Third Party Open Source
License Terms Guide
QNX Software Systems incorporates certain
open source software in our stack. The license terms associated with this
software require that we give copyright and license information, and this
Third Party Open Source License Terms Guide (“TPOSLTG”) provides those
details.
The open source software is used primarily
in two areas. We use the GNU Compiler Tools, Debugger and GNU C++ libraries in
the development suite. These applications are governed by the terms of either
the GPL or LGPL, copies of which are reproduced below.
We also incorporate various open source
software in our networking stack, mainly around the TCP/IP stack and related
utilities.
As many of the licenses share common terms
(the BSD license from the Regents of the University of California is the most
common), rather than repeat the same text ad nauseam, we have abstracted those
licenses. For unique licenses, we have provided the full license text.
See the last page of the
guide for an example.
Master License
Chart Index
1.
Master Chart for Australian National University (ANU) License
– pg. 2
2.
Master Chart for BSD Licenses – pg. 3
3.
Master Chart for BSD2 Licenses – pg. 7
4.
Master Chart for Carnegie Mellon (CMU) Licenses – pg. 9
5.
Master Chart for Digital Equipment Corporation (DEC) Licenses
– pg. 10
6.
Master Chart for IBM Licenses
– pg. 11
7.
Master Chart for TIS Licenses – pg. 12
8.
Master Chart for One-Off Licenses – pg. 13
9.
GNU General Public License – pg. 22
10.
GNU Lesser General Public License – pg. 26
11.
Mozilla Public License Version
1.1 – pg. 32
12.
Example – pg. 38
Master Chart for Australian National
University (ANU) License
Generic License
Text:
Copyright Ó[DATE(S)].* [NAME OF LICENSOR(S)].** All Rights Reserved.***
Redistribution and use in source and binary
forms are permitted provided that the above copyright notice and this paragraph
are duplicated in all such forms and that any documentation, advertising
materials, and other materials related to such distribution and use acknowledge
that the software was developed by the [NAME OF LICENSOR(S)]. The name of
the [NAME OF LICENSOR(S)] may not be used to endorse or promote products
derived from this software without specific prior written permission. THIS
SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE.
*
Insert appropriate date(s) from chart below.
** Insert
appropriate name(s) from chart below.
*** Insert
authorship acknowledgement(s) from chart below or append additional license
terms to end of license text.
Copyright Notice and Attribution
Chart:
Notice
Number |
Description
of Software |
Name
of Licensor |
Date(s) |
Acknowledgment |
1 |
npm-pppmgr.so |
ANU |
1989,
1994 |
none |
2 |
pppd |
ANU |
1993 |
none |
3 |
pppd |
Gregory
M. Christy. |
1991 |
none |
4 |
pppd |
Eric
Rosenquist, Strata Software Limited.
http://www.strataware.com/ |
1995 |
Modifications
by Lauri Pesonen / lpesonen@clinet.fi, April
1997 |
5 |
pppd |
Carnegie
Mellon University. |
1989 |
none |
6 |
fs-cifs
(also known as SMB client) |
ANU |
1993 |
none |
7 |
fs-cifs
(also known as SMB client) |
Gregory
M. Christy |
1991 |
none |
8 |
fs-cifs
(also known as SMB client) |
Eric
Rosenquist, Strata Software Limited.
http://www.strataware.com/ |
1995 |
Modifications
by Laurie Pesonen / lpesonen@client.fi, April 1997 Implemented
LANManager type password response to MS-CHAP challenges. Now pppd provides both NT style
and LANMan style blocks, and the preferred is set by option
“ms-lanman”. Default is to
use NT. The hash text (Std
text) was taken from Win95 RASAPI32.DLL. You should also use
DOMAIN\\USERNAME as described in
README.MSCHAP80 |
9 |
pppManager |
Carnegie
Mellon University |
1989 |
none |
10 |
pppd |
The
Regents of the University of California |
1989 |
None |
11 |
pppManager |
The
Regents of the University of California |
1987 |
none |
Generic License
Text:
Copyright Ó[DATE(S)].* [NAME OF LICENSOR(S)].** All Rights Reserved.***
Redistribution and use in source and binary
forms, with or without modifications, are permitted provided that the following
conditions are met:
i.
Redistribution of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
ii.
Redistribution in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
iii.
Neither the name(s) of [NAME OF LICENSOR(S)]** nor the names of
its/their contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE [NAME OF
LICENSOR(S)]** AND CONTRIBUTORS
“AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE [NAME OF LICENSOR(S)]** OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
*
Insert appropriate date(s) from chart below.
** Insert
appropriate name(s) from chart below.
*** Insert
authorship acknowledgement(s) from chart below or append additional license
terms to end of license text.
Copyright Notice and Attribution
Chart:
Notice
Number Description
of Software Name
of Licensor Date(s) 1 npm-pppmgr.so The
Regents of the University of California 1987,
1989, 1993, 1994 none 2 ftp
The
Regents of the University of California 1980,
1985, 1989, 1990 none 3 bootpd The
Regents of the University of California 1986,
1987 none 4 ftpd The
Regents of the University of California 1980,1985,19881989,1990 none 5 Intentionally
blank. 6 Intentionally
blank. 7 libsocks.so The
Regents of the University of California 1983,
1988 none 8 ping The
Regents of the University of California 1989 This
code is derived from software contributed to Berkley by Mike
Muuss. 9 Intentionally
blank. 10 pppd The
Regents of the University of California 1989,
1993
11 rftp The
Regents of the University of California 1985,
1989 None 12 rlogin The
Regents of the University of California 1983 None 13 rlogind The
Regents of the University of California 1983,
1988, 1989, 1991 None 14 telnet The
Regents of the University of California 1988,1990, 1991 None 15 telnetd The
Regents of the University of California 1989,
1991 None 16 rtelnet The
Regents of the University of California 1988,
1990, 1991 None 17 rsh The
Regents of the University of California 1983,1989, 1990 None 18 rshd The
Regents of the University of California 1983,1988, 1989,1991 None 19 rwho The
Regents of the University of California 1983 None 20 rwhod The
Regents of the University of California 1983,1991 None 21 tftp The
Regents of the University of California 1983 None 22 tftpd The
Regents of the University of California 1983,
1991 None 23 syslogd The
Regents of the University of California 1983,
1988, 1989, 1990 None 24 nslookup The
Regents of the University of California 1985,
1989, 1990 none 25 inetd The
Regents of the University of California 1983,
1989, 1991 None 26 Intentionally
blank. 27 Dhcp.client
The
Internet Software Consortium 1995,
1996 This
software has been written for the Internet Software Consortium by Ted
Lemon in cooperation with Vixie Enterprises. To learn more about the
Internet Software Consortium, see ``http://www.vix.com/isc''. To learn
more about Vixie Enterprises, see
``http://www.vix.com''. 28 Dhcp.client The
Internet Software Consortium.
RadioMail
Corporation. Copyright
© 1996 Copyright
© 1995 This
software was written for RadioMail Corporation by Ted Lemon under a
contract with Vixie Enterprises. Further modifications have been made for
the Internet Software Consortium under a contract with Vixie
Laboratories. 29 traceroute The
Regents of the University of California 1990 This
code is derived from software contributed to Berkley by Van
Jacobson. 30 Full
TCP/IP Stack The
Regents of the University of California 1982,
1986, 1989, 1991, 1993 Copyright
8 1997, Christopher G. Demetriou. All Rights Reserved.
31 Full
TCP/IP Stack The
Regents of the University of California 1988,
1989, 1993 None 32 Hostname The
Regents of the University of California 1983,
1988, 1990 None 33 lpd The
Regents of the University of California 1983,
1991, 1993 None 34 lpr The
Regents of the University of California 1980,
1982, 1983, 1986, 1990 None 35 lprc The
Regents of the University of California 1983,
1991, None 36 lprq The
Regents of the University of California 1983,
1990 37 lprrm The
Regents of the University of California 1983,
1990 None 38 logger The
Regents of the University of California 1983,
1993 None 39 showmount The
Regents of the University of California 1989 None 40 route The
Regents of the University of California 1983,
1988, 1989, 1990, 1991, 1993 none 41 routed The
Regents of the University of California 1983,
1988, 1989, 1991 None 42 mount The
Regents of the University of California 1980,
1988, 1993, 1995 None 43 netstat The
Regents of the University of California 1983,
1988, 1990, 1992, 1993 Copyright
(c) 1989 Stephen Deering.
This code is derived from software contributed to Berkeley by
Stephen Deering of Stanford University. 44 Intentionally
blank. 45 NFS
Client NFS
Server The
Regents of the University of California 1989,
1991, 1993 This
code is derived from software contributed to Berkeley by Rick Macklem at
the University of Guelph. 46 queue.h The
Regents of the University of California 1991,
1993 NOTE:
This is a header file that is used to build the following applications and
should therefore be included in the corresponding copyright notices and
attributions: io-blk.so fs-cifs io-hid
(not yet released - human interface device which will replace all devi's
and some usb drivers) npm-tcpip.so fs-nfs2 nfsd libsocket.so devh/include/
(hid ddk - not yet released) devu/include/
(usb ddk) 47 fs-cifs
(also known as SMB client) The
Regents of the University of California 1991,
1993 none
48 BIND The
Regents of the University of California 1985,
1990, 1993 none
Acknowledgment
Master Chart for BSD2
Licenses
Generic License
Text:
Copyright Ó[DATE(S)].* [NAME OF LICENSOR(S)].** All Rights Reserved.***
Redistribution and use in source and binary
forms, with or without modifications, are permitted provided that the following
conditions are met:
i.
