-457-100-01(1) © 2016 Important Notice Regarding Software

COPYRIGHT All right and title in and to the SOFTWARE (including, but not limited to, any images, License photographs, animation, video, audio, music, text and “applets” incorporated into the SOFTWARE) is owned by or one or more of the THIRD-PARTY SUPPLIERS. GRANT OF LICENSE Notes on the License SONY grants you a limited license to use the SOFTWARE solely in connection with your compatible device (“DEVICE”) and only for your individual, non- This product comes with software that are used based on licensing agreements with the owners of commercial use. SONY and the THIRD-PARTY SUPPLIERS expressly reserve all rights, title and that software. Based on requests by the owners of copyright of these software applications, we have interest (including, but not limited to, all intellectual property rights) in and to the SOFTWARE an obligation to inform you of the following. Please read the following sections. that this EULA does not specifically grant to you.

THIS PRODUCT IS LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A CONSUMER OR OTHER USES IN WHICH IT DOES NOT REQUIREMENTS AND LIMITATIONS RECEIVE REMUNERATION TO You may not copy, publish, adapt, redistribute, attempt to derive source code, modify, reverse (i) ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC VIDEO”) engineer, decompile, or disassemble any of the SOFTWARE, whether in whole or in part, or create AND/OR any derivative works from or of the SOFTWARE unless such derivative works are intentionally (ii) DECODE AVC VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A facilitated by the SOFTWARE. You may not modify or tamper with any digital rights management PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER LICENSED functionality of the SOFTWARE. TO PROVIDE AVC VIDEO. You may not bypass, modify, defeat or circumvent any of the functions or protections of the SOFTWARE or any mechanisms operatively linked to the SOFTWARE. You may not separate any NO LICENSE IS GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. individual component of the SOFTWARE for use on more than one DEVICE unless expressly ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE HTTP:// authorized to do so by SONY. You may not remove, alter, cover or deface any trademarks or notices WWW.MPEGLA.COM on the SOFTWARE. You may not share, distribute, rent, lease, sublicense, assign, transfer or sell the SOFTWARE. The software, network services or other products other than SOFTWARE upon which the SOFTWARE’S performance depends might be interrupted or discontinued at the On GNU GPL/LGPL applied software discretion of the suppliers (software suppliers, service suppliers, or SONY). SONY and such The software that is eligible for the following GNU General Public License (hereinafter referred to suppliers do not warrant that the SOFTWARE, network services or other products will continue to as “GPL”) or GNU Lesser General Public License (hereinafter referred to as “LGPL”) are included be available, or will operate without interruption or modification. in the product. This informs you that you have a right to have access to, modify, and redistribute source code for these software programs under the conditions of the supplied GPL/LGPL. EXCLUDED SOFTWARE AND OPEN SOURCE Source code is provided on the web. Use the following URL to download it. COMPONENTS http://oss.sony.net/Products/Linux/ We would prefer you do not contact us about the contents of source code. Notwithstanding the foregoing limited license grant, you acknowledge that the SOFTWARE may include EXCLUDED SOFTWARE. Certain EXCLUDED SOFTWARE may be covered by open source software licenses (“OPEN SOURCE COMPONENTS”), which means any software licenses approved as open source licenses by the Open Source Initiative or any substantially similar About the open source software license licenses, including but not limited to any license that, as a condition of distribution of the software licensed under such license, requires that the distributor make the software available in source code Please refer to below information for the content of license. format. If and to the extent disclosure is required, please visit www.sony.net/Products/Linux or other SONY-designated web site for a list of applicable OPEN SOURCE COMPONENTS included in the SOFTWARE from time to time, and the applicable terms and conditions governing its use. Such terms and conditions may be changed by the applicable third party at any time without END USER LICENSE AGREEMENT liability to you. To the extent required by the licenses covering EXCLUDED SOFTWARE, the terms of such licenses will apply in lieu of the terms of this EULA. To the extent the terms of the licenses applicable to EXCLUDED SOFTWARE prohibit any of the restrictions in this EULA with IMPORTANT: respect to such EXCLUDED SOFTWARE, such restrictions will not apply to such EXCLUDED BEFORE USING THE SOFTWARE, PLEASE READ THIS END USER LICENSE SOFTWARE. To the extent the terms of the licenses applicable to OPEN SOURCE AGREEMENT (“EULA”) CAREFULLY. BY USING THE SOFTWARE YOU ARE COMPONENTS require SONY to make an offer to provide source code in connection with the ACCEPTING THE TERMS OF THIS EULA. SOFTWARE, such offer is hereby made. IF YOU DO NOT ACCEPT THE TERMS OF THIS EULA, YOU MAY NOT USE THE SOFTWARE. USE OF SOFTWARE WITH COPYRIGHTED This EULA is a legal agreement between you and Sony Electronics Inc. (“SONY”). This EULA MATERIALS governs your rights and obligations regarding the product software of SONY and/or its third party The SOFTWARE may be capable of being used by you to view, store, process and/or use content licensors (including SONY’s affiliates) and their respective affiliates (collectively, the “THIRD- created by you PARTY SUPPLIERS”), together with any updates/upgrades provided by SONY, any printed, on- and/or third parties. Such content may be protected by copyright, other intellectual property laws, line or other electronic documentation for such software, and any data files created by operation of and/or agreements. You agree to use the SOFTWARE only in compliance with all such laws and such software (collectively, the “SOFTWARE”). agreements that apply to such content. You acknowledge and agree that SONY may take appropriate measures to protect the copyright of content stored, processed or used by the Notwithstanding the foregoing, any software in the SOFTWARE having a separate end user license SOFTWARE. Such measures include, but are not limited to, counting the frequency of your backup agreement and restoration through certain SOFTWARE features, refusal to accept your request to enable (including, but not limited to, GNU General Public license and Lesser/Library General Public restoration of data, and termination of this EULA in the event of your illegitimate use of the License) shall be covered by such applicable separate end user license agreement in lieu of the SOFTWARE. terms of this EULA to the extent required by such separate end user license agreement (“EXCLUDED SOFTWARE”).

SOFTWARE LICENSE The SOFTWARE is licensed, not sold. The SOFTWARE is protected by copyright and other intellectual property laws and international treaties.

1 CONTENT SERVICE CONSENT TO USE OF NON-PERSONAL PLEASE ALSO NOTE THAT THE SOFTWARE MAY BE DESIGNED TO BE USED WITH INFORMATION, LOCATION DATA, DATA CONTENT AVAILABLE THROUGH ONE OR MORE CONTENT SERVICES (“CONTENT SERVICE”). USE OF THE SERVICE AND THAT CONTENT IS SUBJECT TO THE TERMS SECURITY OF SERVICE OF THAT CONTENT SERVICE. IF YOU DECLINE TO ACCEPT THOSE You acknowledge and agree that SONY and its affiliates, partners and agents may read, collect, TERMS, YOUR USE OF THE SOFTWARE WILL BE LIMITED. YOU ACKNOWLEDGE AND transfer, process and store certain information collected from the SOFTWARE, including but not AGREE THAT CERTAIN CONTENT AND SERVICES AVAILABLE THROUGH THE limited to information about (i) the SOFTWARE and (ii) the software applications, contents and SOFTWARE MAY BE PROVIDED BY THIRD PARTIES OVER WHICH SONY HAS NO peripheral devices that interact with your DEVICE and the SOFTWARE (“Information”). CONTROL. USE OF THE CONTENT SERVICE REQUIRES AN INTERNET CONNECTION. Information includes, but is not limited to: (1) unique identifiers relating to your DEVICE and its THE CONTENT SERVICE MAY BE DISCONTINUED AT ANY TIME. components; (2) performance of the DEVICE, the SOFTWARE and their components; (3) configurations of your DEVICE, the SOFTWARE and the software applications, contents and INTERNET CONNECTIVITY AND THIRD PARTY peripheral devices that interact with the DEVICE and the SOFTWARE; (4) use and frequency of use of the functions of (x) the SOFTWARE, and (y) the software applications, contents and SERVICES peripheral devices that interact with the SOFTWARE; and (5) location data, as indicated below. SONY and its affiliates, partners and agents may use and disclose Information subject to applicable You acknowledge and agree that access to certain SOFTWARE features may require an Internet laws in order to improve its products and services or to provide products or services to you. Such connection for which you are solely responsible. Further, you are solely responsible for payment uses include, but are not limited to: (a) administering the functionalities of the SOFTWARE; (b) to of any third party fees associated with your Internet connection, including but not limited to improve, service, update or upgrade the SOFTWARE; (c) improving, developing and enhancing Internet service provider or airtime charges. Operation of the SOFTWARE may be limited or the current and future products and services of SONY and other parties; (d) to provide you with restricted depending on the capabilities, bandwidth or technical limitations of your Internet information about the products and services offered by SONY and other parties; (e) complying connection and service. The provision, quality and security of such Internet connectivity are the with applicable laws or regulations; and (f) to the extent offered, providing you with location-based sole responsibility of the third party providing such service. services of SONY and other parties, as indicated below. In addition, SONY retains the right to use Information to protect itself and third parties from illegal, criminal or harmful conduct. EXPORT AND OTHER REGULATIONS Certain services available through the SOFTWARE may rely upon location information, including, You agree to comply with all export and re-export restrictions and regulations of the Department but not limited to, the geographic location of the DEVICE. You acknowledge that for the purpose of Commerce and other United States agencies and authorities, and not to transfer, or authorize the of providing such services, SONY, the THIRD-PARTY SUPPLIERS or their partners may collect, transfer, of the SOFTWARE to a prohibited country or otherwise in violation of any such archive, process and use such location data, and that such services are governed by the privacy restrictions or regulations. policies of SONY or such third party. By using any such services, you agree that you have reviewed the privacy policies applicable to such services and consent to such activities. U.S. GOVERNMENT RESTRICTED RIGHTS SONY, its affiliates, partners and agents will not intentionally use Information to personally Use, duplication, or disclosure by the United States Government is subject to restriction as set forth identify the owner or user of the SOFTWARE without your knowledge or consent. Any use of in subparagraph (c) (1) and (2) of the Commercial Computer Software-Restricted Rights at 48 Information will be in accordance with the privacy policies of SONY or such third party. SONY’s C.F.R. § 52.227-19, as applicable. The manufacturer solely for purposes of this section is Sony current privacy policy is located at: www.sony.com/selprivacy. Electronics Inc., 16530 Via Esprillo, San Diego, CA 92127. Please contact applicable third parties for privacy policies relating to personally identifiable and other information you provide when you use or access third party software or HIGH RISK ACTIVITIES services. The SOFTWARE is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, Information may be processed, stored or transferred to SONY, its affiliates or agents which are such as in the operation of nuclear facilities, aircraft navigation or communication systems, air located in countries outside of your country of residence. Data protection and information privacy traffic control, direct life support machines, or weapons systems, in which the failure of the laws in certain countries may not offer the same level of protection as your country of residence SOFTWARE could lead to death, personal injury, or severe physical or environmental damage and you may have fewer legal rights in relation to Information processed and stored in, or (“HIGH RISK ACTIVITIES”). SONY, each of the THIRD-PARTY SUPPLIERS, and each of their transferred to, such countries. SONY will use reasonable efforts to take appropriate technical and respective affiliates specifically disclaim any express or implied warranty, duty or condition of organizational steps to prevent unauthorized access to or disclosure of Information, but does not fitness for HIGH RISK ACTIVITIES. warrant it will eliminate all risk of misuse of such Information. EXCLUSION OF WARRANTY ON SOFTWARE AUTOMATIC UPDATE FEATURE You acknowledge and agree that use of the SOFTWARE is at your sole risk and that you are From time to time, SONY or the THIRD-PARTY SUPPLIERS may automatically update or responsible for use of the SOFTWARE. The SOFTWARE is provided “AS IS,” without warranty, otherwise modify the SOFTWARE, including, but not limited to, for purposes of enhancement of duty or condition of any kind. security functions, error correction and improvement of functions, at such time as you interact with SONY’s or third parties’ servers, or otherwise. Such updates or modifications may delete or change SONY AND EACH OF THE THIRD-PARTY SUPPLIERS (for purposes of this Section, SONY the nature of features or other aspects of the SOFTWARE, including, but not limited to, functions and each of the THIRD-PARTY SUPPLIERS shall be collectively referred to as “SONY”) you may rely upon. You acknowledge and agree that such activities may occur at SONY’s sole EXPRESSLY DISCLAIM ALL WARRANTIES, DUTIES OR CONDITIONS, EXPRESS OR discretion and that SONY may condition continued use of the SOFTWARE upon your complete IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF installation or acceptance of such update or modifications. Any updates/modifications shall be MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A PARTICULAR deemed to be, and shall constitute part of, the SOFTWARE for purposes of this EULA. By PURPOSE. SONY DOES NOT WARRANT OR MAKE ANY CONDITIONS OR acceptance of this EULA, you consent to such update/modification. REPRESENTATIONS (A) THAT THE FUNCTIONS CONTAINED IN ANY OF THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT THEY WILL BE UPDATED, (B) THAT THE OPERATION OF ANY OF THE SOFTWARE WILL BE CORRECT OR ENTIRE AGREEMENT, WAIVER, ERROR-FREE OR THAT ANY DEFECTS WILL BE CORRECTED, (C) THAT THE SOFTWARE WILL NOT DAMAGE ANY OTHER SOFTWARE, HARDWARE OR DATA, (D) SEVERABILITY THAT ANY SOFTWARE, NETWORK SERVICES (INCLUDING THE INTERNET) OR This EULA and SONY’s privacy policy, each as amended and modified from time to time, together PRODUCTS (OTHER THAN THE SOFTWARE) UPON WHICH THE SOFTWARE’S constitute the entire agreement between you and SONY with respect to the SOFTWARE. The PERFORMANCE DEPENDS WILL CONTINUE TO BE AVAILABLE, UNINTERRUPTED OR failure of SONY to exercise or enforce any right or provision of this EULA shall not constitute a UNMODIFIED, AND (E) REGARDING THE USE OR THE RESULTS OF THE USE OF THE waiver of such right or provision. If any part of this EULA is held invalid, illegal, or unenforceable, SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY, OR that provision shall be enforced to the maximum extent permissible so as to maintain the intent of OTHERWISE. this EULA, and the other parts will remain in full force and effect. The United Nations Convention on Contracts for the International Sale of Goods shall not apply to the SOFTWARE or this EULA. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY SONY OR AN Furthermore, this EULA will not be governed or interpreted in any way by referring to any law AUTHORIZED REPRESENTATIVE OF SONY SHALL CREATE A WARRANTY, DUTY OR based on the Uniform Computer Information Transactions Act (UCITA) or any other act derived CONDITION OR IN ANY WAY INCREASE THE SCOPE OF THIS WARRANTY. SHOULD from or related to UCITA. THE SOFTWARE PROVE DEFECTIVE YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THESE EXCLUSIONS MAY BINDING ARBITRATION NOT APPLY TO YOU. ANY “DISPUTE” THAT IS NOT RESOLVED THROUGH THE INFORMAL NEGOTIATION PROCESS DESCRIBED ABOVE SHALL BE RESOLVED EXCLUSIVELY THROUGH BINDING ARBITRATION. “DISPUTE” is defined as any LIMITATION OF LIABILITY disagreement, cause of action, claim, controversy, or proceeding between you and any Sony entity SONY AND EACH OF THE THIRD-PARTY SUPPLIERS (for purposes of this Section, SONY related to or arising out of the SOFTWARE or this EULA. DISPUTE is to be given the broadest and each of the THIRD-PARTY SUPPLIERS shall be collectively referred to as “SONY”) SHALL possible meaning that will be enforced. If a DISPUTE arises, you agree to first give notice to NOT BE LIABLE FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR SONY by contacting Sony Electronics Inc. at 16530 Via Esprillo, MZ 1105, San Diego, CA 92127, BREACH OF ANY EXPRESS OR IMPLIED WARRANTY, BREACH OF CONTRACT, Attn: Legal Department, and engaging in good faith negotiations to attempt to resolve any NEGLIGENCE, STRICT LIABILITY OR UNDER ANY OTHER LEGAL THEORY RELATED DISPUTE for at least 14 days, except that you or Sony (or any of its affiliates) may skip this TO THE SOFTWARE, INCLUDING, BUT NOT LIMITED TO, ANY DAMAGES ARISING informal negotiation procedure for DISPUTE enforcing, protecting, or concerning the validity of OUT OF LOSS OF PROFITS, LOSS OF REVENUE, LOSS OF DATA, LOSS OF USE OF THE intellectual property rights. SOFTWARE OR ANY ASSOCIATED HARDWARE, DOWN TIME AND USER’S TIME, EVEN IF ANY OF THEM HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, EACH AND ALL OF THEIR AGGREGATE LIABILITY UNDER ARBITRATION INSTRUCTIONS ANY PROVISION OF THIS EULA SHALL BE LIMITED TO THE AMOUNT ACTUALLY To begin arbitration, either you or SONY must make a written demand to the other for arbitration. PAID FOR THE SOFTWARE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION The arbitration will take place before a single arbitrator. It will be administered in keeping with the OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE Expedited Procedures of the Commercial Arbitration Rules, and the Supplementary Proceedings EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU. for Consumer-Related disputes when applicable (“Rules”) of the American Arbitration

