52
55
Source code in directories src and src/lib is subject to the
53
56
`GNU LIBRARY GENERAL PUBLIC LICENSE' [ LGPL ]
54
57
It is copyrighted by Henner Eisen.
55
Source code in directory src/authlib is subject to different licenses
56
(a BSD style license with advertisment clause).
59
ipppd, based on pppd 2.2.0g with a few changes from 2.3
60
============================================================
61
copyright (c) 1995-1998 of all changes by Michael Hipp
62
All changes are under GPL license.
60
Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
62
Redistribution and use in source and binary forms, with or without
63
modification, are permitted provided that the following conditions
66
1. Redistributions of source code must retain the above copyright
67
notice, this list of conditions and the following disclaimer.
69
2. Redistributions in binary form must reproduce the above copyright
70
notice, this list of conditions and the following disclaimer in
71
the documentation and/or other materials provided with the
74
3. The name "Carnegie Mellon University" must not be used to
75
endorse or promote products derived from this software without
76
prior written permission. For permission or any legal
77
details, please contact
78
Office of Technology Transfer
79
Carnegie Mellon University
81
Pittsburgh, PA 15213-3890
82
(412) 268-4387, fax: (412) 268-7395
83
tech-transfer@andrew.cmu.edu
85
4. Redistributions of any form whatsoever must retain the following
87
"This product includes software developed by Computing Services
88
at Carnegie Mellon University (http://www.cmu.edu/computing/)."
90
CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
91
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
92
AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
93
FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
94
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
95
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
96
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
98
Copyright 1989 - 1994, John F. Haugh II
101
Redistribution and use in source and binary forms, with or without
102
modification, are permitted provided that the following conditions
104
1. Redistributions of source code must retain the above copyright
105
notice, this list of conditions and the following disclaimer.
106
2. Redistributions in binary form must reproduce the above copyright
107
notice, this list of conditions and the following disclaimer in the
108
documentation and/or other materials provided with the distribution.
109
3. All advertising materials mentioning features or use of this software
110
must display the following acknowledgement:
111
This product includes software developed by John F. Haugh, II
112
and other contributors.
113
4. Neither the name of John F. Haugh, II nor the names of its contributors
114
may be used to endorse or promote products derived from this software
115
without specific prior written permission.
117
THIS SOFTWARE IS PROVIDED BY JOHN HAUGH AND CONTRIBUTORS ``AS IS'' AND
118
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
119
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
120
ARE DISCLAIMED. IN NO EVENT SHALL JOHN HAUGH OR CONTRIBUTORS BE LIABLE
121
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
122
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
123
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
124
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
125
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
126
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
129
Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.
131
License to copy and use this software is granted provided that
132
it is identified as the "RSA Data Security, Inc. MD5 Message-
133
Digest Algorithm" in all material mentioning or referencing this
134
software or this function.
136
License is also granted to make and use derivative works
137
provided that such works are identified as "derived from the RSA
138
Data Security, Inc. MD5 Message-Digest Algorithm" in all
139
material mentioning or referencing the derived work.
141
RSA Data Security, Inc. makes no representations concerning
142
either the merchantability of this software or the suitability
143
of this software for any particular purpose. It is provided "as
144
is" without express or implied warranty of any kind.
146
These notices must be retained in any copies of any part of this
147
documentation and/or software.
149
Copyright (c) 1989 Carnegie Mellon University.
150
Copyright (c) 1991 Gregory M. Christy.
151
Copyright (c) 1993 The Australian National University.
152
Copyright (c) 1995 Eric Rosenquist, Strata Software Limited.
153
Copyright (c) 1995 Pedro Roque Marques
154
copyright (c) 1995,1996,1997 Michael Hipp
155
Copyright (C) 1996, Matjaz Godec <gody@elgo.si>
156
Copyright (C) 1996, Lars Fenneberg <in5y050@public.uni-hamburg.de>
159
Redistribution and use in source and binary forms are permitted
160
provided that the above copyright notice and this paragraph are
161
duplicated in all such forms and that any documentation,
162
advertising materials, and other materials related to such
163
distribution and use acknowledge that the software was developed
164
by Carnegie Mellon University. The name of the
165
University may not be used to endorse or promote products derived
166
from this software without specific prior written permission.
168
Redistribution and use in source and binary forms are permitted
169
provided that the above copyright notice and this paragraph are
170
duplicated in all such forms and that any documentation,
171
advertising materials, and other materials related to such
172
distribution and use acknowledge that the software was developed
173
by Gregory M. Christy. The name of the author may not be used to
174
endorse or promote products derived from this software without
175
specific prior written permission.
177
Redistribution and use in source and binary forms are permitted
178
provided that the above copyright notice and this paragraph are
179
duplicated in all such forms and that any documentation,
180
advertising materials, and other materials related to such
181
distribution and use acknowledge that the software was developed
182
by the Australian National University. The name of the University
183
may not be used to endorse or promote products derived from this
184
software without specific prior written permission.
186
Redistribution and use in source and binary forms are permitted
187
provided that the above copyright notice and this paragraph are
188
duplicated in all such forms and that any documentation,
189
advertising materials, and other materials related to such
190
distribution and use acknowledge that the software was developed
191
by Eric Rosenquist. The name of the author may not be used to
192
endorse or promote products derived from this software without
193
specific prior written permission.
195
Redistribution and use in source and binary forms are permitted
196
provided that the above copyright notice and this paragraph are
197
duplicated in all such forms and that any documentation,
198
advertising materials, and other materials related to such
199
distribution and use acknowledge that the software was developed
200
by Pedro Roque Marques. The name of the author may not be used to
201
endorse or promote products derived from this software without
202
specific prior written permission.
204
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
205
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
206
WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
208
Copyright (c) 1994 The Australian National University.
211
Permission to use, copy, modify, and distribute this software and its
212
documentation is hereby granted, provided that the above copyright
213
notice appears in all copies. This software is provided without any
214
warranty, express or implied. The Australian National University
215
makes no representations about the suitability of this software for
218
IN NO EVENT SHALL THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY
219
PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
220
ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF
221
THE AUSTRALIAN NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY
224
THE AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
225
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
226
AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
227
ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
228
OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS,
233
Copyright (c) 1999-2004 Paul Mackerras. All rights reserved.
235
Redistribution and use in source and binary forms, with or without
236
modification, are permitted provided that the following conditions
239
1. Redistributions of source code must retain the above copyright
240
notice, this list of conditions and the following disclaimer.
242
2. The name(s) of the authors of this software must not be used to
243
endorse or promote products derived from this software without
244
prior written permission.
246
3. Redistributions of any form whatsoever must retain the following
248
"This product includes software developed by Paul Mackerras
251
THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
252
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
253
AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
254
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
255
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
256
AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
257
OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
259
Copyright 2010 Ben Hutchings.
261
Redistribution and use in source and binary forms, with or without
262
modification, are permitted provided that the following conditions
265
1. Redistributions of source code must retain the above copyright
266
notice, this list of conditions and the above disclaimer.
268
2. The name(s) of the authors of this software must not be used to
269
endorse or promote products derived from this software without
270
prior written permission.
273
Copyright (c) 1989 Regents of the University of California.
276
Redistribution and use in source and binary forms are permitted
277
provided that the above copyright notice and this paragraph are
278
duplicated in all such forms and that any documentation,
279
advertising materials, and other materials related to such
280
distribution and use acknowledge that the software was developed
281
by the University of California, Berkeley. The name of the
282
University may not be used to endorse or promote products derived
283
from this software without specific prior written permission.
284
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
285
IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
286
WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.