de ses propres
programmes ou données incluant le R-SW ou des éléments du R-SW, acquérir une
licence sur le R-SW en fonction du type d'utilisation prévu, conformément au
catalogue Siemens alors en vigueur. Si le preneur de licence remet lesdits
programmes ou données à des tiers à des fins d'utilisation, il devra imposer
à ceux-ci, pour les éléments susvisés du R-SW, des dispositions écrites
conformes à celles du paragraphe 5. L'obligation du preneur de licence
d'acquérir une licence pour le R-SW en cas de copie de l'original n'en sera
pas affectée. Dans la mesure où des outils de paramétrage ou de configuration
sont inclus dans le R-SW et où ceux-ci bénéficient de droits élargis, ceci
est signalé dans le fichier Readme du R-SW.
4. Upgrade et PowerPack
S'il ressort des références de commande ou du CoL,
par exemple du fait de l'ajout de la mention « Upgrade » ou « Powerpack »
au nom de produit du SW, que le SW sert à la mise à niveau d'un autre
logiciel (dénommé ci-après " Licence d'origine "), la mise à niveau
met fin aux droits d'utilisation concédés initialement au preneur de licence
sur la licence d'origine. Les droits d'utilisation aux termes du
paragraphe 1.6 n'en sont pas affectés. Le preneur de licence sera
toutefois en droit de ramener la mise à niveau à la version antérieure
(downgrading), si tant est que ceci soit techniquement prévu, et d'exercer
sur la licence d'origine les droits d'utilisation qui lui auront été concédés
sur le SW en application mutatis mutandis du paragraphe 1.5.
5. Autres droits et devoirs du preneur de
licence
5.1 Sauf indication contraire figurant sur le support
de données ou le fichier Readme du SW qui limiterait le nombre de copies, le
preneur de licence sera autorisé à faire un nombre raisonnable de copies de
chaque exemplaire du SW pour lequel il dispose d'un droit d'utilisation aux
termes des présentes Conditions Générales, ces copies étant exclusivement
réservées aux fins de sauvegarde des données. Par ailleurs, le preneur de
licence ne pourra copier le SW que si et dans la mesure où nous lui aurons
octroyé par écrit des droits de reproduction.
5.2 Le preneur de licence n'est pas autorisé à
modifier le SW, ni à le rétroconcevoir, ni à le traduire, ni à en détacher
aucun élément, si tant est que ceci ne soit pas obligatoirement permis aux
termes de la législation sur les droits d'auteur. D'autre part, le preneur de
licence n'est autorisé à supprimer aucun repère alphanumérique, aucune
marque, ni aucune mention de copyright apposés sur le SW ou sur le support de
données. S'il bénéficie du droit de reproduction, il devra impérativement
copier ces éléments conjointement sans les modifier. La disposition susvisée
s'appliquera mutatis mutandis à la documentation remise conformément au
paragraphe 1.
5.3 Le preneur de licence sera en droit de transférer
intégralement à un tiers le droit d'utilisation qui lui a été octroyé, à
condition de conclure avec ledit tiers un accord écrit conforme à toutes les
dispositions du présent article 5 et de ne conserver aucune copie du SW.
Si le preneur de licence a reçu une License Key, celle-ci sera remise au
tiers conjointement au SW. D'autre part, le CoL sera remis au tiers,
accompagné des présentes Conditions Générales. À notre demande, le preneur de
licence nous présentera à tout moment le CoL obtenu pour le SW.
5.4 Si le SW est un PowerPack ou un Upgrade, le
preneur de licence conservera le Certificat de licence ou la carte
d'identification du produit logiciel de la licence d'origine, qu'il nous
présentera à tout moment sur notre demande, accompagné(e) du CoL du SW. Si le
preneur de licence transfère à un tiers son droit d'utilisation sur le
PowerPack SW ou sur l'Upgrade SW aux termes du paragraphe 5.3, il remettra
également au tiers le Certificat de licence ou la carte d'identification du
produit logiciel de la licence d'origine.
5.5 Si le preneur de licence reçoit un support de
données contenant, outre le SW, d'autres produits logiciels activés pour
l'utilisation, il disposera d'un droit gratuit et limité dans le temps
d'utiliser lesdits produits logiciels activés et ce, uniquement à des fins de
validation. La durée d'utilisation est limitée à 14 jours, à dater du premier
démarrage du programme logiciel concerné si tant est qu'un autre laps de
temps ne figure pas, par exemple, dans le fichier Readme du produit en
question. Les dispositions des présentes Conditions Générales s'appliqueront
mutatis mutandis auxdits produits logiciels remis exclusivement à des fins de
validation. Le preneur de licence n'est pas autorisé à transférer ces
produits logiciels à des tiers sous forme séparée, c.-à-d. sans le SW.
Les conditions
du contrat de vente sont, par ailleurs, réputées applicables.
|
Condiciones Generales para la Cesión de
Software de Automatización y Accionamientos
(2011-08-01)
1. Cesión del software al titular de una
licencia y otorgamiento de derechos de uso del software
1.1 Para la cesión por nuestra parte de
software de automatización y accionamientos al titular de la licencia son
aplicables únicamente estas condiciones generales. Las Condiciones Generales
de Contrato del titular de una licencia regirán solamente en caso de que las
hayamos aceptado expresamente por escrito. En lo referente al alcance de la
cesión del software son determinantes las aclaraciones escritas y acordadas
por ambas partes. Otorgamos al titular de la licencia derechos de uso del
software (en adelante "SW") especificado en la confirmación del
pedido o -si el titular de la licencia no ha recibido ninguna- en el
Certificate of License o en el comprobante de producto -si el titular de la
licencia recibe tal comprobante en lugar de un Certificate of License. El
Certificate of License y el comprobante de producto de software se resumen en
adelante con la abreviatura "CoL". El titular de la licencia
recibirá el CoL al serle entregado el SW y/o el talón (nota, albarán) de
entrega. La modalidad de cesión del SW resulta también en forma inmediata de
la confirmación del pedido o de la referencia del SW consignado en la
confirmación del pedido en conexión con los datos de pedido pertinentes que
provienen de nuestro catálogo vigente al confirmarse el pedido (resumidos en
adelante como "Datos del pedido") y/o del CoL. Si el titular de la
licencia no recibe ningún soporte de datos, tendrá derecho a copiar el SW que
ya obra en su poder en la medida necesaria para ejercer los derechos de uso
que se le han otorgado. Lo mismo rige por analogía para la cesión del SW por
vía electrónica (downloading). Siempre que en las presentes Condiciones
Generales de Contrato se haga referencia a los datos del pedido o al CoL, la
referencia al CoL será relevante en caso de que el titular de la licencia no
reciba una confirmación del pedido. En cualquier caso, los datos incluidos en
los datos del pedido lo están igualmente en el CoL.
1.2 La documentación perteneciente al SW
(en adelante "documentación") deberá adquirirse por separado, salvo
que los datos del pedido o el CoL indiquen que la misma forma parte del
volumen de suministro. En caso de que el titular de la licencia definido en
el apartado 1.1 esté autorizado a copiar el SW, podrá hacer lo mismo con la
documentación siempre que ésta forme parte del volumen de suministro.
1.3 Si el titular de la licencia recibe de
nuestra parte una License Key (clave de licencia) para el SW para la
validación técnica del SW (en adelante "License Key"), será
imprescindible instalar esta última junto con los demás componentes.
1.4 Los derechos sobre el SW otorgados al
titular de la licencia se desprenden del tipo de licencia (véase el apartado
2) y del tipo de software (ver apartado 3). El tipo de licencia y el tipo de
software se desprenden de los datos del pedido o del CoL. En caso de que la
cesión del SW se efectúe por vía electrónica o por concesión de derechos de
copia, los derechos y obligaciones consignados en estas Condiciones Generales
de Contrato se referirán a las copias realizadas legítimamente.
1.5 Si el titular de la licencia tiene en
su poder una versión/release anterior del SW (en adelante "Versión
anterior"), el titular de la licencia tendrá derecho a ejercer los
derechos de uso otorgados para el SW optando por hacerlo o bien con el SW o
con la versión anterior (downgrading), si ello estuviera técnicamente
previsto. Si el SW es un Upgrade o un PowerPack de conformidad con lo
estipulado en el apartado 4, se aplicará el apartado 4 .
1.6 Si bajo la rúbrica "Uso paralelo" del
archivo Léame del SW se indican versiones anteriores, el titular de la
licencia tendrá derecho a ejercer los derechos de uso otorgados para el SW
opcionalmente sobre las versiones anteriores indicadas allí en una (1)
instancia. Si la
"Modalidad de uso" mencionada en los datos del pedido o en el CoL ES
fuera "Installation" o "User", el titular podrá ejercer
además el derecho anteriormente descrito simultáneamente sobre las versiones
anteriores ahí listadas en una instancia. En el sentido de las Condiciones
Generales, una "instancia" es o bien una instancia en un entorno de
sistema operativo físico, o bien una instancia en un entorno de sistema
operativo virtual. La posibilidad de transferir los derechos de uso a las
versiones anteriores sólo está permitida junto con los derechos de uso
otorgados para el SW según lo estipulado en el apartado 5.3.
1.7 Si de los datos del pedido o el CoL se
desprende que el titular de la licencia recibirá sólo el soporte de datos
desprovisto de licencia, el titular quedará facultado para usar el SW sólo en
caso de adquirir una licencia tal y como lo estipula el apartado 2. Mientras
no adquiera la licencia, el titular de la licencia tampoco tendrá derecho a
transmitir el SW a terceros.
1.8 Si el SW contiene Open Source Software
o un software similar de terceros (en adelante "OSS"), éste
aparecerá especificado en el archivo Readme_OSS del SW. El titular de la
licencia podrá utilizar el OSS dentro de las condiciones de licencia
pertinentes y vigentes para el OSS. Dichas condiciones están recogidas en el
soporte de datos en el que el titular de la licencia recibe el SW. Para OSS
rigen en primera instancia las condiciones de la licencia aplicables al OSS
en cuestión, que tendrán prioridad ante las presentes Condiciones Generales.
Si las condiciones de licencia del OSS incluyen la entrega del código fuente,
lo pondremos a disposición del titular a cambio del correspondiente importe
cuando éste lo solicite.
1.9 Además de OSS, el SW puede ser o
contener otro software con licencia, es decir, software que no haya sido
desarrollado por nosotros, sino que hayamos recibido de terceros (en adelante
"concesor"), como p. ej. Microsoft Licensing Inc., bajo la
correspondiente licencia. En ese caso, si el titular recibe con el SW
condiciones del correspondiente concesor en el archivo Readme_OSS, éstas se
aplicarán en lo que respecta a la responsabilidad del concesor frente al
titular. En cuanto a nuestra responsabilidad frente al titular de la
licencia, rigen en cualquier caso las presentes Condiciones Generales.
2. Tipo de licencia
Según el tipo de licencia, al titular de
la misma se le otorgarán los siguientes derechos sobre el SW:
2.1 Single License (One Off License, Copy
License)
Los términos One Off License o Copy
License que pudieran figurar en el certificado de producto de software
equivalen a la Single License. La siguiente regulación rige en toda su
extensión para la One Off License/Copy License. El titular de la licencia
obtendrá el derecho no exclusivo y de duración ilimitada que se estipula en
el apartado 5.3 para instalar el SW en una (1) instancia y utilizar el SW así
instalado del modo especificado en los datos del pedido o en el CoL (v.
"Modalidad de uso").
2.2 Floating License
El titular de la licencia obtiene el
derecho no exclusivo, de duración ilimitada y transferible conforme al apartado
5.3 para instalar el SW en cualquier cantidad de equipos de su propiedad. El
número de objetos (p. ej. usuarios o equipos) facultados para usar el SW al
mismo tiempo se desprende de los datos del pedido o del CoL (v.
"Modalidad de uso").
2.3 Rental License
El titular de la licencia obtiene el
derecho no exclusivo, de duración limitada c los datos del pedido o del CoL
(v. "Modalidad de uso") y transferible de conformidad con el
apartado 5.3 de instalar y utilizar el SW en un (1) equipo. Si la duración
del uso se especifica en horas, el uso determinante para calcular el tiempo
limitado empezará a contar siempre con el inicio del SW y termina con su
finalización. Si la duración del uso se especifica en días, semanas o meses,
el período indicado empezará a contarse desde el primer inicio del SW,
independientemente del uso efectivo de este último. Si la duración del uso se
especifica con una fecha, el derecho de uso finalizará en esta fecha,
independientemente del uso efectivo.
2.4 Rental Floating License
El titular de la licencia obtiene el
derecho no exclusivo, de duración limitada conforme a los datos del pedido o
al CoL (v. "Modalidad de uso") y transferible de conformidad con el
apartado 5.3, de instalar el SW en cualquier cantidad de equipos del titular.
El número de objetos (p. ej. usuarios o equipos) facultados para usar el
software al mismo tiempo se desprende asimismo de los datos del pedido o del
CoL (v. "Modalidad de uso"). Si la duración de uso se especifica en
horas, el uso determinante para calcular el plazo limitado se empieza a
contar desde el inicio del SW y finaliza al cerrar el SW. Si la duración de
uso se especifica en días, semanas o meses , el período indicado se aplicará,
empezando a contar desde el primer inicio del SW, independientemente del uso
efectivo. Si la duración de uso se especifica con una fecha, el derecho de
uso finalizará en esta fecha, independientemente del uso efectivo.
2.5 Demo License
El titular de la licencia obtiene el
derecho no exclusivo, de duración limitada conforme a los datos del pedido o
al CoL (v. "Modalidad de uso") y transferible de conformidad con el
apartado 5.3, de utilizar el SW en una (1) instancia y para fines de
validación. Si la duración de uso se especifica en días, semanas o meses, el
período indicado se aplicará, empezando a contar desde el primer inicio del
SW, independientemente del uso efectivo. Si la duración de uso se especifica
con una fecha, el derecho de uso finalizará en esta fecha, independientemente
del uso efectivo.
2.6 Demo Floating License
El titular de la licencia obtiene el
derecho no exclusivo, de duración limitada conforme a los datos del pedido o
al CoL (v. "Modalidad de uso") y transferible de conformidad con el
apartado 5.3, de instalar el SW en cualquier cantidad de equipos del titular.
El número de objetos (p. ej. usuarios o equipos) facultados para usar el SW
al mismo tiempo para fines de validación, se desprende asimismo de los datos
del pedido o del CoL (v. "Modalidad de uso"). Si la duración de uso
se especifica en días, semanas o meses, el período indicado se aplicará,
empezando a contar desde el primer inicio del SW, independientemente del uso
efectivo. Si la duración de uso se especifica con una fecha, el derecho de
uso finalizará en esta fecha, independientemente del uso efectivo.
2.7 Trial License
El titular de la licencia obtiene el
derecho no exclusivo y no transferible de instalar el SW en una (1) instancia
y de utilizar el SW así instalado con fines de validación tal y como lo
especifican los datos del pedido o del CoL (v. "Modalidad de uso").
La duración del uso se limita a 14 días empezando por la primera
inicialización del SW, salvo que los datos del pedido o el CoL especifiquen
una duración distinta.
3. Tipo de software
Si el tipo de software no está especificado
ni en los datos del pedido ni en el CoL, los derechos vigentes para el SW
serán los que figuran en el apartado 3.2 (Runtime Software).
3.1 Engineering Software (en adelante
"E-SW")
Si el titular de una licencia genera con
el E-SW programas o datos propios que incluyen componentes del E-SW, tendrá
el derecho exento de regalías o cánones a copiar esos componentes como parte
integrante de sus propios programas o datos, a utilizarlos o a cederlos a
terceros para su utilización. Al efectuar la cesión a terceros es
imprescindible imponerles por escrito las disposiciones de los apartados 5.1
y 5.2 en relación con los citados componentes del E-SW.
3.2 Runtime Software (en adelante
"R-SW")
En caso de integrar el R-SW completo o en
parte a sus propios programas o datos, el titular de la licencia deberá
adquirir una licencia para el R-SW conforme a la modalidad de uso prevista y
al catálogo Siemens vigente en ese momento. La adquisición la efectuará antes
de cada instalación o copiado -según lo que haga primero- de sus programas o
datos propios que contengan el R-SW completo o en parte. En caso de que el
titular de la licencia ceda los citados programas o datos a terceros para su
utilización, deberá imponer por escrito las disposiciones incluidas en el
apartado 5 con respecto a los componentes incorporados del R-SW. Esto no
invalida la obligación del titular de la licencia de adquirir una licencia
para el R-SW en caso de que éste sea copiado en su versión original. En caso
de que el R-SW contenga herramientas de parametrización o configuración y
para los que se haya otorgado derechos suplementarios, la información
respectiva figura en el archivo Léeme del R-SW.