2 Association (“AAA”) in effect when the claim is filed. You may get a copy of AAA’s Rules by THIRD-PARTY BENEFICIARIES contacting AAA at (800) 778-7879 or visiting www.adr.org. The filing fees to begin and carry out arbitration will be shared between you and SONY, but in no Each THIRD-PARTY SUPPLIER is an express intended third-party beneficiary of, and shall have event shall your fees ever exceed the amount allowable by the special rules for Consumers Disputes the right to enforce, each provision of this EULA with respect to the SOFTWARE of such party. provided for by AAA, at which point SONY will cover all additional administrative fees and expenses. This does not prohibit the arbitrator from giving the winning party their fees and expenses of the arbitration when appropriate pursuant to the Rules. Unless you and SONY agree YOUR ACCOUNT RESPONSIBILITIES differently, the arbitration will take place in the county and state where you live, and applicable Should you return your DEVICE to its place of purchase, sell or otherwise transfer your DEVICE, federal or state law shall govern the substance of any DISPUTE. The Federal Arbitration Act, 9 or if this EULA is terminated, you are responsible for and must uninstall the SOFTWARE from the U.S.C. § 1, et seq., will govern the arbitration itself and not any state law on arbitration. The DEVICE and delete any and all accounts you may have established on DEVICE or are accessible arbitrator’s decision will be binding and final, except for a limited right of appeal under the Federal through the SOFTWARE. You are solely responsible for maintaining the confidentiality of any Arbitration Act. The arbitrator may award declaratory or injunctive relief only in favor of the party accounts you have with SONY or third parties and any usernames and passwords associated with seeking relief, and only to the extent necessary to provide relief warranted by that party’s individual your use of the DEVICE. claim. Any court with jurisdiction over the parties may enforce the arbitrator’s decision. Should you have any questions concerning this EULA, you may contact SONY by writing to SONY at: Sony Electronics Inc., 16530 Via Esprillo, San Diego, CA 92127. SMALL CLAIMS EXCEPTION Despite the provisions set forth above, you have the right to litigate any DISPUTE in small claims Copyright © 2012-2013 Sony Electronics Inc. All rights reserved. court or other similar court of limited jurisdiction, to the extent the amount at issue does not exceed $15,000, and as long as such court has proper jurisdiction and all other requirements (including amount in controversy) are satisfied. GNU GPL/LGPL The following software are used in this product and are subject to the GNU General Public License CLASS ACTION WAIVER ("GPL") or GNU Lesser General Public License ("LGPL") as attached. Sony Corporation notifies you hereunder that you have the rights to obtain, modify and/or redistribute the source code of such YOU UNDERSTAND AND ACKNOWLEDGE THAT BY AGREEING TO BINDING software in accordance with the terms and conditions of GPL/LGPL attached. Therefore, if you ARBITRATION, YOU ARE GIVING UP THE RIGHT TO LITIGATE (OR PARTICIPATE IN obtain such source code, please read carefully the terms and conditions of GPL/LGPL. AS A PARTY OR CLASS MEMBER) ANY DISPUTES IN COURT BEFORE A JUDGE • linux-kernel OR JURY. ANY DISPUTE RESOLUTION PROCEEDING WILL BE CONDUCTED ONLY • busybox ON AN INDIVIDUAL BASIS, AND BOTH PARTIES AGREE NOT TO HAVE ANY • dosfstools DISPUTE HEARD AS A CLASS ACTION, REPRESENTATIVE ACTION, • gcc-gplv3-libs CONSOLIDATED ACTION, OR PRIVATE ATTORNEY GENERAL ACTION, UNLESS • glibc ALL PARTIES INVOLVED IN THE DISPUTE SPECIFICALLY AGREE TO DO SO IN •procps WRITING FOLLOWING INITIATION OF THE ARBITRATION. • util-linux-ng • pump OPT-OUT INSTRUCTIONS Source code for such software above can be obtained using the following link: http://www.sony.net/Products/Linux/ IF YOU DO NOT WISH TO BE BOUND BY THE BINDING ARBITRATION PROVISION AND/OR THE CLASS ACTION WAIVER ABOVE, THEN: (1) YOU MUST NOTIFY SONY IN GNU GENERAL PUBLIC LICENSE WRITING WITHIN 30 DAYS OF THE DATE THAT YOU FIRST USE THE SOFTWARE OR Version 2, June 1991 AGREE TO THIS EULA, WHICHEVER OCCURS FIRST; (2) YOUR WRITTEN Copyright (C) 1989, 1991 Free Software Foundation, Inc. NOTIFICATION MUST BE MAILED TO SONY ELECTRONICS INC., 16530 VIA ESPRILLO, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA MZ 1105, SAN DIEGO CA 92127, ATTN: LEGAL DEPARTMENT; AND (3) YOUR WRITTEN Everyone is permitted to copy and distribute verbatim copies of this license document, but NOTIFICATION MUST INCLUDE: (A) YOUR NAME; (B) YOUR ADDRESS; (C) THE DATE changing it is not allowed. YOU FIRST USED THE SOFTWARE OR AGREED TO THIS EULA; AND (D) A CLEAR Preamble STATEMENT THAT YOU DO NOT WISH TO RESOLVE DISPUTES WITH ANY SONY The licenses for most software are designed to take away your freedom to share and change it. By ENTITY THROUGH ARBITRATION AND/OR TO BE BOUND BY THE CLASS ACTION contrast, the GNU General Public License is intended to guarantee your freedom to share and WAI VE R. change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser REJECTING CHANGES MADE TO THE General Public License instead.) You can apply it to your programs, too. DISPUTE PROCEDURES When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software Despite anything to the contrary in this EULA, you may reject changes made to the binding (and charge for this service if you wish), that you receive source code or can get it if you want it, arbitration provision and class action waiver if: (1) you’ve already begun authorized use of the that you can change the software or use pieces of it in new free programs; and that you know you SOFTWARE at the time the change was/is made; and (2) you mail written notice to the address in can do these things. the immediately preceding paragraph within 30 days after the particular change was/is made. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or Should such a situation arise, you will still be bound by the DISPUTE procedures you previously to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if agreed to and existing before the change you rejected was made. you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give MISCELLANEOUS the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. Any DISPUTE determined not subject to arbitration and not initiated in small claims court will be We protect your rights with two steps: (1) copyright the software, and (2) offer you this license litigated by either party in a court of competent jurisdiction in either the superior court for the which gives you legal permission to copy, distribute and/or modify the software. County of San Diego or in the United States District Court for the Southern District of California. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems EQUITABLE REMEDIES introduced by others will not reflect on the original authors' reputations. Notwithstanding anything contained in this EULA to the contrary, you acknowledge and agree that Finally, any free program is threatened constantly by software patents. We wish to avoid the danger any violation of or non-compliance with this EULA by you will cause irreparable harm to SONY, that redistributors of a free program will individually obtain patent licenses, in effect making the for which monetary damages would be inadequate, and you consent to SONY obtaining any program proprietary. To prevent this, we have made it clear that any patent must be licensed for injunctive or equitable relief that SONY deems necessary or appropriate in such circumstances. everyone's free use or not licensed at all. SONY may also take any legal and technical remedies to prevent violation of and/or to enforce this The precise terms and conditions for copying, distribution and modification follow. EULA, including, but not limited to, immediate termination of your use of the SOFTWARE, if SONY believes in its sole discretion that you are violating or intend to violate this EULA. These TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION remedies are in addition to any other remedies SONY may have at law, in equity or under contract. 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means TERMINATION either the Program or any derivative work under copyright law: that is to say, a work containing the Without prejudice to any of its other rights, SONY may terminate this EULA if you fail to comply Program or a portion of it, either verbatim or with modifications and/or translated into another with any of its terms. In case of such termination, you must: (i) cease all use, and destroy any language. (Hereinafter, translation is included without limitation in the term "modification".) Each copies, of the SOFTWARE; (ii) comply with the requirements in the section below entitled “Your licensee is addressed as "you". Account Responsibilities”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of AMENDMENT having been made by running the Program). Whether that is true depends on what the Program SONY RESERVES THE RIGHT TO AMEND ANY OF THE TERMS OF THIS EULA AT ITS does. SOLE DISCRETION BY POSTING NOTICE ON A SONY DESIGNATED WEB SITE, BY EMAIL NOTIFICATION TO AN EMAIL ADDRESS PROVIDED BY YOU, BY PROVIDING 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in NOTICE AS PART OF THE PROCESS IN WHICH YOU OBTAIN UPGRADES/UPDATES OR any medium, provided that you conspicuously and appropriately publish on each copy an BY ANY OTHER LEGALLY RECOGNIZABLE FORM OF NOTICE. If you do not agree to the appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this amendment, you should promptly contact SONY for instructions. Your continued use of the License and to the absence of any warranty; and give any other recipients of the Program a copy of SOFTWARE after the effective date of any such notice shall be deemed your agreement to be this License along with the Program. bound by such amendment. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

3 a) You must cause the modified files to carry prominent notices stating that you changed the files 9. The Free Software Foundation may publish revised and/or new versions of the General Public and the date of any change. License from time to time. Such new versions will be similar in spirit to the present version, but b) You must cause any work that you distribute or publish, that in whole or in part contains or is may differ in detail to address new problems or concerns. derived from the Program or any part thereof, to be licensed as a whole at no charge to all third Each version is given a distinguishing version number. If the Program specifies a version number parties under the terms of this License. of this License which applies to it and "any later version", you have the option of following the c) If the modified program normally reads commands interactively when run, you must cause it, terms and conditions either of that version or of any later version published by the Free Software when started running for such interactive use in the most ordinary way, to print or display an Foundation. If the Program does not specify a version number of this License, you may choose any announcement including an appropriate copyright notice and a notice that there is no warranty (or version ever published by the Free Software Foundation. else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. 10. If you wish to incorporate parts of the Program into other free programs whose distribution (Exception: if the Program itself is interactive but does not normally print such an announcement, conditions are different, write to the author to ask for permission. For software which is your work based on the Program is not required to print an announcement.) copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving These requirements apply to the modified work as a whole. If identifiable sections of that work are the free status of all derivatives of our free software and of promoting the sharing and reuse of not derived from the Program, and can be reasonably considered independent and separate works software generally. in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a NO WARRANTY work based on the Program, the distribution of the whole must be on the terms of this License, 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO whose permissions for other licensees extend to the entire whole, and thus to each and every part WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE regardless of who wrote it. LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF by you; rather, the intent is to exercise the right to control the distribution of derivative or collective ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, works based on the Program. THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A In addition, mere aggregation of another work not based on the Program with the Program (or with PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE a work based on the Program) on a volume of a storage or distribution medium does not bring the OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU other work under the scope of this License. ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN or executable form under the terms of Sections 1 and 2 above provided that you also do one of the WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY following: MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE a) Accompany it with the complete corresponding machine-readable source code, which must be TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR distributed under the terms of Sections 1 and 2 above on a medium customarily used for software CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE interchange; or, PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING b) Accompany it with a written offer, valid for at least three years, to give any third party, for a RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A charge no more than your cost of physically performing source distribution, a complete machine- FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH 2 above on a medium customarily used for software interchange; or, DAMAGES. c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you END OF TERMS AND CONDITIONS received the program in object code or executable form with such an offer, in accord with How to Apply These Terms to Your New Programs Subsection b above.) If you develop a new program, and you want it to be of the greatest possible use to the public, the The source code for a work means the preferred form of the work for making modifications to it. best way to achieve this is to make it free software which everyone can redistribute and change For an executable work, complete source code means all the source code for all modules it contains, under these terms. plus any associated interface definition files, plus the scripts used to control compilation and To do so, attach the following notices to the program. It is safest to attach them to the start of each installation of the executable. However, as a special exception, the source code distributed need not source file to most effectively convey the exclusion of warranty; and each file should have at least include anything that is normally distributed (in either source or binary form) with the major the "copyright" line and a pointer to where the full notice is found. components (compiler, kernel, and so on) of the on which the executable runs, one line to give the program's name and an idea of what it does. unless that component itself accompanies the executable. Copyright (C) yyyy name of author If distribution of executable or object code is made by offering access to copy from a designated This program is free software; you can redistribute it and/or modify it under the terms of the GNU place, then offering equivalent access to copy the source code from the same place counts as General Public License as published by the Free Software Foundation; either version 2 of the distribution of the source code, even though third parties are not compelled to copy the source License, or (at your option) any later version. along with the object code. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided PURPOSE. See the GNU General Public License for more details. under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is You should have received a copy of the GNU General Public License along with this program; if void, and will automatically terminate your rights under this License. However, parties who have not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA received copies, or rights, from you under this License will not have their licenses terminated so 02110-1301, USA. long as such parties remain in full compliance. Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive 5. You are not required to accept this License, since you have not signed it. However, nothing else mode: grants you permission to modify or distribute the Program or its derivative works. These actions Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are Program (or any work based on the Program), you indicate your acceptance of this License to do welcome to redistribute it under certain conditions; type `show c' for details. so, and all its terms and conditions for copying, distributing or modifying the Program or works The hypothetical commands `show w' and `show c' should show the appropriate parts of the based on it. General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your 6. Each time you redistribute the Program (or any work based on the Program), the recipient program. automatically receives a license from the original licensor to copy, distribute or modify the You should also get your employer (if you work as a programmer) or your school, if any, to sign a Program subject to these terms and conditions. You may not impose any further restrictions on the "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which by third parties to this License. makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other Ty Coon, President of Vice reason (not limited to patent issues), conditions are imposed on you (whether by court order, This General Public License does not permit incorporating your program into proprietary agreement or otherwise) that contradict the conditions of this License, they do not excuse you from programs. If your program is a subroutine library, you may consider it more useful to permit linking the conditions of this License. If you cannot distribute so as to satisfy simultaneously your proprietary applications with the library. If this is what you want to do, use the GNU Lesser General obligations under this License and any other pertinent obligations, then as a consequence you may Public License instead of this License. not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, GNU LESSER GENERAL PUBLIC LICENSE then the only way you could satisfy both it and this License would be to refrain entirely from Version 2.1, February 1999 distribution of the Program. Copyright (C) 1991, 1999 Free Software Foundation, Inc. If any portion of this section is held invalid or unenforceable under any particular circumstance, the 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA balance of the section is intended to apply and the section as a whole is intended to apply in other Everyone is permitted to copy and distribute verbatim copies of this license document, but circumstances. changing it is not allowed. It is not the purpose of this section to induce you to infringe any patents or other property right [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU claims or to contest validity of any such claims; this section has the sole purpose of protecting the Library Public License, version 2, hence the version integrity of the free software distribution system, which is implemented by public license practices. number 2.1.] Many people have made generous contributions to the wide range of software distributed through Preamble that system in reliance on consistent application of that system; it is up to the author/donor to The licenses for most software are designed to take away your freedom to share and change it. By decide if he or she is willing to distribute software through any other system and a licensee cannot contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and impose that choice. change free software--to make sure the software is free for all its users. This section is intended to make thoroughly clear what is believed to be a consequence of the rest This license, the Lesser General Public License, applies to some specially designated software of this License. packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or ordinary General Public License is the better strategy to use in any particular case, based on the by copyrighted interfaces, the original copyright holder who places the Program under this License explanations below. may add an explicit geographical distribution limitation excluding those countries, so that When we speak of free software, we are referring to freedom of use, not price. Our General Public distribution is permitted only in or among countries not thus excluded. In such case, this License Licenses are designed to make sure that you have the freedom to distribute copies of free software incorporates the limitation as if written in the body of this License. (and charge for this service if you wish); that you receive source code or can get it if you want it;

4 that you can change the software and use pieces of it in new free programs; and that you are These requirements apply to the modified work as a whole. If identifiable sections of that work are informed that you can do these things. not derived from the Library, and can be reasonably considered independent and separate works in To protect your rights, we need to make restrictions that forbid distributors to deny you these rights themselves, then this License, and its terms, do not apply to those sections when you distribute or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you them as separate works. But when you distribute the same sections as part of a whole which is a if you distribute copies of the library or if you modify it. work based on the Library, the distribution of the whole must be on the terms of this License, whose For example, if you distribute copies of the library, whether gratis or for a fee, you must give the permissions for other licensees extend to the entire whole, and thus to each and every part recipients all the rights that we gave you. You must make sure that they, too, receive or can get the regardless of who wrote it. source code. If you link other code with the library, you must provide complete object files to the Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely recipients, so that they can relink them with the library after making changes to the library and by you; rather, the intent is to exercise the right to control the distribution of derivative or collective recompiling it. And you must show them these terms so they know their rights. works based on the Library. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you In addition, mere aggregation of another work not based on the Library with the Library (or with this license, which gives you legal permission to copy, distribute and/or modify the library. a work based on the Library) on a volume of a storage or distribution medium does not bring the To protect each distributor, we want to make it very clear that there is no warranty for the free other work under the scope of this License. library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this affected by problems that might be introduced by others. License to a given copy of the Library. To do this, you must alter all the notices that refer to this Finally, software patents pose a constant threat to the existence of any free program. We wish to License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this make sure that a company cannot effectively restrict the users of a free program by obtaining a License. (If a newer version than version 2 of the ordinary GNU General Public License has restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a appeared, then you can specify that version instead if you wish.) Do not make any other change in version of the library must be consistent with the full freedom of use specified in this license. these notices. Most GNU software, including some libraries, is covered by the ordinary GNU General Public Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU License. This license, the GNU Lesser General Public License, applies to certain designated General Public License applies to all subsequent copies and derivative works made from that copy. libraries, and is quite different from the ordinary General Public License. We use this license for This option is useful when you wish to copy part of the code of the Library into a program that is certain libraries in order to permit linking those libraries into non-free programs. not a library. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in The ordinary General Public License therefore permits such linking only if the entire combination object code or executable form under the terms of Sections 1 and 2 above provided that you fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking accompany it with the complete corresponding machine-readable source code, which must be other code with the library. distributed under the terms of Sections 1 and 2 above on a medium customarily used for software We call this license the "Lesser" General Public License because it does Less to protect the user's interchange. freedom than the ordinary General Public License. It also provides other free software developers If distribution of object code is made by offering access to copy from a designated place, then Less of an advantage over competing non-free programs. These disadvantages are the reason we offering equivalent access to copy the source code from the same place satisfies the requirement to use the ordinary General Public License for many libraries. However, the Lesser license provides distribute the source code, even though third parties are not compelled to copy the source along advantages in certain special circumstances. with the object code. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must 5. A program that contains no derivative of any portion of the Library, but is designed to work with be allowed to use the library. A more frequent case is that a free library does the same job as widely the Library by being compiled or linked with it, is called a "work that uses the Library". Such a used non-free libraries. In this case, there is little to gain by limiting the free library to free software work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of only, so we use the Lesser General Public License. this License. In other cases, permission to use a particular library in non-free programs enables a greater number However, linking a "work that uses the Library" with the Library creates an executable that is a of people to use a large body of free software. For example, permission to use the GNU C Library derivative of the Library (because it contains portions of the Library), rather than a "work that uses in non-free programs enables many more people to use the whole GNU operating system, as well the library". The executable is therefore covered by this License. Section 6 states terms for as its variant, the GNU/Linux operating system. distribution of such executables. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure When a "work that uses the Library" uses material from a header file that is part of the Library, the that the user of a program that is linked with the Library has the freedom and the wherewithal to object code for the work may be a derivative work of the Library even though the source code is run that program using a modified version of the Library. not. Whether this is true is especially significant if the work can be linked without the Library, or The precise terms and conditions for copying, distribution and modification follow. Pay close if the work is itself a library. The threshold for this to be true is not precisely defined by law. attention to the difference between a "work based on the library" and a "work that uses the library". If such an object file uses only numerical parameters, data structure layouts and accessors, and The former contains code derived from the library, whereas the latter must be combined with the small macros and small inline functions (ten lines or less in length), then the use of the object file library in order to run. is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work 0. This License Agreement applies to any software library or other program which contains a notice under the terms of Section 6. Any executables containing that work also fall under Section 6, placed by the copyright holder or other authorized party saying it may be distributed under the whether or not they are linked directly with the Library itself. terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you". 6. As an exception to the Sections above, you may also combine or link a "work that uses the A "library" means a collection of software functions and/or data prepared so as to be conveniently Library" with the Library to produce a work containing portions of the Library, and distribute that linked with application programs (which use some of those functions and data) to form work under terms of your choice, provided that the terms permit modification of the work for the executables. customer's own use and reverse engineering for debugging such modifications. The "Library", below, refers to any such software library or work which has been distributed under You must give prominent notice with each copy of the work that the Library is used in it and that these terms. A "work based on the Library" means either the Library or any derivative work under the Library and its use are covered by this License. You must supply a copy of this License. If the copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with work during execution displays copyright notices, you must include the copyright notice for the modifications and/or translated straightforwardly into another language. (Hereinafter, translation Library among them, as well as a reference directing the user to the copy of this License. Also, you is included without limitation in the term "modification".) must do one of these things: "Source code" for a work means the preferred form of the work for making modifications to it. For a) Accompany the work with the complete corresponding machine-readable source code for the a library, complete source code means all the source code for all modules it contains, plus any Library including whatever changes were used in the work (which must be distributed under associated interface definition files, plus the scripts used to control compilation and installation of Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete the library. machine-readable "work that uses the Library", as object code and/or source code, so that the user Activities other than copying, distribution and modification are not covered by this License; they can modify the Library and then relink to produce a modified executable containing the modified are outside its scope. The act of running a program using the Library is not restricted, and output Library. (It is understood that the user who changes the contents of definitions files in the Library from such a program is covered only if its contents constitute a work based on the Library will not necessarily be able to recompile the application to use the modified definitions.) (independent of the use of the Library in a tool for writing it). Whether that is true depends on what b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is the Library does and what the program that uses the Library does. one that (1) uses at run time a copy of the library already present on the user's computer system, 1. You may copy and distribute verbatim copies of the Library's complete source code as you rather than copying library functions into the executable, and (2) will operate properly with a receive it, in any medium, provided that you conspicuously and appropriately publish on each copy modified version of the library, if the user installs one, as long as the modified version is interface- an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to compatible with the version that the work was made with. this License and to the absence of any warranty; and distribute a copy of this License along with c) Accompany the work with a written offer, valid for at least three years, to give the same user the the Library. materials specified in Subsection 6a, above, for a charge no more than the cost of performing this You may charge a fee for the physical act of transferring a copy, and you may at your option offer distribution. warranty protection in exchange for a fee. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work e) Verify that the user has already received a copy of these materials or that you have already sent based on the Library, and copy and distribute such modifications or work under the terms of this user a copy. Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. For an executable, the required form of the "work that uses the Library" must include any data and b) You must cause the files modified to carry prominent notices stating that you changed the files utility programs needed for reproducing the executable from it. However, as a special exception, and the date of any change. the materials to be distributed need not include anything that is normally distributed (in either c) You must cause the whole of the work to be licensed at no charge to all third parties under the source or binary form) with the major components (compiler, kernel, and so on) of the operating terms of this License. system on which the executable runs, unless that component itself accompanies the executable. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an It may happen that this requirement contradicts the license restrictions of other proprietary libraries application program that uses the facility, other than as an argument passed when the facility is that do not normally accompany the operating system. Such a contradiction means you cannot use invoked, then you must make a good faith effort to ensure that, in the event an application does not both them and the Library together in an executable that you distribute. supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. 7. You may place library facilities that are a work based on the Library side-by-side in a single (For example, a function in a library to compute square roots has a purpose that is entirely well- library together with other library facilities not covered by this License, and distribute such a defined independent of the application. Therefore, Subsection 2d requires that any application- combined library, provided that the separate distribution of the work based on the Library and of supplied function or table used by this function must be optional: if the application does not supply the other library facilities is otherwise permitted, and provided that you do these two things: it, the square root function must still compute square roots.)