Redistribution of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
ii.
Redistribution
in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
iii.
All
advertising materials mentioning features or use of this software must display
the following acknowledgement: This product includes software developed by
[NAME OF LICENSOR(S)]** and its contributors
iv.
Neither the name(s) of [NAME OF LICENSOR(S)]** nor the names of
its/their contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE [NAME OF
LICENSOR(S)]** AND CONTRIBUTORS
“AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE [NAME OF LICENSOR(S)]** OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
*
Insert appropriate date(s) from chart below.
** Insert
appropriate name(s) from chart below.
*** Insert
authorship acknowledgement from chart below or append additional license terms
to end of license text.
Copyright Notice and Attribution
Chart:
Notice
Number
Description
of Software Name of Licensor
Date(s)
1
BIND
WIDE
Project. 1995,
1996, 1997, and 1998
None
2
TCP/IP
The
NetBSD Foundation, Inc.
1995,
1996, 1997, 1998
Parts
of this code is derived from software contributed to The NetBSD Foundation
by Jason R. Thorpe of the Numerical Aerospace Simulation Facility, NASA
Ames Research Center and from software contributed to the NetBSD
Foundation by Lennart Augustsson (lennart@augustsson.net) at Carlstedt
Research & Technology.
This
code is derived from software contributed to The NetBSD Foundation by
Public Access Networks Corporation ("Panix"). It was developed under
contract to Panix by Eric Haszlakiewicz and Thor Lancelot Simon.
This
code is derived from software contributed to The NetBSD Foundation by
Christos Zoulas.
This
code is derived from software contributed to The NetBSD Foundation by
Jason R. Thorpe of the Numerical Aerospace Simulation Facility, NASA Ames
Research Center.
This
code is derived from software contributed to The NetBSD Foundation by
Charles M. Hannum.
3
Mbuf.h (tiny
TCP/IP Stack)
The
Regents of the University of California
1982,
1986, 1988, 1993
none 4 route Christos
Zoulas.
1997 None 5 ifconfig The
Net BSD Foundation, Inc. 1997,
1998 This
code is derived from software contributed to The NetBSD
Foundation by
Jason R. Thorpe of the Numerical Aerospace Simulation
Facility, NASA
Ames Research Center. 6 ifconfig The
Regents of the University of California 1983,
1993 None 7 pppManager The
Regents of the University of California 1989,
1993, 1994 None 8 arp The
Regents of the University of California 1984,
1993 This
code is derived from software contributed to Berkeley by Sun Microsystems,
Inc. Master Chart for Carnegie Mellon (CMU)
Licenses
Generic License
Text: Copyright © [DATE(S)]* by [NAME OF
LICENSOR(S)].** All Rights
Reserved. *** Permission to use, copy, modify, and
distribute this software and its documentation for any purpose and without fee
is hereby granted, provided that the above copyright notice appear in all copies
and that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of [NAME OF LICENSOR(S)]**
not be used in advertising or publicity pertaining to distribution of the
software without specific, written prior permission. [NAME OF LICENSOR(S)]** DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS.
IN NO EVENT SHALL [NAME OF LICENSOR(S)]** BE LIABLE FOR ANY SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
OR USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THIS SOFTWARE. *
Insert appropriate date(s) from chart below. **
Insert appropriate name(s) from chart below **
Insert authorship acknowledgement(s) from chart below or append
additional license terms to end of license text. Copyright Notice and Attribution
Chart: Notice
Number Description
of Software Name
of Licensor Date(s) Acknowledgment 1 npm-pppmgr.so Carnegie
Mellon University 1989 None 2 bootpd Carnegie
Mellon University 1988,
1989, 1991 none 3 pppd Carnegie
Mellon University 1989
none 4 libsnmp.so Carnegie
Mellon University 1988,
1989, 1991, 1992, 1993 Copyright
© 1995, 1996 by Frank Kicenko.
Frank@man.net
5 snmpget Carnegie
Mellon University 1988,
1989, 1991, 1992 Copyright
© 1995, 1996 by Frank Kicenko.
Frank@man.net
6 snmpwalk Carnegie
Mellon University 1988,
1989, 1991, 1992 Copyright
© 1995, 1996 by Frank Kicenko.
Frank@man.net
7 vmail Carnegie
Mellon University 1994,
1996 none
8 vmail University
of Washington and Leyland Stanford University 1999
and 1988 none 8.5 vmail University
of Washington 1997 none 9 netstat IBM
Corporation 1987 none
Master Chart for Digital Equipment
Corporation (DEC) Licenses. Generic License
Text: Portions Copyright © [DATE(S)]* by
[NAME OF LICENSOR(S)]**.
*** Permission to use, copy, modify, and
distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in
all copies, and that the name of [NAME OF LICENSOR(S)] not be used in
advertising or publicity pertaining to distribution of the document or software
without specific, written prior permission. *
Insert appropriate date from chart below. ** Insert
appropriate name(s) from chart below. *** Insert
authorship acknowledgement from chart below or append additional license terms
to end of license text. Copyright Notice and Attribution
Chart: Notice
Number Description
of Name
of Licensor Date(s) 1 TCP/IP Digital
Equipment Corporation 1993 none 2 intentionally
blank 3 BIND Digital
Equipment Corporation 1993 none 4 BIND MetaInfo,
Incorporated 1998 none 5 nslookup Digital
Equipment Corporation. 1993
none
Generic License Text: Portions Copyright © [DATE(S)]* by
International Business Machines, Inc. ** International Business Machines, Inc.
(hereinafter called IBM) grants permission under its copyrights to use, copy,
modify, and distribute this Software with or without fee, provided that the
above copyright notice and all paragraphs of this notice appear in all copies,
and that the name of IBM not be used in connection with the marketing of any
product incorporating the Software or modifications thereof, without specific,
written prior permission. To the extent it has a right to do so, IBM
grants an immunity from suit under its patents, if any, for the use, sale or
manufacture of products to the extent that such products are used for performing
Domain Name System dynamic updates in TCP/IP networks by means of the Software.
No immunity is granted for any product per se or for any other function of any
product. THE SOFTWARE IS PROVIDED "AS IS", AND IBM
DISCLAIMS ALL WARRANTIES, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY
SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE,
EVEN IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH
DAMAGES. *
Insert appropriate date from chart below. **
Insert authorship acknowledgement from chart below or append additional
license terms to end of license text. Copyright Notice and Attribution
Chart: Notice
Number Description
of Software
Date(s) 1 netstat 1987 none 2 TCP/IP 1995 none 3 bind 1995 none Portions Copyright © [DATE(S)]*by [NAME OF
LICENSOR(S)].** Permission to use, copy modify, and
distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in
all copies. THE SOFTWARE IS PROVIDED "AS IS" AND
[NAME OF
LICENSOR(S)]**
DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS.
IN NO EVENT SHALL [NAME OF
LICENSOR(S)]**
BE LIABLE FOR ANY
SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE
USE OR PERFORMANCE OF THE SOFTWARE. *
Insert appropriate date from chart below. ** Insert
appropriate name(s) from chart below. *** Insert
authorship acknowledgement from chart below or append additional license terms
to end of license text.
Copyright Notice and Attribution
Chart:
Notice
Number
Description
of Software Name
of Licensor
Date(s)
1
bind Internet
Software Consortium, Inc.
1993-2000
None
2
bind Trusted
Information Systems, Inc. 1995-1998
None
3
bind
TISLabs
at Network Associates, Inc. 1995-1999
None Notice
Number Description
of Software 1 mesa
api Copyright
©1999, Brian Paul. All Rights Reserved. Permission
is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the "Software") to deal in
the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The
above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software. THE
SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NON- INFRINGEMENT. IN NO EVENT SHALL
BRIAN PAUL BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WHICH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE. 2 rpc Copyright
© 1984-1987, Sun Microsystems, Inc. All Rights
Reserved. Sun
RPC is a product of Sun Microsystems, Inc. and is provided for
unrestricted use provided that this legend is included on all tape media
and as a part of the software program in whole or part. Users may copy or
modify Sun RPC without charge, but are not authorized to license or
distribute it to anyone else except as part of a product or program
developed by the user. SUN
RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
WARRANTIES OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE
PRACTICE. Sun
RPC is provided with no support and without any obligation on the part of
Sun Microsystems, Inc. to assist in its use, correction, modification or
enhancement. SUN
MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY
PART THEREOF. In no event will Sun Microsystems, Inc. be liable for any
lost revenue or profits or other special, indirect and consequential
damages, even if Sun has been advised of the possibility of such
damages. Sun
Microsystems, Inc., 2550 Garcia Avenue, Mountain View, California
94043 3 mib
compiler Copyright
© 1992, SynOptics Communications, Inc. All Rights Reserved.