4. Upgrade y PowerPack
Si de los datos del pedido o del Col se
desprende, p. ej. por el indicativo "Upgrade" o "Power
Pack" junto al nombre del producto del SW, que el SW sirve para ampliar
las características de otro software (en adelante "Licencia de
origen"), los derechos de uso de la licencia de origen concedidos
previamente al titular expirarán con la ampliación. Los derechos de uso
concedidos de conformidad con el apartado 1.6 no se ven afectados. El titular
de la licencia, no obstante, está facultado para anular la ampliación en
cualquier momento (downgrading) -si tal cosa está prevista técnicamente hablando-
y ejercer los derechos de uso del SW a él concedidos sobre la licencia de
origen análogamente a lo estipulado en el apartado 1.5.
5. Demás derechos y obligaciones del
titular de la licencia
5.1 En caso de que el soporte de datos o
el archivo Léame del SW no estipulen un número determinado de copias, el
titular de la licencia podrá sacar un número prudencial de copias de cada
ejemplar del SW cuyo uso le estuviera permitido por estas Condiciones
Generales, copias que servirán exclusivamente para asegurar los datos. Por lo
demás, el titular de la licencia sólo podrá copiar el SW en caso de que le
hubiéramos concedido los derechos pertinentes por escrito.
5.2 El titular de la licencia no deberá
modificar el SW, decompilarlo ni aplicarle ingeniería inversa ni traducirlo
ni separar sus componentes salvo que lo permita la Ley de derechos de autor.
El titular de la licencia tampoco debe quitar códigos alfanuméricos, marcas o
notas de propiedad del SW o del soporte de datos y si está autorizado a
copiar el SW, deberá copiar también esos componentes sin alteración alguna.
La regulación antedicha vale por analogía para la documentación cedida de
conformidad con el apartado 1.
5.3 El titular de la licencia está
facultado para transferir en su totalidad a un tercero el derecho de uso que
se le ha concedido, siempre que suscriba con éste un acuerdo escrito que
recoja todas las disposiciones del apartado 5 y que conserve en su poder una
copia del SW. Si el titular de la licencia ha recibido una License Key para
el SW, tendrá que cederla al tercero junto con el SW. El tercero ha de
recibir también el CoL junto con las presentes Condiciones Generales. El
titular de la licencia nos ha de presentar el CoL recibido en relación con el
SW siempre que lo solicitemos.
5.4 En caso de que el SW sea un PowerPack
o un Upgrade, el titular de la licencia ha de guardar el Certificate of
License o el certificado de producto de software de la licencia de origen,
para poder presentarlos junto al CoL del SW cuando Siemens se lo exija. Si el
titular de la licencia transfiere su derecho de uso al PowerPack SW o Upgrade
SW conforme al apartado 5.3, cederá también al tercero el Certificate of
License o el certificado de producto de software de la licencia de origen.
5.5 En caso de que el titular de la
licencia reciba un soporte de datos conteniendo no sólo el SW sino otros
productos de software liberados para su uso, tendrá derecho gratuito y de
duración limitada para utilizar estos últimos con fines de validación
exclusivamente. La limitación será de 14 días contados desde la primera
inicialización del programa correspondiente al software a no ser que, p. ej.,
el archivo Léame del mismo especifique un plazo diferente. Para estos
productos cedidos exclusivamente con fines de validación regirán por analogía
las estipulaciones de estas Condiciones Generales. El titular de la licencia
no tiene permiso para pasar a un tercero estos productos de software
separados del SW.
Por lo demás, rigen las condiciones del
contrato de compra.
|
Condizioni generali per la cessione di
prodotti software per la tecnica di automazione e di azionamento
(2011-08-01)
1. Cessione di prodotti software a
licenziatari e conferimento dei diritti di utilizzo del software
1.1 Per la cessione da parte nostra di prodotti
software per la tecnica di automazione e di azionamento al licenziatario
valgono esclusivamente queste condizioni generali. Le condizioni generali del
licenziatario valgono solamente se noi le abbiamo espressamente approvate in
forma scritta. Ai fini dell’entità delle condizioni di cessione del software
sono determinanti le dichiarazioni concordi in forma scritta di entrambe le
parti. Noi conferiamo al licenziatario i diritti di utilizzo del software (in
seguito denominato "SW") specificato nella conferma d'ordine o - se
il licenziatario non riceve alcuna conferma d'ordine - nel Certificate of
License oppure, se il licenziatario al posto del Certificate of License
riceve un certificato di prodotto software, nel certificato di prodotto
software. Il Certificate of License e il certificato di prodotto software
sono in seguito denominati insieme "CoL": Il licenziatario riceve
il CoL con la cessione del SW e del documento di consegna. La modalità di
cessione del SW risulta comunque direttamente dalla conferma d'ordine o dal
numero di ordinazione del SW riportato nella conferma d'ordine correlato ai
rispettivi dati per l'ordinazione (in seguito denominati "dati
d'ordine") del nostro catalogo valido al momento della conferma d'ordine
e dal CoL. Se il licenziatario non riceve alcun supporto dei dati, egli è
autorizzato a riprodurre il SW già in suo possesso nella misura necessaria
consentita dai diritti di utilizzo conferiti. Ciò vale parimenti per la
cessione elettronica del software (downloading). Finché in queste condizioni
generali si fa riferimento ai dati d'ordine e al CoL, questo riferimento ha
significato se il licenziatario non riceve alcuna conferma d'ordine. In ogni
caso i dati riportati nei dati d'ordine sono anche riportati nel CoL.
1.2 La documentazione relativa al SW (in seguito
denominata "documentazione") va richiesta separatamente a meno che
dai dati d'ordine e dal CoL non risulti che questa fa parte della
configurazione di fornitura. Se il licenziatario è autorizzato, secondo
quanto indicato al paragrafo 1.1, alla riproduzione del software, ciò vale
anche per la documentazione sempreché questa faccia parte della
configurazione di fornitura.
1.3 Se il licenziatario riceve da noi per il SW una
License Key che permette l'abilitazione tecnica del SW (in seguito denominata
"License Key"), questa va installata insieme con il SW.
1.4 I diritti di utilizzo del SW conferiti al
licenziatario risultano dal tipo di licenza (vedi paragrafo 2) e dal tipo di
SW (vedi paragrafo 3). Tipo di licenza e tipo di SW risultano dai dati
d'ordine e dal CoL. Se la cessione del SW avviene elettronicamente oppure
mediante conferimento di diritti di riproduzione, i diritti e gli obblighi
definiti in queste "Condizioni generali" si riferiscono alle copie
legalmente prodotte.
1.5 Se il licenziatario è regolarmente in possesso di
una versione/release del SW precedente (in seguito denominata "versione
precedente"), egli ha facoltà di esercitare i diritti di utilizzo a
scelta o del SW attuale o - finché tecnicamente possibile - della versione
precedente (downgrading). Se il SW è un Upgrade o un PowerPack secondo il
paragrafo 4, vale inoltre quanto indicato in questo paragrafo.
1.6 Se nella rubrica "Uso parallelo" del
file Leggimi del SW vengono indicate versioni precedenti, il licenziatario ha
il dirittto di esercitare i diritti di utilizzo per il SW opzionalmente con
le versioni precedenti indicate in una (1) istanza. Se la "Type of
use" citata nei dati d'ordine e nel CoL è "Installation" o
"User" il licenziatario può esercitare il diritto descritto
precedentemente e simmultaneamente nelle versioni precedenti elencate in una
istanza. In queste condizioni generali un’"Istanza" è o un’istanza
in un ambiente di sistema operativo fisico, o un’istanza in un ambiente di
sistema operativo virtuale. La possibilita di trasferire i diritti di
utilizzo nelle versioni precedenti è concesso solo comunemente ai diritti di
utilizzo nel SW secondo il paragrafo 5.3.
1.7 Se dai dati d'ordine e dal CoL risulta che il
licenziatario ha solo il supporto dei dati ma nessuna licenza, il
licenziatario è autorizzato all'utilizzo del SW solamente se egli ottiene una
licenza secondo il paragrafo 2. Fino all'entrata in possesso della licenza il
licenziatario non è neppure autorizzato al trasferimento del SW a terzi.
1.8 Se il SW contiene "Open Source
Software" o software analogo di terzi (in seguito denominato
"OSS") quest'ultimo viene indicato nel file Readme_OSS del SW. Il
licenziatario è autorizzato a utilizzare l'OSS secondo le rispettive condizioni
di licenza valide per l'OSS. Queste sono contenute nel supporto dati con il
quale il licenziatario riceve il SW. Le condizioni di licenza specifiche
dell'OSS hanno priorità rispetto alle presenti condizioni generali. Se le
condizioni di licenza dell'OSS prevedono la fornitura del codice sorgente, lo
metteremo a disposizione su richiesta del licenziatario dietro un adeguato
rimborso spese.
1.9 Oltre a OSS, il SW può essere o contenere anche
altri software di licenza, ossia software che non è stato sviluppato da noi
ma che abbiamo ottenuto in licenza da terzi (in seguito denominati
"fornitori di licenza"), ad es. Microsoft Licensing Inc. Se in
questo caso il licenziatario riceve con il SW nel file Readme_OSS le
condizioni del rispettivo fornitore, tali condizioni valgono per la
responsabilità del fornitore di licenza verso il licenziatario. Per quanto
concerne la nostra responsabilità verso il licenziatario valgono in ogni caso
le presenti condizioni generali.
2. Tipo di licenza
A seconda del tipo di licenza sono conferiti al
destinatario i seguenti diritti di utilizzo del SW:
2.1 Single License (One Off License, Copy
License)
Il concetto utilizzato nel certificato di prodotto
software "One Off License, Copy License" corrisponde alla Single
License. Il seguente regolamento vale in senso lato per la One Off
License/Copy License. Il licenziatario riceve il diritto non esclusivo e
illimitato nel tempo - trasferibile secondo il paragrafo 5.3 - di installare
il SW in una (1) istanza e di utilizzare il SW così installato nel modo indicato
nei dati d'ordine e nel CoL (vedi "Type of use").
2.2 Floating License
Il licenziatario riceve il diritto non esclusivo e
illimitato nel tempo - trasferibile secondo il paragrafo 5.3 - di installare
il SW su tutte le proprie apparecchiature a piacere. Il numero di oggetti (ad
es. utenti o apperecchiature) che possono utilizzare il SW contemporaneamente
risulta dai dati d'ordine e dal CoL (vedi "Type of use").
2.3 Rental License
Il licenziatario riceve il diritto non esclusivo e
limitato nel tempo secondo i dati d'ordine ed il CoL (vedi "Type of
use") - trasferibile secondo il paragrafo 5.3 - di installare il SW su
una (1) apparecchiatura e di utilizzarlo. Se la durata di utilizzo è data in
ore, il conteggio del tempo di utilizzo inizia con lo start del SW e finisce
con la relativa chiusura. Se la durata di utilizzo è data in giorni,
settimane o mesi, il conteggio del tempo di utilizzo inizia con il primo
start del SW e prosegue indipendentemente dal tempo di utilizzo effettivo. Se
la durata di utilizzo è specificata con un data, il diritto di utilizzo
finisce con questa data, indipendentemente dall’utilizzo effettivo.
2.4 Rental Floating License
Il licenziatario riceve il diritto non esclusivo, di
durata limitata conforme ai dati d’ordine o al CoL (vedi "Type of
use") e trasferibile secondo il paragrafo 5.3, di installare il SW in
qualsiasi numero di apparecchiature del licenziatario. Il numero di oggetti
(ad es. utenti o apperecchiature) che possono utilizzare il SW
contemporaneamente risulta anche dai dati d’ordine e dal CoL (vedi "Type
of use"). Se la durata di utilizzo è data in ore, il conteggio del tempo
di utilizzo inizia con lo start del SW e finisce con la relativa chiusura. Se
la durata di utilizzo è data in giorni, settimane o mesi, il conteggio del
tempo di utilizzo inizia con il primo start del SW e prosegue
indipendentemente dal tempo di utilizzo effettivo. Se la durata di utilizzo è
specificata con un data, il diritto di utilizzo finisce con questa data,
indipendentemente dall’utilizzo effettivo.
2.5 Demo License
Il licenziatario riceve il diritto non esclusivo, di
durata limitata conforme ai dati d’ordine o al CoL (vedi "Type of
use") e trasferibile secondo il paragrafo 5.3, di installare il SW in
una (1) istanza e di utilizzarlo a scopo di validazione. Se la durata di
utilizzo è data in giorni, settimane o mesi, il conteggio del tempo di
utilizzo inizia con il primo start del SW e prosegue indipendentemente dal
tempo di utilizzo effettivo. Se la durata di utilizzo è specificata con un
data, il diritto di utilizzo finisce con questa data, indipendentemente
dall’utilizzo effettivo.
2.6 Demo Floating License
Il licenziatario riceve il diritto non esclusivo, di
durata limitata conforme ai dati d’ordine o al CoL (vedi "Type of
use") e trasferibile secondo il paragrafo 5.3, di installare il SW in
qualsiasi numero di apparecchiature del licenziatario. Il numero di oggetti
(ad es. utenti o apperecchiature) che possono utilizzare il SW
contemporaneamente a scopo di validazione risulta anche dai dati d’ordine e
dal CoL (vedi "Type of use"). Se la durata di utilizzo è data in
giorni, settimane o mesi, il conteggio del tempo di utilizzo inizia con il
primo start del SW e prosegue indipendentemente dal tempo di utilizzo
effettivo. Se la durata di utilizzo è specificata con un data, il diritto di
utilizzo finisce con questa data, indipendentemente dall’utilizzo effettivo.
2.7 Trial License
Il licenziatario riceve il diritto non esclusivo e
non trasferibile di installare il SW in una (1) istanza e di utilizzarlo a
scopi di valutazione nel modo specificato nei dati d’ordine risp. nel CoL
(vedi "Modo di utilizzo"). La durata di
utilizzo è limitata a 14 giorni - a partire dal primo avvio del SW - a meno
che dai dati d’ordine risp. dal CoL non risulti una durata di utilizzo
differente.
3. Tipo di software
Se il tipo di software non è specificato né nei dati
d'ordine né nel CoL, per l'utilizzo del SW valgono i diritti secondo il
paragrafo 3.2 (Runtime Software).
3.1 Engineering Software (in seguito denominato
"E-SW")
Se il licenziatario sviluppa con l'E-SW propri
programmi o dati che contengono parti dell'E-SW, egli ha il diritto gratuito
di riprodurre queste parti dell'E-SW come parte integrante dei propri
programmi o dati, di utilizzarle e di trasferirle a terzi per l'utilizzo. In
caso di cessione a terzi occorre, in riferimento alle suddette parti
dell'E-SSW, evidenziare in forma scritta quanto specificato ai paragrafi 5.1
e 5.2.
3.2 Runtime Software (in seguito denominato
"R-SW")
Se il licenziatario integra in propri programmi o
dati R-SW o parti di esso, egli deve ottenere prima di ogni installazione o
riproduzione - a seconda di quanto avviene prima - dei propri programmi o
dati, che contengono R-SW o parti di esso, una licenza per il R-SW
corrispondente al modo di utilizzo previsto secondo l'ultimo catalogo Siemens
valido. Se il licenziatario cede i suddetti programmi o dati a terzi per
l'utilizzo, occorre, in riferimento alle parti del R-SW contenute,
evidenziare in forma scritta quanto specificato al paragrafo 5. Rimane
invariato l'obbligo del licenziatario di ottenere una licenza per il R-SW, se
questo è riprodotto in originale. Se nel R-SW sono compresi tool di
parametrizzazione/configurazione e se per questi sono conferiti ulteriori
diritti, ciò risulta dal file Readme dell'R-SW.
4. Upgrade e PowerPack
Se dai dati d'ordine e dal CoL risulta ad es.
dall'aggiunta di "Upgrade" o "PowerPack" al nome di
prodotto del SW, che il SW serve per l'aggiornamento di un altro software (in
seguito denominato "licenza originale") I diritti di utilizzo
conferiti inizialmente al licenziatario con la licenza originale cessano con
l’aggiornamento. I diritti di utilizzo secondo il paragrafo 1.6 non hanno
ripercussioni. Il licenziatario è comunque autorizzato a rimuovere in ogni momento
l'aggiornamento (downgrading) - sempreché ciò sia previsto tecnicamente - ed
a esercitare i diritti di utilizzo del SW conferiti con la licenza originale
secondo quanto specificato al paragrafo 1.5.
5. Ulteriori diritti e obblighi del
licenziatario
5.1 Se sul supporto dei dati o nel file Readme del SW
non è data alcuna indicazione contraria su un numero di copie definito, il
licenziatario può riprodurre da ogni esemplare del SW, per il cui utilizzo è
autorizzato secondo queste "Condizioni generali", un numero
adeguato di copie che possono essere utilizzate esclusivamente a scopo di
salvataggio dei dati. In generale il licenziatario può riprodurre il SW solo
e finché sono da noi conferiti in forma scritta diritti di riproduzione.