5 a) Accompany the combined library with a copy of the same work based on the Library, To apply these terms, attach the following notices to the library. It is safest to attach them to the uncombined with any other library facilities. This must be distributed under the terms of the start of each source file to most effectively convey the exclusion of warranty; and each file should Sections above. have at least the "copyright" line and a pointer to where the full notice is found. b) Give prominent notice with the combined library of the fact that part of it is a work based on the one line to give the library's name and an idea of what it does. Library, and explaining where to find the accompanying uncombined form of the same work. Copyright (C) year name of author This library is free software; you can redistribute it and/or modify it under the terms of the GNU 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly Lesser General Public License as published by the Free Software Foundation; either version 2.1 of provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or the License, or (at your option) any later version. distribute the Library is void, and will automatically terminate your rights under this License. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; However, parties who have received copies, or rights, from you under this License will not have without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR their licenses terminated so long as such parties remain in full compliance. PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; 9. You are not required to accept this License, since you have not signed it. However, nothing else if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA grants you permission to modify or distribute the Library or its derivative works. These actions are 02110-1301 USA prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Also add information on how to contact you by electronic and paper mail. Library (or any work based on the Library), you indicate your acceptance of this License to do so, You should also get your employer (if you work as a programmer) or your school, if any, to sign a and all its terms and conditions for copying, distributing or modifying the Library or works based "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: on it. Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. 10. Each time you redistribute the Library (or any work based on the Library), the recipient signature of Ty Coon, 1 April 1990 automatically receives a license from the original licensor to copy, distribute, link with or modify Ty Coon, President of Vice the Library subject to these terms and conditions. You may not impose any further restrictions on That's all there is to it! the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

11. If, as a consequence of a court judgment or allegation of patent infringement or for any other C Library reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from Copyright (c) 1982, 1986, 1993 the conditions of this License. If you cannot distribute so as to satisfy simultaneously your The Regents of the University of California. All rights reserved. obligations under this License and any other pertinent obligations, then as a consequence you may (c) System Laboratories, Inc. not distribute the Library at all. For example, if a patent license would not permit royalty-free All or some portions of this file are derived from material licensed to the University of California redistribution of the Library by all those who receive copies directly or indirectly through you, then by American Telephone and Telegraph Co. or Unix the only way you could satisfy both it and this License would be to refrain entirely from distribution System Laboratories, Inc. and are reproduced herein with the permission of UNIX System of the Library. Laboratories, Inc. If any portion of this section is held invalid or unenforceable under any particular circumstance, the Redistribution and use in source and binary forms, with or without modification, are permitted balance of the section is intended to apply, and the section as a whole is intended to apply in other provided that the following conditions are met: circumstances. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and It is not the purpose of this section to induce you to infringe any patents or other property right the following disclaimer. claims or to contest validity of any such claims; this section has the sole purpose of protecting the 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions integrity of the free software distribution system which is implemented by public license practices. and the following disclaimer in the documentation and/or other materials provided with the Many people have made generous contributions to the wide range of software distributed through distribution. that system in reliance on consistent application of that system; it is up to the author/donor to 4. Neither the name of the University nor the names of its contributors may be used to endorse or decide if he or she is willing to distribute software through any other system and a licensee cannot promote products derived from this software without specific prior written permission. impose that choice. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND This section is intended to make thoroughly clear what is believed to be a consequence of the rest ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE of this License. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, by copyrighted interfaces, the original copyright holder who places the Library under this License EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, may add an explicit geographical distribution limitation excluding those countries, so that PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR distribution is permitted only in or among countries not thus excluded. In such case, this License PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY incorporates the limitation as if written in the body of this License. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Public License from time to time. Such new versions will be similar in spirit to the present version, Copyright (c) 1991, 1993 but may differ in detail to address new problems or concerns. The Regents of the University of California. All rights reserved. Each version is given a distinguishing version number. If the Library specifies a version number of Redistribution and use in source and binary forms, with or without modification, are permitted this License which applies to it and "any later version", you have the option of following the terms provided that the following conditions are met: and conditions either of that version or of any later version published by the Free Software 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Foundation. If the Library does not specify a license version number, you may choose any version the following disclaimer. ever published by the Free Software Foundation. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the 14. If you wish to incorporate parts of the Library into other free programs whose distribution distribution. conditions are incompatible with these, write to the author to ask for permission. For software 3 All advertising materials mentioning features or use of this software must display the following which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we acknowledgement: This product includes software developed by the University of California, sometimes make exceptions for this. Our decision will be guided by the two goals of preserving Berkeley and its contributors. the free status of all derivatives of our free software and of promoting the sharing and reuse of 4 Neither the name of the University nor the names of its contributors may be used to endorse or software generally. promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND NO WARRANTY ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/ CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1990 The Regents of the University of California. All rights reserved. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN This code is derived from locore.s. WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY Redistribution and use in source and binary forms, with or without modification, are permitted MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE provided that the following conditions are met: TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE the following disclaimer. LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A and the following disclaimer in the documentation and/or other materials provided with the FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF distribution. SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH 3 All advertising materials mentioning features or use of this software must display the following DAMAGES. acknowledgement: This product includes software developed by the University of California, Berkeley and its contributors. END OF TERMS AND CONDITIONS 4 Neither the name of the University nor the names of its contributors may be used to endorse or How to Apply These Terms to Your New Libraries promote products derived from this software without specific prior written permission. If you develop a new library, and you want it to be of the greatest possible use to the public, we THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND recommend making it free software that everyone can redistribute and change. You can do so by ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE permitting redistribution under these terms (or, alternatively, under the terms of the ordinary IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR General Public License). PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,

6 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY ARE DISCLAIMED. IN NO EVENT SHALL TOOLS GMBH BE LIABLE FOR ANY DIRECT, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) Copyright (c) 1998 Christos Zoulas Copyright (c) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 1995 Christopher G. Demetriou All rights reserved. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN Redistribution and use in source and binary forms, with or without modification, are permitted ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE provided that the following conditions are met: POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved. the following disclaimer. This code is derived from software contributed to The NetBSD Foundation by Matt Thomas. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Redistribution and use in source and binary forms, with or without modification, are permitted and the following disclaimer in the documentation and/or other materials provided with the provided that the following conditions are met: distribution. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 3 All advertising materials mentioning features or use of this software must display the following the following disclaimer. acknowledgement: This product includes software developed for the NetBSD Project. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions See http://www.netbsd.org/ for information about NetBSD. and the following disclaimer in the documentation and/or other materials provided with the 4 The name of the author may not be used to endorse or promote products derived from this distribution. software without specific prior written permission. 3 All advertising materials mentioning features or use of this software must display the following THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED its contributors. WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, endorse or promote products derived from this software without specific prior written permission. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL POSSIBILITY OF SUCH DAMAGE. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS This code is derived from software contributed to The NetBSD Foundation by Christos Zoulas. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Redistribution and use in source and binary forms, with or without modification, are permitted WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE provided that the following conditions are met: OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 1 Redistributions of source code must retain the above copyright notice, this list of conditions and IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. the following disclaimer. Copyright (c) 1998, 2000 The NetBSD Foundation, Inc. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions This code is derived from software contributed to The NetBSD Foundation by Klaus J. Klein. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and the following disclaimer. its contributors. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to and the following disclaimer in the documentation and/or other materials provided with the endorse or promote products derived from this software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF its contributors. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY endorse or promote products derived from this software without specific prior written permission. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE Copyright (c) 1994 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS The Regents of the University of California. All rights reserved. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, This code is derived from software contributed to Berkeley by Chuck Karish of Mindcraft, Inc. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1982, 1986, 1988, 1993 the following disclaimer. The Regents of the University of California. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Redistribution and use in source and binary forms, with or without modification, are permitted and the following disclaimer in the documentation and/or other materials provided with the provided that the following conditions are met: distribution. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 3 All advertising materials mentioning features or use of this software must display the following the following disclaimer. acknowledgement: This product includes software developed by the University of California, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Berkeley and its contributors. and the following disclaimer in the documentation and/or other materials provided with the 4 Neither the name of the University nor the names of its contributors may be used to endorse or distribution. promote products derived from this software without specific prior written permission. 3 All advertising materials mentioning features or use of this software must display the following THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND acknowledgement: This product includes software developed by the University of California, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Berkeley and its contributors. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 4 Neither the name of the University nor the names of its contributors may be used to endorse or PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR promote products derived from this software without specific prior written permission. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (C) 1997 Mark Brinicombe PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (C) 1995 Wolfgang Solfrank. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Copyright (C) 1995 TooLs GmbH. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS All rights reserved. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1993 Carlos Leandro and Rui Salgueiro Dep. Matematica Universidade de Coimbra, provided that the following conditions are met: Portugal, Europe 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Permission to use, copy, modify, and distribute this software for any purpose with or without fee is the following disclaimer. hereby granted, provided that the above copyright notice and this permission notice appear in all 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions copies. and the following disclaimer in the documentation and/or other materials provided with the Copyright (c) 2000 The NetBSD Foundation, Inc. All rights reserved. distribution. This code is derived from software contributed to The NetBSD Foundation by Jun-ichiro Hagino. 3 All advertising materials mentioning features or use of this software must display the following Redistribution and use in source and binary forms, with or without modification, are permitted acknowledgement: This product includes software developed by TooLs GmbH. provided that the following conditions are met: 4 The name of TooLs GmbH may not be used to endorse or promote products derived from this 1 Redistributions of source code must retain the above copyright notice, this list of conditions and software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY TOOLS GMBH ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED

7 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions International Business Machines, Inc. (hereinafter called IBM) grants permission under its and the following disclaimer in the documentation and/or other materials provided with the copyrights to use, copy, modify, and distribute this Software with or without fee, provided that the distribution. above copyright notice and all paragraphs of this notice appear in all copies, and that the name of 3 All advertising materials mentioning features or use of this software must display the following IBM not be used in connection with the marketing of any product incorporating the Software or acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and modifications thereof, without specific, written prior permission. its contributors. To the extent it has a right to do so, IBM grants an immunity from suit under its patents, if any, for 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to the use, sale or manufacture of products to the extent that such products are used for performing endorse or promote products derived from this software without specific prior written permission. Domain Name System dynamic updates in TCP/IP networks by means of the Software. No THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND immunity is granted for any product per se or for any other function of any product. CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, THE SOFTWARE IS PROVIDED ""AS IS"", AND IBM DISCLAIMS ALL WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. A PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL, IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL WHATSOEVER ARISING OUT OF OR IN CONNECTION WITH THE USE OR DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE PERFORMANCE OF THIS SOFTWARE, EVEN IF IBM IS APPRISED OF THE POSSIBILITY GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS OF SUCH DAMAGES. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Copyright (c) 1996 by Internet Software Consortium. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Permission to use, copy, modify, and distribute this software for any purpose with or without fee is OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN hereby granted, provided that the above copyright notice and this permission notice appear in all IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. copies. Copyright (c) 1998-1999 by Internet Software Consortium. THE SOFTWARE IS PROVIDED ""AS IS"" AND INTERNET SOFTWARE CONSORTIUM Permission to use, copy, modify, and distribute this software for any purpose with or without fee is DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL hereby granted, provided that the above copyright notice and this permission notice appear in all IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL copies. INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, THE SOFTWARE IS PROVIDED ""AS IS"" AND INTERNET SOFTWARE CONSORTIUM INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER Copyright (c) 1985, 1988, 1993 RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF The Regents of the University of California. All rights reserved. CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN Redistribution and use in source and binary forms, with or without modification, are permitted CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. provided that the following conditions are met: Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and This code is derived from software contributed to The NetBSD Foundation by Charles M. Hannum. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the University of California, and the following disclaimer in the documentation and/or other materials provided with the Berkeley and its contributors. distribution. 4 Neither the name of the University nor the names of its contributors may be used to endorse or 3 All advertising materials mentioning features or use of this software must display the following promote products derived from this software without specific prior written permission. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND its contributors. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR endorse or promote products derived from this software without specific prior written permission. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS Copyright (c) 2000, 2001, 2002 The NetBSD Foundation, Inc. All rights reserved. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, This code is derived from software contributed to The NetBSD Foundation by Jun-ichiro itojun WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Hagino and by Klaus Klein. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN Redistribution and use in source and binary forms, with or without modification, are permitted IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Portions Copyright (c) 1993 Carlos Leandro and Rui Salgueiro 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Dep. Matematica Universidade de Coimbra, Portugal, Europe the following disclaimer. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions hereby granted, provided that the above copyright notice and this permission notice appear in all and the following disclaimer in the documentation and/or other materials provided with the copies. distribution. Copyright (c) 1999 Kungliga Tekniska Högskolan (Royal Institute of Technology, Stockholm, 3 All advertising materials mentioning features or use of this software must display the following Sweden). All rights reserved. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and Redistribution and use in source and binary forms, with or without modification, are permitted its contributors. provided that the following conditions are met: 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 1 Redistributions of source code must retain the above copyright notice, this list of conditions and endorse or promote products derived from this software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, and the following disclaimer in the documentation and/or other materials provided with the INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF distribution. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 3 Neither the name of the Institute nor the names of its contributors may be used to endorse or IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY promote products derived from this software without specific prior written permission. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 1985, 1990, 1993 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY The Regents of the University of California. All rights reserved. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Redistribution and use in source and binary forms, with or without modification, are permitted NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS provided that the following conditions are met: SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1996 by Internet Software Consortium. the following disclaimer. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions hereby granted, provided that the above copyright and the following disclaimer in the documentation and/or other materials provided with the notice and this permission notice appear in all copies. distribution. THE SOFTWARE IS PROVIDED ""AS IS"" AND INTERNET SOFTWARE CONSORTIUM 3 All advertising materials mentioning features or use of this software must display the following DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL acknowledgement: This product includes software developed by the University of California, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL Berkeley and its contributors. INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, 4 Neither the name of the University nor the names of its contributors may be used to endorse or INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER promote products derived from this software without specific prior written permission. RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Portions Copyright (c) 1995 by International Business Machines, Inc. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,

8 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1999 The NetBSD Foundation, Inc. All rights reserved. Copyright (c) 1982, 1986, 1993 This code is derived from software contributed to The NetBSD Foundation by Jason R. Thorpe of The Regents of the University of California. All rights reserved. the Numerical Aerospace Simulation Facility, NASA Ames Research Center. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 All advertising materials mentioning features or use of this software must display the following 3 All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and Berkeley and its contributors. its contributors. 4 Neither the name of the University nor the names of its contributors may be used to endorse or 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to promote products derived from this software without specific prior written permission. endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN Copyright (c) 1995 IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The Regents of the University of California. All rights reserved. Copyright (c) 1991, 1993 Redistribution and use in source and binary forms, with or without modification, are permitted The Regents of the University of California. All rights reserved. provided that the following conditions are met: (c) UNIX System Laboratories, Inc. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and All or some portions of this file are derived from material licensed to the University of California the following disclaimer. by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions herein with the permission of UNIX System Laboratories, Inc. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the University of California, the following disclaimer. Berkeley and its contributors. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 Neither the name of the University nor the names of its contributors may be used to endorse or and the following disclaimer in the documentation and/or other materials provided with the promote products derived from this software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 3 All advertising materials mentioning features or use of this software must display the following ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE acknowledgement: This product includes software developed by the University of California, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Berkeley and its contributors. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 4 Neither the name of the University nor the names of its contributors may be used to endorse or CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, promote products derived from this software without specific prior written permission. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, Copyright (c) 1991, 1993 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR The Regents of the University of California. All rights reserved. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY This code is derived from software contributed to Berkeley by Berkeley Software Design, Inc. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Redistribution and use in source and binary forms, with or without modification, are permitted NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS provided that the following conditions are met: SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 2003 The NetBSD Foundation, Inc. All rights reserved. the following disclaimer. This code is derived from software contributed to The NetBSD Foundation by Klaus Klein. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Redistribution and use in source and binary forms, with or without modification, are permitted and the following disclaimer in the documentation and/or other materials provided with the provided that the following conditions are met: distribution. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 3 All advertising materials mentioning features or use of this software must display the following the following disclaimer. acknowledgement: This product includes software developed by the University of California, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Berkeley and its contributors. and the following disclaimer in the documentation and/or other materials provided with the 4 Neither the name of the University nor the names of its contributors may be used to endorse or distribution. promote products derived from this software without specific prior written permission. 3 All advertising materials mentioning features or use of this software must display the following THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE its contributors. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR endorse or promote products derived from this software without specific prior written permission. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE Copyright (c) 1991, 1993 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS The Regents of the University of California. All rights reserved. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Redistribution and use in source and binary forms, with or without modification, are permitted WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE provided that the following conditions are met: OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 1 Redistributions of source code must retain the above copyright notice, this list of conditions and IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. the following disclaimer. Copyright (c) 1994 The NetBSD Foundation, Inc. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions This code is derived from software contributed to The NetBSD Foundation by Christos Zoulas. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 Neither the name of the University nor the names of its contributors may be used to endorse or 1 Redistributions of source code must retain the above copyright notice, this list of conditions and promote products derived from this software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE and the following disclaimer in the documentation and/or other materials provided with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR distribution. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, its contributors.

9 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 4 Neither the name of the University nor the names of its contributors may be used to endorse or endorse or promote products derived from this software without specific prior written permission. promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1995, 1996 Carnegie-Mellon University. All rights reserved. Copyright (c) 1980, 1983, 1988, 1993 Author: Chris G. Demetriou The Regents of the University of California. All rights reserved. Permission to use, copy, modify and distribute this software and its documentation is hereby Redistribution and use in source and binary forms, with or without modification, are permitted granted, provided that both the copyright notice and this permission notice appear in all copies of provided that the following conditions are met: the software, derivative works or modified versions, and any portions thereof, and that both notices 1 Redistributions of source code must retain the above copyright notice, this list of conditions and appear in supporting documentation. the following disclaimer. CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS ""AS IS"" 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR and the following disclaimer in the documentation and/or other materials provided with the ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. distribution. Copyright (c) 1989, 1991, 1993 3 All advertising materials mentioning features or use of this software must display the following The Regents of the University of California. All rights reserved. acknowledgement: This product includes software developed by the University of California, Redistribution and use in source and binary forms, with or without modification, are permitted Berkeley and its contributors. provided that the following conditions are met: 4 Neither the name of the University nor the names of its contributors may be used to endorse or 1 Redistributions of source code must retain the above copyright notice, this list of conditions and promote products derived from this software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE and the following disclaimer in the documentation and/or other materials provided with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR distribution. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, acknowledgement: This product includes software developed by the University of California, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, Berkeley and its contributors. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 4 Neither the name of the University nor the names of its contributors may be used to endorse or PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY promote products derived from this software without specific prior written permission. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Copyright (c) 1989, 1993 PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR The Regents of the University of California. All rights reserved. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Redistribution and use in source and binary forms, with or without modification, are permitted EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, provided that the following conditions are met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY the following disclaimer. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS and the following disclaimer in the documentation and/or other materials provided with the SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. distribution. Copyright (c) 1997,98 The NetBSD Foundation, Inc. All rights reserved. 3 All advertising materials mentioning features or use of this software must display the following This code is derived from software contributed to The NetBSD Foundation by J.T. Conklin. acknowledgement: This product includes software developed by the University of California, Redistribution and use in source and binary forms, with or without modification, are permitted Berkeley and its contributors. provided that the following conditions are met: 4 Neither the name of the University nor the names of its contributors may be used to endorse or 1 Redistributions of source code must retain the above copyright notice, this list of conditions and promote products derived from this software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE and the following disclaimer in the documentation and/or other materials provided with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR distribution. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, its contributors. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY endorse or promote products derived from this software without specific prior written permission. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF Copyright (c) 1994 Winning Strategies, Inc. All rights reserved. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. Redistribution and use in source and binary forms, with or without modification, are permitted IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY provided that the following conditions are met: DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 1 Redistributions of source code must retain the above copyright notice, this list of conditions and DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE the following disclaimer. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, and the following disclaimer in the documentation and/or other materials provided with the WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE distribution. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 3 All advertising materials mentioning features or use of this software must display the following IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. acknowledgement: This product includes software developed by Winning Strategies, Inc. Copyright (c) 1992, 1993 4 The name of the author may not be used to endorse or promote products derived from this The Regents of the University of California. All rights reserved. software without specific prior written permission. (c) UNIX System Laboratories, Inc. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR All or some portions of this file are derived from material licensed to the University of California IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED by American Telephone and Telegraph Co. or Unix WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE System Laboratories, Inc. and are reproduced herein with the permission of UNIX System ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, Laboratories, Inc. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES Redistribution and use in source and binary forms, with or without modification, are permitted (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR provided that the following conditions are met: SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 1 Redistributions of source code must retain the above copyright notice, this list of conditions and HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, the following disclaimer. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE and the following disclaimer in the documentation and/or other materials provided with the POSSIBILITY OF SUCH DAMAGE. distribution. Copyright (c) 1982, 1986, 1993, 1994 3 All advertising materials mentioning features or use of this software must display the following The Regents of the University of California. All rights reserved. acknowledgement: This product includes software developed by the University of California, Redistribution and use in source and binary forms, with or without modification, are permitted Berkeley and its contributors. provided that the following conditions are met: 4 Neither the name of the University nor the names of its contributors may be used to endorse or 1 Redistributions of source code must retain the above copyright notice, this list of conditions and promote products derived from this software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE and the following disclaimer in the documentation and/or other materials provided with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR distribution. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, acknowledgement: This product includes software developed by the University of California, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, Berkeley and its contributors. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR

10 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Copyright (c) 1999, 2000 The NetBSD Foundation, Inc. All rights reserved. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This code is derived from software contributed to The NetBSD Foundation by Julian Coleman. Copyright (c) 1993 Redistribution and use in source and binary forms, with or without modification, are permitted The Regents of the University of California. All rights reserved. provided that the following conditions are met: Redistribution and use in source and binary forms, with or without modification, are permitted 1 Redistributions of source code must retain the above copyright notice, this list of conditions and provided that the following conditions are met: the following disclaimer. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions the following disclaimer. and the following disclaimer in the documentation and/or other materials provided with the 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions distribution. and the following disclaimer in the documentation and/or other materials provided with the 3 All advertising materials mentioning features or use of this software must display the following distribution. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and 3 All advertising materials mentioning features or use of this software must display the following its contributors. acknowledgement: This product includes software developed by the University of California, 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to Berkeley and its contributors. endorse or promote products derived from this software without specific prior written permission. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND promote products derived from this software without specific prior written permission. CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1983, 1987, 1989, 1993 Copyright (c) 1997 Christos Zoulas. All rights reserved. The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 All advertising materials mentioning features or use of this software must display the following 3 All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Christos Zoulas. acknowledgement: This product includes software developed by the University of California, 4 The name of the author may not be used to endorse or promote products derived from this Berkeley and its contributors. software without specific prior written permission. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR promote products derived from this software without specific prior written permission. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING POSSIBILITY OF SUCH DAMAGE. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Copyright (c) 1983, 1990, 1993 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The Regents of the University of California. All rights reserved. Portions Copyright (c) 1993 by Digital Equipment Corporation. (c) UNIX System Laboratories, Inc. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is All or some portions of this file are derived from material licensed to the University of California hereby granted, provided that the above copyright notice and this permission notice appear in all by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity herein with the permission of UNIX System Laboratories, Inc. pertaining to distribution of the document or software without specific, written prior permission. Redistribution and use in source and binary forms, with or without modification, are permitted THE SOFTWARE IS PROVIDED ""AS IS"" AND DIGITAL EQUIPMENT CORP. DISCLAIMS provided that the following conditions are met: ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED 1 Redistributions of source code must retain the above copyright notice, this list of conditions and WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL the following disclaimer. EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM and the following disclaimer in the documentation and/or other materials provided with the LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, distribution. NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION 3 All advertising materials mentioning features or use of this software must display the following WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. acknowledgement: This product includes software developed by the University of California, Copyright (c) 1992, 1993 Berkeley and its contributors. The Regents of the University of California. All rights reserved. 4 Neither the name of the University nor the names of its contributors may be used to endorse or This software was developed by the Computer Systems Engineering group at Lawrence Berkeley promote products derived from this software without specific prior written permission. Laboratory under DARPA contract BG 91-66 and contributed to Berkeley. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND Redistribution and use in source and binary forms, with or without modification, are permitted ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE provided that the following conditions are met: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR the following disclaimer. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, and the following disclaimer in the documentation and/or other materials provided with the PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR distribution. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 3 All advertising materials mentioning features or use of this software must display the following OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING acknowledgement: This product includes software developed by the University of California, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Berkeley and its contributors. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 4 Neither the name of the University nor the names of its contributors may be used to endorse or Copyright (c)1999 Citrus Project, All rights reserved. promote products derived from this software without specific prior written permission. Redistribution and use in source and binary forms, with or without modification, are permitted THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND provided that the following conditions are met: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1 Redistributions of source code must retain the above copyright notice, this list of conditions and IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR the following disclaimer. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, and the following disclaimer in the documentation and/or other materials provided with the EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, distribution. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR Copyright (c) 2000 The NetBSD Foundation, Inc. All rights reserved. CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT This code is derived from software contributed to The NetBSD Foundation by Dieter Baron and OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR Thomas Klausner. BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Redistribution and use in source and binary forms, with or without modification, are permitted WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE provided that the following conditions are met:

11 1 Redistributions of source code must retain the above copyright notice, this list of conditions and All or some portions of this file are derived from material licensed to the University of California the following disclaimer. by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions herein with the permission of UNIX System Laboratories, Inc. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and the following disclaimer. its contributors. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to and the following disclaimer in the documentation and/or other materials provided with the endorse or promote products derived from this software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, acknowledgement: This product includes software developed by the University of California, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF Berkeley and its contributors. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 4 Neither the name of the University nor the names of its contributors may be used to endorse or IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY promote products derived from this software without specific prior written permission. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 1990, 1993 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY The Regents of the University of California. All rights reserved. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING This code is derived from software contributed to Berkeley by Chris Torek. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Redistribution and use in source and binary forms, with or without modification, are permitted SFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (c) 1990 The Regents of the University of California. All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and This code is derived from software contributed to Berkeley by William Jolitz. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the University of California, and the following disclaimer in the documentation and/or other materials provided with the Berkeley and its contributors. distribution. 4 Neither the name of the University nor the names of its contributors may be used to endorse or 3 All advertising materials mentioning features or use of this software must display the following promote products derived from this software without specific prior written permission. acknowledgement: This product includes software developed by the University of California, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND Berkeley and its contributors. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4 Neither the name of the University nor the names of its contributors may be used to endorse or IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR promote products derived from this software without specific prior written permission. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (c) 1992, 1993 Theo de Raadt All rights reserved. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Redistribution and use in source and binary forms, with or without modification, are permitted NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS provided that the following conditions are met: SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1991 Regents of the University of California. All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by Theo de Raadt. and the following disclaimer in the documentation and/or other materials provided with the 4 The name of the author may not be used to endorse or promote products derived from this distribution. software without specific prior written permission. 3 All advertising materials mentioning features or use of this software must display the following THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR acknowledgement: This product includes software developed by the University of California, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED Berkeley and its contributors. WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4 Neither the name of the University nor the names of its contributors may be used to endorse or ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, promote products derived from this software without specific prior written permission. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 1990 The Regents of the University of California. All rights reserved. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Redistribution and use in source and binary forms, with or without modification, are permitted OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING provided that the following conditions are met: NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 1 Redistributions of source code must retain the above copyright notice, this list of conditions and SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. the following disclaimer. Copyright (c) 1988 The Regents of the University of California. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Redistribution and use in source and binary forms, with or without modification, are permitted and the following disclaimer in the documentation and/or other materials provided with the provided that the following conditions are met: distribution. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 3 All advertising materials mentioning features or use of this software must display the following the following disclaimer. acknowledgement: This product includes software developed by the University of California, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Berkeley and its contributors. and the following disclaimer in the documentation and/or other materials provided with the 4 Neither the name of the University nor the names of its contributors may be used to endorse or distribution. promote products derived from this software without specific prior written permission. 3 All advertising materials mentioning features or use of this software must display the following THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND acknowledgement: This product includes software developed by the University of California, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Berkeley and its contributors. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 4 Neither the name of the University nor the names of its contributors may be used to endorse or PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR promote products derived from this software without specific prior written permission. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 1982, 1986, 1989, 1993 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY The Regents of the University of California. All rights reserved. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING (c) UNIX System Laboratories, Inc. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

12 Copyright (c) 1992, 1993 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS The Regents of the University of California. All rights reserved. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1997, 1998, 1999 The NetBSD Foundation, Inc. All rights reserved. provided that the following conditions are met: This code is derived from software contributed to The NetBSD Foundation by Luke Mewburn. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by the University of California, distribution. Berkeley and its contributors. 3 All advertising materials mentioning features or use of this software must display the following 4 Neither the name of the University nor the names of its contributors may be used to endorse or acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and promote products derived from this software without specific prior written permission. its contributors. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE endorse or promote products derived from this software without specific prior written permission. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Copyright (c) 1982, 1986, 1989, 1991 Regents of the University of California. All rights reserved. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1994,1995 Mark Brinicombe. All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the University of California, and the following disclaimer in the documentation and/or other materials provided with the Berkeley and its contributors. distribution. 4 Neither the name of the University nor the names of its contributors may be used to endorse or 3 All advertising materials mentioning features or use of this software must display the following promote products derived from this software without specific prior written permission. acknowledgement: This product includes software developed by the RiscBSD team. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 4 The name ""RiscBSD"" nor the name of the author may be used to endorse or promote products ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE derived from this software without specific prior written permission. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR THIS SOFTWARE IS PROVIDED BY RISCBSD ``AS IS'' AND ANY EXPRESS OR IMPLIED PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN Copyright (c) 1998, 1999 The NetBSD Foundation, Inc. All rights reserved. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE This code is derived from software contributed to The NetBSD Foundation by Klaus Klein. POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1994 Mark Brinicombe. All rights reserved. provided that the following conditions are met: Redistribution and use in source and binary forms, with or without modification, are permitted 1 Redistributions of source code must retain the above copyright notice, this list of conditions and provided that the following conditions are met: the following disclaimer. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions the following disclaimer. and the following disclaimer in the documentation and/or other materials provided with the 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions distribution. and the following disclaimer in the documentation and/or other materials provided with the 3 All advertising materials mentioning features or use of this software must display the following distribution. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and 3 All advertising materials mentioning features or use of this software must display the following its contributors. acknowledgement: This product includes software developed by the RiscBSD team. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 4 The name ""RiscBSD"" nor the name of the author may be used to endorse or promote products endorse or promote products derived from this software without specific prior written permission. derived from this software without specific THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND prior written permission. CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, THIS SOFTWARE IS PROVIDED BY RISCBSD ``AS IS'' AND ANY EXPRESS OR IMPLIED INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY IN NO EVENT SHALL RISCBSD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1991, 1993, 1994 Copyright (c) 1994-1997 Mark Brinicombe. The Regents of the University of California. All rights reserved. Copyright (c) 1994 Brini. Redistribution and use in source and binary forms, with or without modification, are permitted All rights reserved. provided that the following conditions are met: This code is derived from software written for Brini by Mark Brinicombe 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by the University of California, distribution. Berkeley and its contributors. 3 All advertising materials mentioning features or use of this software must display the following 4 Neither the name of the University nor the names of its contributors may be used to endorse or acknowledgement: This product includes software developed by Brini. promote products derived from this software without specific prior written permission. 4 The name of the company nor the name of the author may be used to endorse or promote products THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND derived from this software without specific prior written permission. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN

13 ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, POSSIBILITY OF SUCH DAMAGE. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN Copyright (c) 2001 The NetBSD Foundation, Inc. All rights reserved. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE This code is derived from software contributed to The NetBSD Foundation by Klaus Klein. POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (C) 1995 Wolfgang Solfrank. provided that the following conditions are met: Copyright (C) 1995 TooLs GmbH. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and and the following disclaimer in the documentation and/or other materials provided with the its contributors. distribution. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 3 All advertising materials mentioning features or use of this software must display the following endorse or promote products derived from this software without specific prior written permission. acknowledgement: This product includes software developed by TooLs GmbH. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 4 The name of TooLs GmbH may not be used to endorse or promote products derived from this CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, software without specific prior written permission. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF THIS SOFTWARE IS PROVIDED BY TOOLS GMBH ``AS IS'' AND ANY EXPRESS OR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL ARE DISCLAIMED. IN NO EVENT SHALL TOOLS GMBH BE LIABLE FOR ANY DIRECT, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE Copyright (c) 2000, 2001 The NetBSD Foundation, Inc. All rights reserved. POSSIBILITY OF SUCH DAMAGE. This code is derived from software contributed to The NetBSD Foundation by Jason R. Thorpe. Copyright (c) 1989, 1993 Redistribution and use in source and binary forms, with or without modification, are permitted The Regents of the University of California. All rights reserved. provided that the following conditions are met: (c) UNIX System Laboratories, Inc. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and All or some portions of this file are derived from material licensed to the University of California the following disclaimer. by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions herein with the permission of UNIX System Laboratories, Inc. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and the following disclaimer. its contributors. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to and the following disclaimer in the documentation and/or other materials provided with the endorse or promote products derived from this software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 3 All advertising materials mentioning features or use of this software must display the following CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, acknowledgement: This product includes software developed by the University of California, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF Berkeley and its contributors. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 4 Neither the name of the University nor the names of its contributors may be used to endorse or IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY promote products derived from this software without specific prior written permission. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Copyright (c) 1995 Mark Brinicombe. All rights reserved. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Redistribution and use in source and binary forms, with or without modification, are permitted OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING provided that the following conditions are met: NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 1 Redistributions of source code must retain the above copyright notice, this list of conditions and SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. the following disclaimer. Sun RPC is a product of , Inc. and is provided for unrestricted use provided that 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions this legend is included on all tape media and as a part of the software program in whole or part. and the following disclaimer in the documentation and/or other materials provided with the Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute distribution. it to anyone else except as part of a product or program developed by the user. 3 All advertising materials mentioning features or use of this software must display the following SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE acknowledgement: This product includes software developed by Mark Brinicombe. WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR 4 The name of the company nor the name of the author may be used to endorse or promote products PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. derived from this software without specific prior written permission. Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR Inc. to assist in its use, correction, modification or enhancement. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE OR ANY PART THEREOF. LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT indirect and consequential damages, even if Sun has been advised of the possibility of such OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR damages. BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, California 94043 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Copyright (c) 2001 Tsubai Masanari. All rights reserved. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN Redistribution and use in source and binary forms, with or without modification, are permitted IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (c) 1994-1996 Mark Brinicombe. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1994 Brini. the following disclaimer. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions This code is derived from software written for Brini by Mark Brinicombe and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 The name of the author may not be used to endorse or promote products derived from this 1 Redistributions of source code must retain the above copyright notice, this list of conditions and software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED and the following disclaimer in the documentation and/or other materials provided with the WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE distribution. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, 3 All advertising materials mentioning features or use of this software must display the following INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES acknowledgement: This product includes software developed by Brini. (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 4 The name of the company nor the name of the author may be used to endorse or promote products SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) derived from this software without specific prior written permission. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, THIS SOFTWARE IS PROVIDED BY BRINI ``AS IS'' AND ANY EXPRESS OR IMPLIED STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. POSSIBILITY OF SUCH DAMAGE. IN NO EVENT SHALL BRINI OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, Copyright (c) 1989, 1993 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES The Regents of the University of California. All rights reserved. (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR (c) UNIX System Laboratories, Inc. SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

14 All or some portions of this file are derived from material licensed to the University of California HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN herein with the permission of UNIX System Laboratories, Inc. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE Portions Copyright(C) 1995, Jason Downs. All rights reserved. POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1982, 1986, 1993 provided that the following conditions are met: The Regents of the University of California. All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by the University of California, distribution. Berkeley and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or 4 Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1989, 1993 Copyright (c) 1997 The NetBSD Foundation, Inc. All rights reserved. The Regents of the University of California. All rights reserved. This code is derived from software contributed to The NetBSD Foundation by Klaus Klein. This code is derived from software contributed to Berkeley by Tom Truscott. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 All advertising materials mentioning features or use of this software must display the following 3 All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and acknowledgement: This product includes software developed by the University of California, its contributors. Berkeley and its contributors. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 4 Neither the name of the University nor the names of its contributors may be used to endorse or endorse or promote products derived from this software without specific prior written permission. promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved. Copyright (c) 1982, 1986, 1990, 1993 Developed at SunPro, a Sun Microsystems, Inc. business. The Regents of the University of California. All rights reserved. Permission to use, copy, modify, and distribute this software is freely granted, provided that this Redistribution and use in source and binary forms, with or without modification, are permitted notice is preserved. provided that the following conditions are met: Copyright (c) 1992, 1993 1 Redistributions of source code must retain the above copyright notice, this list of conditions and The Regents of the University of California. All rights reserved. the following disclaimer. This software was developed by the Computer Systems Engineering group at Lawrence Berkeley 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Laboratory under DARPA contract BG 91-66 and contributed to Berkeley. and the following disclaimer in the documentation and/or other materials provided with the All advertising materials mentioning features or use of this software must display the following distribution. acknowledgement: 3 All advertising materials mentioning features or use of this software must display the following This product includes software developed by the University of California, Lawrence Berkeley acknowledgement: This product includes software developed by the University of California, Laboratory. Berkeley and its contributors. Redistribution and use in source and binary forms, with or without modification, are permitted 4 Neither the name of the University nor the names of its contributors may be used to endorse or provided that the following conditions are met: promote products derived from this software without specific prior written permission. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND the following disclaimer. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR and the following disclaimer in the documentation and/or other materials provided with the PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR distribution. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 3 All advertising materials mentioning features or use of this software must display the following EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, acknowledgement: This product includes software developed by the University of California, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Berkeley and its contributors. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 4 Neither the name of the University nor the names of its contributors may be used to endorse or OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING promote products derived from this software without specific prior written permission. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Copyright (C) 1995, 1996 Wolfgang Solfrank. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Copyright (C) 1995, 1996 TooLs GmbH. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR All rights reserved. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Redistribution and use in source and binary forms, with or without modification, are permitted EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, provided that the following conditions are met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY the following disclaimer. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS and the following disclaimer in the documentation and/or other materials provided with the SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. distribution. Copyright (c) 1993,94 Winning Strategies, Inc. All rights reserved. 3 All advertising materials mentioning features or use of this software must display the following Redistribution and use in source and binary forms, with or without modification, are permitted acknowledgement: This product includes software developed by TooLs GmbH. provided that the following conditions are met: 4 The name of TooLs GmbH may not be used to endorse or promote products derived from this 1 Redistributions of source code must retain the above copyright notice, this list of conditions and software without specific prior written permission. the following disclaimer. THIS SOFTWARE IS PROVIDED BY TOOLS GMBH ``AS IS'' AND ANY EXPRESS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED and the following disclaimer in the documentation and/or other materials provided with the WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE distribution. ARE DISCLAIMED. IN NO EVENT SHALL TOOLS GMBH BE LIABLE FOR ANY DIRECT, 3 All advertising materials mentioning features or use of this software must display the following INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES acknowledgement: This product includes software developed by Winning Strategies, Inc. (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 4 The name of the author may not be used to endorse or promote products derived from this SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) software without specific prior written permission.

15 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, POSSIBILITY OF SUCH DAMAGE. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN Copyright (c)2001 Citrus Project, All rights reserved. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE Redistribution and use in source and binary forms, with or without modification, are permitted POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (c) 1990, 1993 1 Redistributions of source code must retain the above copyright notice, this list of conditions and The Regents of the University of California. All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE and the following disclaimer in the documentation and/or other materials provided with the IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR distribution. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS 3 All advertising materials mentioning features or use of this software must display the following BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR acknowledgement: This product includes software developed by the University of California, CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT Berkeley and its contributors. OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 4 Neither the name of the University nor the names of its contributors may be used to endorse or BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON AY THEORY OF LIABILITY, promote products derived from this software without specific prior written permission. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Copyright (c)2001 Citrus Project, All rights reserved. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR Redistribution and use in source and binary forms, with or without modification, are permitted CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, provided that the following conditions are met: EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR the following disclaimer. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING and the following disclaimer in the documentation and/or other materials provided with the NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS distribution. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND Copyright (c) 2000 The NetBSD Foundation, Inc. All rights reserved. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE This code is derived from software contributed to The NetBSD Foundation by Jason R. Thorpe. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Redistribution and use in source and binary forms, with or without modification, are permitted PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS provided that the following conditions are met: BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT the following disclaimer. OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, and the following disclaimer in the documentation and/or other materials provided with the WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE distribution. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 3 All advertising materials mentioning features or use of this software must display the following IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and Copyright (c) 1987, 1993 its contributors. The Regents of the University of California. All rights reserved. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to Redistribution and use in source and binary forms, with or without modification, are permitted endorse or promote products derived from this software without specific prior written permission. provided that the following conditions are met: THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND 1 Redistributions of source code must retain the above copyright notice, this list of conditions and CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, the following disclaimer. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. and the following disclaimer in the documentation and/or other materials provided with the IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY distribution. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 3 All advertising materials mentioning features or use of this software must display the following DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE acknowledgement: This product includes software developed by the University of California, GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS Berkeley and its contributors. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 4 Neither the name of the University nor the names of its contributors may be used to endorse or WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE promote products derived from this software without specific prior written permission. OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Copyright (c) 1989 Regents of the University of California. All rights reserved. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Redistribution and use in source and binary forms, with or without modification, are permitted PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR provided that the following conditions are met: CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 1 Redistributions of source code must retain the above copyright notice, this list of conditions and EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, the following disclaimer. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY and the following disclaimer in the documentation and/or other materials provided with the OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING distribution. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3 All advertising materials mentioning features or use of this software must display the following SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. acknowledgement: This product includes software developed by the University of California, Copyright (c) 1990 The Regents of the University of California. All rights reserved. Berkeley and its contributors. This code is derived from software contributed to Berkeley by Chris Torek. 4 Neither the name of the University nor the names of its contributors may be used to endorse or Redistribution and use in source and binary forms, with or without modification, are permitted promote products derived from this software without specific prior written permission. provided that the following conditions are met: THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1 Redistributions of source code must retain the above copyright notice, this list of conditions and ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE the following disclaimer. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR and the following disclaimer in the documentation and/or other materials provided with the CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, distribution. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 3 All advertising materials mentioning features or use of this software must display the following PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR acknowledgement: This product includes software developed by the University of California, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Berkeley and its contributors. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 4 Neither the name of the University nor the names of its contributors may be used to endorse or NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS promote products derived from this software without specific prior written permission. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND Copyright (c) 1994 SigmaSoft, Th. Lockert All rights reserved. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Redistribution and use in source and binary forms, with or without modification, are permitted IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR provided that the following conditions are met: PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, the following disclaimer. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR and the following disclaimer in the documentation and/or other materials provided with the PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY distribution. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3 The name of the author may not be used to endorse or promote products derived from this NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS software without specific prior written permission. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR Copyright (c) 1988 Regents of the University of California. All rights reserved. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED Redistribution and use in source and binary forms, with or without modification, are permitted WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE provided that the following conditions are met:

16 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions the following disclaimer. and the following disclaimer in the documentation and/or other materials provided with the 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions distribution. and the following disclaimer in the documentation and/or other materials provided with the 3 All advertising materials mentioning features or use of this software must display the following distribution. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and 3 All advertising materials mentioning features or use of this software must display the following its contributors. acknowledgement: This product includes software developed by the University of California, 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to Berkeley and its contributors. endorse or promote products derived from this software without specific prior written permission. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND promote products derived from this software without specific prior written permission. CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved. Copyright (c) 1997 Todd C. Miller All rights reserved. This code is derived from software contributed to The NetBSD Foundation by Paul Kranenburg. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 The name of the author may not be used to endorse or promote products derived from this 3 All advertising materials mentioning features or use of this software must display the following software without specific prior written permission. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED its contributors. WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. endorse or promote products derived from this software without specific prior written permission. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE Copyright (c) 1989, 1991, 1993, 1995 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS The Regents of the University of California. All rights reserved. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, This code is derived from software contributed to Berkeley by Jan-Simon Pendry. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1997, 2002 The NetBSD Foundation, Inc. All rights reserved. the following disclaimer. This code is derived from software contributed to The NetBSD Foundation by Klaus Klein and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Jason R. Thorpe. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the University of California, the following disclaimer. Berkeley and its contributors. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 Neither the name of the University nor the names of its contributors may be used to endorse or and the following disclaimer in the documentation and/or other materials provided with the promote products derived from this software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 3 All advertising materials mentioning features or use of this software must display the following ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR its contributors. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, endorse or promote products derived from this software without specific prior written permission. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL Copyright (c) 1998 The NetBSD Foundation, Inc. All rights reserved. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE This code is derived from software contributed to The NetBSD Foundation by Klaus Klein. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS Redistribution and use in source and binary forms, with or without modification, are permitted INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, provided that the following conditions are met: WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE 1 Redistributions of source code must retain the above copyright notice, this list of conditions and OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN the following disclaimer. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Copyright (c) 1990, 1993, 1994 and the following disclaimer in the documentation and/or other materials provided with the The Regents of the University of California. All rights reserved. distribution. This code is derived from software contributed to Berkeley by Chris Torek. 3 All advertising materials mentioning features or use of this software must display the following Redistribution and use in source and binary forms, with or without modification, are permitted acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and provided that the following conditions are met: its contributors. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to the following disclaimer. endorse or promote products derived from this software without specific prior written permission. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND and the following disclaimer in the documentation and/or other materials provided with the CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, distribution. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 3 All advertising materials mentioning features or use of this software must display the following MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. acknowledgement: This product includes software developed by the University of California, IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY Berkeley and its contributors. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 4 Neither the name of the University nor the names of its contributors may be used to endorse or DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE promote products derived from this software without specific prior written permission. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Copyright (c) 2002 The NetBSD Foundation, Inc. All rights reserved. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, This code is derived from software contributed to The NetBSD Foundation by Nathan J. Williams. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Redistribution and use in source and binary forms, with or without modification, are permitted PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY provided that the following conditions are met: OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 1 Redistributions of source code must retain the above copyright notice, this list of conditions and NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS the following disclaimer. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

17 Copyright (c) 1992, 1993, 1994 Henry Spencer. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (c) 1992, 1993, 1994 OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING The Regents of the University of California. All rights reserved. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS This code is derived from software contributed to Berkeley by Henry Spencer. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1985, 1993 The Regents of the University of California. All rights reserved. provided that the following conditions are met: Redistribution and use in source and binary forms, with or without modification, are permitted 1 Redistributions of source code must retain the above copyright notice, this list of conditions and provided that the following conditions are met: the following disclaimer. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions the following disclaimer. and the following disclaimer in the documentation and/or other materials provided with the 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions distribution. and the following disclaimer in the documentation and/or other materials provided with the 3 All advertising materials mentioning features or use of this software must display the following distribution. acknowledgement: This product includes software developed by the University of California, 3 All advertising materials mentioning features or use of this software must display the following Berkeley and its contributors. acknowledgement: This product includes software developed by the University of California, 4 Neither the name of the University nor the names of its contributors may be used to endorse or Berkeley and its contributors. promote products derived from this software without specific prior written permission. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND promote products derived from this software without specific prior written permission. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Copyright (c) 1994 Christos Zoulas All rights reserved. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1985, 1989, 1993 provided that the following conditions are met: The Regents of the University of California. All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by Christos Zoulas. distribution. 4 The name of the author may not be used to endorse or promote products derived from this 3 All advertising materials mentioning features or use of this software must display the following software without specific prior written permission. acknowledgement: This product includes software developed by the University of California, THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR Berkeley and its contributors. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 4 Neither the name of the University nor the names of its contributors may be used to endorse or WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE promote products derived from this software without specific prior written permission. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR POSSIBILITY OF SUCH DAMAGE. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (c) 1989, 1993, 1994 OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING The Regents of the University of California. All rights reserved. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS This code is derived from software contributed to Berkeley by Guido van Rossum. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. provided that the following conditions are met: License to copy and use this software is granted provided that it is identified as the ""RSA Data 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Security, Inc. MD5 Message-Digest Algorithm"" in all material mentioning or referencing this the following disclaimer. software or this function. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions License is also granted to make and use derivative works provided that such works are identified and the following disclaimer in the documentation and/or other materials provided with the as ""derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm"" in all material distribution. mentioning or referencing the derived work. 3 All advertising materials mentioning features or use of this software must display the following RSA Data Security, Inc. makes no representations concerning either the merchantability of this acknowledgement: This product includes software developed by the University of California, software or the suitability of this software for any particular purpose. It is provided ""as is"" Berkeley and its contributors. without express or implied warranty of any kind. 4 Neither the name of the University nor the names of its contributors may be used to endorse or These notices must be retained in any copies of any part of this documentation and/or software. promote products derived from this software without specific prior written permission. Copyright (c) 1989 The Regents of the University of California. All rights reserved. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND (c) UNIX System Laboratories, Inc. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE All or some portions of this file are derived from material licensed to the University of California IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR herein with the permission of UNIX System Laboratories, Inc. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Redistribution and use in source and binary forms, with or without modification, are permitted EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, provided that the following conditions are met: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY the following disclaimer. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS and the following disclaimer in the documentation and/or other materials provided with the SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. distribution. Copyright (c) 1988, 1993 3 All advertising materials mentioning features or use of this software must display the following The Regents of the University of California. All rights reserved. acknowledgement: This product includes software developed by the University of California, This code is derived from software written by Ken Arnold and published in UNIX Review, Vol. 6, Berkeley and its contributors. No. 8. 4 Neither the name of the University nor the names of its contributors may be used to endorse or Redistribution and use in source and binary forms, with or without modification, are permitted promote products derived from this software without specific prior written permission. provided that the following conditions are met: THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1 Redistributions of source code must retain the above copyright notice, this list of conditions and ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE the following disclaimer. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR and the following disclaimer in the documentation and/or other materials provided with the CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, distribution. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 3 All advertising materials mentioning features or use of this software must display the following PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR acknowledgement: This product includes software developed by the University of California, PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Berkeley and its contributors. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 4 Neither the name of the University nor the names of its contributors may be used to endorse or NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS promote products derived from this software without specific prior written permission. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND Copyright (c) 1992 Henry Spencer. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Copyright (c) 1992, 1993 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR The Regents of the University of California. All rights reserved. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR This code is derived from software contributed to Berkeley by Henry Spencer of the University of CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Toronto. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, Redistribution and use in source and binary forms, with or without modification, are permitted PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR provided that the following conditions are met:

18 1 Redistributions of source code must retain the above copyright notice, this list of conditions and INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES the following disclaimer. (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) and the following disclaimer in the documentation and/or other materials provided with the HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, distribution. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN 3 All advertising materials mentioning features or use of this software must display the following ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE acknowledgement: This product includes software developed by the University of California, POSSIBILITY OF SUCH DAMAGE. Berkeley and its contributors. Copyright (c) 1983, 1989, 1993 4 Neither the name of the University nor the names of its contributors may be used to endorse or The Regents of the University of California. All rights reserved. promote products derived from this software without specific prior written permission. Redistribution and use in source and binary forms, with or without modification, are permitted THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND provided that the following conditions are met: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1 Redistributions of source code must retain the above copyright notice, this list of conditions and IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR the following disclaimer. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, and the following disclaimer in the documentation and/or other materials provided with the EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, distribution. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3 All advertising materials mentioning features or use of this software must display the following PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY acknowledgement: This product includes software developed by the University of California, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Berkeley and its contributors. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 4 Neither the name of the University nor the names of its contributors may be used to endorse or SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. promote products derived from this software without specific prior written permission. Copyright (c) 1983, 1988, 1993 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND The Regents of the University of California. All rights reserved. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Redistribution and use in source and binary forms, with or without modification, are permitted IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR provided that the following conditions are met: PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, the following disclaimer. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR and the following disclaimer in the documentation and/or other materials provided with the PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY distribution. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3 All advertising materials mentioning features or use of this software must display the following NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS acknowledgement: This product includes software developed by the University of California, SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Berkeley and its contributors. Copyright (c) 1983, 1993 4 Neither the name of the University nor the names of its contributors may be used to endorse or The Regents of the University of California. All rights reserved. promote products derived from this software without specific prior written permission. Redistribution and use in source and binary forms, with or without modification, are permitted THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND provided that the following conditions are met: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1 Redistributions of source code must retain the above copyright notice, this list of conditions and IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR the following disclaimer. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, and the following disclaimer in the documentation and/or other materials provided with the EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, distribution. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3 All advertising materials mentioning features or use of this software must display the following PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY acknowledgement: This product includes software developed by the University of California, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Berkeley and its contributors. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 4 Neither the name of the University nor the names of its contributors may be used to endorse or SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. promote products derived from this software without specific prior written permission. Copyright (c) 1989, 1993 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND The Regents of the University of California. All rights reserved. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Portions Copyright (c) 1994, Jason Downs. All Rights Reserved. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR Redistribution and use in source and binary forms, with or without modification, are permitted PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR provided that the following conditions are met: CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 1 Redistributions of source code must retain the above copyright notice, this list of conditions and EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, the following disclaimer. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY and the following disclaimer in the documentation and/or other materials provided with the OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING distribution. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3 All advertising materials mentioning features or use of this software must display the following SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. acknowledgement: This product includes software developed by the University of California, Copyright (c) 1991, 1993 Berkeley and its contributors. The Regents of the University of California. All rights reserved. 4 Neither the name of the University nor the names of its contributors may be used to endorse or This code is derived from software contributed to Berkeley by Paul Borman at Krystal promote products derived from this software without specific prior written permission. Technologies. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND Redistribution and use in source and binary forms, with or without modification, are permitted ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE provided that the following conditions are met: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR the following disclaimer. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, and the following disclaimer in the documentation and/or other materials provided with the PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR distribution. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 3 All advertising materials mentioning features or use of this software must display the following OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING acknowledgement: This product includes software developed by the University of California, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Berkeley and its contributors. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 4 Neither the name of the University nor the names of its contributors may be used to endorse or Copyright (c) 1989 The Regents of the University of California. All rights reserved. promote products derived from this software without specific prior written permission. Redistribution and use in source and binary forms are permitted provided that the above copyright THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND notice and this paragraph are duplicated in all such forms and that any documentation, advertising ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE materials, and other materials related to such distribution and use acknowledge that the software IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR was developed by the University of California, Berkeley. The name of the University may not be PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR used to endorse or promote products derived from this software without specific prior written CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (c) 1994 Christopher G. Demetriou All rights reserved. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Redistribution and use in source and binary forms, with or without modification, are permitted NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS provided that the following conditions are met: SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1993 the following disclaimer. The Regents of the University of California. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions This code is derived from software contributed to Berkeley by Paul Borman at Krystal and the following disclaimer in the documentation and/or other materials provided with the Technologies. distribution. Redistribution and use in source and binary forms, with or without modification, are permitted 3 All advertising materials mentioning features or use of this software must display the following provided that the following conditions are met: acknowledgement: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and This product includes software developed for the NetBSD Project. See http://www.netbsd.org/ for the following disclaimer. information about NetBSD. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 4 The name of the author may not be used to endorse or promote products derived from this and the following disclaimer in the documentation and/or other materials provided with the software without specific prior written permission. distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 3 All advertising materials mentioning features or use of this software must display the following IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED acknowledgement: This product includes software developed by the University of California, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE Berkeley and its contributors. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,

19 4 Neither the name of the University nor the names of its contributors may be used to endorse or OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING promote products derived from this software without specific prior written permission. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE copyright (c) 1983, 1993 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR The Regents of the University of California. All rights reserved. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR Redistribution and use in source and binary forms, with or without modification, are permitted CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, provided that the following conditions are met: EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 1 Redistributions of source code must retain the above copyright notice, this list of conditions and PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR the following disclaimer. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING and the following disclaimer in the documentation and/or other materials provided with the NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS distribution. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 3 All advertising materials mentioning features or use of this software must display the following Copyright (c) 1995 - 1999 Kungliga Tekniska Högskolan acknowledgement: This product includes software developed by the University of California, (Royal Institute of Technology, Stockholm, Sweden). All rights reserved. Berkeley and its contributors. Redistribution and use in source and binary forms, with or without modification, are permitted 4 Neither the name of the University nor the names of its contributors may be used to endorse or provided that the following conditions are met: promote products derived from this software without specific prior written permission. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND the following disclaimer. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR and the following disclaimer in the documentation and/or other materials provided with the PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR distribution. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 3 Neither the name of the Institute nor the names of its contributors may be used to endorse or EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, promote products derived from this software without specific prior written permission. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Copyright (c) 2002 The NetBSD Foundation, Inc. All rights reserved. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, This code is derived from software contributed to The NetBSD Foundation by Christos Zoulas. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Redistribution and use in source and binary forms, with or without modification, are permitted PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY provided that the following conditions are met: OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 1 Redistributions of source code must retain the above copyright notice, this list of conditions and NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS the following disclaimer. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions The author of this software is David M. Gay. and the following disclaimer in the documentation and/or other materials provided with the Copyright (c) 1991 by AT&T. distribution. Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby 3 All advertising materials mentioning features or use of this software must display the following granted, provided that this entire notice is included in all copies of any software which is or acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and includes a copy or modification of this software and in all copies of the supporting documentation its contributors. for such software. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to THIS SOFTWARE IS BEING PROVIDED ""AS IS"", WITHOUT ANY EXPRESS OR endorse or promote products derived from this software without specific prior written permission. IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF PURPOSE. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. The author of this software is David M. Gay. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY Copyright (c) 1991 by AT&T. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE granted, provided that this entire notice is included in all copies of any software which is or GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS includes a copy or modification of this software and in all copies of the supporting documentation INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, for such software. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE THIS SOFTWARE IS BEING PROVIDED ""AS IS"", WITHOUT ANY EXPRESS OR OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE Copyright (c) 1990, 1993 MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR The Regents of the University of California. All rights reserved. PURPOSE. This code is derived from software contributed to Berkeley by Mike Hibler and Chris Torek. Copyright (c) 1998 Todd C. Miller All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 All advertising materials mentioning features or use of this software must display the following 3 The name of the author may not be used to endorse or promote products derived from this acknowledgement: This product includes software developed by the University of California, software without specific prior written permission. Berkeley and its contributors. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 4 Neither the name of the University nor the names of its contributors may be used to endorse or WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF promote products derived from this software without specific prior written permission. MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY Copyright (c) 1982, 1985, 1993 OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING The Regents of the University of California. All rights reserved. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Redistribution and use in source and binary forms, with or without modification, are permitted SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (C) 1997-2000 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Sony Computer Science Laboratories Inc. All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the University of California, and the following disclaimer in the documentation and/or other materials provided with the Berkeley and its contributors. distribution. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED BY SONY CSL AND CONTRIBUTORS ``AS IS'' AND ANY promote products derived from this software without specific prior written permission. EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SONY CSL OR CONTRIBUTORS BE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY

20 OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. and the following disclaimer in the documentation and/or other materials provided with the Copyright (c) 1999 The NetBSD Foundation, Inc. All rights reserved. distribution. This code is derived from software contributed to The NetBSD Foundation by Charles M. Hannum. 3 All advertising materials mentioning features or use of this software must display the following Redistribution and use in source and binary forms, with or without modification, are permitted acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and provided that the following conditions are met: its contributors. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to the following disclaimer. endorse or promote products derived from this software without specific prior written permission. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND and the following disclaimer in the documentation and/or other materials provided with the CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, distribution. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 3 All advertising materials mentioning features or use of this software must display the following MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE its contributors. LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT endorse or promote products derived from this software without specific prior written permission. OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY Copyright (c) 1996 Matthew R. Greene All rights reserved. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL Redistribution and use in source and binary forms, with or without modification, are permitted DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE provided that the following conditions are met: GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 1 Redistributions of source code must retain the above copyright notice, this list of conditions and INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, the following disclaimer. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN and the following disclaimer in the documentation and/or other materials provided with the IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. distribution. Copyright (c) 1999, 2000, 2001 The NetBSD Foundation, Inc. All rights reserved. 3 The name of the author may not be used to endorse or promote products derived from this This code is derived from software contributed to The NetBSD Foundation by William software without specific prior written permission. Studnemund and Jason R. Thorpe. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR Redistribution and use in source and binary forms, with or without modification, are permitted IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED provided that the following conditions are met: WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1 Redistributions of source code must retain the above copyright notice, this list of conditions and ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, the following disclaimer. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR and the following disclaimer in the documentation and/or other materials provided with the SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) distribution. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 3 All advertising materials mentioning features or use of this software must display the following STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE its contributors. POSSIBILITY OF SUCH DAMAGE. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to This C source file is part of the SoftFloat IEC/IEEE Floating-Pointe endorse or promote products derived from this software without specific prior written permission. Arithmetic Package, Release 2a. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND Written by John R. Hauser. This work was made possible in part by the International Computer CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, Science Institute, located at Suite 600, 1947 Center Street, Berkeley, California 94704. Funding INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF was partially provided by the National Science Foundation under grant MIP-9311980. The original MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. version of this code was written as part of a project to build a fixed-point vector processor in IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY collaboration with the University of California at Berkeley, overseen by Profs. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL Nelson Morgan and John Wawrzynek. More information is available through the Web page DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE `http://HTTP.CS.Berkeley.EDU/~jhauser/arithmetic/SoftFloat.html'. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS THIS SOFTWARE IS DISTRIBUTED AS IS, FOR FREE. Although reasonable effort has been INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, made to avoid it, THIS SOFTWARE MAY CONTAIN FAULTS THAT WILL AT TIMES WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE RESULT IN INCORRECT BEHAVIOR. USE OF THIS SOFTWARE IS RESTRICTED TO OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN PERSONS AND ORGANIZATIONS WHO CAN AND WILL TAKE FULL RESPONSIBILITY IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. FOR ANY AND ALL LOSSES, COSTS, OR OTHER PROBLEMS ARISING FROM ITS USE. This C source file is part of the SoftFloat IEC/IEEE Floating-point Arithmetic Package, Release 2a. Derivative works are acceptable, even for commercial purposes, so long as (1) they include Written by John R. Hauser. This work was made possible in part by the International Computer prominent notice that the work is derivative, and (2) they include prominent notice akin to these Science Institute, located at Suite 600, 1947 Center Street, four paragraphs for those parts of this code that are retained. Berkeley, California 94704. Funding was partially provided by the National Science Foundation Copyright (c) 2001 The NetBSD Foundation, Inc. All rights reserved. under grant MIP-9311980. The original version of this code was written as part of a project to build This code is derived from software contributed to The NetBSD Foundation by Jason R. Thorpe. a fixed-point vector processor in collaboration with the University of California at Berkeley, Redistribution and use in source and binary forms, with or without modification, are permitted overseen by Profs. provided that the following conditions are met: Nelson Morgan and John Wawrzynek. More information is available through the Web page 1 Redistributions of source code must retain the above copyright notice, this list of conditions and `http://HTTP.CS.Berkeley.EDU/~jhauser/arithmetic/SoftFloat.html'. the following disclaimer. THIS SOFTWARE IS DISTRIBUTED AS IS, FOR FREE. Although reasonable effort has been 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions made to avoid it, THIS SOFTWARE MAY CONTAIN FAULTS THAT WILL AT TIMES and the following disclaimer in the documentation and/or other materials provided with the RESULT IN INCORRECT BEHAVIOR. USE OF THIS SOFTWARE IS RESTRICTED TO distribution. PERSONS AND ORGANIZATIONS WHO CAN AND WILL TAKE FULL RESPONSIBILITY 3 All advertising materials mentioning features or use of this software must display the following FOR ANY AND ALL LOSSES, COSTS, OR OTHER PROBLEMS ARISING FROM ITS USE. acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and Derivative works are acceptable, even for commercial purposes, so long as (1) they include its contributors. prominent notice that the work is derivative, and (2) they include prominent notice akin to these 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to four paragraphs for those parts of this code that are retained. endorse or promote products derived from this software without specific prior written permission. This C source fragment is part of the SoftFloat IEC/IEEE Floating-point Arithmetic Package, THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND Release 2a. CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, Written by John R. Hauser. This work was made possible in part by the International Computer INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF Science Institute, located at Suite 600, 1947 Center Street, Berkeley, California 94704. Funding MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. was partially provided by the National Science Foundation under grant MIP-9311980. The original IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY version of this code was written as part of a project to build a fixed-point vector processor in DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL collaboration with the University of California at Berkeley, overseen by Profs. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE Nelson Morgan and John Wawrzynek. More information is available through the Web page GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS `http://HTTP.CS.Berkeley.EDU/~jhauser/arithmetic/SoftFloat.html'. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, THIS SOFTWARE IS DISTRIBUTED AS IS, FOR FREE. Although reasonable effort has been WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE made to avoid it, THIS SOFTWARE MAY CONTAIN FAULTS THAT WILL AT TIMES OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN RESULT IN INCORRECT BEHAVIOR. USE OF THIS SOFTWARE IS RESTRICTED TO IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PERSONS AND ORGANIZATIONS WHO CAN AND WILL TAKE FULL RESPONSIBILITY Copyright (c) 1998, 2001 The NetBSD Foundation, Inc. All rights reserved. FOR ANY AND ALL LOSSES, COSTS, OR OTHER PROBLEMS ARISING FROM ITS USE. This code is derived from software contributed to The NetBSD Foundation by Paul Kranenburg, Derivative works are acceptable, even for commercial purposes, so long as (1) they include Ross Harvey, and Jason R. Thorpe. prominent notice that the work is derivative, and (2) they include prominent notice akin to these Redistribution and use in source and binary forms, with or without modification, are permitted four paragraphs for those parts of this code that are retained. provided that the following conditions are met: Copyright (c) 1997 The NetBSD Foundation, Inc. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and All rights reserved. the following disclaimer. This code is derived from software contributed to The NetBSD Foundation by Neil A. Carson and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Mark Brinicombe and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms, with or without modification, are permitted distribution. provided that the following conditions are met: 3 All advertising materials mentioning features or use of this software must display the following 1 Redistributions of source code must retain the above copyright notice, this list of conditions and acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and the following disclaimer. its contributors. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