SynOptics
grants a non-exclusive license to use, copy, modify and distribute this
software for any purpose and without fee, provided that this copyright
notice and license appear on all copies and supporting documentation.
SynOptics
makes no representations about the suitability of this software for any
particular purpose. The software is supplied "AS IS", and SynOptics makes
no warranty, either express or implied, as to the use, operation,
condition, or performance of the software. SynOptics retains all title and
ownership in the software. 4 ssleay Copyright
© 1997 Eric Young (eay@mincom.oz.au). All rights reserved.
Redistribution
and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions
of source code must retain the copyright notice, this list of conditions
and the following disclaimer. Redistributions
in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution. All
advertising materials mentioning features or use of this software must
display the following acknowledgment: "This
product includes cryptographic software written by Eric Young
(eay@mincom.oz.au)" The word 'cryptographic' can be left out if the
routines from the library being used are not cryptographic
related. If
any Windows specific code (or a derivative thereof) from the apps
directory (application code) is included you must include an
acknowledgment: "This
product includes software written by Tim Hudson (tjh@mincom.oz.au)" THIS
SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The
SSLeay software includes encryption technology. You may not import this
software: (i) to countries prohibited by the Canadian Government. These
countries presently include: Angola, Burma (Myanmar), and Yugoslavia; (ii)
to any country which requires an
import or use permit for encryption technology. These countries presently
include but are not limited to: Belarus, China, France, Israel, Kazakstan,
Moldova, Poland, Russia, and Vietnam. If
you are resident in the United States, you may not export or re-export
this software or information pertaining thereto to any country for which a
U.S. government agency requires an export license or other governmental
approval without first obtaining such license or
approval. 5 websphere
studio device developer (i)
Eclipse.org. Websphere Workbench, the
framework on which the Websphere Studio Device Developer is built, is
based on software developed for eclipse.org. Source code for these components
is available from www.eclipse.org, under the Common Public License
(http://www.eclipse.org/legal/cpl-v05.html) OTI
effectively disclaims on behalf of all Eclipse.org Contributors all
warranties and conditions, express and implied, including warranties or
conditions of title and non-infringement, and implied warranties or
conditions of merchantability and fitness for a particular purpose;
OTI
effectively excludes on behalf of all Contributors all liability for
damages, including direct, indirect, special, incidental and consequential
damages, such as lost profits; OTI
states that any provisions which differ from the Common Public License are
offered by OTI alone and not by any other party; ANT
1.3. WebSphere Device Developer
may be accompanied by software developed by The Apache Software Foundation
as part of the Jakarta project.
The ANT code included with WebSphere Device Developer in
plugins/org.apache.xerces/ant.jar includes no modifications. Your use of ANT in binary code
form accompanying WebSphere Device Developer is subject to the terms and
conditions of the Apache Software License 1.1 from
http://jakarta.apache.org/ant/manual/. More
specifically: 1.
The end-user documentation included with the redistribution, if any, must
include the following acknowledgment: "This product includes software
developed by the Apache Software Foundation
(http://www.apache.org/)."
Alternately, this acknowledgment may appear in the software itself,
if and wherever such third-party acknowledgments normally
appear. 2.
The names "ANT" and "Apache Software Foundation" must not be used to
endorse or promote products derived from this software without prior
written permission. For
written permission, please contact
apache@apache.org. 3.
Products derived from this software may not be called "Apache", nor may
"Apache" appear in their name, without prior written permission of the
Apache Software Foundation. THIS
SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE
SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE. (iii)
The Blowfish Encryption
Algorithm.
WebSphere Device Developer may be accompanied by software and an
algorithm developed by Bruce Schneier. The algorithm was originally
published in the following paper
http://www.counterpane.com/bfsverlag.html. Your use of the Blowfish
encryption Algorithm in both source and binary code form accompanying
WebSphere Device Developer is not subject to any additional terms and
conditions. The Blowfish
source, Blowfish.java, is located at
org.eclipse.vcm.core.cvs.ssh/vcmcvssshsrc.zip. The Blowfish binary,
Blowfish.class is location at
org.eclipse.vcm.core.cvs.ssh/vcmcvsssh.jar JDI
Interfaces.
The
JDI Interface code is included in
plugins/org.eclipse.jdt.debug/jdi.jar. Your use of the JDI Interfaces in
binary code form accompanying WebSphere Device Developer is subject to the
following terms and conditions: 1.
You can only use the JDI Interfaces with the Programs.
2.
You cannot separate them, modify them, or use them for any purpose other
than in conjunction with the Programs. JUnit
3.6. WebSphere
Device Developer may be accompanied by software developed by
JUnit.org. Your use of JUnit
3.6 in both source and binary code form accompanying WebSphere Device
Developer is subject to the terms and conditions of the IBM Public License
1.0 from http://oss.software.ibm.com/developerworks/opensource/license10.html. IBM
effectively disclaims on behalf of all Contributors all warranties and
conditions, express and implied, including warranties or conditions of
title and non-infringement, and implied warranties or conditions of
merchantability and fitness for a particular purpose;
IBM
effectively excludes on behalf of all Contributors all liability for
damages, including direct, indirect, special, incidental and consequential
damages, such as lost profits; IBM
states that any provisions which differ from this Agreement are offered by
that Contributor alone and not by any other party; (vi)
The Java Ssh Applet. WebSphere Device Developer may
be accompanied by software developed by Cedric Gourio. The source code is located in
org.eclipse.vcm.core.cvs.ssh/vcmcvssshsrc.zip. The binary code is located in
org.eclipse.vcm.core.cvs.ssh/vcmcvsssh.jar. The Java Ssh Applet is: Copyright
© 1998 Cedric Gourio (http://www.cl.cam.ac.uk/~fapp2/software/java-ssh/)
(javassh@france-mail.com) (vii)
OpenMotif for Linux. WebSphere Device
Developer, WebSphere Micro Edition and WebSphere Custom Edition may be
accompanied by software developed by Metro Link as part of the Open Motif
project. The Open Motif code
includes the following files in the WebSphere Device Developer base
installation directory of the Linux version. libXm.so
(symbolic link to libXm.so.2.1) libXm.so.2
(symbolic link to libXm.so.2.1) libXm.so.2.1
(the real file) THE
OPEN MOTIF CODE IS NOT CONSIDERED PART OF WEBSPHERE DEVICE DEVELOPER, AND
YOU MUST AGREE TO THE TERMS OF THE METRO LINK PUBLIC LICENSE. IBM is not a "Contributor" under
the Metro Link Public License.
This software is forwarded with WebSphere Device Developer for your
convenience. The Metro Link
Public License 1.00 license can be found at
http://www.opengroup.org/openmotif/supporters/metrolink/license.html. Source code for Open Motif for
Linux is available at
http://www.opengroup.org/openmotif/supporters/metrolink/. (viii)
Rhino 1.5. WebSphere Device
Developer may be accompanied by software developed by Mozilla as part of
the Rhino project. The Rhino
code included with WebSphere Device Developer in
plugins/org.eclipse.scripting/js.jar includes no modifications. Your use of Rhino in binary code
form accompanying WebSphere Device Developer is subject to the terms and
conditions of the Netscape Public License 1.1 from
http://www.mozilla.org/MPL/NPL-1.1.html. The Rhino binary code included in
WebSphere Device Developer includes no modifications. Source code for the Rhino binaries
is available at http://www.mozilla.org/rhino/ under terms of the Netscape
Public License 1.1. (ix)
Xerces 1.4. WebSphere Device
Developer may be accompanied by software developed by The Apache Software
Foundation as part of the Apache XML project. The Xerces code included with
WebSphere Device Developer in plugins/org.apache.xerces/xerces.jar
includes no modifications.
Your use of Xerces in binary code form accompanying WebSphere
Device Developer is subject to the terms and conditions of the Apache
Software License 1.1 from http://xml.apache.org/LICENSE. More
specifically: 1.
The end-user documentation included with the redistribution, if any, must
include the following acknowledgment: "This product includes software
developed by the Apache Software Foundation
(http://www.apache.org/)."
Alternately, this acknowledgment may appear in the software itself,
if and wherever such third-party acknowledgments normally
appear. 2.
The names "Xerces" and "Apache Software Foundation" must not be used to
endorse or promote products derived from this software without prior
written permission. For
written permission, please contact
apache@apache.org. 3.