5.2 Il licenziatario non può modificare il SW né
risalire nello sviluppo a ritroso o tradurlo e non può inoltre eliminare
alcuna parte nel rispetto delle normative di legge sui diritto d'autore. Il
licenziatario non può rimuovere dal SW o dal supporto dei dati elementi identificatori
alfanumerici, marchi e dichiarazioni di riserva del diritto d'autore e deve
riprodurli immutati qualora abbia autorizzazione di riproduzione. Il presente
regolamento vale parimenti per la documentazione ceduta secondo il paragrafo
1.
5.3 Il licenziatario è autorizzato a trasferire ad
una terza parte il completo diritto di utilizzo acquisito, con il presupposto
che venga stipulato un corrispondente accordo scritto ove si contemplino
tutte le normative di questo paragrafo 5 ed egli non trattenga alcuna copia
del SW. Se il licenziatario ha ricevuto per il SW una License Key, questa va
trasferita alla terza parte insieme con il SW. Inoltre va trasferito il CoL
insieme con queste "Condizioni generali". Il licenziatario esibirà
a Siemens su richiesta in qualsiasi momento il CoL ricevuto per il SW.
5.4 Se il SW è un PowerPack o un Upgrade, il
licenziatario conserverà il Certificate of License o il certificato di
prodotto software della licenza originale e lo esibirà su nostra richiesta in
qualsiasi momento insieme con il CoL del SW. Se il licenziatario trasferisce
il suo diritto di utilizzo del SW PowerPack e del SW Upgrade secondo il
paragrafo 5.3, egli deve trasferire alla terza parte anche Il Certificate of
License o il certificato di prodotto software della licenza originale.
5.5 Se il licenziatario riceve un supporto dei dati,
contenente oltre al SW anche altri prodotti software separati, egli ha un
diritto gratuito, limitato nel tempo, di utilizzare questi prodotti software
esclusivamente a scopo di validazione. La durata di utilizzo è limitata a 14
giorni - a partire dal primo start del rispettivo programma software - a meno
che, ad es. nel file Readme del prodotto software, non sia indicata una
durata diversa. Per questi prodotti software rilasciati esclusivamente a
scopo di validazione valgono le normative di queste "Condizioni
generali". Il licenziatario non è autorizzato a trasferire ad una terza
parte questi prodotti software separatamente, cioè senza il SW.
Per il resto valgono le condizioni del contratto
d'acquisto.
|
自动化与驱动软件产品通用许可条件
(2011-08-01)
1. 提供软件及授予使用软件的权利
1.1 本通用许可条件排他地适用于向被许可方提供的自动化与驱动软件。被许可方的通用条款和条件仅在我方以书面形式表示接受的情况下才能适用。软件的交货范围应由双方签订书面声明加以确定。我们将授予被许可方使用订单确认书中规定的,或者(如被许可方未收到订单确认书)许可证书中规定的,或者(如被许可方收到了软件产品单)软件产品单中规定的软件(以下简称“软件”)的权利。许可证书及软件产品单以下通称为“CoL”。应当在提供软件时或者与交货单据一并将CoL提交给被许可方。提供软件的方法也直接来自于订单确认书,或者来自于订单确认书中包含的软件订单号连同订单确认书生效时届时有效的目录的相关订货信息(以下通称为“订单信息”)或来自于CoL。如果被许可方未收到有关的数据媒介,被许可方应当有权在行使授予其使用软件的权利所必须的范围内复制可以获取的软件。上述规定在经过适当调整后适用于以电子方式提供软件(下载)。在通用许可条件中提到订单信息或CoL的情况下,如果被许可方未收到订单确认书,则应参照CoL的规定。在任何情况下,订单信息中所含的信息也包含在CoL之中。
1.2 与软件相关的文档(以下简称“文档”)应当另行购买,除非订单信息或者CoL规定文档包含在交货的范围之内。如果被许可方经授权按照第1.1条的规定复制软件,则该规定也适用于相关的文档,条件是文档已经包括在交货范围之内。
1.3 在我方向被许可方提供解锁软件的许可密钥(以下简称“许可秘钥”)的情况下,必须安装该许可密钥。
1.4 就软件授予被许可方的各项权利均是根据许可类型(见第2条)和软件类型(见第3条)授予的。许可和软件类型详见订单信息或CoL。如果以电子方式提供软件或者已经授予了复制软件的权利,本通用许可条件中规定的各项权利和责任应当适用于合法生成的副本。
1.5 如果被许可方合法占有软件此前的版本(以下简称“此前版本”),则被许可方将有权自行决定是依据当前软件还是因技术需要而依据先前版本(降级)来行使所授予的使用软件的权利。如果软件是第4部分所述的升级版或加强版,则另外适用第4部分的规定。
1.6 如果先前版本列于软件Readme文件的“平行使用”类别下,则除被授予的软件用户权限外,被许可方还有权在一
(1) 个实例上使用所列的先前版本。如果订单信息或许可条件命名的“使用类型”是:“安装”或“用户”,则被许可方除拥有在实例中使用所列先前版本的权限外,还拥有先前所述的权限。就这些通用许可条件而言,“实例”指的是位于实际操作系统环境或虚拟操作系统环境中的实例。依据第5.3条,只有在拥有软件用户权限的情况下,才能将用户权限转移到先前版本上。
1.7 在被许可方仅获得了数据媒介,但是却未获得订单信息或CoL中规定的许可的情况下,被许可方要使用软件必须首先按照第2条的规定获得许可。在获得了该许可之前,被许可方无权向第三方提供该软件。
1.8 在软件含有开源软件或任何类似的第三方软件(以下简称“开源软件”)的情况下,该开源软件在软件的Readme_OSS-文档中列明。被许可方有权按照开源软件的许可条件使用开源软件。许可条件以与软件相同的数据载体提供。关于开源软件的通用许可条件优先于本通用许可条件。如果开源软件的许可条件要求分配此类开源软件的源代码,经要求我们将在被许可方支付了运输和处置费用之后提供此类源代码。
1.9 软件可以是许可软件,或是包含许可软件除OSS外的软件,即不是由我方自行开发,而是由如微软许可有限公司(Microsoft Licensing Inc.)等第三方(以下简称“许可方”)授予我方许可的软件。在被许可方收到与Readme_OSS-文档中的软件一道提供的,由相关许可方规定的各项条款和条件的情况下,此类条款和条件适用于该许可方针对被许可方应承担的责任。在任何情况下,我方对被许可方所承担的责任应当受本通用许可条件的管辖。
2. 许可类型
根据许可类型,被许可方应当就软件被授予下列各项权利:
2.1 单一许可(一次性许可、复制许可)
软件产品单中有可能使用的“一次性许可”或“复制许可”的字样相当于“单一许可”的字样。下列规定应当适用于所有范围的一次性许可/复制许可。被许可方应当被授予在一台硬件设备上安装软件并且以订单信息或CoL所规定的方式使用软件的权利,该权利是非独占性的,可根据第5.3条的规定转让,并且无特定的限期(详见“使用类型”)。
2.2 浮动许可
被许可方应当被授予在任意台被许可方的硬件设备上安装软件的权利,该权利是非独占性的,可根据第5.3条的规定转让,并且无特定的限期(详见“使用类型”)。允许同时使用软件的对象(例如:用户或设备)也适用订单信息或CoL的规定(详见“使用类型”)。
2.3 租赁许可
被许可方应当被授予在订单信息或CoL规定的时限内在一(1)个实例上安装并使用软件的权利,该权利是非独占性的,可根据第5.3条的规定转让(详见“使用类型”)。如果按照规定是以小时计算使用期限,那么使用时间就是自软件启动时开始,并且在软件关闭时结束。如果使用期限是按照日、周或月规定,那么自首次启动软件起算的规定期限不完全等同于实际使用时间。如果使用期限指定为某具体日期,那么无论实际使用时间长短,使用权利都将于此日期终止。
2.4 租赁浮动许可
被许可方应当被授予在订单信息或CoL规定的时限内在任意数量的被许可方的硬件设备上安装该软件的权利,该权利是非独占性的,可根据第5.3条的规定转让(详见“使用类型”)。允许同时使用软件的对象(例如:用户或设备)也适用订单信息或CoL的规定(详见“使用类型”)。如果按照规定是以小时计算使用期限,那么使用时间就是自软件启动时开始,并且在软件关闭时结束。如果使用期限是按照日、周或月规定,那么自首次启动软件起算的规定期限不完全等同于实际使用时间。如果使用期限指定为某具体日期,那么无论实际使用时间长短,使用权利都将于此日期终止。
2.5 演示许可
被许可方应当被授予在订单信息或CoL规定的时限内在一(1)个实例上安装并进行验证,该权利是非独占性的,可根据第5.3条的规定转让(详见“使用类型”)。如果使用期限是按照日、周或月规定,那么自首次启动软件起算的规定期限不完全等同于实际使用时间。如果使用期限指定为某具体日期,那么无论实际使用时间长短,使用权利都将于此日期终止。
2.6 演示浮动许可
被许可方应当被授予在订单信息或CoL规定的时限内在任意数量的被许可方的硬件设备上安装该软件的权利,该权利是非独占性的,可根据第5.3条的规定转让(详见“使用类型”)。允许同时使用软件的对象(例如:用户或设备)也适用订单信息或CoL的规定(详见“使用类型”)。如果使用期限是按照日、周或月规定,那么自首次启动软件起算的规定期限不完全等同于实际使用时间。如果使用期限指定为某具体日期,那么无论实际使用时间长短,使用权利都将于此日期终止。
2.7 试用许可
被许可方应当被授予在一(1)个实例上安装软件并且为了验证的目的,以订单信息或CoL所规定的方式使用软件的权利,该权利是非独占性的,不得转让(详见“使用类型”)。使用的期限仅限于十四(14)天,并且在启动软件时起算,除非订单信息或CoL中规定了其他的使用期限。
3. 软件类型
如果订单信息或CoL中未规定软件类型,那么第3.2条(运行系统软件)中规定的各项软件权利应当适用于该软件。
3.1 工程软件(以下称为“E-SW”)
在被许可方使用工程软件来生成其自己含有工程软件成份的程序或者数据的情况下,被许可方应当有权在不必支付许可费的情况下复制或者使用作为其自己程序或者数据的组成部分的该工程软件的部分或者将该部分提供给第三方使用。在将该部分提供给第三方使用的情况下,该第三方应当以书面形式就上述工程软件的部分按照第5.1和5.2条的规定遵守相关规定。
3.2 运行系统软件(以下称为“R-SW”)
如果被许可方将运行系统软件或者其任何部分嵌入其自己的程序或数据,被许可方应当在每次安装或者复制(取决于先安装还是先复制)其自己含有运行系统软件或其组成部分的程序或数据时,根据拟采用的相关使用类型并根据届时有效的目录购买运行系统软件的许可。在被许可方向第三方提供此类程序或者数据供其使用的情况下,该第三方应当以书面形式就其中所包含的运行系统软件的组成部分遵守第5条的各项规定。如果复制该运行系统软件的原版,以上规定并不影响被许可方为运行系统软件购买许可的义务。如果运行系统软件含有参数化/配置的工具,而且已经就此赋予了扩展权利,则应当在该运行系统软件的readme文档中详细予以说明。
4. 升级和加强
如果从订单信息或CoL可以明显看出,该软件是另一个软件(以下简称“源许可”)的升级版,如产品名称之后添加了“Upgrade”或“PowerPack” 的字样,那么最初授予被许可方的使用源许可的权利于升级时结束。第1.6条中规定的使用权利不会受此影响。但是,如果技术上有必要,被许可方有权撤销升级(降级)并按照第1.5条的规定就源版本行使使用授予被许可方的软件的权利。
5. 被许可方的进一步权利和义务
5.1 除非软件的数据媒介或者在软件的readme文档中就副本的具体数量另有规定,否则被许可方可以按照本通用许可条件的规定为授予其使用的软件生成适当数量的副本。在此情况下,此类副本只能用于数据备份。此外,被许可方只能在我方已经以书面形式授予了被许可方复制权利的情况下才能复制。
5.2 被许可方无权修改、反编辑软件或者对软件进行反向工程。另外,被许可方也不得提取其任何单独的部分,除非为强制性版权法所允许。此外,被许可方也无权在软件或数据媒介中消除任何字母数字形式的识别标志、商标或者版权声明,而且在被许可方有权制作软件副本的情况下,应当在不加变更的情况下予以复制。上述规定应当相应地适用于按照第1条的规定提供的文档。
5.3 被许可方有权将授权被许可方使用软件的权利转让给第三方,条件是被许可方已经与该第三方达成了符合本第5条中规定的所有条件的书面协议,而且以被许可方不保留该软件的任何副本为前提。如果被许可方收到了该软件的许可密钥,该密钥应当与软件一道向第三方提供。此外,应当将CoL与本通用许可条件一并提供给该第三方。经要求,被许可方应当将就软件提供的CoL随时向我方提供。
5.4 如果软件是属于加强或升级版本,被许可方应当保留源许可的CoL并且经要求随时将其与软件的CoL一并提供给我方。在被许可方按照第5.3条的规定转让加强软件或升级软件的情况下,被许可方还应当将源许可的CoL提供给第三方。
5.5 如果除软件之外,被许可方收到了包含已发布供使用的其他软件产品的数据媒介,则被许可方有权仅为验证的目的,免费在一定期限内使用这些已发布的软件产品。使用期限应当仅限于十四(14)天,自首次启动相关的软件程序开始起算,除非就期限另有规定,如在相关软件产品的readme文档中规定了其他的期限。仅为验证的目的提供的这些软件产品应当比照适用本通用许可条件中包含的各项规定。被许可方不得将不附带软件的软件产品向第三方单独传递。
若无另行规定,开源软件将适用采购合同的条款。
|
2) License
Conditions and Disclaimers for Open Source Software and other Licensed Software
Lizenzbedingungen und
Haftungsausschlüsse für Open Source Software sowie andere Lizenzsoftware
Conditions de licence et
clause de non-responsabilité des logiciels Open Source et autres logiciels sous licence
Términos de licencia y exclusión de
responsabilidades del software de código abierto y demás software de licencia
Condizioni di
licenza ed esclusioni di responsabilità per il software Open Source e altri software di licenza
开源软件及其它已授权软件的
许可条件和免责声明
In the product (Copyright Siemens AG, 2016) the following Open Source Software is used either
unchanged or in a form that we have modified, and additionally the other
License Software noted below:
Im
Produkt (Copyright Siemens AG, 2016) kommt die
unten aufgelistete Open Source Software in unveränderter oder von uns
geänderter Form sowie die unten aufgelistete andere Lizenzsoftware zum Einsatz.
Le produit (Copyright Siemens AG, 2016) met
en œuvre les logiciels Open Source listés ci-dessous, inchangés ou modifiés par
nos soins, ainsi que les autres logiciels sous licence listés ci-dessous.
En el producto (Copyright Siemens AG, 2016) se aplica el software de código
abierto, ya sea sin modificar o modificado por nosotros, y el software de
licencia expuestos más abajo.
Nel prodotto
(Copyright Siemens AG, 2016) viene impiegato il Software Open Source invariato
o modificato da Siemens nonché gli altri software con licenza elencati di
seguito.
在产品
(版权所有 Siemens AG,2016)
中,对开源软件及下面提到的其它授权软件,
应以其原模式或经我方修改的模式使用:
Sie
sind berechtigt, die Open Source Software gemäß den jeweils geltenden Open
Source Software-Lizenzbedingungen zu nutzen. Diese sind in der LiesMich_OSS-Datei
beigefügt und gelten für die jeweilige Open Source Software vorrangig vor den
vorliegenden Allgemeinen Bedingungen. Die Open Source Softwarelizenzbedingungen
gelten auch vorrangig, soweit diese Ihnen aufgrund der Verbindung von
OSS-Komponenten mit proprietären Komponenten bestimmte Rechte auch in Bezug auf
die proprietären Komponenten einräumen.
You are
entitled to use the Open Source Software in accordance with the respective
applicable license conditions of the Open Source Software. These Open Source
Software license conditions are included in the ReadMe_OSS file and shall have
priority over the General Conditions for the respective Open Source Software.
The Open Source Software license conditions shall also have priority in the
event that they grant you certain rights also in relation to the proprietary
components due to the connection of OSS components with proprietary components.
Vous
êtes en droit d’utiliser le logiciel ouvert conformément aux conditions de
licence actuellement en vigueur du logiciel ouvert. Celles-ci figurent dans le
fichier Lisezmoi_OSS et priment, pour le logiciel ouvert sur les présentes
Conditions générales. Les conditions de licence du logiciel ouvert sont
également prioritaires si elles vous accordent certains droits sur des
constituants brevetés du fait de la connexion des constituants OSS avec des
constituants brevetés.
El
usuario está autorizado a utilizar el software de código abierto según las
condiciones de licencia válidas para software de código abierto. Dichas
condiciones están incluidas en el archivo Léame_OSS y tienen preferencia ante
las presentes condiciones generales para el software de código abierto
correspondiente. Las condiciones de licencia para software de código abierto
también tienen preferencia en tanto que estas le concedan determinados derechos,
también en relación a los componentes propietarios, debido a la conexión de
componentes OSS con componentes propietarios.