21 THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE POSSIBILITY OF SUCH DAMAGE. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS Copyright (c) 1986, 1993 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, The Regents of the University of California. All rights reserved. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (c) 1995 Christopher G. Demetriou All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the University of California, and the following disclaimer in the documentation Berkeley and its contributors. and/or other materials provided with the distribution. 4 Neither the name of the University nor the names of its contributors may be used to endorse or 3 All advertising materials mentioning features or use of this software must display the following promote products derived from this software without specific prior written permission. acknowledgement: THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND This product includes software developed for the NetBSD Project. See http://www.netbsd.org/ for ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE information about NetBSD. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 4 The name of the author may not be used to endorse or promote products derived from this PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR software without specific prior written permission. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) Copyright (c) 1990, 1991, 1993 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, The Regents of the University of California. All rights reserved. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN This code is derived from the Stanford/CMU enet packet filter, (net/enet.c) distributed as part of ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 4.3BSD, and code contributed to Berkeley by Steven POSSIBILITY OF SUCH DAMAGE. McCanne and Van Jacobson both of Lawrence Berkeley Laboratory. Copyright 1996 John D. Polstra. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright 1996 Matt Thomas provided that the following conditions are met: All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by the University of California, distribution. Berkeley and its contributors. 3 All advertising materials mentioning features or use of this software must display the following 4 Neither the name of the University nor the names of its contributors may be used to endorse or acknowledgement: This product includes software developed by John Polstra. promote products derived from this software without specific prior written permission. 4 The name of the author may not be used to endorse or promote products derived from this THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND software without specific prior written permission. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE Copyright (c) 1987, 1991, 1993 POSSIBILITY OF SUCH DAMAGE. The Regents of the University of California. All rights reserved. Copyright 1996 Matt Thomas All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the and the following disclaimer in the documentation and/or other materials provided with the distribution. distribution. 3 All advertising materials mentioning features or use of this software must display the following 3 The name of the author may not be used to endorse or promote products derived from this acknowledgement: This product includes software developed by the University of California, software without specific prior written permission. Berkeley and its contributors. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 4 Neither the name of the University nor the names of its contributors may be used to endorse or IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED promote products derived from this software without specific prior written permission. WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY POSSIBILITY OF SUCH DAMAGE. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Copyright 1996 Matt Thomas All rights reserved. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS Redistribution and use in source and binary forms, with or without modification, are permitted SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (c) 1996 Mark Brinicombe All rights reserved. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by John Polstra. distribution. 4 The name of the author may not be used to endorse or promote products derived from this 3 All advertising materials mentioning features or use of this software must display the following software without specific prior written permission. acknowledgement: This product includes software developed by Mark Brinicombe for the NetBSD THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR Project. IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 4 The name of the author may not be used to endorse or promote products derived from this WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE software without specific prior written permission ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,

22 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, POSSIBILITY OF SUCH DAMAGE. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES Copyright (c) 1982, 1986, 1991, 1993, 1994 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR The Regents of the University of California. All rights reserved. SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) (c) UNIX System Laboratories, Inc. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, All or some portions of this file are derived from material licensed to the University of California STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE herein with the permission of UNIX System Laboratories, Inc. POSSIBILITY OF SUCH DAMAGE. Redistribution and use in source and binary forms, with or without modification, are permitted Copyright (c) 1999 The NetBSD Foundation, Inc. All rights reserved. provided that the following conditions are met: This code is derived from software contributed to The NetBSD Foundation by Dan Winship. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Redistribution and use in source and binary forms, with or without modification, are permitted the following disclaimer. provided that the following conditions are met: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and the following disclaimer in the documentation and/or other materials provided with the the following disclaimer. distribution. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions 3 All advertising materials mentioning features or use of this software must display the following and the following disclaimer in the documentation and/or other materials provided with the acknowledgement: This product includes software developed by the University of California, distribution. Berkeley and its contributors. 3 All advertising materials mentioning features or use of this software must display the following 4 Neither the name of the University nor the names of its contributors may be used to endorse or acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and promote products derived from this software without specific prior written permission. its contributors. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE endorse or promote products derived from this software without specific prior written permission. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, Copyright (c) 2001 Ross Harvey All rights reserved. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (C) 2001 Martin J. Laubach All rights reserved. the following disclaimer. Redistribution and use in source and binary forms, with or without modification, are permitted 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions provided that the following conditions are met: and the following disclaimer in the documentation and/or other materials provided with the 1 Redistributions of source code must retain the above copyright notice, this list of conditions and distribution. the following disclaimer. 3 All advertising materials mentioning features or use of this software must display the following 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions acknowledgement: This product includes software developed by the NetBSD Foundation, Inc. and and the following disclaimer in the documentation and/or other materials provided with the its contributors. distribution. 4 Neither the name of The NetBSD Foundation nor the names of its contributors may be used to 3 The name of the author may not be used to endorse or promote products derived from this endorse or promote products derived from this software without specific prior written permission. software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN POSSIBILITY OF SUCH DAMAGE. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This C header file is part of the SoftFloat IEC/IEEE Floating-point Copyright (C) 1998 Tsubai Masanari All rights reserved. Arithmetic Package, Release 2a. Redistribution and use in source and binary forms, with or without modification, are permitted Written by John R. Hauser. This work was made possible in part by the International Computer provided that the following conditions are met: Science Institute, located at Suite 600, 1947 Center Street, 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Berkeley, California 94704. Funding was partially provided by the National Science Foundation the following disclaimer. under grant MIP-9311980. The original version of this code was written as part of a project to build 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions a fixed-point vector processor in collaboration with the University of California at Berkeley, and the following disclaimer in the documentation and/or other materials provided with the overseen by Profs. distribution. Nelson Morgan and John Wawrzynek. More information is available through the Web page 3 The name of the author may not be used to endorse or promote products derived from this `http://HTTP.CS.Berkeley.EDU/~jhauser/arithmetic/SoftFloat.html'. software without specific prior written permission. THIS SOFTWARE IS DISTRIBUTED AS IS, FOR FREE. Although reasonable effort has been THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR made to avoid it, THIS SOFTWARE MAY CONTAIN FAULTS THAT WILL AT TIMES IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED RESULT IN INCORRECT BEHAVIOR. USE OF THIS SOFTWARE IS RESTRICTED TO WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE PERSONS AND ORGANIZATIONS WHO CAN AND WILL TAKE FULL RESPONSIBILITY ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, FOR ANY AND ALL LOSSES, COSTS, OR OTHER PROBLEMS ARISING FROM ITS USE. INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES Derivative works are acceptable, even for commercial purposes, so long as (1) they include (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR prominent notice that the work is derivative, and (2) they include prominent notice akin to these SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) four paragraphs for those parts of this code that are retained. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, Copyright (c) 1997 Jason R. Thorpe. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN Copyright (c) 1995 Christopher G. Demetriou All rights reserved. ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE Redistribution and use in source and binary forms, with or without modification, are permitted POSSIBILITY OF SUCH DAMAGE. provided that the following conditions are met: Copyright (C) 1995-1997, 1999 Wolfgang Solfrank. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Copyright (C) 1995-1997, 1999 TooLs GmbH. the following disclaimer. All rights reserved. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Redistribution and use in source and binary forms, with or without modification, are permitted and the following disclaimer in the documentation and/or other materials provided with the provided that the following conditions are met: distribution. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and 3 All advertising materials mentioning features or use of this software must display the following the following disclaimer. acknowledgement: 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions This product includes software developed for the NetBSD Project. See http://www.netbsd.org/ for and the following disclaimer in the documentation and/or other materials provided with the information about NetBSD. distribution. 4 The name of the author may not be used to endorse or promote products derived from this 3 All advertising materials mentioning features or use of this software must display the following software without specific prior written permission. acknowledgement: This product includes software developed by TooLs GmbH. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 4 The name of TooLs GmbH may not be used to endorse or promote products derived from this IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED software without specific prior written permission. WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THIS SOFTWARE IS PROVIDED BY TOOLS GMBH ``AS IS'' AND ANY EXPRESS OR ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR ARE DISCLAIMED. IN NO EVENT SHALL TOOLS GMBH BE LIABLE FOR ANY DIRECT, SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

23 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTIUORS BE STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT POSSIBILITY OF SUCH DAMAGE. OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR Copyright (c) 1988, 1993 BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, The Regents of the University of California. All rights reserved. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE Redistribution and use in source and binary forms, with or without modification, are permitted OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN provided that the following conditions are met: IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 1 Redistributions of source code must retain the above copyright notice, this list of conditions and Followings are license languages of certain parts of library files in "Newlib" (which is a C library) the following disclaimer. which are incorporated in certain models of Sony camcorder products. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Copyright (c) 1990 The Regents of the University of California. All rights reserved. and the following disclaimer in the documentation and/or other materials provided with the Redistribution and use in source and binary forms are permitted provided that the above copyright distribution. notice and this paragraph are duplicated in all such forms and that any documentation, and other 3 All advertising materials mentioning features or use of this software must display the following materials related to such distribution and use acknowledge that the software was developed by the acknowledgement: This product includes software developed by the University of California, University of California, Berkeley. The name of the University may not be used to endorse or Berkeley and its contributors. promote products derived from this software without specific prior written permission. 4 Neither the name of the University nor the names of its contributors may be used to endorse or THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED promote products derived from this software without specific prior written permission. WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Libcurl EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR CCOPYRIGHT AND PERMISSION NOTICE PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING Copyright (c) 1996 - 2011, Daniel Stenberg, . NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. All rights reserved. Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted Permission to use, copy, modify, and distribute this software for any purpose with or without fee is provided that the following conditions are met: hereby granted, provided that the above copyright notice and this permission notice appear in all 1 Redistributions of source code must retain the above copyright notice, this list of conditions and copies. the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, and the following disclaimer in the documentation and/or other materials provided with the EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF distribution. MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 3 Neither the name of the project nor the names of its contributors may be used to endorse or NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS promote products derived from this software without specific prior written permission. OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR DEALINGS IN THE SOFTWARE. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR Except as contained in this notice, the name of a copyright holder shall not be used in advertising CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT or otherwise to promote the sale, use or other dealings in this Software without prior written OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR authorization of the copyright holder. BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN Fcgi IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1982, 1986, 1989, 1993 This FastCGI application library source and object code (the "Software") and its documentation The Regents of the University of California. All rights reserved. (the "Documentation") are copyrighted by Open Market, Inc ("Open Market"). The following (c) UNIX System Laboratories, Inc. terms All or some portions of this file are derived from material licensed to the University of California apply to all files associated with the Software and Documentation unless explicitly disclaimed in by American Telephone and Telegraph Co. or Unix System Laboratories, Inc. and are reproduced individual files. herein with the permission of UNIX System Laboratories, Inc. Redistribution and use in source and binary forms, with or without modification, are permitted Open Market permits you to use, copy, modify, distribute, and license this Software and the provided that the following conditions are met: Documentation for any purpose, provided that existing copyright notices are retained in all copies 1 Redistributions of source code must retain the above copyright notice, this list of conditions and and that this notice is included verbatim in any distributions. No written agreement, license, or the following disclaimer. royalty fee is required for any of the authorized uses. Modifications to this Software and 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions Documentation may be copyrighted by their authors and need not follow the licensing terms and the following disclaimer in the documentation and/or other materials provided with the described here. If modifications to this Software and Documentation have new licensing terms, the distribution. new terms must be clearly indicated on the first page of each file where they apply. 3 All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, OPEN MARKET MAKES NO EXPRESS OR IMPLIED WARRANTY WITH RESPECT TO Berkeley and its contributors. THE SOFTWARE OR THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION ANY 4 Neither the name of the University nor the names of its contributors may be used to endorse or WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN promote products derived from this software without specific prior written permission. NO EVENT SHALL OPEN MARKET BE LIABLE TO YOU OR ANY THIRD PARTY FOR THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY DAMAGES ARISING FROM OR RELATING TO THIS SOFTWARE OR THE ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE DOCUMENTATION, INCLUDING, WITHOUT LIMITATION, ANY INDIRECT, SPECIAL OR IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR CONSEQUENTIAL DAMAGES OR SIMILAR DAMAGES, INCLUDING LOST PROFITS OR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR LOST DATA, EVEN IF OPEN MARKET HAS BEEN ADVISED OF THE POSSIBILITY OF CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, SUCH DAMAGES. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS". EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, OPEN MARKET HAS NO LIABILITY IN CONTRACT, TORT, NEGLIGENCE OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR OTHERWISE ARISING OUT OF THIS SOFTWARE OR THE DOCUMENTATION. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Freetype Copyright (c) 1992, 1993 The Regents of the University of California. All rights reserved. The FreeType Project LICENSE This software was developed by the Computer Systems Engineering group at Lawrence Berkeley ------Laboratory under DARPA contract BG 91-66 and contributed to Berkeley. All advertising materials mentioning features or use of this software must display the following 2006-Jan-27 acknowledgement: This product includes software developed by the University of California, Lawrence Berkeley Copyright 1996-2002, 2006 by Laboratory. David Turner, Robert Wilhelm, and Werner Lemberg Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Introduction 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions ======and the following disclaimer in the documentation and/or other materials provided with the distribution. The FreeType Project is distributed in several archive packages; 3 Neither the name of the University nor the names of its contributors may be used to endorse or some of them may contain, in addition to the FreeType font engine, various tools and promote products derived from this software without specific prior written permission. contributions which rely on, or relate to, the FreeType Project. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

24 This license applies to all files found in such packages, and which do not fall under their own As you have not signed this license, you are not required to accept it. However, as the FreeType explicit license. The license affects thus the FreeType font engine, the test programs, Project is copyrighted material, only this license, or another one contracted with the authors, documentation and makefiles, at the very least. grants you the right to use, distribute, and modify it. Therefore, by using, distributing, or modifying the FreeType Project, you indicate that you This license was inspired by the BSD, Artistic, and IJG (Independent JPEG Group) licenses, understand and accept all the terms of this license. which all encourage inclusion and use of free software in commercial and freeware products alike. 4. Contacts As a consequence, its main points are that: ------

o We don't promise that this software works. However, we will be interested in any kind of bug There are two mailing lists related to FreeType: reports. (`as is' distribution) o [email protected] o You can use this software for whatever you want, in parts or full form, without having to pay us. (`royalty-free' usage) Discusses general use and applications of FreeType, as well as future and wanted additions to the library and distribution. o You may not pretend that you wrote this software. If you use it, or only parts of it, in a program, If you are looking for support, start in this list if you haven't found anything to help you in the you must acknowledge somewhere in your documentation that you have used the FreeType documentation. code. (`credits') o [email protected] We specifically permit and encourage the inclusion of this software, with or without modifications, in commercial products. Discusses bugs, as well as engine internals, design issues, specific licenses, porting, etc. We disclaim all warranties covering The FreeType Project and assume no liability related to The FreeType Project. Our home page can be found at

http://www.freetype.org Finally, many people asked us for a preferred form for a credit/disclaimer to use in compliance with this license. We thus encourage you to use the following text:

""" The FreeType 2 font engine is copyrighted work and cannot be used legally without a software Portions of this software are copyright ? The FreeType Project (www.freetype.org). license. In order to make this project usable to a vast majority of developers, we distribute it under All rights reserved. two mutually exclusive open-source licenses. """ This means that *you* must choose *one* of the two licenses described below, then obey all its Please replace with the value from the FreeType version you actually use. terms and conditions when using FreeType 2 in any of your projects or products.

- The FreeType License, found in the file `FTL.TXT', which is similar to the original BSD Legal Terms license *with* an advertising clause that forces you to explicitly cite the FreeType project in your ======product's documentation. All details are in the license file. This license is suited to products which don't use the GNU General Public License. 0. Definitions ------Note that this license is compatible to the GNU General Public License version 3, but not version 2. Throughout this license, the terms `package', `FreeType Project', and `FreeType archive' refer to the set of files originally distributed by the authors (David Turner, Robert Wilhelm, and Werner - The GNU General Public License version 2, found in `GPLv2.TXT' (any later version can be Lemberg) as the `FreeType Project', be they named as alpha, beta or final release. used also), for programs which already use the GPL. Note that the FTL is incompatible with GPLv2 due to its advertisement clause. `You' refers to the licensee, or person using the project, where `using' is a generic term including compiling the project's source code as well as linking it to form a `program' or `executable'. The contributed BDF and PCF drivers come with a license similar to that of the X Window System. This program is referred to as `a program using the FreeType engine'. It is compatible to the above two licenses (see file src/bdf/README and src/pcf/README).

This license applies to all files distributed in the original FreeType Project, including all source The gzip module uses the zlib license (see src/gzip/zlib.h) which too is compatible to the above two code, binaries and documentation, unless otherwise stated in the file in its original, unmodified licenses. form as distributed in the original archive. If you are unsure whether or not a particular file is covered by this license, you must contact us to verify this. The FreeType Project is copyright (C) 1996-2000 by David Turner, Robert Wilhelm, and Werner Glibc Lemberg. All rights reserved except as specified below. This file contains the copying permission notices for various files in the GNU C Library 1. No Warranty distribution that have copyright owners other than the Free Software Foundation. These notices all ------require that a copy of the notice be included in the accompanying documentation and be distributed with binary distributions of the code, so be sure to include this file along with any binary THE FREETYPE PROJECT IS PROVIDED `AS IS' WITHOUT WARRANTY OF ANY KIND, distributions derived from the GNU C Library. EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL ANY OF THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY DAMAGES CAUSED BY THE USE OR THE INABILITY TO USE, OF THE FREETYPE All code incorporated from 4.4 BSD is distributed under the following license: PROJECT. Copyright (C) 1991 Regents of the University of California. 2. Redistribution All rights reserved. ------Redistribution and use in source and binary forms, with or without modification, are permitted This license grants a worldwide, royalty-free, perpetual and irrevocable right and license to use, provided that the following conditions are met: execute, perform, compile, display, copy, create derivative works of, distribute and sublicense the FreeType Project (in both source and object code forms) and derivative works thereof for any 1. Redistributions of source code must retain the above copyright notice, this list of conditions and purpose; and to authorize others to exercise some or all of the rights granted herein, subject to the following disclaimer. the following conditions: 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the o Redistribution of source code must retain this license file (`FTL.TXT') unaltered; any distribution. additions, deletions or changes to the original files must be clearly indicated in accompanying 3. [This condition was removed.] documentation. The copyright notices of the unaltered, original files must be preserved in all 4. Neither the name of the University nor the names of its contributors may be used to endorse or copies of source files. promote products derived from this software without specific prior written permission.

o Redistribution in binary form must provide a disclaimer that states that the software is based THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND in part of the work of the FreeType Team, in the distribution documentation. We also encourage ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE you to put an URL to the FreeType web page in your documentation, though this isn't mandatory. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE These conditions apply to any software derived from or based on the FreeType Project, not just ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE the unmodified files. If you use our work, you must acknowledge us. However, no fee need be LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR paid to us. CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 3. Advertising BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, ------WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN Neither the FreeType authors and contributors nor you shall use the name of the other for IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. commercial, advertising, or promotional purposes without specific prior written permission.

