xref: /titanic_44/usr/src/lib/libsasl/LICENSE.txt (revision 3f7d54a6b84904c8f4d8daa4c7b577bede7df8b9)
1#pragma ident	"%Z%%M%	%I%	%E% SMI"
2
3 Copyright 2003 Sun Microsystems, Inc.  All rights reserved.
4 Use is subject to license terms.
5
6 Copyright (c) 2001 Carnegie Mellon University.  All rights reserved.
7
8 Redistribution and use in source and binary forms, with or without
9 modification, are permitted provided that the following conditions
10 are met:
11
12 1. Redistributions of source code must retain the above copyright
13    notice, this list of conditions and the following disclaimer.
14
15 2. Redistributions in binary form must reproduce the above copyright
16    notice, this list of conditions and the following disclaimer in
17    the documentation and/or other materials provided with the
18    distribution.
19
20 3. The name "Carnegie Mellon University" must not be used to
21    endorse or promote products derived from this software without
22    prior written permission. For permission or any other legal
23    details, please contact
24      Office of Technology Transfer
25      Carnegie Mellon University
26      5000 Forbes Avenue
27      Pittsburgh, PA  15213-3890
28      (412) 268-4387, fax: (412) 268-7395
29      tech-transfer@andrew.cmu.edu
30
31 4. Redistributions of any form whatsoever must retain the following
32    acknowledgment:
33    "This product includes software developed by Computing Services
34     at Carnegie Mellon University (http://www.cmu.edu/computing/)."
35
36 CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
37 THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
38 AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
39 FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
40 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
41 AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
42 OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
43
44
45Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
46rights reserved.
47
48License to copy and use this software is granted provided that it
49is identified as the "RSA Data Security, Inc. MD5 Message-Digest
50Algorithm" in all material mentioning or referencing this software
51or this function.
52
53License is also granted to make and use derivative works provided
54that such works are identified as "derived from the RSA Data
55Security, Inc. MD5 Message-Digest Algorithm" in all material
56mentioning or referencing the derived work.
57
58RSA Data Security, Inc. makes no representations concerning either
59the merchantability of this software or the suitability of this
60software for any particular purpose. It is provided "as is"
61without express or implied warranty of any kind.
62
63These notices must be retained in any copies of any part of this
64documentation and/or software.
65
66
67 This module contains code made available by IBM
68 Corporation on an AS IS basis.  Any one receiving the
69 module is considered to be licensed under IBM copyrights
70 to use the IBM-provided source code in any way he or she
71 deems fit, including copying it, compiling it, modifying
72 it, and redistributing it, with or without
73 modifications.  No license under any IBM patents or
74 patent applications is to be implied from this copyright
75 license.
76
77 A user of the module should understand that IBM cannot
78 provide technical support for the module and will not be
79 responsible for any consequences of use of the program.
80
81 Any notices, including this one, are not to be removed
82 from the module without the prior written consent of
83 IBM.
84