Products derived from this software may not be called "Apache", nor may
"Apache" appear in their name, without prior written permission of the
Apache Software Foundation. THIS
SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE
SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE. 6 zip
software Copyright
(C) 1990-1998 Mark Adler, Richard B. Wales, Jean-loup Gailly, Onno van der
Linden and Kai Uwe Rommel. Permission
is granted to any individual or institution to use, copy, or
redistribute this
executable so long as it is not modified and that it is not sold for
profit. LIKE ANYTHING
ELSE THAT'S FREE, ZIP AND ITS ASSOCIATED UTILITIES
ARE PROVIDED
AS IS AND COME WITH NO WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED. IN NO EVENT WILL THE COPYRIGHT HOLDERS BE
LIABLE FOR ANY DAMAGES RESULTING FROM THE USE OF
THIS SOFTWARE. 7 emanate
or emanate lite Copying
and distribution is by permission of SNMP Research International,
Inc. The
ISODE is openly available but is NOT in the public domain. You are allowed and encouraged to
take this software and build commercial products. However, as a condition
of use, you are required to “hold harmless” all
contributors. Permission
to use, copy, modify, and distribute this software and its documentation
for any purpose and without fee is hereby granted, provided that this
notice and the reference to this notice appearing in each software module
be retained unaltered, and that the name of any contributors shall not be
used in advertising or publicity pertaining to distribution of the
software without specific written prior permission. No contributor makes
any representations about the suitability of this software for any
purpose. It is provided “as is” without express or implied
warranty. ALL
CONTRIBUTORS DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL ANY CONTRIBUTOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
USE, DATA OR PROFITS. WHETHER IN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE. As
used above, “contributor” includes, but is not limited to: The MITRE
Corporation, The Northrop Corporation, NYSERNet, Inc., Performance Systems
International, Inc., University College London, The University of
Nottingham, The Wollongong Group, Inc., Marshall T.
Rose In
particular, the Northrop Corporation provided the initial sponsorship for
the ISODE and the Wollongong Group, Inc., also supported this effort. The
ISODE receives partial support from the U.S. Defense Advanced Research
Projects Agency and the Rome Air Development Center of the U.S. Air Force
Systems Command under contract number F30602-88-C-0016 to NYSERNet,
In DES:
Software DES functions written 12 Dec 1986 by Phil Karn, KA9Q; large
sections adapted from the 1977 public-domain program by Jim
Gillogly. MD5:
Duplicated with permission.
Customers should consult competent legal counsel before shipping
derivative works of this software internationally. Copyright
(c) 1990, RSA Data Security, Inc. All rights
reserved. License
to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function. License is also
granted to make and use derivative works provided that such works are
identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing the derived
work. 8 socks Copyright
© 1994 The Australian National University. All rights reserved.
Permission
to use, copy, modify, and distribute this software and its documentation
is hereby granted, provided that the above copyright notice appears in all
copies. This software is provided without any warranty, express or
implied. The Australian National University makes no representations about
the suitability of this software for any purpose. THE
AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR
MODIFICATIONS. 9 pppd Copyright
© 1990, RSA Data Security, Inc. All rights reserved.
License
to copy and use this software is granted provided that it is identified as
the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing this software or this function. License is also
granted to make and use derivative works provided that such works are
identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing the derived work.
RSA
Data Security, Inc. makes no representations concerning either the
merchantability of this software or the suitability of this software for
any particular purpose. It is provided "as is" without express or implied
warranty of any kind. These
notices must be retained in any copies of any part of this documentation
and/or software. 10 pppd Copyright
© 1994 The Australian National University. All rights reserved.
Permission
to use, copy, modify, and distribute this software and its documentation
is hereby granted, provided that the above copyright notice appears in all
copies. This software is provided without any warranty, express or
implied. The Australian National University makes no representations about
the suitability of this software for any purpose. THE
AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR
MODIFICATIONS. 11 bind Copyright
© 1993-2000 by Internet Software Consortium, Inc. Permission
to use, copy, modify, and distribute this software for any purpose with or
without fee is hereby granted, provided that the above copyright notice
and this permission notice appear in all copies. THE
SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET
SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE. 12 bind This
BIND software includes the DNSsafe software from RSA Data Security, Inc.,
which is copyrighted software that can only be distributed under the terms
of this license agreement. The
DNSsafe software cannot be used or distributed separately from the BIND
software. You only have the right to use it or distribute it as a bundled,
integrated product. The
DNSsafe software can ONLY be used to provide authentication for resource
records in the Domain Name System, as specified in RFC 2065 and
successors. You cannot modify the BIND software to use the DNSsafe
software for other purposes, or to make its cryptographic functions
available to end-users for other uses. If
you modify the DNSsafe software itself, you cannot modify its documented
API, and you must grant RSA Data Security the right to use, modify, and
distribute your modifications, including the right to use any patents or
other intellectual property that your modifications depend upon.
You
must not remove, alter, or destroy any of RSA's copyright notices or
license information. When distributing the software to the Federal
Government, it must be licensed to them as "commercial computer software"
protected under 48 CFR 12.212 of the FAR, or 48 CFR 227.7202.1 of the
DFARS. You
must not violate United States export control laws by distributing the
DNSsafe software or information about it, when such distribution is
prohibited by law. THE
DNSSAFE SOFTWARE IS PROVIDED "AS IS" WITHOUT ANY WARRANTY WHATSOEVER. RSA
HAS NO OBLIGATION TO SUPPORT, CORRECT, UPDATE OR MAINTAIN THE RSA
SOFTWARE. RSA DISCLAIMS ALL WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS
TO ANY MATTER WHATSOEVER, INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT OF
THIRD PARTY RIGHTS. If
you desire to use DNSsafe in ways that these terms do not permit, please
contact RSA Data Security, Inc., 100 Marine Parkway, Redwood City,
California 94065, USA, to discuss alternate licensing arrangements.
13 bind Copyright
© 1995-1997 Eric Young (eay@cryptsoft.com). All rights reserved.
This
package is an SSL implementation written by Eric Young
(eay@cryptsoft.com). The implementation was written so as to conform with
Netscapes SSL. This
library is free for commercial and non-commercial use as long as the
following conditions are adhered to. The following conditions apply to all
code found in this distribution, be it the RC4, RSA, lhash, DES, etc.,
code; not just the SSL code. The SSL documentation included with this
distribution is covered by the same copyright terms except that the holder
is Tim Hudson (tjh@cryptsoft.com). Copyright
remains Eric Young's, and as such any Copyright notices in the code are
not to be removed. If
this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used. This can be in the form of
a textual message at program startup or in documentation (online or
textual) provided with the package. Redistribution
and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met: THIS
SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The
license and distribution terms for any publicly available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution license [including the GNU
Public License.] 14 bind This
software is Copyright 1997-1998 by Craig Metz, All Rights Reserved.
The
author(s) grant permission for redistribution and use in source and binary
forms, with or without modification, of the software and documentation
provided that the following conditions are met: 0.
If you receive a version of the software that is specifically labeled as
not being for redistribution (check the version message and/or README),
you are not permitted to redistribute that version of the software in any
way or form. THIS
SOFTWARE IS PROVIDED BY ITS AUTHORS AND CONTRIBUTORS ``AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE. If these license terms cause you a real problem, contact the
author. 15 vmail Copyright
1988 Jon Zeeff (zeeff@b-tech.ann-arbour.mi.us)
You can use this code in any manner, as long as you leave my name on it
and don’t hold me responsible for any problems with
it. Usenet
is the internet community of newsgroups. There is no central Usenet
authority. See the following
web-page link on Usenet: http://www.faqs.org/usenet/ Elm
is freely distributed software (source and all) for use in reading Usenet
mail. See the following web
page link on Elm:
http://www.math.fu-berlin.de/~gukes/elm/ 16 Intentionally
blank. 17 zlib Copyright (C) 1995-2002 Jean-loup
Gailly and Mark Adler This software is provided 'as-is',
without any express or implied warranty. In no event will the authors be
held liable for any damages arising from the use of this
software. Permission is granted to anyone to
use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following
restrictions: 1. The origin of this software
must not be misrepresented; you must not claim that you
wrote the original software. If you use this
software in a product, an
acknowledgment in the product documentation would be appreciated but
is not required. 2. Altered source versions must be
plainly marked as such, and must not be misrepresented
as being the original software. 3. This notice may not be removed
or altered from any source distribution. Jean-loup Gailly
Mark Adler jloup@gzip.org
madler@alumni.caltech.edu The data format used by the zlib
library is described by RFCs (Request for Comments) 1950 to 1952 in the
files ftp://ds.internic.net/rfc/rfc1950.txt
zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip
format). 18 Intentionally
blank. 19 pppManager Copyright
© 1994 The Australian National University. All rights reserved.
Permission
to use, copy, modify, and distribute this software and its documentation
is hereby granted, provided that the above copyright notice appears in all
copies. This software is provided without any warranty, express or
implied. The Australian National University makes no representations about
the suitability of this software for any purpose. THE
AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR
MODIFICATIONS. Version
2, June 1991 Copyright
(C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330,
Boston, MA 02111-1307, USA Everyone
is permitted to copy and distribute verbatim copies of this license document,
but changing it is not allowed. The
licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public License is intended to guarantee
your freedom to share and change free software--to make sure the software is
free for all its users. This General Public License applies to most of the Free
Software Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by the GNU
Library General Public License instead.) You can apply it to your programs, too.