We suggest, but do not require, that you use one or more of the following phrases to refer to this The DNS resolver code, taken from BIND 4.9.5, is copyrighted both by UC Berkeley and by software in your documentation or advertising materials: `FreeType Project', `FreeType Engine', Digital Equipment Corporation. The DEC portions are under the following license: `FreeType library', or `FreeType Distribution'.

25 Portions Copyright (C) 1993 by Digital Equipment Corporation. Copyright (c) 2000, Intel Corporation

Permission to use, copy, modify, and distribute this software for any purpose with or without fee is All rights reserved. hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity Redistribution and use in source and binary forms, with or without modification, are permitted pertaining to distribution of the document or software without specific, written prior permission. provided that the following conditions are met:

THE SOFTWARE IS PROVIDED ``AS IS'' AND DIGITAL EQUIPMENT CORP. * Redistributions of source code must retain the above copyright notice, this list of conditions and DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL the following disclaimer. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, * Redistributions in binary form must reproduce the above copyright notice, this list of conditions INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER and the following disclaimer in the documentation and/or other materials provided with the RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF distribution. CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. * The name of Intel Corporation may not be used to endorse or promote products derived from this software without specific prior written permission.

The Sun RPC support (from rpcsrc-4.0) is covered by the following THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS license: "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR Copyright (C) 1984, Sun Microsystems, Inc. A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, this legend is included on all tape media and as a part of the software program in whole or part. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY it to anyone else except as part of a product or program developed by the user. OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. The files inet/getnameinfo.c and sysdeps//getaddrinfo.c are copyright Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, (C) by Craig Metz and are distributed under the following license: Inc. to assist in its use, correction, modification or enhancement. /* The Inner Net License, Version 2.00 SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC The author(s) grant permission for redistribution and use in source and binary forms, with or OR ANY PART THEREOF. without modification, of the software and documentation provided that the following conditions are met: In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the possibility of such 0. If you receive a version of the software that is specifically labelled as not being for damages. redistribution (check the version message and/or README), you are not permitted to redistribute that version of the software in any way or form. 1. All terms of the all other applicable copyrights and licenses must be followed. 2. Redistributions of source code must retain the authors' copyright notice(s), this list of The following CMU license covers some of the support code for Mach, derived from Mach 3.0: conditions, and the following disclaimer. 3. Redistributions in binary form must reproduce the authors' copyright notice(s), this list of Mach Operating System conditions, and the following disclaimer in the documentation and/or other materials provided Copyright (C) 1991,1990,1989 Carnegie Mellon University with the distribution. All Rights Reserved. 4. [The copyright holder has authorized the removal of this clause.] 5. Neither the name(s) of the author(s) nor the names of its contributors may be used to endorse Permission to use, copy, modify and distribute this software and its documentation is hereby or promote products derived from this software without specific prior written permission. granted, provided that both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions, and any portions thereof, and that both notices THIS SOFTWARE IS PROVIDED BY ITS AUTHORS AND CONTRIBUTORS ``AS IS'' AND appear in supporting documentation. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS ``AS IS'' IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, Carnegie Mellon requests users of this software to return to PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED Software Distribution Coordinator AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, School of Computer Science OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF Carnegie Mellon University THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH Pittsburgh PA 15213-3890 DAMAGE. or [email protected] any improvements or extensions that they make and If these license terms cause you a real problem, contact the author. */ grant Carnegie Mellon the rights to redistribute these changes.

Libjpeg The file if_ppp.h is under the following CMU license: The Independent JPEG Group's JPEG software Redistribution and use in source and binary forms, with or without modification, are permitted ======provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and README for release 8c of 16-Jan-2011 the following disclaimer. ======2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the This distribution contains the eighth public release of the Independent JPEG Group's free JPEG distribution. software. You are welcome to redistribute this software and to use it for any purpose, subject to the 3. Neither the name of the University nor the names of its contributors may be used to endorse or conditions under LEGAL ISSUES, below. promote products derived from this software without specific prior written permission. This software is the work of Tom Lane, Guido Vollbeding, Philip Gladstone, Bill Allombert, Jim THIS SOFTWARE IS PROVIDED BY CARNEGIE MELLON UNIVERSITY AND Boucher, Lee Crocker, Bob Friesenhahn, Ben Jackson, Julian Minguillon, Luis Ortiz, George CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, Phillips, Davide Rossi, Ge' Weijers, and other members of the Independent JPEG Group. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IJG is not affiliated with the official ISO JPEG standards committee. IN NO EVENT SHALL THE UNIVERSITY OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE DOCUMENTATION ROADMAP GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS ======INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE This file contains the following sections: OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. OVERVIEW General description of JPEG and the IJG software. LEGAL ISSUES Copyright, lack of warranty, terms of distribution. REFERENCES Where to learn more about JPEG. The following license covers the files from Intel's "Highly Optimized Mathematical Functions for ARCHIVE LOCATIONS Where to find newer versions of this software. Itanium" collection: ACKNOWLEDGMENTS Special thanks. FILE FORMAT WARS Software *not* to get. Intel License Agreement TO DO Plans for future IJG releases.

26 Other documentation files in the distribution are: We specifically permit and encourage the use of this software as the basis of commercial products, provided that all warranty or liability claims are assumed by the product vendor. User documentation: install.txt How to configure and install the IJG software. usage.txt Usage instructions for cjpeg, djpeg, jpegtran, rdjpgcom, and wrjpgcom. ansi2knr.c is included in this distribution by permission of L. Peter Deutsch, sole proprietor of its *.1 Unix-style man pages for programs (same info as usage.txt). copyright holder, Aladdin Enterprises of Menlo Park, CA. wizard.txt Advanced usage instructions for JPEG wizards only. ansi2knr.c is NOT covered by the above copyright and conditions, but instead by the usual change.log Version-to-version change highlights. distribution terms of the Free Software Foundation; principally, that you must include source code Programmer and internal documentation: if you redistribute it. (See the file ansi2knr.c for full details.) However, since ansi2knr.c is not libjpeg.txt How to use the JPEG library in your own programs. needed as part of any program generated from the IJG code, this does not limit you more than the example.c Sample code for calling the JPEG library. foregoing paragraphs do. structure.txt Overview of the JPEG library's internal structure. filelist.txt Road map of IJG files. The Unix configuration script "configure" was produced with GNU Autoconf. coderules.txt Coding style rules --- please read if you contribute code. It is copyright by the Free Software Foundation but is freely distributable. The same holds for its supporting scripts (config.guess, config.sub, ltmain.sh). Another support Please read at least the files install.txt and usage.txt. Some information can also be found in the script, install-sh, is copyright by X Consortium but is also freely distributable. JPEG FAQ (Frequently Asked Questions) article. See ARCHIVE LOCATIONS below to find out where to obtain the FAQ article. The IJG distribution formerly included code to read and write GIF files. To avoid entanglement with the Unisys LZW patent, GIF reading support has been removed If you want to understand how the JPEG code works, we suggest reading one or more of the altogether, and the GIF writer has been simplified to produce "uncompressed GIFs". This REFERENCES, then looking at the documentation files (in roughly the order listed) before diving technique does not use the LZW algorithm; the resulting GIF files are larger than usual, but are into the code. readable by all standard GIF decoders.

We are required to state that OVERVIEW "The Graphics Interchange Format(c) is the Copyright property of CompuServe Incorporated. ======GIF(sm) is a Service Mark property of CompuServe Incorporated."

This package contains C software to implement JPEG image encoding, decoding, and transcoding. JPEG (pronounced "jay-peg") is a standardized compression method for full-color and gray-scale REFERENCES images. ======

This software implements JPEG baseline, extended-sequential, and progressive compression We recommend reading one or more of these references before trying to understand the innards of processes. Provision is made for supporting all variants of these processes, although some the JPEG software. uncommon parameter settings aren't implemented yet. We have made no provision for supporting the hierarchical or lossless processes defined in the The best short technical introduction to the JPEG compression algorithm is Wallace, Gregory K. standard. "The JPEG Still Picture Compression Standard", Communications of the ACM, April 1991 (vol. 34 no. 4), pp. 30-44. We provide a set of library routines for reading and writing JPEG image files, plus two sample (Adjacent articles in that issue discuss MPEG motion picture compression, applications of JPEG, applications "cjpeg" and "djpeg", which use the library to perform conversion between JPEG and and related topics.) If you don't have the CACM issue handy, a PostScript file containing a revised some other popular image file formats. version of Wallace's article is available at http://www.ijg.org/files/wallace.ps.gz. The file (actually The library is intended to be reused in other applications. a preprint for an article that appeared in IEEE Trans. Consumer Electronics) omits the sample images that appeared in CACM, but it includes corrections and some added material. Note: the In order to support file conversion and viewing software, we have included considerable Wallace article is copyright ACM and IEEE, and it may not be used for commercial purposes. functionality beyond the bare JPEG coding/decoding capability; for example, the color quantization modules are not strictly part of JPEG decoding, but they are A somewhat less technical, more leisurely introduction to JPEG can be found in "The Data essential for output to colormapped file formats or colormapped displays. These extra functions Compression Book" by Mark Nelson and Jean-loup Gailly, published by M&T Books (New York), can be compiled out of the library if not required for a particular application. 2nd ed. 1996, ISBN 1-55851-434-1. This book provides good explanations and example C code for a multitude of compression methods including JPEG. It is an excellent source if you are We have also included "jpegtran", a utility for lossless transcoding between different JPEG comfortable reading C code but don't know much about data compression in general. The book's processes, and "rdjpgcom" and "wrjpgcom", two simple applications for inserting and extracting JPEG sample code is far from industrial-strength, but when you are ready to look at a full textual comments in JFIF files. implementation, you've got one here...

The emphasis in designing this software has been on achieving portability and flexibility, while The best currently available description of JPEG is the textbook "JPEG Still Image Data also making it fast enough to be useful. In particular, the software is not intended to be read as a Compression Standard" by William B. Pennebaker and Joan L. tutorial on JPEG. (See the REFERENCES section for introductory material.) Rather, it is intended Mitchell, published by Van Nostrand Reinhold, 1993, ISBN 0-442-01272-1. to be reliable, portable, industrial-strength code. We do not claim to have achieved that goal in Price US$59.95, 638 pp. The book includes the complete text of the ISO JPEG standards (DIS every aspect of the software, but we strive for it. 10918-1 and draft DIS 10918-2). Although this is by far the most detailed and comprehensive exposition of JPEG publicly available, We welcome the use of this software as a component of commercial products. we point out that it is still missing an explanation of the most essential properties and algorithms No royalty is required, but we do ask for an acknowledgement in product documentation, as of the underlying DCT technology. described under LEGAL ISSUES. If you think that you know about DCT-based JPEG after reading this book, then you are in delusion. The real fundamentals and corresponding potential of DCT-based JPEG are not publicly known so far, and that is the reason for all the mistaken developments taking place in the image LEGAL ISSUES coding domain. ======The original JPEG standard is divided into two parts, Part 1 being the actual specification, while In plain English: Part 2 covers compliance testing methods. Part 1 is titled "Digital Compression and Coding of Continuous-tone Still Images, Part 1: Requirements and guidelines" and has document numbers 1. We don't promise that this software works. (But if you find any bugs, please let us know!) ISO/IEC IS 10918-1, ITU-T T.81. Part 2 is titled "Digital Compression and Coding of Continuous- 2. You can use this software for whatever you want. You don't have to pay us. tone Still Images, Part 2: Compliance testing" and has document numbers ISO/IEC IS 10918-2, 3. You may not pretend that you wrote this software. If you use it in a program, you must ITU-T T.83. acknowledge somewhere in your documentation that you've used the IJG code. IJG JPEG 8 introduces an implementation of the JPEG SmartScale extension which is specified in a contributed document at ITU and ISO with title "ITU-T JPEG-Plus Proposal for Extending ITU- In legalese: T T.81 for Advanced Image Coding", April 2006, Geneva, Switzerland. The latest version of the document is Revision 3. The authors make NO WARRANTY or representation, either express or implied, with respect to this software, its quality, accuracy, merchantability, or fitness for a particular purpose. This The JPEG standard does not specify all details of an interchangeable file format. For the omitted software is provided "AS IS", and you, its user, assume the entire risk as to its quality and accuracy. details we follow the "JFIF" conventions, revision 1.02. JFIF 1.02 has been adopted as an Ecma International Technical Report and thus received a formal publication status. It is available as a free This software is copyright (C) 1991-2011, Thomas G. Lane, Guido Vollbeding. download in PDF format from All Rights Reserved except as specified below. http://www.ecma-international.org/publications/techreports/E-TR-098.htm. A PostScript version of the JFIF document is available at Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) http://www.ijg.org/files/jfif.ps.gz. There is also a plain text version at for any purpose, without fee, subject to these conditions: http://www.ijg.org/files/jfif.txt.gz, but it is missing the figures. (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and any additions, deletions, or The TIFF 6.0 file format specification can be obtained by FTP from changes to the original files must be clearly indicated in accompanying documentation. ftp://ftp.sgi.com/graphics/tiff/TIFF6.ps.gz. The JPEG incorporation scheme found in the TIFF 6.0 (2) If only executable code is distributed, then the accompanying documentation must state that spec of 3-June-92 has a number of serious problems. "this software is based in part on the work of the Independent JPEG Group". IJG does not recommend use of the TIFF 6.0 design (TIFF Compression tag 6). (3) Permission for use of this software is granted only if the user accepts full responsibility for any Instead, we recommend the JPEG design proposed by TIFF Technical Note #2 (Compression tag undesirable consequences; the authors accept NO LIABILITY for damages of any kind. 7). Copies of this Note can be obtained from http://www.ijg.org/files/. It is expected that the next revision of the TIFF spec will replace the 6.0 JPEG design with the Note's design. These conditions apply to any software derived from or based on the IJG code, not just to the Although IJG's own code does not support TIFF/JPEG, the free libtiff library uses our library to unmodified library. If you use our work, you ought to acknowledge us. implement TIFF/JPEG per the Note.

Permission is NOT granted for the use of any IJG author's name or company name in advertising or publicity relating to this software or products derived from it. This software may be referred to only as "the Independent JPEG Group's software".

27 ARCHIVE LOCATIONS There is no warranty against interference with your enjoyment of the library or against ======infringement. There is no warranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is provided with all faults, and the entire risk of satisfactory quality, The "official" archive site for this software is www.ijg.org. performance, accuracy, and effort is with the user. The most recent released version can always be found there in directory "files". This particular version will be archived as libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are http://www.ijg.org/files/jpegsrc.v8c.tar.gz, and in Windows-compatible "zip" archive format as Copyright (c) 1998-2000 Glenn Randers-Pehrson, are derived from http://www.ijg.org/files/jpegsr8c.zip. libpng-0.96, and are distributed according to the same disclaimer and license as libpng-0.96, with the following individuals added to the list The JPEG FAQ (Frequently Asked Questions) article is a source of some general information about of Contributing Authors: JPEG. It is available on the World Wide Web at http://www.faqs.org/faqs/jpeg-faq/ and other Tom Lane news.answers archive sites, including the official news.answers archive at rtfm.mit.edu: ftp:// Glenn Randers-Pehrson rtfm.mit.edu/pub/usenet/news.answers/jpeg-faq/. Willem van Schaik If you don't have Web or FTP access, send e-mail to [email protected] with body send usenet/news.answers/jpeg-faq/part1 libpng versions 0.89, June 1996, through 0.96, May 1997, are send usenet/news.answers/jpeg-faq/part2 Copyright (c) 1996-1997 Andreas Dilger, are derived from libpng-0.88, and are distributed according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of ACKNOWLEDGMENTS Contributing Authors: ======John Bowler Thank to Juergen Bruder for providing me with a copy of the common DCT algorithm article, only Kevin Bracey to find out that I had come to the same result in a more direct and comprehensible way with a more Sam Bushell generative approach. Magnus Holmgren Greg Roelofs Thank to Istvan Sebestyen and Joan L. Mitchell for inviting me to the ITU JPEG (Study Group 16) Tom Tanner meeting in Geneva, Switzerland. libpng versions 0.5, May 1995, through 0.88, January 1996, are Thank to Thomas Wiegand and Gary Sullivan for inviting me to the Joint Video Team (MPEG & Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc. ITU) meeting in Geneva, Switzerland. For the purposes of this copyright and license, "Contributing Authors" Thank to John Korejwa and Massimo Ballerini for inviting me to fruitful consultations in Boston, is defined as the following set of individuals: MA and Milan, Italy. Andreas Dilger Thank to Hendrik Elstner, Roland Fassauer, Simone Zuck, Guenther Dave Martindale Maier-Gerber, Walter Stoeber, Fred Schmitz, and Norbert Braunagel Guy Eric Schalnat for corresponding business development. Paul Schmidt Tim Wegner Thank to Nico Zschach and Dirk Stelling of the technical support team at the Digital Images company in Halle for providing me with extra equipment for configuration tests. The PNG Reference Library is supplied "AS IS". The Contributing Authors and Group 42, Inc. disclaim all warranties, expressed or implied, including, without limitation, the warranties of Thank to Richard F. Lyon (then of Foveon Inc.) for fruitful communication about JPEG merchantability and of fitness for any purpose. The Contributing Authors and Group 42, Inc. configuration in Sigma Photo Pro software. assume no liability for direct, indirect, incidental, special, exemplary, or consequential damages, which may result from the use of the PNG Reference Library, even if advised of the possibility of Thank to Andrew Finkenstadt for hosting the ijg.org site. such damage.

Last but not least special thank to Thomas G. Lane for the original design and development of this Permission is hereby granted to use, copy, modify, and distribute this source code, or portions singular software package. hereof, for any purpose, without fee, subject to the following restrictions:

FILE FORMAT WARS 1. The origin of this source code must not be misrepresented. ======2. Altered versions must be plainly marked as such and must not be misrepresented as being the The ISO JPEG standards committee actually promotes different formats like "JPEG 2000" or original source. "JPEG XR" which are incompatible with original DCT-based JPEG and which are based on faulty technologies. IJG therefore does not and will not support such momentary mistakes (see 3. This Copyright notice may not be removed or altered from any source or altered source REFERENCES). distribution. We have little or no sympathy for the promotion of these formats. Indeed, one of the original reasons for developing this free software was to help force convergence on common, interoperable The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the format standards for JPEG files. use of this source code as a component to supporting the PNG file format in commercial products. Don't use an incompatible file format! If you use this source code in a product, acknowledgment is not required but would be appreciated. (In any case, our decoder will remain capable of reading existing JPEG image files indefinitely.) END OF COPYRIGHT NOTICE, DISCLAIMER, and LICENSE.

TO DO A "png_get_copyright" function is available, for convenient use in "about" boxes and the like: ===== printf("%s", png_get_copyright(NULL)); Version 8 is the first release of a new generation JPEG standard to overcome the limitations of the original JPEG specification. Also, the PNG logo (in PNG format, of course) is supplied in the files "pngbar.png" and More features are being prepared for coming releases... "pngbar.jpg (88x31) and "pngnow.png" (98x31).

Please send bug reports, offers of help, etc. to [email protected]. Libpng is OSI Certified Open Source Software. OSI Certified Open Source is a certification mark of the Open Source Initiative. OSI has not addressed the additional disclaimers inserted at version 1.0.7. Libpng Glenn Randers-Pehrson This copy of the libpng notices is provided for your convenience. In case of any discrepancy glennrp at users.sourceforge.net between this copy and the notices in the file png.h that is included in the libpng distribution, the December 17, 2015 latter shall prevail.

COPYRIGHT NOTICE, DISCLAIMER, and LICENSE: Lighttpd

If you modify libpng you may insert additional notices immediately following this sentence. Copyright (c) 2004, Jan Kneschke, incremental All rights reserved. This code is released under the libpng license. Redistribution and use in source and binary forms, with or without modification, are permitted libpng versions 1.0.7, July 1, 2000, through 1.4.19, December 17, 2015, are Copyright (c) 2000- provided that the following conditions are met: 2002, 2004, 2006-2015 Glenn Randers-Pehrson, are derived from libpng-1.0.6, and are distributed according to the same disclaimer and license as libpng-1.0.6 with the following individuals added - Redistributions of source code must retain the above copyright notice, this list of conditions and to the list of Contributing Authors: the following disclaimer.

Simon-Pierre Cadieux - Redistributions in binary form must reproduce the above copyright notice, this list of conditions Eric S. Raymond and the following disclaimer in the documentation and/or other materials provided with the Cosmin Truta distribution. Gilles Vollant - Neither the name of the 'incremental' nor the names of its contributors may be used to endorse and with the following additions to the disclaimer: or promote products derived from this software without specific prior written permission.