Siete
autorizzati a utilizzare l'Open Source Software come previsto nelle rispettive
condizioni di licenza applicabili. Queste sono specificate nel file Leggimi_OSS
e hanno priorità rispetto alle Condizioni Generali previste per l'Open Source
Software. Le condizioni di licenza dell'Open Source Software trovano
applicazione in via prioritaria anche qualora, in ragione del collegamento di
componenti OSS con componenti proprietari, vi conferiscano particolari diritti
anche sui componenti proprietari.
您有权遵照开源软件相应的适用许可证条款来使用开源软件。这些开源软件许可证条款包含在 ReadMe_OSS 文件中,它们应优先于相应开源软件的一般条款。当这些开源软件许可证条款授予您特定权限以及由于将 OSS 组件与专有组件连接而涉及到专有组件时,它们也应具有优先权。
Liability for Open Source Software
Haftung für Open Source Software
Responsabilité pour les logiciels Open Source
Responsabilidad por el software de código abierto
Responsabilità per il software Open Source
对开源软件承担的责任
Open Source
Software is provided free of charge. We are liable for the Product including
Open Source Software contained in accordance with the license conditions
applicable to the Product. Any liability for use of Open Source Software beyond
the program flow intended for the Product is explicitly excluded. Furthermore,
any liability for defects resulting from modifications to the Open Source
Software by you or third parties is excluded.
We do not
provide any technical support for the Product if it has been
modified.
Die Open Source
Software wird unentgeltlich überlassen. Wir haften für das Produkt einschließlich
der darin enthaltenen Open Source Software entsprechend den für das Produkt
gültigen Lizenzbestimmungen. Jegliche Haftung für die Nutzung der Open Source
Software über den von uns für das Produkt vorgesehenen Programmablauf hinaus
sowie jegliche Haftung für Mängel, die durch Änderungen der Open Source
Software verursacht werden, ist ausgeschlossen.
Wir leisten keine
technische Unterstützung für das Produkt, wenn dieses geändert wurde.
Les logiciels Open
Source sont mis à disposition gratuitement. Nous assumons la responsabilité
pour le produit ainsi que pour les logiciels Open Source qu’il contient, dans
les limites des dispositions de licence applicables au produit. Nous déclinons
toute responsabilité en cas d’utilisation des logiciels Open Source hors du
cadre d’exécution du programme que nous avons prévu pour le produit ainsi que
toute responsabilité pour les vices qui résulteraient d’une modification des
logiciels Open Source.
Nous ne
fournissons aucune assistance technique pour le produit si ce dernier a été
modifié.
El software de
código abierto se entrega de forma gratuita. Nosotros nos responsabilizamos del
producto, incluido el software de código abierto que contenga, conforme a los
términos de licencia vigentes para el producto. Queda excluida toda
responsabilidad por el uso del software de código abierto más allá de la
ejecución del programa prevista por nosotros para el producto, así como
cualquier responsabilidad relacionada con los fallos que se puedan derivar de
una modificación del software de código abierto.
Igualmente
queda excluido cualquier soporte técnico del producto en aquellos casos en los
que éste haya sido modificado.
Il software Open
Source viene fornito gratuitamente. Siemens risponde del prodotto e del software
Open Source in esso contenuto in conformità a quanto previsto dalle condizioni di
licenza valide per il prodotto. È espressamente esclusa qualsivoglia garanzia sul
software Open Source che vada oltre allo svolgimento del programma previsto da Siemens.
Siemens non risponde inoltre in alcun modo degli errori causati da modifiche apportate
al software Open Source
Non viene
fornito supporto tecnico per un prodotto modificato.
“开源软件”免费提供。我们将按照适用于“产品”的许可条件对“产品”以及其中所包含的“开源软件”承担责任,但明确排除未按产品专用流程使用“开源软件”的一切责任。此外,对于您或第三方对“开源软件”进行修改所造成的缺陷,我方不承担任何责任。
“产品”一旦被修改,我们将不再提供任何技术支持。
Availability
of Source Code
Verfügbarkeit
Source Code
Disponibilité
du code source
Disponibilidad
del código fuente
Disponibilità
del codice sorgente
源代码的获取
Einige Lizenzbedingungen von in diesem Produkt verwendeten
Fremdsoftwarekomponenten verpflichten uns möglicherweise, Ihnen für diese
Komponenten den Quelltext und weitere Informationen zur Verfügung zu stellen.
Soweit der Quelltext und diese Informationen nicht dem Produkt/Software-Paket
beiliegen (z.B. auf Massenspeicher, DVD), können Sie den Quelltext und diese
Informationen gerne bei Siemens gegen Erstattung der Bearbeitungskosten
anfordern. Bitte wenden Sie sich dafür an die am Ende dieses Abschnitts
angegebene Adresse.
Certain
license conditions of third-party software components used in this product may
require Siemens to provide you with the source code and additional information
for such components. If the source code and the information are not provided
with the product/software package (e.g. on mass storage, DVD), you can obtain a
copy from Siemens against payment of shipping and handling charges. Please send
your request to the address stated at the end of this section.
Certaines conditions de licence de constituants logiciels tiers utilisés dans
ce produit pourraient nous obliger à vous remettre le code source et d'autres
informations de ces constituants. Si ces informations ne sont pas fournies le
produit/pack logiciel i (par exemple sur sa mémoire de masse ou sur un DVD),
Siemens vous enverra volontiers ces informations contre remboursement des frais
de traitement. Dans ce cas, veuillez-vous adresser à l'adresse figurant à la
fin de la présente section.
De determinadas condiciones de licencia de componentes de software de
terceros usados en este producto puede deducirse la obligación de entregar el
código fuente y más información para estos componentes. En caso que el código
fuente y dicha información no se entregaran con el producto o paquete de
software (por ejemplo en su memoria de masa o en DVD), puede solicitar tal
información a Siemens contra el pago de los gastos de envío y tramitación. Para
solicitarla deberá dirigirse a la dirección que figura al final de la presente
sección.
Alcune condizioni di licenza di componenti software di terzi utilizzati
nel presente prodotto potrebbero obbligare Siemens a fornirvi il codice
sorgente e informazioni addizionali. Se il codice sorgente e le informazioni
non sono già in dotazione al prodotto/pacchetto software (ad es. nella memoria
di massa o in un DVD) li si può richiedere a Siemens dietro pagamento delle
spese di spedizione e di gestione. La richiesta può essere inviata
all'indirizzo indicato alla fine della presente sezione.
本产品中使用的第三方软件组件的某些许可证条款可能要求西门子向您提供此类组件的源代码和附加信息。如果源代码和信息未随产品/软件包(例如,大容量存储器、DVD)一起提供,则您可在支付运输费和手续费后从西门子处获得一份副本。请将您的请求发送到本部分结尾处的列出的地址。
Siemens AG
Digital Factory
Customer Services DF&PD
DF CS SD CCC TS
Gleiwitzer Str. 555
90475 Nuernberg, Deutschland
Internet: http://www.siemens.com/automation/support-request
Tel.: +49 911 895 7222
Email: support.automation@siemens.com
Siemens Canada Limited
Process Industries and Drives
Customer Services
300 Applewood Crescent
Concord, Ontario, Canada, L4K 5C7
Internet: <https://support.industry.siemens.com/My/ww/en/requests>
Tel.: 1-888-303-3353
Please note the following license conditions and
copyright notices applicable to Open Source Software and other License
Software:
Lesen
Sie bitte die Lizenzbedingungen und Copyright Hinweise der Open Source Software
sowie anderen Lizenzsoftware:
Veuillez
lire les conditions de licence et les informations de copyright des logiciels Open Source ainsi
que des logiciels sous licence :
Por favor,
lea atentamente los términos de licencia y los derechos de copyright del software de código abierto
y demás software de licencia:
Leggere
le condizioni di licenza e le avvertenze di Copyright relative al software Open Source e ad altri
software di licenza:
请注意以下适用于“开源软件”及其它“授权软件”的许可条件和版权提示:
Licenses
|
THE BEER-WARE LICENSE" (Revision 42): phk@FreeBSD.org> wrote this file. As long as you retain this notice you can do whatever you want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp
|
Copyright (c) 1988 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose is hereby granted without fee, provided that the following conditions are met:
One retains the entire copyright notice properly, and both the copyright notice and this license. in the documentation and/or other materials provided with the distribution.
This software and the name of the author must not be used to endorse or promote products derived from this software without prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT EXPRESSED OR IMPLIED WARRANTIES OF ANY KIND, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABLILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL THE AUTHOR TAKAO ABE BE LIABLE FOR ANY DIRECT, INDIRECT, GENERAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES ( INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION ) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT ( INCLUDING NEGLIGENCE OR OTHERWISE ) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This driver is developed in my private time, and is opened as voluntary contributions for the NTP. The manufacturer of the JJY receiver has not participated in a development of this driver. The manufacturer does not warrant anything about this driver, and is not liable for anything about this driver.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
This file was produced by an AutoOpts template. AutoOpts is a copyrighted work. This source file is not encumbered by AutoOpts licensing, but is provided under the licensing terms chosen by the genshellopt author or copyright holder. AutoOpts is licensed under the terms of the LGPL. The redistributable library (''libopts'') is licensed under the terms of either the LGPL or, at the users discretion, the BSD license. See the AutoOpts and/or libopts sources for details.
|
AutoOpts is available under any one of two licenses. The license in use must be one of these two and the choice is under the control of the user of the license.
The GNU Lesser General Public License, version 3 or later See the files "COPYING.lgplv3" and "COPYING.gplv3"
The Modified Berkeley Software Distribution License See the file "COPYING.mbsd"
These files have the following md5sums: COPYING.mbsd: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of Rice University (RICE) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. This software is provided by RICE and the contributors on an "as is" basis, without any representations or warranties of any kind, express or implied including, but not limited to, representations or warranties of non-infringement, merchantability or fitness for a particular purpose. In no event shall RICE or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage.
|
The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Lawrence Berkeley Laboratory. 4. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Trimble Navigation, Ltd. 4. The name of Trimble Navigation Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY TRIMBLE NAVIGATION LTD. ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL TRIMBLE NAVIGATION LTD. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty.
|
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of U.M. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. U.M. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
U.M. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL U.M. BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Vixie Enterprises not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND VIXIE ENTERPRISES DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL VIXIE ENTERPRISES BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission. THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of the author not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS; IN NO EVENT SHALL AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
|
Permission is hereby granted for unlimited modification, use, and distribution. This software is made available with no warranty of any kind, express or implied. This copyright notice must remain intact in all versions of this software.
|
This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
This file is free software; the Free Software Foundation gives unlimited permission to copy and/or distribute it, with or without modifications, as long as this notice is preserved.
|
Free Software Foundation, Inc. This file is free software; the Free Software Foundation gives unlimited permission to copy and/or distribute it, with or without modifications, as long as this notice is preserved. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, to the extent permitted by law; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
This Makefile.in is free software; the Free Software Foundation gives unlimited permission to copy and/or distribute it, with or without modifications, as long as this notice is preserved. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, to the extent permitted by law; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose is hereby
|
Copyrights
|
Copyright (C) 1996, 1997, 1998, 1999, 2001, 2002, 2003, 2004, 2005, 2007, 2009 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1999, 2000, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. Originally by Fran,cois Pinard <pinard@iro.umontreal.ca>, 1996.
|
Copyright (C) 1994 X Consortium
|
Copyright (C) 1999, 2000, 2003, 2004, 2005 Free Software Foundation, Inc. Written by Tom Tromey <tromey@cygnus.com>.
|
Copyright (C) 1999, 2000, 2003, 2004, 2005 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005 Free Software Foundation, Inc. Originally by Gordon Matzigkeit <gord@gnu.ai.mit.edu>, 1996
|
Copyright (C) 2005 Free Software Foundation, Inc.
|
Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
|
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA
|
copyrighted by the Free Software Foundation, write to the Free Software Foundation
|
copyright (c) 1992-2009 by Bruce Korb - all rights reserved
|
Copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Free Software Foundation, Inc.
|
copyright (c) 1993-2009 by Bruce Korb.
|
Copyright (C) 2008 Free Software Foundation, Inc. Written by Bruce Korb <bkorb@gnu.org>, 2008.
|
copyright (c) 2005-2009 by Bruce Korb - all rights reserved
|
copyright (c) 1999-2009 Bruce Korb - all rights reserved
|
copyright (c) 1999-2009 Bruce Korb, all rights reserved
|
copyright (c) 2009 by Bruce Korb - all rights reserved
|
copyright (c) by Bruce Korb - all rights reserved
|
copyright (c) 1992-Y by Bruce Korb
|
copyright (c) 1999-2009 by Bruce Korb - all rights reserved\n
|
Copyright 1994-1999 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, CA 94303 USA.
|
Copyright Apple Computer 1987 Version
|
Copyright (c) University of Delaware 1992-2010
|
Copyright (c) 1998-2005 by Frank Kardel
|
Copyright to Berkeley style
|
Copyright (c) 1995-2006 by Frank Kardel
|
Copyright (c) 1989-1994 by Frank Kardel, Friedrich-Alexander
|
Copyright (C) 1999, 2000 by Philippe De Muyter <phdm@macqel.be>
|
Copyright (c) 1995-2005 by Frank Kardel
|
Copyright (c) 1997-2005 by Frank Kardel
|
Copyright (C) 1991-2005, Frank Kardel\n
|
Copyright (c) 1993-2005, Frank Kardel\n
|
Copyright (c) 1995-2009 by Frank Kardel
|
COPYRIGHT needs a touch.
|
Copyright in Palisade driver to 2000 Fix Palisade MIN & MAX POLL to optimal values
|
COPYRIGHT file extracted from the html documentation.
|
Copyright (c) 1997, 1999 by Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
|
Copyright 2002, 2009, Harlan Stenn.
|
Copyright (c) 1992 Rainer Pruy Friedrich-Alexander Universitaet Erlangen-Nuernberg
|
Copyright (c) 1992 Frank Kardel, Rainer Pruy Friedrich-Alexander Universitaet Erlangen-Nuernberg
|
Copyright (c) 1997 by Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
|
Copyright (c) 1992-1998 Rainer Pruy, Friedrich-Alexander
|
Copyright (C) 1999,2000 Hans Lambermont and Origin B.V.
|
Copyright (C) 1999,2000 Hans Lambermont and Origin B.V. Disclaimer inside.
|
Copyright (c) 1997 by Ulrich Windl
|
Copyright (C) 1993-2005 by Frank Kardel\n\n
|
Copyright (C) 1993-2005, Frank Kardel\n\n
|
COPYRIGHT to BUILT_SOURCES, correct EXTRA_DIST reference to remove unneeded $(srcdir)/ prefix
|
COPYRIGHT in EXTRA_DIST not
|
COPYRIGHT with zero-byte version bk rm
|
Copyright (c) David L. Mills 1999-2009
|
Copyright (c) 1999 by Ulrich Windl,
|
Copyright (C) 2001 Internet Software Consortium.
|
Copyright (c) 1992 Microsoft Corporation
|
Copyright (C) 2006 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1999-2002 Internet Software Consortium.
|
Copyright (C) 1999, 2000 by Bernd Altmeier altmeier
|
Copyright (C) 1999-2001 Internet Software Consortium.
|
copyright (c) 1970-2010 David L. Mills and/or others - all rights reserved
|
copyright (c) 1970-2010 David L. Mills and/or others, all rights reserved
|
Copyright 1992 by Carnegie Mellon University
|
copyrighted by:
|
Copyright (c) 2003 Sun Microsystems, Inc. All rights reserved.
|
Copyright (C) 1989, 2000 Aladdin Enterprises. All rights reserved.
|
copyright claims only only apply to the specific changes made by Y2K to the code.
|
Copyright 1999 AT&T.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
|
Copyright (C) 2002, 2003, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2001, 2003, 2005 Free Software Foundation, Inc.
|
Copyright (C) 1997, 2000, 2001, 2003, 2004, 2005, 2006, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2009 Free Software Foundation, Inc.
|
Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 2000, 2001, 2003, 2005 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2008, 2009 Free Software Foundation, Inc.
|
Copyright (C) 2001, 2003, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2003, 2005 Free Software Foundation, Inc.
|
Copyright (C) 2001, 2002, 2003, 2005, 2009 Free Software Foundation, Inc.
|
Copyright (C) 1999, 2000, 2001, 2003, 2004, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1997, 1999, 2000, 2001, 2003, 2004, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
|
Copyright (C) 2001, 2002, 2003, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 2000, 2001, 2003, 2005, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2006, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2004, 2005 Free Software Foundation, Inc.
|
Copyright (C) 1996 N.M. Maclaren
|
Copyright (C) 1996 The University of Cambridge
|
Copyright (C) 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009 Free Software Foundation, Inc.
|
Copyright (C) 2009 Free Software Foundation, Inc.
|
Copyright (C) 2005-2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2000, 2001 Internet Software Consortium.