When we
speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish),
that you receive source code or can get it if you want it, that you can change
the software or use pieces of it in new free programs; and that you know you can
do these things. To
protect your rights, we need to make restrictions that forbid anyone to deny you
these rights or to ask you to surrender the rights. These restrictions translate
to certain responsibilities for you if you distribute copies of the software, or
if you modify it. For
example, if you distribute copies of such a program, whether gratis or for a
fee, you must give the recipients all the rights that you have. You must make
sure that they, too, receive or can get the source code. And you must show them
these terms so they know their rights. We
protect your rights with two steps: (1) copyright the software, and (2) offer
you this license which gives you legal permission to copy, distribute and/or
modify the software. Also,
for each author's protection and ours, we want to make certain that everyone
understands that there is no warranty for this free software. If the software is
modified by someone else and passed on, we want its recipients to know that what
they have is not the original, so that any problems introduced by others will
not reflect on the original authors' reputations. Finally,
any free program is threatened constantly by software patents. We wish to avoid
the danger that redistributors of a free program will individually obtain patent
licenses, in effect making the program proprietary. To prevent this, we have
made it clear that any patent must be licensed for everyone's free use or not
licensed at all. The
precise terms and conditions for copying, distribution and modification follow.
0. This
License applies to any program or other work which contains a notice placed by
the copyright holder saying it may be distributed under the terms of this
General Public License. The "Program", below, refers to any such program or
work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the
Program or a portion of it, either verbatim or with modifications and/or
translated into another language. (Hereinafter, translation is included without
limitation in the term "modification".) Each licensee is addressed as
"you". Activities
other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running the Program is not
restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by
running the Program). Whether that is true depends on what the Program does.
1. You may
copy and distribute verbatim copies of the Program's source code as you receive
it, in any medium, provided that you conspicuously and appropriately publish on
each copy an appropriate copyright notice and disclaimer of warranty; keep
intact all the notices that refer to this License and to the absence of any
warranty; and give any other recipients of the Program a copy of this License
along with the Program. You may
charge a fee for the physical act of transferring a copy, and you may at your
option offer warranty protection in exchange for a fee. 2. You may
modify your copy or copies of the Program or any portion of it, thus forming a
work based on the Program, and copy and distribute such modifications or work
under the terms of Section 1 above, provided that you also meet all of these
conditions: a.
You must
cause the modified files to carry prominent notices stating that you changed the
files and the date of any change. These
requirements apply to the modified work as a whole. If identifiable sections of
that work are not derived from the Program, and can be reasonably considered
independent and separate works in themselves, then this License, and its terms,
do not apply to those sections when you distribute them as separate works. But
when you distribute the same sections as part of a whole which is a work based
on the Program, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and
thus to each and every part regardless of who wrote it. Thus, it
is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control
the distribution of derivative or collective works based on the Program.
In
addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage or
distribution medium does not bring the other work under the scope of this
License. 3. You may
copy and distribute the Program (or a work based on it, under Section 2) in
object code or executable form under the terms of Sections 1 and 2 above
provided that you also do one of the following: a.
Accompany
it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily
used for software interchange; or, The
source code for a work means the preferred form of the work for making
modifications to it. For an executable work, complete source code means all the
source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation
of the executable. However, as a special exception, the source code distributed
need not include anything that is normally distributed (in either source or
binary form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component itself
accompanies the executable. If
distribution of executable or object code is made by offering access to copy
from a designated place, then offering equivalent access to copy the source code
from the same place counts as distribution of the source code, even though third
parties are not compelled to copy the source along with the object
code. 4. You may
not copy, modify, sublicense, or distribute the Program except as expressly
provided under this License. Any attempt otherwise to copy, modify, sublicense
or distribute the Program is void, and will automatically terminate your rights
under this License. However, parties who have received copies, or rights, from
you under this License will not have their licenses terminated so long as such
parties remain in full compliance. 5. You are
not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Program or its
derivative works. These actions are prohibited by law if you do not accept this
License. Therefore, by modifying or distributing the Program (or any work based
on the Program), you indicate your acceptance of this License to do so, and all
its terms and conditions for copying, distributing or modifying the Program or
works based on it. 6. Each
time you redistribute the Program (or any work based on the Program), the
recipient automatically receives a license from the original licensor to copy,
distribute or modify the Program subject to these terms and conditions. You may
not impose any further restrictions on the recipients' exercise of the rights
granted herein. You are not responsible for enforcing compliance by third
parties to this License. 7. If, as
a consequence of a court judgment or allegation of patent infringement or for
any other reason (not limited to patent issues), conditions are imposed on you
(whether by court order, agreement or otherwise) that contradict the conditions
of this License, they do not excuse you from the conditions of this License. If
you cannot distribute so as to satisfy simultaneously your obligations under
this License and any other pertinent obligations, then as a consequence you may
not distribute the Program at all. For example, if a patent license would not
permit royalty-free redistribution of the Program by all those who receive
copies directly or indirectly through you, then the only way you could satisfy
both it and this License would be to refrain entirely from distribution of the
Program. If any
portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply and the section as
a whole is intended to apply in other circumstances. It is
not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section
has the sole purpose of protecting the integrity of the free software
distribution system, which is implemented by public license practices. Many
people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that
choice. This
section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License. 8. If the
distribution and/or use of the Program is restricted in certain countries either
by patents or by copyrighted interfaces, the original copyright holder who
places the Program under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is
permitted only in or among countries not thus excluded. In such case, this
License incorporates the limitation as if written in the body of this License.
9. The
Free Software Foundation may publish revised and/or new versions of the General
Public License from time to time. Such new versions will be similar in spirit to
the present version, but may differ in detail to address new problems or
concerns. Each
version is given a distinguishing version number. If the Program specifies a
version number of this License which applies to it and "any later version", you
have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Program
does not specify a version number of this License, you may choose any version
ever published by the Free Software Foundation. 10. If you
wish to incorporate parts of the Program into other free programs whose
distribution conditions are different, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation,
write to the Free Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of
all derivatives of our free software and of promoting the sharing and reuse of
software generally. 11. BECAUSE
THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO
THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING
THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS
WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO
EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Version
2.1, February 1999 Copyright
(C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330,
Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim
copies of this license document, but changing it is not allowed.
[This is
the first released version of the Lesser GPL. It also counts as the successor of
the GNU Library Public License, version 2, hence the version number
2.1.] The
licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public Licenses are intended to
guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This
license, the Lesser General Public License, applies to some specially designated
software packages--typically libraries--of the Free Software Foundation and
other authors who decide to use it. You can use it too, but we suggest you first
think carefully about whether this license or the ordinary General Public
License is the better strategy to use in any particular case, based on the
explanations below. When we
speak of free software, we are referring to freedom of use, not price. Our
General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish);
that you receive source code or can get it if you want it; that you can change
the software and use pieces of it in new free programs; and that you are
informed that you can do these things. To
protect your rights, we need to make restrictions that forbid distributors to
deny you these rights or to ask you to surrender these rights. These
restrictions translate to certain responsibilities for you if you distribute
copies of the library or if you modify it. For
example, if you distribute copies of the library, whether gratis or for a fee,
you must give the recipients all the rights that we gave you. You must make sure
that they, too, receive or can get the source code. If you link other code with
the library, you must provide complete object files to the recipients, so that
they can relink them with the library after making changes to the library and
recompiling it. And you must show them these terms so they know their rights.
We
protect your rights with a two-step method: (1) we copyright the library, and
(2) we offer you this license, which gives you legal permission to copy,
distribute and/or modify the library. To
protect each distributor, we want to make it very clear that there is no
warranty for the free library. Also, if the library is modified by someone else
and passed on, the recipients should know that what they have is not the
original version, so that the original author's reputation will not be affected
by problems that might be introduced by others. Finally,
software patents pose a constant threat to the existence of any free program. We
wish to make sure that a company cannot effectively restrict the users of a free
program by obtaining a restrictive license from a patent holder. Therefore, we
insist that any patent license obtained for a version of the library must be
consistent with the full freedom of use specified in this
license. Most GNU
software, including some libraries, is covered by the ordinary GNU General
Public License. This license, the GNU Lesser General Public License, applies to
certain designated libraries, and is quite different from the ordinary General
Public License. We use this license for certain libraries in order to permit
linking those libraries into non-free programs. When a
program is linked with a library, whether statically or using a shared library,
the combination of the two is legally speaking a combined work, a derivative of
the original library. The ordinary General Public License therefore permits such
linking only if the entire combination fits its criteria of freedom. The Lesser
General Public License permits more lax criteria for linking other code with the
library. We call
this license the "Lesser" General Public License because it does Less to protect
the user's freedom than the ordinary General Public License. It also provides
other free software developers Less of an advantage over competing non-free
programs. These disadvantages are the reason we use the ordinary General Public
License for many libraries. However, the Lesser license provides advantages in
certain special circumstances. For
example, on rare occasions, there may be a special need to encourage the widest
possible use of a certain library, so that it becomes a de-facto standard. To
achieve this, non-free programs must be allowed to use the library. A more
frequent case is that a free library does the same job as widely used non-free
libraries. In this case, there is little to gain by limiting the free library to
free software only, so we use the Lesser General Public
License. In other
cases, permission to use a particular library in non-free programs enables a
greater number of people to use a large body of free software. For example,
permission to use the GNU C Library in non-free programs enables many more
people to use the whole GNU operating system, as well as its variant, the
GNU/Linux operating system. Although
the Lesser General Public License is Less protective of the users' freedom, it
does ensure that the user of a program that is linked with the Library has the
freedom and the wherewithal to run that program using a modified version of the
Library. The
precise terms and conditions for copying, distribution and modification follow.
