1See the respective source files to find out which copyrights apply. 2 3------------------------------------------------------------------------------ 4Copyright (C) 2002 Roaring Penguin Software Inc. 5 6Permission to use, copy, modify, and distribute this software for any 7purpose and without fee is hereby granted, provided that this 8copyright and permission notice appear on all copies and supporting 9documentation, the name of Roaring Penguin Software Inc. not be used 10in advertising or publicity pertaining to distribution of the program 11without specific prior permission, and notice be given in supporting 12documentation that copying and distribution is by permission of 13Roaring Penguin Software Inc.. 14 15Roaring Penguin Software Inc. makes no representations about the 16suitability of this software for any purpose. It is provided "as is" 17without express or implied warranty. 18 19------------------------------------------------------------------------------ 20Copyright (C) 1995,1996,1997,1998 Lars Fenneberg <lf@elemental.net> 21 22Permission to use, copy, modify, and distribute this software for any 23purpose and without fee is hereby granted, provided that this copyright and 24permission notice appear on all copies and supporting documentation, the 25name of Lars Fenneberg not be used in advertising or publicity pertaining to 26distribution of the program without specific prior permission, and notice be 27given in supporting documentation that copying and distribution is by 28permission of Lars Fenneberg. 29 30Lars Fenneberg makes no representations about the suitability of this 31software for any purpose. It is provided "as is" without express or implied 32warranty. 33 34------------------------------------------------------------------------------ 35Copyright 1992 Livingston Enterprises, Inc. 36Livingston Enterprises, Inc. 6920 Koll Center Parkway Pleasanton, CA 94566 37 38Permission to use, copy, modify, and distribute this software for any 39purpose and without fee is hereby granted, provided that this copyright 40and permission notice appear on all copies and supporting documentation, 41the name of Livingston Enterprises, Inc. not be used in advertising or 42publicity pertaining to distribution of the program without specific 43prior permission, and notice be given in supporting documentation that 44copying and distribution is by permission of Livingston Enterprises, Inc. 45 46Livingston Enterprises, Inc. makes no representations about the suitability 47of this software for any purpose. It is provided "as is" without express 48or implied warranty. 49------------------------------------------------------------------------------ 50[C] The Regents of the University of Michigan and Merit Network, Inc. 1992, 511993, 1994, 1995 All Rights Reserved 52 53Permission to use, copy, modify, and distribute this software and its 54documentation for any purpose and without fee is hereby granted, provided 55that the above copyright notice and this permission notice appear in all 56copies of the software and derivative works or modified versions thereof, 57and that both the copyright notice and this permission and disclaimer 58notice appear in supporting documentation. 59 60THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER 61EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF 62MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE REGENTS OF THE 63UNIVERSITY OF MICHIGAN AND MERIT NETWORK, INC. DO NOT WARRANT THAT THE 64FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET LICENSEE'S REQUIREMENTS OR 65THAT OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. The Regents of the 66University of Michigan and Merit Network, Inc. shall not be liable for any 67special, indirect, incidental or consequential damages with respect to any 68claim by Licensee or any third party arising from use of the software. 69------------------------------------------------------------------------------ 70Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. 71All rights reserved. 72 73License to copy and use this software is granted provided that it 74is identified as the "RSA Data Security, Inc. MD5 Message-Digest 75Algorithm" in all material mentioning or referencing this software 76or this function. 77 78License is also granted to make and use derivative works provided 79that such works are identified as "derived from the RSA Data 80Security, Inc. MD5 Message-Digest Algorithm" in all material 81mentioning or referencing the derived work. 82 83RSA Data Security, Inc. makes no representations concerning either 84the merchantability of this software or the suitability of this 85software for any particular purpose. It is provided "as is" 86without express or implied warranty of any kind. 87 88These notices must be retained in any copies of any part of this 89documentation and/or software. 90------------------------------------------------------------------------------ 91