|
Copyright (C) 2004-2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2003 Internet Software Consortium.
|
Copyright (C) 2004-2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1999-2001, 2003 Internet Software Consortium.
|
Copyright (C) 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc.
|
Copyright (c) 1987, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (C) 2004, 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2000-2003 Internet Software Consortium.
|
Copyright (C) 2005, 2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1999-2003 Internet Software Consortium.
|
Copyright (C) 2005, 2007, 2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2001-2003 Internet Software Consortium.
|
Copyright (C) 2004, 2007-2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2000-2002 Internet Software Consortium.
|
Copyright (C) 2004, 2006, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2007, 2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2002 Internet Software Consortium.
|
Copyright (C) 2004, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2006-2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1998-2001, 2003 Internet Software Consortium.
|
Copyright (C) 2001, 2002 Internet Software Consortium.
|
Copyright (C) 2004, 2006, 2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1998-2001 Internet Software Consortium.
|
Copyright (C) 2000, 2001, 2003 Internet Software Consortium.
|
Copyright (C) 2004, 2006-2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2005, 2007-2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2006, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2005, 2007, 2009 Internet Systems Consortium, Inc.
|
Copyright (C) 1996-2001 Internet Software Consortium.
|
Copyright (c) 1983, 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1993 by Digital Equipment Corporation.
|
Copyright (C) 2007-2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004-2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1998-2002 Internet Software Consortium.
|
Copyright (c) 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1998-2003 Internet Software Consortium.
|
Copyright (C) 2008 Internet Systems Consortium, Inc. ("ISC")
|
copyright is claimed.
|
Copyright (C) 1997-2003 Internet Software Consortium.
|
Copyright (C) 1997-2001 Internet Software Consortium.
|
Copyright (C) 2006, 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2005-2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright 2000 Aaron D. Gifford. All rights reserved.
|
Copyright (C) 2005, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (c) 1998 Doug Rabson All rights reserved.
|
Copyright (C) 2006-2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2004, 2005, 2007, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2006, 2007 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2007, 2008 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 1997-2002 Internet Software Consortium.
|
Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
|
Copyright (C) 2001, 2003 Internet Software Consortium.
|
Copyright (C) 1996-2003 Internet Software Consortium.
|
Copyright (c) 1998 Doug Rabson.
|
Copyright (c) 2001 Jake Burkholder. All rights reserved.
|
Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1987-1995 Bruce Perens.
|
Copyright 1987-1995 Bruce Perens. All rights reserved.
|
Copyright (c) 1991-1998 University of Maryland at College Park All Rights Reserved.
|
Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved.
|
Copyright (c) 1982, 1986, 1990, 1993 The Regents of the University of California. All rights reserved.
|
(c) Copyright Tai Jin, 1988. All Rights Reserved.
|
Copyright (c) 1983, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983 Regents of the University of California. All rights reserved.
|
Copyright (c) 1988 Regents of the University of California. All rights reserved.
|
Copyright (c) 1987, 1989 Regents of the University of California. All rights reserved.
|
Copyright (C) 2001-2004, Takao Abe. All rights reserved.
|
Copyright (c) 1997, 1998, 1999, 2000 Trimble Navigation Ltd. All rights reserved.
|
Copyright (C) 1992, 1996 by Rainer Pruy Friedrich-Alexander
|
Copyright (c) 2002 RIPE NCC
|
Copyright (c) 1997, 1998, 2003 The Regents of the University of California. All rights reserved.
|
(c) 2002 NEOL S.A. FRANCE / L0.01 NDF:A:* (compile time)
|
Copyright (c) 1989-2009, Frank Kardel
|
COPYRIGHT 1991-1997 MOTOROLA INC.
|
COPYRIGHT 1991-1996 MOTOROLA INC.
|
COPYRIGHT 1991-1994 MOTOROLA INC.
|
COPYRIGHT 1991-2000 MOTOROLA INC.
|
COPYRIGHT 1991-2002 MOTOROLA INC.
|
COPYRIGHT 1991-2003 MOTOROLA INC.
|
Copyright (C) 1984, 1989, 1990, 2000, 2001, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
|
Copyright (c) 1992 The Regents of the University of California. All rights reserved.
|
Copyright (c) 2006 (Some code shamelessly based on the original NTP discrete event simulator)
|
Copyright (c) David L. Mills 1992-1998
|
Copyright 2008, Red Hat, Inc.
|
Copyright 2008, Andrew Tridgell.
|
Copyright 1991-1994, Nick Sayer
|
Copyright 1991, Nick Sayer
|
Copyright (c) 1995 Vixie Enterprises
|
Copyright (c) David L. Mills 1993, 1994
|
Copyright (c) David L. Mills 1999-2000
|
Copyright (C) 2005 by Frank Kardel
|
Copyright (c) 1982, 1986 Regents of the University of California. All rights reserved.
|
Copyright (c) by Meinberg Funkuhren (www.meinberg.de)
|
(c) 1999, 2000 Bernd Altmeier <altmeier@ATLSoft.de> Rev.
|
Licenses
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. THIS SOFTWARE IS PROVIDED BY Berkeley Software Design, Inc. ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL Berkeley Software Design, Inc. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice immediately at the beginning of the file, without modification, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Absolutely no warranty of function or purpose is made by the author John S. Dyson. 4. This work was done expressly for inclusion into FreeBSD. Other use is allowed if this notation is included. 5. Modifications may be freely made to this file if the above conditions are met.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice immediately at the beginning of the file, without modification, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR HIS RELATIVES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF MIND, USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE OPENBSD PROJECT AND CONTRIBUTORS AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENBSD PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990, 1991, 1993 The Regents of the University of California. All rights reserved.
This code is derived from the Stanford/CMU enet packet filter, (net/enet.c) distributed as part of 4.3BSD, and code contributed to Berkeley by Steven McCanne and Van Jacobson both of Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, and the entire permission notice in its entirety, including the disclaimer of warranties. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
ALTERNATIVELY, this product may be distributed under the terms of the GNU Public License, in which case the provisions of the GPL are required INSTEAD OF the above restrictions. (This clause is necessary due to a potential bad interaction between the GPL and the restrictions contained in a BSD-style copyright.)
THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1991-1997 Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the Network Research Group at Lawrence Berkeley Laboratory. 4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1993, 1994, 1995, 1996, 1997 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the Computer Systems Engineering Group at Lawrence Berkeley Laboratory. 4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1989, 1993 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Paul Vixie.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990 The Regents of the University of California. The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Chris Torek.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1992, 1993, 1994 Henry Spencer. Copyright (c) 1992, 1993, 1994 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Henry Spencer.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1995 Charles M. Hannum. All rights reserved. Copyright (c) 1990 The Regents of the University of California. The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by William Jolitz.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by William Jolitz.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1989, 1993 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Mike Muuss.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of The Internet Software Consortium nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of , RadioMail Corporation, the Internet Software Consortium nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY RADIOMAIL CORPORATION, THE INTERNET SOFTWARE CONSORTIUM AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RADIOMAIL CORPORATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) Sun Microsystems, Inc. 1993-1998 All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the SMCC Technology Development Group at Sun Microsystems, Inc.
4. The name of the Sun Microsystems, Inc nor may not be used to endorse or promote products derived from this software without specific prior written permission.
SUN MICROSYSTEMS DOES NOT CLAIM MERCHANTABILITY OF THIS SOFTWARE OR THE SUITABILITY OF THIS SOFTWARE FOR ANY PARTICULAR PURPOSE. The software is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this software.
|
Copyright (C) 1995 Eric Young (eay@mincom.oz.au) All rights reserved.
This file is part of an SSL implementation written by Eric Young (eay@mincom.oz.au). The implementation was written so as to conform with Netscapes SSL specification. This library and applications are FREE FOR COMMERCIAL AND NON-COMMERCIAL USE as long as the following conditions are aheared to.
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this code is used in a product, Eric Young should be given attribution as the author of the parts used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Eric Young (eay@mincom.oz.au)
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the SMCC Technology Development Group at Sun Microsystems, Inc.
4. The name of the Sun Microsystems, Inc nor may not be used to endorse or promote products derived from this software without specific prior written permission.
SUN MICROSYSTEMS DOES NOT CLAIM MERCHANTABILITY OF THIS SOFTWARE OR THE SUITABILITY OF THIS SOFTWARE FOR ANY PARTICULAR PURPOSE. The software is provided "as is" without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this software.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Jonathan Stone and Jason R. Thorpe for the NetBSD Project. 4. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Ericsson Radio Systems. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Christian E. Hopps. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Theo de Raadt. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Niklas Hallqvist. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Charles M. Hannum. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Niels Provos. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Charles D. Cranor and Washington University. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Jason L. Wright 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Portions of this software are Copyright 1995-1998 by Randall Atkinson, Ronald Lee, Daniel McDonald, Bao Phan, and Chris Winters. All Rights Reserved. All rights under this copyright have been assigned to the US Naval Research Laboratory (NRL). The NRL Copyright Notice and License Agreement Version 1.1 (January 17, 1995) applies to these portions of the software. You should have received a copy of the license with this software. If you didn't get a copy, you may request one from <license@ipv6.nrl.navy.mil>.
|
(#)COPYRIGHT 1.1 (NRL) 17 January 1995 NRL grants permission for redistribution and use in source and binary forms, with or without modification, of the software and documentation created at NRL provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgements: This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed at the Information Technology Division, US Naval Research Laboratory. 4. Neither the name of the NRL nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THE SOFTWARE PROVIDED BY NRL IS PROVIDED BY NRL AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL NRL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the US Naval Research Laboratory (NRL).
|
NRL grants permission for redistribution and use in source and binary forms, with or without modification, of the software and documentation created at NRL provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgements: This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed at the Information Technology Division, US Naval Research Laboratory. 4. Neither the name of the NRL nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THE SOFTWARE PROVIDED BY NRL IS PROVIDED BY NRL AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL NRL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
Copyright (c) 1996, 1997, 1998, 1999, Craig Metz, All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Craig Metz and by other contributors. 4. Neither the name of the author nor the names of contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and its contributors. 4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Theodore Ts'o. 4. Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Jason Downs for the OpenBSD system. 4. Neither the name(s) of the author(s) nor the name OpenBSD may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Permission to use, copy, modify, and distribute this software and its documentation is hereby granted (including for commercial or for-profit use), provided that both the copyright notice and this permission notice appear in all copies of the software, derivative works, or modified versions, and any portions thereof, and that both notices appear in supporting documentation, and that credit is given to Carnegie Mellon University in all publications reporting on direct or indirect use of this code or its derivatives.
THIS SOFTWARE IS EXPERIMENTAL AND IS KNOWN TO HAVE BUGS, SOME OF WHICH MAY HAVE SERIOUS CONSEQUENCES. CARNEGIE MELLON PROVIDES THIS SOFTWARE IN ITS ''AS IS'' CONDITION, AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Carnegie Mellon encourages (but does not require) users of this software to return any improvements or extensions that they make, and to grant Carnegie Mellon the rights to redistribute these changes without encumbrance.
|
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions, and any portions thereof, and that both notices appear in supporting documentation.
CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
Carnegie Mellon requests users of this software to return to
Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU School of Computer Science Carnegie Mellon University Pittsburgh PA 15213-3890
any improvements or extensions that they make and grant Carnegie the rights to redistribute these changes.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of IBM not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. IBM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission. THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. The software is provided "as is" and the author disclaims all warranties with regard to this software including all implied warranties of merchantability and fitness. In no event shall the author be liable for any special, direct, indirect, or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of this software.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, and modify this software with or without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software. You may use this code under the GNU public license if you so wish. Please contribute changes back to the authors under this freer than GPL license so that we may further the use of strong encryption without limitations to all.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
|
This code was written by Angelos D. Keromytis in Philadelphia, PA, USA, in April-May 1998
Copyright (C) 1998, 1999 by Angelos D. Keromytis.
Permission to use, copy, and modify this software with or without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, THE AUTHORS MAKES NO REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
|
Arc4 random number generator for OpenBSD. Copyright 1996 David Mazieres <dm@lcs.mit.edu>.
Modification and redistribution in source and binary forms is permitted provided that due credit is given to the author and the OpenBSD project by leaving this copyright notice intact.
This code is derived from section 17.1 of Applied Cryptography, second edition, which describes a stream cipher allegedly compatible with RSA Labs "RC4" cipher (the actual description of which is a trade secret). The same algorithm is used as a stream cipher called "arcfour" in Tatu Ylonen's ssh package.
Here the stream cipher has been modified always to include the time when initializing the state. That makes it impossible to regenerate the same random sequence twice, so this can't be used for encryption, but will generate good random numbers.
RC4 is a registered trademark of RSA Laboratories.
|
International Business Machines, Inc. (hereinafter called IBM) grants permission under its copyrights to use, copy, modify, and distribute this Software with or without fee, provided that the above copyright notice and all paragraphs of this notice appear in all copies, and that the name of IBM not be used in connection with the marketing of any product incorporating the Software or modifications thereof, without specific, written prior permission.
To the extent it has a right to do so, IBM grants an immunity from suit under its patents, if any, for the use, sale or manufacture of products to the extent that such products are used for performing Domain Name System dynamic updates in TCP/IP networks by means of the Software. No immunity is granted for any product per se or for any other function of any product.
THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
All or some portions of this file are derived from material licensed to the University of California by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced herein with the permission of UNIX System Laboratories, Inc.
|
This code was written by Angelos D. Keromytis in Athens, Greece, in February 2000. Network Security Technologies Inc. (NSTI) kindly supported the development of this code.
Copyright (c) 2000, 2001 Angelos D. Keromytis
Permission to use, copy, and modify this software with or without fee is hereby granted, provided that this entire notice is included in all source code copies of any software which is or includes a copy or modification of this software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
|
Permission to use, copy, modify, and distribute this software is freely granted, provided that this notice is preserved.
|
Written by Steve Reid <sreid@sea-to-sky.net> 100% Public Domain - no warranty Released 1997.10.11
|
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message- Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
|
Copyright (C) 1995 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler gzip@prep.ai.mit.edu madler@alumni.caltech.edu
|
Copyrights
|
Copyright (c) 1984, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1996 The Internet Software Consortium. All Rights Reserved.
|
Copyright (c) 1995 RadioMail Corporation. All rights reserved.
|
Copyright (c) 1995, 1996, 1997, 1998 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 2004 Henning Brauer <henning@cvs.openbsd.org>
|
Copyright (c) 1995, 1996, 1998, 1999 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1995, 1996 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1995, 1996, 1998 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1995 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1995, 1996, 1997 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1997, 1998 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1995, 1996, 1999 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1990 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993, 1994\n The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997 The Internet Software Consortium. All rights reserved.
|
Copyright (c) 1996, 1997, 1998, 1999 The Internet Software Consortium. All rights reserved.
|
Copyright 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium.
|
Copyright (c) 1984, 1993\n The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993 Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1989 Stephen Deering
|
Copyright (c) 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993\n Regents of the University of California. All rights reserved.
|
Copyright (c) 1992, 1993 Regents of the University of California. All rights reserved.
|
(c) 2003 Siemens AG History:
|
Copyright (c) 1989, 1993\n The Regents of the University of California. All rights reserved.
|
Copyright (c) 1999 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999 Hakan Olsson. All rights reserved.
|
Copyright (c) 2001
|
Copyright (c) 1998 Niels Provos. All rights reserved.
|
Copyright (c) 2000-2001 Angelos D. Keromytis.
|
Copyright (c) 2000 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1998, 1999, 2000, 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2001 Angelos D. Keromytis. All rights reserved.
|
Copyright (c) 2003, 2004
|
Copyright (c) 1998, 1999 Niels Provos. All rights reserved.
|
Copyright (c) 1999 Angelos D. Keromytis. All rights reserved.
|
Copyright (c) 2000, 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1998 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 2001, 2004
|
Copyright (c) 1998, 1999 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 2002
|
Copyright (c) 2001, 2002, 2003
|
Copyright (c) 1998, 1999, 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2000, 2001, 2003
|
Copyright (c) 2000, 2001, 2002
|
Copyright (c) 2003
|
Copyright (c) 2004
|
Copyright (c) 1999, 2000 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2000, 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2000, 2001 Angelos D. Keromytis. All rights reserved.
|
Copyright (c) 1999 Niels Provos. All rights reserved.
|
Copyright (c) 2000, 2001, 2003
|
Copyright (c) 2000 Angelos D. Keromytis. All rights reserved.
|
Copyright (c) 1999, 2000, 2002
|
Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2000, 2001, 2002
|
Copyright (c) 1993, 1994, 1995, 1996, 1997 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com> All rights reserved.
|
Copyright 1996 David Mazieres <dm@lcs.mit.edu>.
|
Copyright (C) 1991-
|
Copyright (c) 2006 Hans-Joerg Hoexer <hshoexer@openbsd.org>
|
Copyright (c) 1998, 2001 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1999, 2000 Angelos D. Keromytis. All rights reserved.