Pay close attention to the difference between a "work based on the library" and
a "work that uses the library". The former contains code derived from the
library, whereas the latter must be combined with the library in order to run.
0. This
License Agreement applies to any software library or other program which
contains a notice placed by the copyright holder or other authorized party
saying it may be distributed under the terms of this Lesser General Public
License (also called "this License"). Each licensee is addressed as "you".
A
"library" means a collection of software functions and/or data prepared so as to
be conveniently linked with application programs (which use some of those
functions and data) to form executables. The
"Library", below, refers to any such software library or work which has been
distributed under these terms. A "work based on the Library" means either the
Library or any derivative work under copyright law: that is to say, a work
containing the Library or a portion of it, either verbatim or with modifications
and/or translated straightforwardly into another language. (Hereinafter,
translation is included without limitation in the term
"modification".) "Source
code" for a work means the preferred form of the work for making modifications
to it. For a library, complete source code means all the source code for all
modules it contains, plus any associated interface definition files, plus the
scripts used to control compilation and installation of the library.
Activities
other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running a program using the
Library is not restricted, and output from such a program is covered only if its
contents constitute a work based on the Library (independent of the use of the
Library in a tool for writing it). Whether that is true depends on what the
Library does and what the program that uses the Library does.
1. You may
copy and distribute verbatim copies of the Library's complete source code as you
receive it, in any medium, provided that you conspicuously and appropriately
publish on each copy an appropriate copyright notice and disclaimer of warranty;
keep intact all the notices that refer to this License and to the absence of any
warranty; and distribute a copy of this License along with the Library.
You may
charge a fee for the physical act of transferring a copy, and you may at your
option offer warranty protection in exchange for a fee. 2. You may
modify your copy or copies of the Library or any portion of it, thus forming a
work based on the Library, and copy and distribute such modifications or work
under the terms of Section 1 above, provided that you also meet all of these
conditions: (For
example, a function in a library to compute square roots has a purpose that is
entirely well-defined independent of the application. Therefore, Subsection 2d
requires that any application-supplied function or table used by this function
must be optional: if the application does not supply it, the square root
function must still compute square roots.) These
requirements apply to the modified work as a whole. If identifiable sections of
that work are not derived from the Library, and can be reasonably considered
independent and separate works in themselves, then this License, and its terms,
do not apply to those sections when you distribute them as separate works. But
when you distribute the same sections as part of a whole which is a work based
on the Library, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and
thus to each and every part regardless of who wrote it. Thus, it
is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control
the distribution of derivative or collective works based on the Library.
In
addition, mere aggregation of another work not based on the Library with the
Library (or with a work based on the Library) on a volume of a storage or
distribution medium does not bring the other work under the scope of this
License. 3. You may
opt to apply the terms of the ordinary GNU General Public License instead of
this License to a given copy of the Library. To do this, you must alter all the
notices that refer to this License, so that they refer to the ordinary GNU
General Public License, version 2, instead of to this License. (If a newer
version than version 2 of the ordinary GNU General Public License has appeared,
then you can specify that version instead if you wish.) Do not make any other
change in these notices. Once
this change is made in a given copy, it is irreversible for that copy, so the
ordinary GNU General Public License applies to all subsequent copies and
derivative works made from that copy. This
option is useful when you wish to copy part of the code of the Library into a
program that is not a library. 4. You may
copy and distribute the Library (or a portion or derivative of it, under Section
2) in object code or executable form under the terms of Sections 1 and 2 above
provided that you accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of Sections 1 and 2 above
on a medium customarily used for software interchange. If
distribution of object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same
place satisfies the requirement to distribute the source code, even though third
parties are not compelled to copy the source along with the object code.
5. A
program that contains no derivative of any portion of the Library, but is
designed to work with the Library by being compiled or linked with it, is called
a "work that uses the Library". Such a work, in isolation, is not a derivative
work of the Library, and therefore falls outside the scope of this
License. However,
linking a "work that uses the Library" with the Library creates an executable
that is a derivative of the Library (because it contains portions of the
Library), rather than a "work that uses the library". The executable is
therefore covered by this License. Section 6 states terms for distribution of
such executables. When a
"work that uses the Library" uses material from a header file that is part of
the Library, the object code for the work may be a derivative work of the
Library even though the source code is not. Whether this is true is especially
significant if the work can be linked without the Library, or if the work is
itself a library. The threshold for this to be true is not precisely defined by
law. If such
an object file uses only numerical parameters, data structure layouts and
accessors, and small macros and small inline functions (ten lines or less in
length), then the use of the object file is unrestricted, regardless of whether
it is legally a derivative work. (Executables containing this object code plus
portions of the Library will still fall under Section 6.) Otherwise,
if the work is a derivative of the Library, you may distribute the object code
for the work under the terms of Section 6. Any executables containing that work
also fall under Section 6, whether or not they are linked directly with the
Library itself. 6. As an
exception to the Sections above, you may also combine or link a "work that uses
the Library" with the Library to produce a work containing portions of the
Library, and distribute that work under terms of your choice, provided that the
terms permit modification of the work for the customer's own use and reverse
engineering for debugging such modifications. You must
give prominent notice with each copy of the work that the Library is used in it
and that the Library and its use are covered by this License. You must supply a
copy of this License. If the work during execution displays copyright notices,
you must include the copyright notice for the Library among them, as well as a
reference directing the user to the copy of this License. Also, you must do one
of these things: For an
executable, the required form of the "work that uses the Library" must include
any data and utility programs needed for reproducing the executable from it.
However, as a special exception, the materials to be distributed need not
include anything that is normally distributed (in either source or binary form)
with the major components (compiler, kernel, and so on) of the operating system
on which the executable runs, unless that component itself accompanies the
executable. It may
happen that this requirement contradicts the license restrictions of other
proprietary libraries that do not normally accompany the operating system. Such
a contradiction means you cannot use both them and the Library together in an
executable that you distribute. 7. You may
place library facilities that are a work based on the Library side-by-side in a
single library together with other library facilities not covered by this
License, and distribute such a combined library, provided that the separate
distribution of the work based on the Library and of the other library
facilities is otherwise permitted, and provided that you do these two things:
8. You may
not copy, modify, sublicense, link with, or distribute the Library except as
expressly provided under this License. Any attempt otherwise to copy, modify,
sublicense, link with, or distribute the Library is void, and will automatically
terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance.
9. You are
not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Library or its
derivative works. These actions are prohibited by law if you do not accept this
License. Therefore, by modifying or distributing the Library (or any work based
on the Library), you indicate your acceptance of this License to do so, and all
its terms and conditions for copying, distributing or modifying the Library or
works based on it. 10. Each
time you redistribute the Library (or any work based on the Library), the
recipient automatically receives a license from the original licensor to copy,
distribute, link with or modify the Library subject to these terms and
conditions. You may not impose any further restrictions on the recipients'
exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties with this License. 11. If, as
a consequence of a court judgment or allegation of patent infringement or for
any other reason (not limited to patent issues), conditions are imposed on you
(whether by court order, agreement or otherwise) that contradict the conditions
of this License, they do not excuse you from the conditions of this License. If
you cannot distribute so as to satisfy simultaneously your obligations under
this License and any other pertinent obligations, then as a consequence you may
not distribute the Library at all. For example, if a patent license would not
permit royalty-free redistribution of the Library by all those who receive
copies directly or indirectly through you, then the only way you could satisfy
both it and this License would be to refrain entirely from distribution of the
Library. If any
portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply, and the section
as a whole is intended to apply in other circumstances. It is
not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section
has the sole purpose of protecting the integrity of the free software
distribution system which is implemented by public license practices. Many
people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that
choice. This
section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License. 12. If the
distribution and/or use of the Library is restricted in certain countries either
by patents or by copyrighted interfaces, the original copyright holder who
places the Library under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is
permitted only in or among countries not thus excluded. In such case, this
License incorporates the limitation as if written in the body of this
License. 13. The
Free Software Foundation may publish revised and/or new versions of the Lesser
General Public License from time to time. Such new versions will be similar in
spirit to the present version, but may differ in detail to address new problems
or concerns. Each
version is given a distinguishing version number. If the Library specifies a
version number of this License which applies to it and "any later version", you
have the option of following the terms and conditions either of that version or
of any later version published by the Free Software Foundation. If the Library
does not specify a license version number, you may choose any version ever
published by the Free Software Foundation. 14. If you
wish to incorporate parts of the Library into other free programs whose
distribution conditions are incompatible with these, write to the author to ask
for permission. For software which is copyrighted by the Free Software
Foundation, write to the Free Software Foundation; we sometimes make exceptions
for this. Our decision will be guided by the two goals of preserving the free
status of all derivatives of our free software and of promoting the sharing and
reuse of software generally. 15. BECAUSE
THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO
THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING
THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS
WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO
EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. MOZILLA
PUBLIC LICENSE Version 1.1 1.0.1.
"Commercial Use" means
distribution or otherwise making the Covered Code available to a third party.
1.1.
''Contributor'' means
each entity that creates or contributes to the creation of Modifications.
1.2.
''Contributor Version'' means
the combination of the Original Code, prior Modifications used by a Contributor,
and the Modifications made by that particular Contributor.
1.3.
''Covered Code'' means
the Original Code or Modifications or the combination of the Original Code and
Modifications, in each case including portions thereof. 1.4.
''Electronic Distribution Mechanism'' means a
mechanism generally accepted in the software development community for the
electronic transfer of data. 1.5.
''Executable'' means
Covered Code in any form other than Source Code. 1.6.
''Initial Developer'' means
the individual or entity identified as the Initial Developer in the Source Code
notice required by Exhibit A. 1.7.
''Larger Work'' means a
work which combines Covered Code or portions thereof with code not governed by
the terms of this License. 1.8.
''License'' means
this document. 1.8.1.
"Licensable" means
having the right to grant, to the maximum extent possible, whether at the time
of the initial grant or subsequently acquired, any and all of the rights
conveyed herein. 1.9.
''Modifications'' means
any addition to or deletion from the substance or structure of either the
Original Code or any previous Modifications. When Covered Code is released as a
series of files, a Modification is: a.
Any
addition to or deletion from the contents of a file containing Original Code or
previous Modifications. 1.10.
''Original Code'' means
Source Code of computer software code which is described in the Source Code
notice required by Exhibit A as Original Code, and which, at the time of its
release under this License is not already Covered Code governed by this License.
1.10.1.
"Patent Claims" means
any patent claim(s), now owned or hereafter acquired, including without
limitation, method, process, and apparatus claims, in any patent Licensable by
grantor. 1.11.
''Source Code'' means
the preferred form of the Covered Code for making modifications to it, including
all modules it contains, plus any associated interface definition files, scripts
used to control compilation and installation of an Executable, or source code
differential comparisons against either the Original Code or another well known,
available Covered Code of the Contributor's choice. The Source Code can be in a
compressed or archival form, provided the appropriate decompression or
de-archiving software is widely available for no charge. 1.12.
"You'' (or "Your") means an
individual or a legal entity exercising rights under, and complying with all of
the terms of, this License or a future version of this License issued under
Section 6.1. For legal entities, "You'' includes any entity which controls, is
controlled by, or is under common control with You. For purposes of this
definition, "control'' means (a) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or otherwise, or (b)
ownership of more than fifty percent (50%) of the outstanding shares or
beneficial ownership of such entity. 2.1.
The Initial Developer Grant. The
Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive
license, subject to third party intellectual property claims:
2.2.
Contributor Grant. Subject
to third party intellectual property claims, each Contributor hereby grants You
a world-wide, royalty-free, non-exclusive license 3.1.
Application of License. The
Modifications which You create or to which You contribute are governed by the
terms of this License, including without limitation Section 2.2. The Source Code
version of Covered Code may be distributed only under the terms of this License
or a future version of this License released under Section 6.1, and You must
include a copy of this License with every copy of the Source Code You
distribute. You may not offer or impose any terms on any Source Code version
that alters or restricts the applicable version of this License or the
recipients' rights hereunder. However, You may include an additional document
offering the additional rights described in Section 3.5. 3.2.
Availability of Source Code. Any
Modification which You create or to which You contribute must be made available
in Source Code form under the terms of this License either on the same media as
an Executable version or via an accepted Electronic Distribution Mechanism to
anyone to whom you made an Executable version available; and if made available
via Electronic Distribution Mechanism, must remain available for at least twelve
(12) months after the date it initially became available, or at least six (6)
months after a subsequent version of that particular Modification has been made
available to such recipients. You are responsible for ensuring that the Source
Code version remains available even if the Electronic Distribution Mechanism is
maintained by a third party. 3.3.
Description of Modifications.
You must
cause all Covered Code to which You contribute to contain a file documenting the
changes You made to create that Covered Code and the date of any change. You
must include a prominent statement that the Modification is derived, directly or
indirectly, from Original Code provided by the Initial Developer and including
the name of the Initial Developer in (a) the Source Code, and (b) in any notice
in an Executable version or related documentation in which You describe the
origin or ownership of the Covered Code. 3.4.
Intellectual Property Matters 3.5.
Required Notices.
You must duplicate
the notice in Exhibit A in each file of the Source Code. If it is not
possible to put such notice in a particular Source Code file due to its
structure, then You must include such notice in a location (such as a relevant
directory) where a user would be likely to look for such a notice. If You
created one or more Modification(s) You may add your name as a Contributor to
the notice described in Exhibit A. You must also duplicate this License
in any documentation for the Source Code where You describe recipients' rights
or ownership rights relating to Covered Code. You may choose to offer, and to
charge a fee for, warranty, support, indemnity or liability obligations to one
or more recipients of Covered Code. However, You may do so only on Your own
behalf, and not on behalf of the Initial Developer or any Contributor. You must
make it absolutely clear than any such warranty, support, indemnity or liability
obligation is offered by You alone, and You hereby agree to indemnify the
Initial Developer and every Contributor for any liability incurred by the
Initial Developer or such Contributor as a result of warranty, support,
indemnity or liability terms You offer. 3.6.
Distribution of Executable Versions. You may
distribute Covered Code in Executable form only if the requirements of Section
3.1-3.5 have been met for that Covered Code, and if You include a notice stating
that the Source Code version of the Covered Code is available under the terms of
this License, including a description of how and where You have fulfilled the
obligations of Section 3.2. The notice must be conspicuously included in any
notice in an Executable version, related documentation or collateral in which
You describe recipients' rights relating to the Covered Code. You may distribute
the Executable version of Covered Code or ownership rights under a license of
Your choice, which may contain terms different from this License, provided that
You are in compliance with the terms of this License and that the license for
the Executable version does not attempt to limit or alter the recipient's rights
in the Source Code version from the rights set forth in this License. If You
distribute the Executable version under a different license You must make it
absolutely clear that any terms which differ from this License are offered by
You alone, not by the Initial Developer or any Contributor. You hereby agree to
indemnify the Initial Developer and every Contributor for any liability incurred
by the Initial Developer or such Contributor as a result of any such terms You
offer. 3.7.
Larger Works. You may
create a Larger Work by combining Covered Code with other code not governed by
the terms of this License and distribute the Larger Work as a single product. In
such a case, You must make sure the requirements of this License are fulfilled
for the Covered Code. If it is
impossible for You to comply with any of the terms of this License with respect
to some or all of the Covered Code due to statute, judicial order, or regulation
then You must: (a) comply with the terms of this License to the maximum extent
possible; and (b) describe the limitations and the code they affect. Such
description must be included in the LEGAL file described in Section 3.4 and must
be included with all distributions of the Source Code. Except to the extent
prohibited by statute or regulation, such description must be sufficiently
detailed for a recipient of ordinary skill to be able to understand
it. This
License applies to code to which the Initial Developer has attached the notice
in Exhibit A and to related Covered Code. 6.1.
New Versions.
Netscape
Communications Corporation (''Netscape'') may publish revised and/or new
versions of the License from time to time. Each version will be given a
distinguishing version number. 6.2.
Effect of New Versions. Once
Covered Code has been published under a particular version of the License, You
may always continue to use it under the terms of that version. You may also
choose to use such Covered Code under the terms of any subsequent version of the
License published by Netscape. No one other than Netscape has the right to
modify the terms applicable to Covered Code created under this License.
6.3.
Derivative Works. If You
create or use a modified version of this License (which you may only do in order
to apply it to code which is not already Covered Code governed by this License),
You must (a) rename Your license so that the phrases ''Mozilla'', ''MOZILLAPL'',
''MOZPL'', ''Netscape'', "MPL", ''NPL'' or any confusingly similar phrase do not
appear in your license (except to note that your license differs from this
License) and (b) otherwise make it clear that Your version of the license
contains terms which differ from the Mozilla Public License and Netscape Public
License. (Filling in the name of the Initial Developer, Original Code or
Contributor in the notice described in Exhibit A shall not of themselves be
deemed to be modifications of this License.) COVERED
CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS'' BASIS, WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES
THAT THE COVERED CODE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR
PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
THE COVERED CODE IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY
RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE
COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF
WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED
CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8.1. This
License and the rights granted hereunder will terminate automatically if You
fail to comply with terms herein and fail to cure such breach within 30 days of
becoming aware of the breach. All sublicenses to the Covered Code which are
properly granted shall survive any termination of this License. Provisions
which, by their nature, must remain in effect beyond the termination of this
License shall survive. 8.2. If You
initiate litigation by asserting a patent infringement claim (excluding
declatory judgment actions) against Initial Developer or a Contributor (the
Initial Developer or Contributor against whom You file such action is referred
to as "Participant") alleging that: 8.3. If You
assert a patent infringement claim against Participant alleging that such
Participant's Contributor Version directly or indirectly infringes any patent
where such claim is resolved (such as by license or settlement) prior to the
initiation of patent infringement litigation, then the reasonable value of the
licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken
into account in determining the amount or value of any payment or license.