|
Copyright 2001 Niels Provos <provos@citi.umich.edu> All rights reserved.
|
Copyright (c) 2000, 2003
|
Copyright (c) 1996-1999 by Internet Software Consortium.
|
Copyright (c) 1995 by International Business Machines, Inc.
|
Copyright (c) 2001 Angelos D. Keromytis. All rights reserved.
|
Copyright (c) 2000
|
Copyright (c) 1999, 2000, 2001
|
Copyright (c) 2000, 2001, 2004
|
Copyright (c) 1999, 2000, 2001, 2004
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
|
copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
Copyright remains Eric Young
|
Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) All rights reserved.
|
Copyright (c) 2004 The OpenBSD project
|
Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
Copyright (c) 2001 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1999-2001 The OpenSSL Project. All rights reserved.
|
(c) the shared library will be unloaded.
|
Copyright (c) 2003 The OpenSSL Project. All rights reserved.
|
Copyright (c) 1983, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997, 1998, 2000 The NetBSD Foundation, Inc. All rights reserved.
|
Copyright (c) 1983, 1993\n The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1989, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 2001 Daniel Hartmeier All rights reserved.
|
Copyright (c) 2002 Cedric Berger All rights reserved.
|
Copyright (C) 2002 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (C) 2002, 2003 Henning Brauer. All rights reserved.
|
Copyright (c) 2003 Henning Brauer All rights reserved.
|
Copyright (c) 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1984
|
Copyright (c) 1983, 1989, 1991, 1993\n The Regents of the University of California. All rights reserved.
|
Copyright (c) 2003 Markus Friedl. All rights reserved.
|
Copyright (C) 1995, 1996, 1997, 1998, 1999 by John Ioannidis, Angelos D. Keromytis and Niels Provos.
|
Copyright (c) 2001, Angelos D. Keromytis.
|
Copyright (c) 2001 Theo de Raadt
|
Copyright (c) 2001 Can Erkin Acar All rights reserved.
|
Copyright (c) 1999, 2000 Jason L. Wright (jason@thought.net) All rights reserved.
|
Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved.
|
Copyright (c) 1985, 1986, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1986, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1986, 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997 Charles D. Cranor and Washington University.
|
Copyright (c) 1991, 1993, The Regents of the University of California.
|
Copyright (c) 1987, 1990 Carnegie-Mellon University. All rights reserved.
|
Copyright (c) 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997 Charles D. Cranor and Washington University. All rights reserved.
|
Copyright (c) 1990 University of Utah.
|
Copyright (c) 1998 Chuck Silvers, Charles D. Cranor and Washington University. All rights reserved.
|
Copyright (c) 2000, 2001 The NetBSD Foundation, Inc. All rights reserved.
|
Copyright (c) 1997 Matthew R. Green All rights reserved.
|
Copyright (c) 1991, 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1996 Theo de Raadt
|
Copyright (c) 1982, 1986, 1989, 1993 The Regents of the University of California. All rights reserved.
|
(c) UNIX System Laboratories, Inc. All or some portions of
|
Copyright (C) 1999 WIDE Project. All rights reserved.
|
Copyright (c) 1982, 1986, 1988, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1986, 1988, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997, 1999, 2000 The NetBSD Foundation, Inc. All rights reserved.
|
Copyright (c) 1982, 1986, 1989, 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1999,2000,2001 Jonathan Lemon <jlemon@FreeBSD.org> All rights reserved.
|
Copyright (c) 1982, 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1986, 1988, 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1986, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 2001 Markus Friedl. All rights reserved.
|
Copyright (c) 2001 Jean-Jacques Bernard-Gundol (jj@wabbitt.org)
|
Copyright (c) 2000 Angelos D. Keromytis
|
Copyright (c) SIEMENS AG 2010 All Rights Reserved.
|
Copyright (C) 2010 Siemens Aktiengesellschaft. All rights reserved.
|
Copyright (C) 1995 Eric Young (eay@mincom.oz.au) All rights reserved.
|
Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> All rights reserved.
|
Copyright (c) 2000, 2001 Angelos D. Keromytis
|
Copyright (c) 1999 Theo de Raadt
|
Copyright (c) 1984, 1985, 1986, 1987, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1993 Christopher G. Demetriou All rights reserved.
|
Copyright (c) 1995 Charles M. Hannum. All rights reserved.
|
Copyright (c) 1991 Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1986, 1989, 1991 Regents of the University of California. All rights reserved.
|
Copyright (c) 1996 Charles M. Hannum. All rights reserved.
|
Copyright (c) 1997 Niklas Hallqvist. All rights reserved.
|
Copyright (c) 1993 Charles Hannum. All rights reserved.
|
Copyright (c) 1988 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1989, 1990 William F. Jolitz
|
Copyright (c) 1982, 1986, 1990, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1996 Theo de Raadt All rights reserved.
|
Copyright (c) 1989, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988, 1989, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1995 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997, 1998, 1999, 2000 The NetBSD Foundation, Inc. All rights reserved.
|
Copyright (c) 1982, 1986, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1987, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 2000-2001 Artur Grabowski <art@openbsd.org> All rights reserved.
|
Copyright (c) 1982, 1986, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1999,2000 Jonathan Lemon <jlemon@FreeBSD.org> All rights reserved.
|
Copyright (c) 1985, 1989, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright 2002 Niels Provos <provos@citi.umich.edu> All rights reserved.
|
Copyright (c) 1997 Theo de Raadt All rights reserved.
|
Copyright (c) 2002 Marc Espie.
|
Copyright (c) 1982, 1985, 1986, 1988, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1982, 1988, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1996 John S. Dyson All rights reserved.
|
Copyright (c) 1981, 1984, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1995 Jason R. Thorpe. All rights reserved.
|
Copyright (c) 1982, 1986, 1989, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1996,2000 Michael Shalayeff.
|
Copyright (c) 1996, 1997, 2000-2002 Michael Shalayeff.
|
Copyright Theodore Ts
|
Copyright (c) 1996 Michael Shalayeff
|
Copyright (c) 1995, Mike Mitchell
|
Copyright IBM Corporation 1987
|
Copyright (c) 1988, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1995, 1996, 1997, 1998 by John Ioannidis, Angelos D. Keromytis and Niels Provos.
|
Copyright (c) 1997-1999 Onno van der Linden
|
Copyright (c) 1995 Matt Thomas. All rights reserved.
|
Copyright (c) 1982, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1995, 1996, 1997, 1998, 1999 Craig Metz. All rights reserved.
|
Copyright (c) 1989, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1986, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved
|
Copyright (c) 1990, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1980, 1986, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1995 Jean-loup Gailly and Mark Adler
|
Copyright (C) 1995 Jean-loup Gailly.
|
Copyright (c) 1996 Charles D. Cranor and Washington University. All rights reserved.
|
Copyright (c) 2002 Michael Shalayeff All rights reserved.
|
Copyright (C) 1994 Cronyx Ltd. Author: Serge Vakulenko, <vak@cronyx.ru>
|
Copyright (C) 1997, Joerg Wunsch.
|
Copyright (c) 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1980, 1986, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1998, 2000 The NetBSD Foundation, Inc. All rights reserved.
|
Copyright (c) 1997 Jonathan Stone and Jason R. Thorpe. All rights reserved.
|
Copyright (c) 2001, Angelos D. Keromytis, Niels Provos.
|
Copyright (c) 1994, 1995 Ignatios Souvatzis
|
Copyright (c) 1990, 1991, 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1980, 1986, 1991, 1993 The Regents of the University of California. All rights reserved.
|
Copyright 1995-1998 by Randall Atkinson, Ronald Lee, Daniel McDonald, Bao Phan, and Chris Winters. All Rights Reserved.
|
copyright have been assigned to the US Naval Research Laboratory (NRL).
|
Copyright (c) 2001 Michael Shalayeff All rights reserved.
|
Copyright (C) 1994-1996 Cronyx Engineering Ltd. Author: Serge Vakulenko, <vak@cronyx.ru>
|
Copyright (c) 2004 Hans-Joerg Hoexer <h@as10.net>
|
Copyright (C) 1995 Jean-loup Gailly For conditions of distribution and use, see
|
Copyright (C) 1995 Mark Adler
|
Copyright (c) 1987, 1989, 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1998-2000 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (c) 1990-1994 Regents of the University of California. All rights reserved.
|
Copyright (C) 2000-2002 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (C) 1997-2002 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (c) 1997-1999 Carnegie Mellon University. All Rights Reserved.
|
Copyright (c) Sun Microsystems, Inc. 1993-1998 All rights reserved.
|
Copyright (c) 1991-1997 Regents of the University of California. All rights reserved.
|
Copyright (C) 1999-2000 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (C) 1997-2000 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (C) 2000 Sony Computer Science Laboratories Inc. All rights reserved.
|
Copyright (c) Sun Microsystems, Inc. 1998 All rights reserved.
|
Copyright (c) University of British Columbia, 1984
|
Copyright (c) 1990, 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988 Stephen Deering.
|
Copyright (c) 1999 Niklas Hallqvist.
|
Copyright (c) 1988, 1992, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 2001 WIDE Project. All rights reserved.
|
Copyright (C) 1999-2001 Angelos D. Keromytis.
|
Copyright (c) 1982, 1986, 1988, 1990, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright 1998 Niels Provos <provos@citi.umich.edu> All rights reserved.
|
Copyright (C) 1995, 1996, 1997, 1998, 1999 John Ioannidis, Angelos D. Keromytis and Niels Provos.
|
Copyright (C) 1998, 1999 by Angelos D. Keromytis.
|
copyrighted by Microsoft, IBM, or AT&T.
|
Copyright (c) 1996 by Internet Software Consortium.
|
Copyright (c) 1994 Christian E. Hopps All rights reserved.
|
Copyright (c) 1982, 1985, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1992, 1993, 1994 Henry Spencer.
|
Copyright (c) 1992, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1985, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1993 by Digital Equipment Corporation.
|
Copyright (c) 1997, 2000 Berkeley Software Design, Inc. All rights reserved.
|
Copyright (c) 1985, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1985, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1997, Jason Downs. All rights reserved.
|
Copyright (c) 1993 Carlos Leandro and Rui Salgueiro Dep.
|
Copyright (c) 1997-1999, Craig Metz, All rights reserved.
|
Copyright (c) 1996, 1997, 1998, 1999, Craig Metz, All rights reserved.
|
Copyright (c) 1999 Theo de Raadt All rights reserved.
|
Copyright (c) 1995, 1999 Berkeley Software Design, Inc. All rights reserved.
|
Copyright (C) Siemens AG, 2009. All Rights Reserved.
|
(c) 2003 Siemens AG
|
Copyright 1990-2001 Wind River Systems, Inc.
|
Copyright 1989-2003 Wind River Systems, Inc. include
|
Copyright (c) 1980, 1983, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1991 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1993 The Regents of the University of California. All rights reserved.
|
Copyright Siemens AG A&D PT2D 2004
|
(c) 2004 Siemens AG
|
Copyright (c) 1988 Regents of the University of California. All rights reserved.
|
Copyright 1984-2001 Wind River Systems, Inc.
|
Copyright (c) 1987 Regents of the University of California. All rights reserved.
|
Copyright (C) 1995-1997 Eric Young (eay@mincom.oz.au) All rights reserved.
|
copyright terms except that the holder is Tim Hudson (tjh@mincom.oz.au).
|
Copyright (c) 1983, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1992 Henry Spencer.
|
Copyright (c) 1983, 1987, 1989, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved.
|
Copyright(C) 1995, 1996, Jason Downs. All rights reserved.
|
Licenses
|
Artistic-1.0-Perl: License text see appendix
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, brand or product names may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
License Various copyrights apply to this package, listed in various separate parts below. Please make sure that you read all the parts. Part 1: CMU/UCD copyright notice: (BSD like) ----- Copyright 1989, 1991, 1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000 Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Part 2: Networks Associates Technology, Inc copyright notice (BSD) ----- Copyright (c) 2001-2003, Networks Associates Technology, Inc All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Networks Associates Technology, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
The name of Cambridge Broadband Ltd. may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 4: Sun Microsystems, Inc. copyright notice (BSD) ----- Copyright (c) 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Use is subject to license terms below. This distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 5: Sparta, Inc copyright notice (BSD) ----- Copyright (c) 2003-2009, Sparta, Inc All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 6: Cisco/BUPTNIC copyright notice (BSD) ----- Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) ----- Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss@fabasoft.com Author: Bernhard Penz Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, brand or product names may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 8: Apple Inc. copyright notice (BSD) ----- Copyright (c) 2007 Apple Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Apple Inc. ("Apple") nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Part 9: ScienceLogic, LLC copyright notice (BSD) ----- Copyright (c) 2009, ScienceLogic, LLC All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of the Networks Associates Technology, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
edistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of Apple Inc. ("Apple") nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of ScienceLogic, LLC nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1993, 1994, 1997 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that: (1) source code distributions retain the above copyright notice and this paragraph in its entirety, (2) distributions including binary code include the above copyright notice and this paragraph in its entirety in the documentation or other materials provided with the distribution, and (3) all advertising materials mentioning features or use of this software display the following acknowledgement: This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its contributors.'' Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and TGV not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. CMU AND TGV DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU OR TGV BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Copyright (C) The Internet Society (2003). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
Copyright (c) 2006 G. S. Marzot. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Net-SNMP itself. Copyright (c) 2006 SPARTA, Inc. All Rights Reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Net-SNMP itself.
|
Copyright Patrick Powell 1995 This code is based on code written by Patrick Powell (papowell@astart.com) It may be used for any purpose as long as this notice remains intact on all source code distributions
|
This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission.
CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies. I DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL I BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
THIS SOFTWARE IS NOT COPYRIGHTED This source code is offered for use in the public domain. You may use, modify or distribute it freely. This source code is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY. ALL WARRANTIES, EXPRESS OR IMPLIED ARE HEREBY DISCLAIMED. This includes but is not limited to warranties of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE."
|
Copyrights
|
Copyright (C) 2004, 2005, 2007, 2008 Free Software Foundation, Inc. Written by Gary V. Vaughan, 2004
|
Copyright (C) 2004 Free Software Foundation, Inc. Written by Scott James Remnant, 2004
|
Copyright (C) 2004, 2005, 2007 Free Software Foundation, Inc. Written by Scott James Remnant, 2004.
|
Copyright (C) 1994 X Consortium
|
Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, 2006, 2007 2008 Free Software Foundation, Inc.
|
Copyright 1999, 2000 - D.T.Shield.
|
Copyright 1988, 1989 by Carnegie Mellon University All Rights Reserved
|
Copyright 2003 Sun Microsystems, Inc. All rights reserved.
|
Copyright 1997 Niels Baggesen All Rights Reserved
|
Copyright 1989 by Carnegie Mellon University All Rights Reserved
|
Copyright (c) 1983, 1988, 1993
|
Copyright 1989, 1991, 1992 by Carnegie Mellon University
|
Copyright 1996, 1998-2000 The Regents of the University of California
|
Copyright (c) 2001-2003, Networks Associates Technology, Inc All rights reserved.
|
copyright (c) 2001-2003, Cambridge Broadband Ltd. All rights reserved.
|
Copyright (c) 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.
|
Copyright (c) 2003-2009, Sparta, Inc All rights reserved.
|
Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications. All rights reserved.
|
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss
|
Copyright (c) 2007 Apple Inc. All rights reserved.
|
Copyright (c) 2009, ScienceLogic, LLC All rights reserved.
|
copyright probably resides with UCB.
|
Copyright 1988, 1989 by Carnegie Mellon University
|
Copyright 1989 TGV, Incorporated
|
Copyright 1989 by Carnegie Mellon University
|
(C) 1990 RSA Data Security, Inc.
|
Copyright 1998 by Carnegie Mellon University
|
Copyright 1993 by Carnegie Mellon University
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
|
Copyright (C) The Internet Society (2005).
|
Copyright (C) The Internet Society (2003).
|
Copyright (C) The Internet Society (2002).
|
Copyright (C) The Internet Society (2006).
|
Copyright (C) The Internet Society (2004).
|
Copyright (c) 1999 Frank Strauss, Technical University of Braunschweig.
|
Copyright 1988, 1989, 1991, 1992 by Carnegie Mellon University
|
Copyright 2009 SPARTA, Inc. All rights reserved Use is subject to license terms specified in the COPYING file distributed with the Net-SNMP package.
|
Copyright Â(c) 2009 Science Logic, Inc. All rights reserved.
|
Copyright 1997 Niels Baggesen
|
Copyright (c) 1983, 1988, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1992, 1993 Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993 Regents of the University of California. All rights reserved.
|
Copyright (c) 1983, 1988, 1993\n Regents of the University of California. All rights reserved.
|
Copyright 1996 by Carnegie Mellon University
|
Copyright(c)2004,Cisco URP imburses and Network Information Center in Beijing University of Posts and Telecommunications researches.
|
Copyright (c) 1988, 1989, 1991, 1994, 1995, 1996, 1997, 1998, 1999, 2000 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988, 1989, 1991, 1994, 1995, 1996, 1997, 1998, 1999, 2000\n The Regents of the University of California. All rights reserved.