8.4. In the
event of termination under Sections 8.1 or 8.2 above, all end user license
agreements (excluding distributors and resellers) which have been validly
granted by You or any distributor hereunder prior to termination shall survive
termination. UNDER NO
CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE),
CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR,
OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE
LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER
COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE
POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO
LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO
THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO
THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. The
Covered Code is a ''commercial item,'' as that term is defined in 48 C.F.R.
2.101 (Oct. 1995), consisting of ''commercial computer software'' and
''commercial computer software documentation,'' as such terms are used in 48
C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R.
227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire
Covered Code with only those rights set forth herein. This
License represents the complete agreement concerning subject matter hereof. If
any provision of this License is held to be unenforceable, such provision shall
be reformed only to the extent necessary to make it enforceable. This License
shall be governed by California law provisions (except to the extent applicable
law, if any, provides otherwise), excluding its conflict-of-law provisions. With
respect to disputes in which at least one party is a citizen of, or an entity
chartered or registered to do business in the United States of America, any
litigation relating to this License shall be subject to the jurisdiction of the
Federal Courts of the Northern District of California, with venue lying in Santa
Clara County, California, with the losing party responsible for costs, including
without limitation, court costs and reasonable attorneys' fees and expenses. The
application of the United Nations Convention on Contracts for the International
Sale of Goods is expressly excluded. Any law or regulation which provides that
the language of a contract shall be construed against the drafter shall not
apply to this License. As
between Initial Developer and the Contributors, each party is responsible for
claims and damages arising, directly or indirectly, out of its utilization of
rights under this License and You agree to work with Initial Developer and
Contributors to distribute such responsibility on an equitable basis. Nothing
herein is intended or shall be deemed to constitute any admission of
liability. Initial
Developer may designate portions of the Covered Code as “Multiple-Licensed”.
“Multiple-Licensed” means that the Initial Developer permits you to utilize
portions of the Covered Code under Your choice of the NPL or the alternative
licenses, if any, specified by the Initial Developer in the file described in
Exhibit A. ``The
contents of this file are subject to the Mozilla Public License Version 1.1 (the
"License"); you may not use this file except in compliance with the License. You
may obtain a copy of the License at www.mozilla.org/MPL/ Software
distributed under the License is distributed on an "AS IS" basis, WITHOUT
WARRANTY OF ANY KIND, either express or implied. See the License for the
specific language governing rights and limitations under the
License. The
Original Code is ______________________________________. The
Initial Developer of the Original Code is ________________________. Portions
created by ______________________ are Copyright (C) ______
_______________________. All Rights Reserved. Contributor(s):
______________________________________. Alternatively,
the contents of this file may be used under the terms of the _____ license (the
“[___] License”), in which case the provisions of [______] License are
applicable instead of those above. If you wish to allow use of your version of
this file only under the terms of the [____] License and not to allow others to
use your version of this file under the MPL, indicate your decision by deleting
the provisions above and replace them with the notice and other provisions
required by the [___] License. If you do not delete the provisions above, a
recipient may use your version of this file under either the MPL or the [___]
License." [NOTE:
The text of this Exhibit A may differ slightly from the text of the notices in
the Source Code files of the Original Code. You should use the text of this
Exhibit A rather than the text found in the Original Code Source Code for Your
Modifications.] You have reviewed the QNX Development
Suite License Guide and have the following information on the third party
open source license terms: BSD 27, DEC 3 and CMU 4. The full third party license terms would
appear as follows: BSD
27 DEC
3 CMU
4 Copyright 1995, 1996. The
Internet Software Consortium. All Rights Reserved. Redistribution
and use in source and binary forms, with or without modifications, are
permitted provided that the following conditions are
met: i.
Redistribution of source code must retain the above copyright
notice, this list of conditions and the following
disclaimer. ii.
Redistribution in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the
distribution. iii.
Neither the name(s) of The Internet Software Consortium nor the
names of its/their contributors may be used to endorse or promote products
derived from this software without specific prior written
permission. THIS
SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND
CONTRIBUTORS “AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL
THE INTERNET SOFTWARE CONSORTIUM OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE. This
software has been written for the Internet Software Consortium by Ted
Lemon in cooperation with Vixie Enterprises. To learn more about the
Internet Software Consortium, see ``http://www.vix.com/isc''. To learn
more about Vixie Enterprises, see ``http://www.vix.com''. Portions Copyright © 1993 by Digital Equipment
Corporation. Permission to use, copy, modify, and distribute this
software for any purpose with or without fee is hereby granted, provided
that the above copyright notice and this permission notice appear in all
copies, and that the name of Digital Equipment Corporation not be used in
advertising or publicity pertaining to distribution of the document or
software without specific, written prior permission. THE
SOFTWARE IS PROVIDED "AS IS" AND Digital Equipment Corporation DISCLAIMS
ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL Digital
Equipment Corporation BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE. Copyright
© 1988, 1989, 1991, 1992, 1993 by Carnegie Mellon University All Rights
Reserved. Copyright © 1995, 1996 by Frank Kicenko. Frank@man.net Permission
to use, copy, modify, and distribute this software and its documentation
for any purpose and without fee is hereby granted, provided that the above
copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation, and that
the name of Carnegie Mellon University not be used in advertising or
publicity pertaining to distribution of the software without specific,
written prior permission. Carnegie
Mellon University DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO
EVENT SHALL Carnegie Mellon University BE LIABLE FOR ANY SPECIAL, INDIRECT
OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OR
USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE. osltg1_00A
Acknowledgment
THE SOFTWARE IS PROVIDED "AS IS" AND
[NAME OF LICENSOR(S)] DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS.
IN NO EVENT SHALL [NAME OF LICENSOR(S)] BE LIABLE FOR ANY SPECIAL,
DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Software
Acknowledgment
Acknowledgment
Acknowledgment
Master
Chart for One-Off Licenses
Terms of
Agreement
IN NO EVENT SHALL
THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY PARTY FOR DIRECT,
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE AUSTRALIAN
NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
IN NO EVENT SHALL
THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY PARTY FOR DIRECT,
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE AUSTRALIAN
NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1.
Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in
binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
3. All advertising materials
mentioning features or use of this software must display the following
acknowledgement: "This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)". The word 'cryptographic' can be left out
if the routines from the library being used are not cryptographic related
:-).
4. If you include any Windows specific code (or a derivative
thereof) from the apps directory (application code) you must include an
acknowledgement: "This product includes software written by Tim Hudson
(tjh@cryptsoft.com)"
1. All terms of all other applicable copyrights and
licenses must be followed.
2. Redistributions of source code must
retain the authors' copyright notice(s), this list of conditions, and the
following disclaimer.
3. Redistributions in binary form must reproduce
the authors' copyright notice(s), this list of conditions, and the
following disclaimer in the documentation and/or other materials provided
with the distribution.
4. All advertising materials mentioning
features or use of this software must display the following
acknowledgement with the name(s) of the authors as specified in the
copyright notice(s) substituted where indicated: This product includes
software developed by The Inner Net, and other contributors.
5.
Neither the name(s) of the author(s) nor the names of its contributors may
be used to endorse or promote products derived from this software without
specific prior written permission.
IN NO EVENT SHALL
THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY PARTY FOR DIRECT,
INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE AUSTRALIAN
NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Preamble
TERMS
AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
NO
WARRANTY
Preamble
TERMS
AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
NO
WARRANTY
1. Definitions.
2. Source Code License.
3. Distribution
Obligations.
If Contributor has knowledge that a
license under a third party's intellectual property rights is required to
exercise the rights granted by such Contributor under Sections 2.1 or 2.2,
Contributor must include a text file with the Source Code distribution titled
"LEGAL'' which describes the claim and the party making the claim in
sufficient detail that a recipient will know whom to contact. If Contributor
obtains such knowledge after the Modification is made available as described
in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies
Contributor makes available thereafter and shall take other steps (such as
notifying appropriate mailing lists or newsgroups) reasonably calculated to
inform those who received the Covered Code that new knowledge has been
obtained.
If Contributor's Modifications include
an application programming interface and Contributor has knowledge of patent
licenses which are reasonably necessary to implement that API, Contributor
must also include this information in the LEGAL file.
Contributor represents that, except as
disclosed pursuant to Section 3.4(a) above, Contributor believes that
Contributor's Modifications are Contributor's original creation(s) and/or
Contributor has sufficient rights to grant the rights conveyed by this
License. 4. Inability to Comply Due to Statute or
Regulation.
5. Application of this
License.
6. Versions of the
License.
7. DISCLAIMER OF
WARRANTY.
8. TERMINATION.
9. LIMITATION OF LIABILITY.
10. U.S. GOVERNMENT END
USERS.
11. MISCELLANEOUS.
12. RESPONSIBILITY FOR
CLAIMS.
13. MULTIPLE-LICENSED CODE.
EXHIBIT A -Mozilla Public
License.