|
Copyright (C) 2001 Alex Rozin, Optical Access
|
Copyright (c) 2000-2003 Frank Strauss <strauss@ibr.cs.tu-bs.de>
|
Copyright (c) 2000 Frank Strauss <strauss@ibr.cs.tu-bs.de>
|
Copyright (C) 2001 Tali Rozin, Optical Access
|
Copyright (c) 2006-2009 Alex Burger.
|
Copyright (c) 2009 Bart Van Assche <bart.vanassche@gmail.com>.
|
Copyright (c) 2002-2004 Apple Computer, Inc. All rights reserved.
|
Copyright 1988, 1989, 1990 by Carnegie Mellon University
|
Copyright (C) The Internet Society (2002). All Rights Reserved.
|
Copyright (C) The Internet Society (2003). All Rights Reserved.
|
Copyright (C) The Internet Society (1999). All Rights Reserved.
|
Copyright (C) The Internet Society (2000). All Rights Reserved.
|
Copyright (C) Apple, Inc. Use is subject to license terms specified in the COPYING file distributed with the Net-SNMP package.
|
Copyright Tripleplay Services Limited 2005 All rights reserved.
|
Copyright (c) 1995-2000 G. S. Marzot. All rights reserved.
|
Copyright (c) 2001-2002 Networks Associates Technology, Inc. All Rights Reserved.
|
Copyright (c) 2003-2006 SPARTA, Inc. All Rights Reserved.
|
Copyright (c) 1995-2006 G. S. Marzot. All rights reserved.
|
Copyright (c) 2002 Networks Associates Technology, Inc. All rights reserved.
|
Copyright (C) 2001, Paul Marquess.
|
Copyright (C) 1999, Kenneth Albanowski.
|
Copyright 2004 by W. Hardaker
|
Copyright Patrick Powell 1995
|
Copyright (c) 1987, 1993, 1994 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1990, 1993 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1996 by Internet Software Consortium.
|
Copyright 1992 by Carnegie Mellon University
|
Copyright (c) 1990 The Regents of the University of California. All rights reserved.
|
Copyright (c) 1988 Regents of the University of California. All rights reserved.
|
copyright status of Win32 API definitions.
|
copyright status of BSD-derived TCPTV* definitions.
|
Copyright (C) 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc. Written by Gordon Matzigkeit, 1996
|
Copyright (C) 2008 Free Software Foundation, Inc.
|
Copyright (c) 2006 SPARTA, Inc. All Rights Reserved.
|
Copyright (c) 2006 Andy Gross.
|
Copyright (c) 2006, ScienceLogic, LLC All rights reserved.
|
Licenses
|
Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due credit is given to the University of California at Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. This software is provided ''as is'' without express or implied warranty.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ''AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
Copyright (c) 1989 The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1992, 1993, 1994 Henry Spencer. Copyright (c) 1992, 1993, 1994 The Regents of the University of California. All rights reserved. This code is derived from software contributed to Berkeley by Henry Spencer.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1983, 1989, 1993 Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1992 Henry Spencer. Copyright (c) 1992, 1993 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Henry Spencer of the University of Toronto.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1988 Stephen Deering. Copyright (c) 1992, 1993 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Stephen Deering of Stanford University.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 The Regents of the University of California. All rights reserved.
This code is derived from the Stanford/CMU enet packet filter, (net/enet.c) distributed as part of 4.3BSD, and code contributed to Berkeley by Steven McCanne and Van Jacobson both of Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990, 1991, 1992, 1994, 1995, 1996 The Regents of the University of California. All rights reserved. This code is derived from the Stanford/CMU enet packet filter, (net/enet.c) distributed as part of 4.3BSD, and code contributed to Berkeley by Steven McCanne and Van Jacobson both of Lawrence Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 1990 The Regents of the University of California. All rights reserved. This code is derived from software contributed to Berkeley by Chris Torek.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission. THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
Intel hereby grants you permission to copy, modify, and distribute this software and its documentation. Intel grants this permission provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation. In addition, Intel grants this permission provided that you prominently mark as not part of the original any modifications made to this software or documentation, and that the name of Intel Corporation not be used in advertising or publicity pertaining to distribution of the software or the documentation without specific, written prior permission. Intel Corporation does not warrant, guarantee or make any representations regarding the use of, or the results of the use of, the software and documentation in terms of correctness, accuracy, reliability, currentness, or otherwise; and you rely on the software, documentation and results solely at your own risk.
|
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided only with the following conditions are satisfied:
1. Both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions, and any portions thereof, and that both notices appear in supporting documentation. 2. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by WIDE Project and its contributors. 3. Neither the name of WIDE Project nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE DEVELOPER ''AS IS'' AND WIDE PROJECT DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. ALSO, THERE IS NO WARRANTY IMPLIED OR OTHERWISE, NOR IS SUPPORT PROVIDED.
Feedback of the results generated from any improvements or extensions made to this software would be much appreciated. Any such feedback should be sent to:
Akihiro Tominaga WIDE Project Keio University, Endo 5322, Kanagawa, Japan (E-mail: dhcp-dist@wide.ad.jp)
WIDE project has the rights to redistribute these changes.
|
Permission to use, copy, modify, and distribute this program for any purpose and without fee is hereby granted, provided that this copyright and permission notice appear on all copies and supporting documentation, the name of Carnegie Mellon not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be given in supporting documentation that copying and distribution is by permission of Carnegie Mellon and Stanford University. Carnegie Mellon makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
|
Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that this legend is included on all tape media and as a part of the software program in whole or part. Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute it to anyone else except as part of a product or program developed by the user.
SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement.
SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY PART THEREOF.
In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the possibility of such damages.
Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, California 94043
|
THIS SOFTWARE IS PROVIDED BY GALILEO TECHNOLOGY INC. ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL GALILEO TECHNOLOGY INC. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ANY REDISTRIBUTION OF THIS SOURCE CODE MUST RETAIN THE COPYRIGHT AND DECLARATION STATED ABOVE.
|
Third Eye Software, Inc. grants reproduction and use rights to all parties, PROVIDED that this comment is maintained in the copy.
|
This is an unsupported release of the Background Debug Mode (BDM) Back End. It is provided AS IS with no warranties of any kind.
|
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message- Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
|
Copyrights
|
(C) Copyright 1984 by Third Eye Software, Inc.
|
Copyright 1999-2001 Wind River Systems.
|
Copyright (C) 1984, Sun Microsystems, Inc.
|
Copyright (C) 1986, Sun Microsystems, Inc.
|
Copyright (C) 1990, RSA Data Security, Inc.
|
Copyright (C) M-Systems Ltd. 1995-1996
|
Copyright (C) M-Systems Ltd. 1995-1997
|
Copyright (c) 1980, 1983, 1988, 1993 The Regents of the University of California.
|
Copyright (c) 1980, 1986 Regents of the University of California.
|
Copyright (c) 1980, 1986, 1993 The Regents of the University of California
|
Copyright (c) 1982, 1985, 1986, 1988, 1993, 1994 The Regents of the University of California.
|
Copyright (c) 1982, 1986 Regents of the University of California.
|
Copyright (c) 1982, 1986, 1988, 1990, 1993, 1994, 1995 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1988, 1990, 1993, 1995 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1988, 1993 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1989, 1993 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1990, 1993 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1993 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1993, 1994 The Regents of the University of California.
|
Copyright (c) 1982, 1986, 1993, 1994, 1995 The Regents of the University of California.
|
Copyright (c) 1983 Regents of the University of California.
|
Copyright (c) 1983, 1987, 1989 The Regents of the University of California.
|
Copyright (c) 1983, 1988, 1993 The Regents of the University of California.
|
Copyright (c) 1983, 1989 Regents of the University of California.
|
Copyright (c) 1983, 1989, 1993 The Regents of the University of California.
|
Copyright (c) 1983, 1993 The Regents of the University of California.
|
Copyright (c) 1984 AT&T
|
Copyright (c) 1984, 1989, 1990 AT&T.
|
Copyright (c) 1985 by Sun Microsystems, Inc.
|
Copyright (c) 1985, 1986, 1993 The Regents of the University of California.
|
Copyright (c) 1985-1995, Microsoft Corporation.
|
Copyright (c) 1986 by Sun Microsystems, Inc.
|
Copyright (c) 1986, 1989 MIPS Computer Systems, Inc.
|
Copyright (c) 1986, 1993 The Regents of the University of California.
|
Copyright (c) 1986-1995 Frame Technology Corporation
|
Copyright (c) 1987 Regents of the University of California.
|
Copyright (c) 1988 Stephen Deering.
|
Copyright (c) 1988, 1989, 1993 The Regents of the University of California.
|
Copyright (c) 1988, 1993 The Regents of the University of California.
|
Copyright (c) 1989 Carnegie Mellon University.
|
Copyright (c) 1989 Stephen Deering.
|
Copyright (c) 1989, 1993 The Regents of the University of California.
|
Copyright (c) 1989, 1993, 1994 The Regents of the University of California.
|
Copyright (c) 1989, Intel Corporation
|
Copyright (c) 1990 The Regents of the University of California
|
Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 The Regents of the University of California.
|
Copyright (c) 1990, 1991, 1992, 1994, 1995, 1996 The Regents of the University of California.
|
Copyright (c) 1990, 1993 The Regents of the University of California.
|
Copyright (c) 1990,1991 Intel Corporation
|
Copyright (c) 1991 AT&T and UNIX System Laboratories, Inc.
|
Copyright (c) 1991 Gregory M. Christy
|
Copyright (c) 1992 Henry Spencer.
|
Copyright (c) 1992, 1993 The Regents of the University of California.
|
Copyright (c) 1992, 1993, 1994 The Regents of the University of California.
|
Copyright (c) 1992, 1993, 1994 Henry Spencer.
|
Copyright (c) 1993 by Digital Equipment Corporation.
|
Copyright (c) 1993, 1994 RST Software Industries Ltd.
|
Copyright (c) 1994 David A. Hinds
|
Copyright (c) 1995 Akihiro Tominaga
|
Copyright (c) 1995 WIDE Project
|
Copyright (c) 1996 Applied Microsystems Corp.
|
Copyright (c) 1996 Applied Microsystems Corporation
|
Copyright (c) 1998 Wind River Systems, Inc.
|
Copyright (c) 1999 Wind River Systems, Inc.
|
Copyright (c) 1999-2001 Wind River systems, Inc.
|
Copyright (c) 2000, Wind River Systems, Inc.
|
Copyright (c) 2001 Wind River Systems, Inc.
|
Copyright (c) 2002, Wind River Systems, Inc.
|
Copyright (c) Galileo Technology Inc.
|
Copyright (c) Wind River Systems, Inc. 2001 IMarshal LPMARSHAL
|
Copyright (c) Wind River Systems, Inc. 2001
|
Copyright 1984 - 1996 Wind River Systems, Inc.
|
Copyright 1984 - 1997 Wind River Systems, Inc.
|
Copyright 1984 - 1999 Wind River Systems, Inc.
|
Copyright 1984 - 2000 Wind River Systems, Inc.
|
Copyright 1984 - 2001 Wind River Systems, Inc.
|
Copyright 1984 - 2001, 2005 Wind River Systems, Inc.
|
Copyright 1984 - 2002 Wind River Systems, Inc.
|
Copyright 1984 - 2002 Wind River Systems, Inc. include "
|
Copyright 1984 - 2003 Wind River Systems, Inc.
|
Copyright 1984 - 2003, 2005 Wind River Systems, Inc.
|
Copyright 1984 - 2004 Wind River Systems, Inc.
|
Copyright 1984-1991 Wind River Systems, Inc.
|
Copyright 1984-1992 Wind River Systems, Inc.
|
Copyright 1984-1993 Wind River Systems, Inc.
|
Copyright 1984-1994 Wind River Systems, Inc.
|
Copyright 1984-1995 Wind River Systems, Inc.
|
Copyright 1984-1998 Wind River Systems, Inc.
|
Copyright 1984-1999 Wind River htmlSystems, Inc.
|
Copyright 1984-2002, Wind River Systems
|
Copyright 1984-2002, Wind River Systems, Inc. Alameda, CA
|
Copyright 1986-1989, Wind River Systems, Inc.
|
Copyright 1986-2002 Wind River Systems Inc.
|
Copyright 1988 by Carnegie Mellon.
|
Copyright 1988-2002 Wind River Systems Inc.
|
Copyright 1989-1993 Wind River Systems, Inc.
|
Copyright 1989-1995 Wind River Systems, Inc.
|
Copyright 1989-1997 Wind River Systems, Inc.
|
Copyright 1989-1999 Wind River Systems, Inc.
|
Copyright 1989-2000 Wind River Systems, Inc.
|
Copyright 1989-2002 Wind River Systems, Inc.
|
Copyright 1989-2003 Wind River Systems, Inc.
|
Copyright 1990 - 2003 Wind River Systems, Inc.
|
Copyright 1990-1992 Wind River Systems, Inc.
|
Copyright 1990-1993 Wind River Systems, Inc.
|
Copyright 1990-1996 Wind River Systems, Inc.
|
Copyright 1990-2001 Wind River Systems, Inc.
|
Copyright 1990-2002 Wind River Systems, Inc.
|
Copyright 1991-1992 Wind River Systems, Inc.
|
Copyright 1991-1994 Wind River Systems, Inc.
|
Copyright 1991-1997 Wind River Systems, Inc.
|
Copyright 1991-1998 Wind River Systems, Inc.
|
Copyright 1991-1999 Wind River Systems, Inc.
|
Copyright 1991-2001 Wind River Systems, Inc.
|
Copyright 1991-2002 Wind River Systems, Inc.
|
Copyright 1992 - 1998 Wind River Systems, Inc.
|
Copyright 1992 - 1999 Wind River Systems, Inc.
|
Copyright 1992 - 2000 Wind River Systems, Inc.
|
Copyright 1992 - 2001 Wind River Systems, Inc.
|
Copyright 1992 - 2002 Wind River Systems, Inc.
|
Copyright 1992 - 2003 Wind River Systems, Inc.
|
Copyright 1992 - 2004 Wind River Systems, Inc.
|
Copyright 1992 Wind River Systems, Inc.
|
Copyright 1992,1993 Wind River Systems, Inc.
|
Copyright 1992-1992 Wind River Systems, Inc.
|
Copyright 1992-1993 Wind River Systems, Inc.
|
Copyright 1992-1995 Wind River Systems, Inc.
|
Copyright 1992-1996 Wind River Systems, Inc.
|
Copyright 1992-1997 Wind River Systems, Inc.
|
Copyright 1993 Wind River Systems, Inc.
|
Copyright 1993-1993 Wind River System, Inc.
|
Copyright 1993-1994 Wind River Systems, Inc.
|
Copyright 1993-1995 Wind River Systems, Inc.
|
Copyright 1993-1996 Wind River System, Inc.
|
Copyright 1993-1998 Wind River Systems, Inc.
|
Copyright 1993-2001 Wind River System, Inc.
|
Copyright 1993-2001 Wind River Systems, Inc.
|
Copyright 1993-2002 Wind River System, Inc.
|
Copyright 1993-2002 Wind River Systems, Inc.
|
Copyright 1993-95 Wind River Systems, Inc.
|
Copyright 1993-96 Wind River Systems, Inc.
|
Copyright 1994 - 2001 Wind River Systems, Inc.
|
Copyright 1994 Wind River Systems, Inc.
|
Copyright 1994-1996 Wind River Systems, Inc.
|
Copyright 1994-1997 Wind River Systems, Inc.
|
Copyright 1994-1998 Wind River Systems, Inc.
|
Copyright 1994-2000 Wind River Systems, Inc.
|
Copyright 1994-2002 Wind River Systems, Inc.
|
Copyright 1995 - 2003 Wind River Systems, Inc.
|
Copyright 1995 Wind River Systems, Inc.
|
Copyright 1995-1996 Wind River Systems, Inc.
|
Copyright 1995-1999 Wind River Systems, Inc.
|
Copyright 1995-2001 Wind River Systems, Inc.
|
Copyright 1996 - 2001 Wind River Systems, Inc.
|
Copyright 1996 - 2002 Wind River Systems, Inc.
|
Copyright 1996 - 2003 Wind River Systems, Inc.
|
Copyright 1996 Applied Microsystems, Inc.
|
Copyright 1996 Crystal Semiconductor Corp.
|
Copyright 1996 Wind River Systems, Inc.
|
Copyright 1996, 1997, 2001, 2002, 2004, 2005 Wind River Systems, Inc.
|
Copyright 1996-1997 Wind River Systems, Inc.
|
Copyright 1996-1998 Wind River Systems, Inc.
|
Copyright 1996-1998, 2000-2005 Wind River Systems, Inc.
|
Copyright 1996-1999 Wind River Systems, Inc.
|
Copyright 1996-2000 Wind River Systems, Inc.
|
Copyright 1996-2003, 2005 Wind River Systems, Inc.
|
Copyright 1997 - 1999 Wind River Systems, Inc.
|
Copyright 1997 Wind River Systems, Inc.
|
Copyright 1997,1998 Motorola, Inc.
|
Copyright 1997,1998,1999 Motorola, Inc.
|
Copyright 1997-1998 Wind River Systems, Inc.
|
Copyright 1997-2000 Wind River Systems, Inc.
|
Copyright 1997-2001 Wind River Systems, Inc.
|
Copyright 1997-2002 Wind River Systems, Inc.
|
Copyright 1998 CETIA Inc.
|
Copyright 1998-1999 Wind River Systems, Inc.
|
Copyright 1998-2000 Wind River Systems, Inc.
|
Copyright 1998-2001 Wind River Systems, Inc
|
Copyright 1998-2002 Wind River Systems, Inc.
|
Copyright 1998-2003, Wind River Systems, Inc.
|
Copyright 1999 - 2000 Wind River Systems, Inc.
|
Copyright 1999 - 2002 Wind River Systems, Inc.
|
Copyright 1999-2000 Motorola, Inc.,
|
Copyright 2000 - 2001 Wind River Systems, Inc.
|
Copyright 2000 - 2002 Wind River Systems, Inc.
|
Copyright 2000 - 2004 Wind River Systems, Inc.
|
Copyright 2000,2001 Broadcom Corporation.
|
Copyright 2001 Wind River Systems, Alameda, CA
|
Copyright 2001-2002 Wind River Systems, Inc.
|
Copyright 2001-2003 Wind River Systems, Inc.
|
Copyright 2003 Wind River Systems, Inc.
|
Copyright 2003 by FS Forth-Systeme GmbH.
|
Copyright FS Forth-Systeme GmbH.
|
Copyright Wind River Systems, Inc., 1984-2002
|
Copyright by Hannu Savolainen 1993-1999
|
Copyrights
|
(c) CopyRight EdelWeb for EdelKey and OpenEvidence, 2000-2004, 2009
|
COPYRIGHT 1996 - 2014 Daniel Stenberg, <daniel@haxx.se>.
|
Copyright (C) 1990-2, RSA Data Security, Inc. All rights reserved.
|
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
|
Copyright (C) 1992-1996, 1998-2012 Free Software Foundation, Inc.
|
Copyright (C) 1994 X Consortium
|
Copyright (C) 1994-2013 Free Software Foundation, Inc.
|
Copyright (C) 1996, 1997, 1998, 1999, 2000, 2001, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc.
|
Copyright (C) 1996-2001 Internet Software Consortium.
|
Copyright (C) 1996-2013 Free Software Foundation, Inc.
|
Copyright (C) 1997 - 2011, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1997 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1997-2013 Free Software Foundation, Inc.
|
Copyright (C) 1998 - 2005, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2007, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2008, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2009, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2010, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2011, 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2011, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2012, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1998 - 2014, Vijay Panghal, <vpanghal@maginatics.com>
|
Copyright (C) 1998-2013 Daniel Stenberg
|
Copyright (C) 1999 - 2010, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1999 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1999 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 1999-2013 Free Software Foundation, Inc.
|
Copyright (C) 2001 - 2012, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2001 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2001 Eric Lavigne
|
Copyright (C) 2001-2013 Free Software Foundation, Inc.
|
Copyright (C) 2002-2013 Free Software Foundation, Inc.
|
Copyright (C) 2003-2013 Free Software Foundation, Inc.
|
Copyright (C) 2004 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2004 Free Software Foundation, Inc.
|
Copyright (C) 2004, 2005, 2007, 2008 Free Software Foundation, Inc.
|
Copyright (C) 2004, 2005, 2007, 2008, 2009 Free Software Foundation, Inc.
|
Copyright (C) 2004, 2005, 2007, 2009 Free Software Foundation, Inc.
|
Copyright (C) 2004-2013 Free Software Foundation, Inc.
|
Copyright (C) 2006, David Shaw <dshaw@jabberwocky.com>
|
Copyright (C) 2006-2013 Free Software Foundation, Inc.
|
Copyright (C) 2009 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2009, 2011, Markus Moeller, <markus_moeller@compuserve.com>
|
Copyright (C) 2009-2013 Free Software Foundation, Inc.
|
Copyright (C) 2010 - 2011, Hoi-Ho Chan, <hoiho.chan@gmail.com>
|
Copyright (C) 2010 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2010 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2010, 2011, Hoi-Ho Chan, <hoiho.chan@gmail.com>
|
Copyright (C) 2010, 2013, Howard Chu, <hyc@openldap.org>
|
Copyright (C) 2010, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2010, DirecTV contact: Eric Hu <ehu@directv.com>
|
Copyright (C) 2010, Hoi-Ho Chan, <hoiho.chan@gmail.com>
|
Copyright (C) 2010, Howard Chu, <hyc@highlandsun.com>
|
Copyright (C) 2010, Mandy Wu, <mandy.wu@intel.com>
|
Copyright (C) 2010-2011, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2010-2012, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2011 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2011 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2011 Free Software Foundation, Inc.
|
Copyright (C) 2011, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2012 - 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2012 - 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2012 - 2014, Linus Nielsen Feltzing, <linus@haxx.se>
|
Copyright (C) 2012 - 2014, Marc Hoersken, <info@marc-hoersken.de>
|
Copyright (C) 2012 - 2014, Nick Zitzmann, <nickzman@gmail.com>
|
Copyright (C) 2012 - 2014, Steve Holme, <steve_holme@hotmail.com>.
|
Copyright (C) 2012 Free Software Foundation, Inc.
|
Copyright (C) 2012, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2012, Linus Nielsen Feltzing, <linus@haxx.se>
|
Copyright (C) 2012, Marc Hoersken, <info@marc-hoersken.de>
|
Copyright (C) 2012, Mark Salisbury, <mark.salisbury@hp.com>
|
Copyright (C) 2013 - 2014, Linus Nielsen Feltzing, <linus@haxx.se>
|
Copyright (C) 2013, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2013, Linus Nielsen Feltzing <linus@haxx.se>
|
Copyright (C) 2013-2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2014, Daniel Stenberg, <daniel@haxx.se>
|
Copyright (C) 2014, Steve Holme, <steve_holme@hotmail.com>
|
Copyright (C) 2014, Vijay Panghal, <vpanghal@maginatics.com>
|
Copyright (c) 1983 Regents of the University of California. All rights reserved.
|
Copyright (c) 1995, 1996, 1997, 1998, 1999, 2013 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, Sweden).
|
Copyright (c) 1996 by Internet Software Consortium.
|
Copyright (c) 1998, 1999 Kungliga Tekniska Högskolan.
|
Copyright (c) 1998, 1999, 2013 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, Sweden).
|
Copyright (c) 2000 David Odin (aka DindinX)
|
Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org>
|
Copyright (c) 2003 Simtec Electronics
|
Copyright (c) 2003 The OpenEvidence Project. All rights reserved.
|
Copyright (c) 2004 - 2012 Daniel Stenberg All rights reserved.
|
Copyright (c) 2011, Jim Hollinger All rights reserved.
|
Copyright 1992-2014 Free Software Foundation, Inc.
|
Copyright 1996, 1997, 1999, 2000 Free Software Foundation, Inc.
|
Copyright 2009, John Malmberg
|
Copyright 2011, John Malmberg
|
Copyright 2012 Google Inc. All Rights Reserved.
|
Copyright 2012, John Malmberg
|
Copyright 2013, John Malmberg
|
Copyright: MIT/X derivate Vendor: Daniel Stenberg <Daniel.Stenberg@haxx.se>
|
Copyright: MPL Vendor: Daniel Stenberg <Daniel.Stenberg@haxx.se>
|
copyright 1998-2002 by Daniel Stenberg vendor Daniel Stenberg, <daniel@haxx.se>
|
Licenses
|
Apache-2: License text see appendix
|
This module may be used under the terms of either the GNU General Public License version 2 or later, the GNU Lesser General Public License version 2.1 or later, the Mozilla Public License version 1.1 or the BSD License. The exact terms of either license are distributed along with this module. For further details see http://www.openssl.org/~appro/camellia/.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 'AS IS' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with opr without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer, in the documentation and/or other materials provided with the distribution IN NO EVENT SHALL NCIPHER CORPORATION LIMITED ('NCIPHER') AND/OR ANY OTHER AUTHORS OR DISTRIBUTORS OF THIS FILE BE LIABLE for any damages arising directly or indirectly from this file, its use or this licence. Without prejudice to the generality of the foregoing: all liability shall be excluded for direct, indirect, special, incidental, consequential or other damages or any loss of profits, business, revenue goodwill or anticipated savings liability shall be excluded even if nCipher or anyone else has been advised of the possibility of damage. In any event, if the exclusion of liability is not effective, the liability of nCipher or any author or distributor shall be limited to the lesser of the price paid and 1,000 pounds sterling. This licence only fails to exclude or limit liability for death or personal injury arising out of negligence, and only to the extent that such an exclusion or limitation is not effective. NCIPHER AND THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ALL AND ANY WARRANTIES (WHETHER EXPRESS OR IMPLIED), including, but not limited to, any implied warranties of merchantability, fitness for a particular purpose, satisfactory quality, and/or non-infringement of any third party rights. US Government use: This software and documentation is Commercial Computer Software and Computer Software Documentation, as defined in sub-paragraphs (a)(1) and (a)(5) of DFAR 252.227-7014, "Rights in Noncommercial Computer Software and Noncommercial Computer Software Documentation." Use, duplication or disclosure by the Government is subject to the terms and conditions specified here. By using or distributing this file you will be accepting these terms and conditions, including the limitation of liability and lack of warranty. If you do not wish to accept these terms and conditions, DO NOT USE THE FILE. The actual dynamically loadable plugin, and the library files for static linking, which are also provided in some distributions, are not covered by the licence described above. You should have received a separate licence with terms and conditions for these library files; if you received the library files without a licence, please contact nCipher.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Neither the name of author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Written by Andy Polyakov <appro@fy.chalmers.se> for the OpenSSL project. The module is, however, dual licensed under OpenSSL and CRYPTOGAMS licenses depending on where you obtain it. For further details see http://www.openssl.org/~appro/cryptogams/. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain copyright notices, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the CRYPTOGAMS nor the names of its copyright holder and contributors may be used to endorse or promote products derived from this software without specific prior written permission. ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. ECDH support in OpenSSL originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
This package is an DES implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with MIT's libdes. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution. Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of that the SSL library. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Eric Young (eay@cryptsoft.com) THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distrubution license including the GNU Public License.] The reason behind this being stated in this direct manner is past experience in code simply being copied and the attribution removed from it and then being distributed as part of other packages. This implementation was a non-trivial and unpaid effort.
|
The Elliptic Curve Public-Key Crypto Library (ECC Code) included herein is developed by SUN MICROSYSTEMS, INC., and is contributed to the OpenSSL project. The ECC Code is licensed pursuant to the OpenSSL open source license provided below. The ECDH software is originally written by Douglas Stebila of Sun Microsystems Laboratories.
Copyright (c) 2000-2002 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact licensing@OpenSSL.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license. The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL. No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise. No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution. THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
The Elliptic Curve Public-Key Crypto Library (ECC Code) included herein is developed by SUN MICROSYSTEMS, INC., and is contributed to the OpenSSL project.
The ECC Code is licensed pursuant to the OpenSSL open source license provided below.
The software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
(#)des.h 2.2 88/08/10 4.0 RPCSRC; from 2.7 88/02/08 SMI
Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that this legend is included on all tape media and as a part of the software program in whole or part. Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute it to anyone else except as part of a product or program developed by the user.
SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement.
SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY PART THEREOF.
In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the possibility of such damages.
Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, California 94043
Generic DES driver interface Keep this file hardware independent Copyright (c) 1986 by Sun Microsystems, Inc.
|
Written by Corinne Dive-Reclus(cdive@baltimore.com)
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact licensing@OpenSSL.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
Written by Corinne Dive-Reclus(cdive@baltimore.com)
Copyright@2001 Baltimore Technologies Ltd. All right Reserved.
THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
include <stdio.h> include <string.h> include <
|
This package is an Blowfish implementation written by Eric Young (eay@cryptsoft.com). This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution. Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Eric Young (eay@cryptsoft.com) THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distrubution license including the GNU Public License.] The reason behind this being stated in this direct manner is past experience in code simply being copied and the attribution removed from it and then being distributed as part of other packages. This implementation was a non-trivial and unpaid effort.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright 2005 Nokia. All rights reserved.
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license.
The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL.
No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise.
No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution.
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact licensing@OpenSSL.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact licensing@OpenSSL.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. Portions originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. Binary polynomial ECC support in OpenSSL originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
Copyright (c) 2014, Google Inc.
Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Copyright (c) 1998-2015 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the OpenSSL open source license provided above.
The elliptic curve binary polynomial software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
|
Copyright (c) 2007 KISA(Korea Information Security Agency). All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Neither the name of author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
The Elliptic Curve Public-Key Crypto Library (ECC Code) included herein is developed by SUN MICROSYSTEMS, INC., and is contributed to the OpenSSL project.
The ECC Code is licensed pursuant to the OpenSSL open source license provided below.
The software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. Portions of this software developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
The Elliptic Curve Public-Key Crypto Library (ECC Code) included herein is developed by SUN MICROSYSTEMS, INC., and is contributed to the OpenSSL project.
The ECC Code is licensed pursuant to the OpenSSL open source license provided below.
The ECDH software is originally written by Douglas Stebila of Sun Microsystems Laboratories.
Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@OpenSSL.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact licensing@OpenSSL.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the OpenSSL open source license provided above.
The elliptic curve binary polynomial software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the Eric Young open source license provided above.
The binary polynomial arithmetic software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the OpenSSL open source license provided above.
The ECDH and ECDSA speed test software is originally written by Sumit Gupta of Sun Microsystems Laboratories.
|
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License
Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
|
Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the Eric Young open source license provided above.
The binary polynomial arithmetic software is originally written by Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
Portions of the attached software ("Contribution") are developed by SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
The Contribution is licensed pursuant to the OpenSSL open source license provided above.
ECC cipher suite support in OpenSSL originally written by Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
Copyright 2005 Nokia. All rights reserved.
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license.
The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL.
No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise.
No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution.
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. ECC cipher suite support in OpenSSL originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
Copyright 2005 Nokia. All rights reserved.
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license.
The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL.
No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise.
No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution.
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2005 Nokia. All rights reserved.
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license.
The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL.
No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise.
No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution.
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2005 Nokia. All rights reserved.
The portions of the attached software ("Contribution") is developed by Nokia Corporation and is licensed pursuant to the OpenSSL open source license.
The Contribution, originally written by Mika Kousa and Pasi Eronen of Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites support (see RFC 4279) to OpenSSL.
No patent licenses or other rights except those expressly stated in the OpenSSL open source license shall be deemed granted or received expressly, by implication, estoppel, or otherwise.
No assurances are provided by Nokia that the Contribution does not infringe the patent or other intellectual property rights of any third party or that the license provides you with all the necessary rights to make use of the Contribution.
THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR OTHERWISE.
|
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
|
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. ECC cipher suite support in OpenSSL originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ''AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence including the GNU Public Licence.]
Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. ECDH support in OpenSSL originally developed by SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
THIS FILE IS PROVIDED BY BALTIMORE TECHNOLOGIES ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BALTIMORE TECHNOLOGIES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
At least you need two steps: generating the key & request and then installing the certificate. A real world CA would have some more steps involved, eg. accepting some license. Note that both scripts shown below are just experimental state without any warrenty
|
Written by Ulf Moeller. This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied.
|
This file is part of a free library for the Win32 API. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
You have a royalty-free right to use, modify, reproduce and distribute the Sample Files (and/or any modified version) in any way you find useful, provided that you agree that Microsoft has no warranty obligations or liability for any Sample Application Files which are modified.
|
This code is based on code written by Patrick Powell <papowell@astart.com> It may be used for any purpose as long as this notice remains intact on all source code distributions.
|
author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be> author Antoon Bosselaers <antoon.bosselaers@esat.kuleuven.ac.be> author Paulo Barreto <paulo.barreto@terra.com.br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
This software was written by Leonard Janke (janke@unixg.ubc.ca) in 1996-7 and is entered, by him, into the public domain.
|
Author: Marc Bevand <bevand_m (at) epita.fr> Licence: I hereby disclaim the copyright on this code and place it in the public domain.
|
Author: Emilia Käsper and Peter Schwabe Date: 2009-03-19 Public domain
|
By Mike Hamburg (Stanford University), 2009 Public domain.
For details see http://shiftleft.org/papers/vector_aes/ and http://crypto.stanford.edu/vpaes/.
|
A 64-bit implementation of the NIST P-224 elliptic curve point multiplication
Inspired by Daniel J. Bernstein's public domain nistp224 implementation and Adam Langley's public domain 64-bit C implementation of curve25519
|