28 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT ======OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * This product includes cryptographic software written by Eric Young ([email protected]). LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * This product includes software written by Tim Hudson ([email protected]). DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT */ (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Original SSLeay License ------

Ncurses /* Copyright (C) 1995-1998 Eric Young ([email protected]) * All rights reserved. ------* -- Copyright (c) 1998-2004,2006 Free Software Foundation, Inc. -- * This package is an SSL implementation written by Eric Young ([email protected]). -- -- * The implementation was written so as to conform with Netscapes SSL. -- Permission is hereby granted, free of charge, to any person obtaining a copy of this -- * -- software and associated documentation files (the "Software"), to deal in the Software -- * This library is free for commercial and non-commercial use as long as the following conditions -- without restriction, including without limitation the rights to use, copy, modify, merge, -- * are aheared to. The following conditions apply to all code found in this distribution, -- publish, distribute, distribute with modifications, sublicense, and/or sell copies of -- * be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. -- the Software, and to permit persons to whom the Software is furnished to do so, subject -- * The SSL documentation included with this distribution is covered by the same copyright terms -- to the following conditions: -- * except that the holder is Tim Hudson ([email protected]). -- -- * -- The above copyright notice and this permission notice shall be included in all copies or -- * Copyright remains Eric Young's, and as such any Copyright notices in the code are not -- substantial portions of the Software. -- * to be removed. -- -- * If this package is used in a product, Eric Young should be given attribution as the author of -- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, -- * the parts of the library used. -- EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES -- * This can be in the form of a textual message at program startup or in documentation -- OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND -- * (online or textual) provided with the package. -- NONINFRINGEMENT. IN NO EVENT SHALL THE ABOVE COPYRIGHT -- * -- HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, -- * Redistribution and use in source and binary forms, with or without modification, are permitted -- WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING -- * provided that the following conditions are met: -- FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR -- * 1. Redistributions of source code must retain the copyright notice, this list of conditions -- OTHER DEALINGS IN THE SOFTWARE. -- * and the following disclaimer. -- -- * 2. Redistributions in binary form must reproduce the above copyright notice, this list of -- Except as contained in this notice, the name(s) of the above copyright holders shall not -- * conditions and the following disclaimer in the documentation and/or other materials -- be used in advertising or otherwise to promote the sale, use or other dealings in this -- * provided with the distribution. -- Software without prior written authorization. -- * 3. All advertising materials mentioning features or use of this software must display the ------* following acknowledgement: * "This product includes cryptographic software written by * Eric Young ([email protected])" Openssl * The word 'cryptographic' can be left out if the rouines from the library being used are * not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from the apps directory LICENSE ISSUES * (application code) you must include an acknowledgement: ======* "This product includes software written by Tim Hudson ([email protected])" * The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS and the original SSLeay license apply to the toolkit. * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR In case of any license issues related to OpenSSL * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR please contact [email protected]. * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT OpenSSL License * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF ------* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN /* * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR ======* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN * Copyright (c) 1998-2016 The OpenSSL Project. All rights reserved. * IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * * * Redistribution and use in source and binary forms, with or without modification, are * The licence and distribution terms for any publically available version or derivative of this * permitted provided that the following conditions are met: * code cannot be changed. i.e. this code cannot simply be copied and put under another * * distribution licence * 1. Redistributions of source code must retain the above copyright notice, this list of * [including the GNU Public Licence.] * conditions and the following disclaimer. */ * * 2. Redistributions in binary form must reproduce the above copyright notice, this list of * conditions and the following disclaimer in the documentation and/or other materials * provided with the distribution. Pcre * * 3. All advertising materials mentioning features or use of this software must display the PCRE LICENCE * following acknowledgment: ------* "This product includes software developed by the OpenSSL Project for use in the OpenSSL * Toolkit. (http://www.openssl.org/)" PCRE is a library of functions to support regular expressions whose syntax and semantics are as * close as possible to those of the Perl 5 language. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or * promote products derived from this software without prior written permission. Release 8 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The * For written permission, please contact documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as * [email protected]. the software itself. * * 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" The basic library functions are written in C and are freestanding. Also included in the distribution * appear in their names without prior written permission of the OpenSSL Project. is a set of C++ wrapper functions. * * 6. Redistributions of any form whatsoever must retain the following acknowledgment: THE BASIC LIBRARY FUNCTIONS * "This product includes software developed by the OpenSSL Project for use in the ------* OpenSSL Toolkit (http://www.openssl.org/)" * Written by: Philip Hazel * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY Email local part: ph10 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE Email domain: cam.ac.uk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL University of Cambridge Computing Service, * PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, Cambridge, England. * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR Copyright (c) 1997-2010 University of Cambridge * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) All rights reserved. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR

29 THE C++ WRAPPER FUNCTIONS The reason we have a separate public license for some libraries is that they blur the distinction we ------usually make between modifying or adding to a program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is Contributed by: Google Inc. analogous to running a utility program or application program. However, in a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the Copyright (c) 2007-2010, Google Inc. ordinary General Public License treats it as such. All rights reserved. Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing, because most developers did not use the libraries. We THE "BSD" LICENCE concluded that weaker conditions might promote sharing better. ------However, unrestricted linking of non-free programs would deprive the users of those programs of Redistribution and use in source and binary forms, with or without modification, are permitted all benefit from the free status of the libraries themselves. This Library General Public License is provided that the following conditions are met: intended to permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs to change the free libraries that are incorporated in them. (We * Redistributions of source code must retain the above copyright notice, this list of conditions and have not seen how to achieve this as regards changes in header files, but we have achieved it as the following disclaimer. regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the The precise terms and conditions for copying, distribution and modification follow. Pay close distribution. attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the * Neither the name of the University of Cambridge nor the name of Google Inc. nor the names of library. their contributors may be used to endorse or promote products derived from this software without specific prior written permission. Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT GNU LIBRARY GENERAL PUBLIC LICENSE LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 0. This License Agreement applies to any software library which contains a notice placed by the SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT copyright holder or other authorized party saying it may be distributed under the terms of this LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, Library General Public License (also called "this License"). Each licensee is addressed as "you". DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT A "library" means a collection of software functions and/or data prepared so as to be conveniently (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE linked with application programs (which use some of those functions and data) to form OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. executables.

End The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with Pcre modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any Copyright (C) 1991 Free Software Foundation, Inc. associated interface definition files, plus the scripts used to control compilation and installation of 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA the library. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output [This is the first released version of the library GPL. It is numbered 2 because it goes with version from such a program is covered only if its contents constitute a work based on the Library 2 of the ordinary GPL.] (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. Preamble 1. You may copy and distribute verbatim copies of the Library's complete source code as you The licenses for most software are designed to take away your freedom to share and change it. By receive it, in any medium, provided that you conspicuously and appropriately publish on each copy contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to change free software--to make sure the software is free for all its users. this License and to the absence of any warranty; and distribute a copy of this License along with the Library. This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it. You can You may charge a fee for the physical act of transferring a copy, and you may at your option offer use it for your libraries, too. warranty protection in exchange for a fee.

When we speak of free software, we are referring to freedom, not price. Our General Public 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work Licenses are designed to make sure that you have the freedom to distribute copies of free software based on the Library, and copy and distribute such modifications or work under the terms of (and charge for this service if you wish), that you receive source code or can get it if you want it, Section 1 above, provided that you also meet all of these conditions: that you can change the software or use pieces of it in new free programs; and that you know you can do these things. a) The modified work must itself be a software library.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or b) You must cause the files modified to carry prominent notices stating that you changed the files to ask you to surrender the rights. and the date of any change. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the d) If a facility in the modified Library refers to a function or a table of data to be supplied by an source code. If you link a program with the library, you must provide complete object files to the application program that uses the facility, other than as an argument passed when the facility is recipients so that they can relink them with the library, after making changes to the library and invoked, then you must make a good faith effort to ensure that, in the event an application does recompiling it. And you must show them these terms so they know their rights. not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library. (For example, a function in a library to compute square roots has a purpose that is entirely well- defined independent of the application. Therefore, Subsection 2d requires that any application- Also, for each distributor's protection, we want to make certain that everyone understands that there supplied function or table used by this function must be optional: if the application does not is no warranty for this free library. If the library is modified by someone else and passed on, we supply it, the square root function must still compute square roots.) want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations. These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in Finally, any free program is threatened constantly by software patents. We wish to avoid the danger themselves, then this License, and its terms, do not apply to those sections when you distribute that companies distributing free software will individually obtain patent licenses, thus in effect them as separate works. But when you distribute the same sections as part of a whole which is a transforming the program into proprietary software. To prevent this, we have made it clear that any work based on the Library, the distribution of the whole must be on the terms of this License, whose patent must be licensed for everyone's free use or not licensed at all. permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely License, applies to certain designated libraries. This license is quite different from the ordinary by you; rather, the intent is to exercise the right to control the distribution of derivative or collective one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary works based on the Library. license.

30 In addition, mere aggregation of another work not based on the Library with the Library (or with a) Accompany the combined library with a copy of the same work based on the Library, a work based on the Library) on a volume of a storage or distribution medium does not bring the uncombined with any other library facilities. This must be distributed under the terms of the other work under the scope of this License. Sections above.

3. You may opt to apply the terms of the ordinary GNU General Public License instead of this b) Give prominent notice with the combined library of the fact that part of it is a work based on License to a given copy of the Library. To do this, you must alter all the notices that refer to this the Library, and explaining where to find the accompanying uncombined form of the same work. License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly appeared, then you can specify that version instead if you wish.) Do not make any other change in provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or these notices. distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU their licenses terminated so long as such parties remain in full compliance. General Public License applies to all subsequent copies and derivative works made from that copy. 9. You are not required to accept this License, since you have not signed it. However, nothing else This option is useful when you wish to copy part of the code of the Library into a program that is grants you permission to modify or distribute the Library or its derivative works. These actions are not a library. prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in and all its terms and conditions for copying, distributing or modifying the Library or works based object code or executable form under the terms of Sections 1 and 2 above provided that you on it. accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software 10. Each time you redistribute the Library (or any work based on the Library), the recipient interchange. automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on If distribution of object code is made by offering access to copy from a designated place, then the recipients' exercise of the rights granted herein. offering equivalent access to copy the source code from the same place satisfies the requirement to You are not responsible for enforcing compliance by third parties to this License. distribute the source code, even though third parties are not compelled to copy the source along with the object code. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, 5. A program that contains no derivative of any portion of the Library, but is designed to work agreement or otherwise) that contradict the conditions of this License, they do not excuse you from with the Library by being compiled or linked with it, is called a "work that uses the Library". Such the conditions of this License. If you cannot distribute so as to satisfy simultaneously your a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of obligations under this License and any other pertinent obligations, then as a consequence you may this License. not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then However, linking a "work that uses the Library" with the Library creates an executable that is a the only way you could satisfy both it and this License would be to refrain entirely from distribution derivative of the Library (because it contains portions of the Library), rather than a "work that uses of the Library. the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other When a "work that uses the Library" uses material from a header file that is part of the Library, circumstances. the object code for the work may be a derivative work of the Library even though the source code is not. It is not the purpose of this section to induce you to infringe any patents or other property right Whether this is true is especially significant if the work can be linked without the Library, or if the claims or to contest validity of any such claims; this section has the sole purpose of protecting the work is itself a library. The threshold for this to be true is not precisely defined by law. integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through If such an object file uses only numerical parameters, data structure layouts and accessors, and that system in reliance on consistent application of that system; it is up to the author/donor to small macros and small inline functions (ten lines or less in length), then the use of the object file decide if he or she is willing to distribute software through any other system and a licensee cannot is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this impose that choice. object code plus portions of the Library will still fall under Section 6.) This section is intended to make thoroughly clear what is believed to be a consequence of the rest Otherwise, if the work is a derivative of the Library, you may distribute the object code for the of this License. work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked 12. If the distribution and/or use of the Library is restricted in certain countries either by patents directly with the Library itself. or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that 6. As an exception to the Sections above, you may also compile or link a "work that uses the distribution is permitted only in or among countries not thus excluded. In such case, this License Library" with the Library to produce a work containing portions of the Library, and distribute that incorporates the limitation as if written in the body of this License. work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. 13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time to time. You must give prominent notice with each copy of the work that the Library is used in it and that Such new versions will be similar in spirit to the present version, but may differ in detail to address the Library and its use are covered by this License. You must supply a copy of this License. If the new problems or concerns. work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you Each version is given a distinguishing version number. If the Library specifies a version number of must do one of these things: this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software a) Accompany the work with the complete corresponding machine-readable source code for the Foundation. If the Library does not specify a license version number, you may choose any version Library including whatever changes were used in the work (which must be distributed under ever published by the Free Software Foundation. Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so 14. If you wish to incorporate parts of the Library into other free programs whose distribution that the user can modify the Library and then relink to produce a modified executable containing conditions are incompatible with these, write to the author to ask for permission. For software the modified Library. (It is understood that the user who changes the contents of definitions files which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we in the Library will not necessarily be able to recompile the application to use the modified sometimes make exceptions for this. Our decision will be guided by the two goals of preserving definitions.) the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. b) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing NO WARRANTY this distribution. 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO c) If distribution of the work is made by offering access to copy from a designated place, offer WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. equivalent access to copy the above specified materials from the same place. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/ OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY d) Verify that the user has already received a copy of these materials or that you have already KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE sent this user a copy. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE For an executable, the required form of the "work that uses the Library" must include any data LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME and utility programs needed for reproducing the executable from it. However, as a special THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN operating system on which the executable runs, unless that component itself accompanies the WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY executable. MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR It may happen that this requirement contradicts the license restrictions of other proprietary CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE libraries that do not normally accompany the operating system. Such a contradiction means you LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING cannot use both them and the Library together in an executable that you distribute. RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF 7. You may place library facilities that are a work based on the Library side-by-side in a single SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH library together with other library facilities not covered by this License, and distribute such a DAMAGES. combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:

31 END OF TERMS AND CONDITIONS It supports both 4.3BSD-style sockets and System V.4-style TLI. Praise yourself lucky if you don't How to Apply These Terms to Your New Libraries know what that means.

If you develop a new library, and you want it to be of the greatest possible use to the public, we The package provides tiny daemon wrapper programs that can be installed without any changes to recommend making it free software that everyone can redistribute and change. You can do so by existing software or to existing configuration files. The wrappers report the name of the client host permitting redistribution under these terms (or, alternatively, under the terms of the ordinary and of the requested service; the wrappers do not exchange information with the client or server General Public License). applications, and impose no overhead on the actual conversation between the client and server applications. To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should Optional features are: access control to restrict what systems can connect to what network have at least the "copyright" line and a pointer to where the full notice is found. daemons; client user name lookups with the RFC 931 etc. protocol; additional protection against hosts that pretend to have someone elses host name; additional protection against hosts that pretend to have someone elses host address. Copyright (C) The programs are very portable. Build procedures are provided for many common (and not so This library is free software; you can redistribute it and/or modify it under the terms of the GNU common) environments, and guidelines are provided in case your environment is not among them. Library General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Requirements are that network daemons are spawned by a super server such as the inetd; a 4.3BSD- style socket programming interface and/or System V.4-style TLI programming interface; and the This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; availability of a syslog(3) library and of a syslogd(8) daemon. The wrappers should run without without even the implied warranty of MERCHANTABILITY or FITNESS FOR A modification on any system that satisfies these requirements. PARTICULAR PURPOSE. See the GNU Library General Public License for more details. Workarounds have been implemented for several common bugs in systems software.

You should have received a copy of the GNU Library General Public License along with this What to do if this is your first encounter with the wrapper programs: library; if not, write to the Free Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 1) read the tutorial sections for an introduction to the relevant concepts and terminology; 02111-1307 USA 2) glance over the security feature sections in this document; 3) follow the installation instructions (easy or advanced). I recommend that you first use the default Also add information on how to contact you by electronic and paper mail. security feature settings. Run the wrappers for a few days to become familiar with their logs, before doing anything drastic such as cutting off access or installing booby traps. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names: 2 - Disclaimer ------Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. The wrapper programs rely on source address information obtained from network packets. This information is provided by the client host. It is not 100 percent reliable, although the wrappers do , 1 April 1990 their best to expose forgeries. Ty Coon, President of Vice In the absence of cryptographic protection of message contents, and of cryptographic That's all there is to it! authentication of message originators, all data from the network should be treated with sound scepticism.

Tcp-wrapper THIS RESTRICTION IS BY NO MEANS SPECIFIC TO THE TCP/IP PROTOCOLS.

@(#) README 1.30 97/03/21 19:27:21 3 - Tutorials ------This is the 7.6 version of the TCP/IP daemon wrapper package. The tutorial sections give a gentle introduction to the operation of the wrapper programs, and Thank you for using this program. If you like it, send me a postcard. introduce some of the terminology that is used in the remainder of the document: client, server, the My postal address is at the bottom of this file. inetd and syslogd daemons, and their configuration files.

Read the BLURB file for a brief summary of what is new. The CHANGES file gives a complete 3.1 - How it works account of differences with respect to previous releases. ------

Announcements of new releases of this software are posted to Usenet (comp.security.unix, Almost every application of the TCP/IP protocols is based on a client-server model. For example, comp.unix.admin), to the cert-tools mailing list, and to a dedicated mailing list. You can subscribe when a user invokes the telnet command to connect to one of your systems, a telnet server process to the dedicated mailing list by sending an email message to [email protected] is executed on the target host. The telnet server process connects the user to a login process. A few with in the body (not subject): subscribe tcp-wrappers-announce. examples of client and server programs are shown in the table below:

Table of contents client server application ------telnet telnetd remote login 1 - Introduction ftp ftpd file transfer 2 - Disclaimer finger fingerd show users 3 - Tutorials 3.1 - How it works The usual approach is to run one single daemon process that waits for all kinds of incoming 3.2 - Where the logging information goes network connections. Whenever a connection is established, this daemon (usually called inetd) 4 - Features runs the appropriate server program and goes back to sleep, waiting for other connections. 4.1 - Access control 4.2 - Host name spoofing The wrapper programs rely on a simple, but powerful mechanism. Instead of directly running the 4.3 - Host address spoofing desired server program, the inetd is tricked into running a small wrapper program. The wrapper 4.4 - Client username lookups logs the client host name or address and performs some additional checks. When all is well, the 4.5 - Language extensions wrapper executes the desired server program and goes away. 4.6 - Multiple ftp/gopher/www archives on one host 4.7 - Banner messages The wrapper programs have no interaction with the client user (or with the client process). Nor do 4.8 - Sequence number guessing the wrappers interact with the server application. This has two major advantages: 1) the wrappers 5 - Other works are application-independent, so that the same program can protect many kinds of network services; 5.1 - Related documents 2) no interaction also means that the wrappers are invisible from outside (at least for authorized 5.2 - Related software users). 6 - Limitations 6.1 - Known wrapper limitations Another important property is that the wrapper programs are active only when the initial contact 6.2 - Known system software bugs between client and server is established. Once a wrapper has done its work there is no overhead on 7 - Configuration and installation the client-server conversation. 7.1 - Easy configuration and installation 7.2 - Advanced configuration and installation The simple mechanism has one major drawback: the wrappers go away after the initial contact 7.3 - Daemons with arbitrary path names between client and server processes, so the wrappers are of little use with network daemons that 7.4 - Building and testing the access control rules service more than one client. The wrappers would only see the first client attempt to contact such 7.5 - Other applications a server. The NFS mount daemon is a typical example of a daemon that services requests from 8 - Acknowledgements multiple clients. See the section on related software for ways to deal with such server programs.

1 - Introduction There are two ways to use the wrapper programs: ------1) The easy way: move network daemons to some other directory and fill the resulting holes with With this package you can monitor and filter incoming requests for the SYSTAT, FINGER, FTP, copies of the wrapper programs. This approach involves no changes to system configuration TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other network services. files, so there is very little risk of breaking things.

2) The advanced way: leave the network daemons alone and modify the inetd configuration file. For example, an entry such as:

tftp dgram udp wait root /usr/etc/tcpd in.tftpd -s /tftpboot

32 When a tftp request arrives, inetd will run the wrapper program (tcpd) with a process name The wrapper programs verify the client host name that is returned by the address->name DNS `in.tftpd'. This is the name that the wrapper will use when logging the request and when server, by asking for a second opinion. To this end, the programs look at the name and addresses scanning the optional access control tables. `in.tftpd' is also the name of the server program that that are returned by the name->address DNS server, which may be an entirely different host. the wrapper will attempt to run when all is well. Any arguments (`-s /tftpboot' in this particular example) are transparently passed on to the server program. If any name or address discrepancies are found, or if the second DNS opinion is not available, the wrappers assume that one of the two name servers is lying, and assume that the client host pretends For an account of the history of the wrapper programs, with real-life examples, see the section to have someone elses host name. below on related documents. When compiled with -DPARANOID, the wrappers will always attempt to look up and double 3.2 - Where the logging information goes check the client host name, and will always refuse service in case of a host name/address ------discrepancy. This is a reasonable policy for most systems.

The wrapper programs send their logging information to the syslog daemon (syslogd). The When compiled without -DPARANOID, the wrappers by default still perform hostname lookup. disposition of the wrapper logs is determined by the syslog configuration file (usually /etc/ You can match hosts with a name/address discrepancy with the PARANOID wildcard and decide syslog.conf). Messages are written to files, to the console, or are forwarded to a @loghost. Some whether or not to grant service. syslogd versions can even forward messages down a |pipeline. Automatic hostname verification is enabled by default. Automatic hostname lookups and Older syslog implementations (still found on Ultrix systems) only support priority levels ranging verification can be turned off by editing the Makefile. The configuration and installation section from 9 (debug-level messages) to 0 (alerts). All logging information of the specified priority level below describes the Makefile editing process. or more urgent is written to the same destination. In the syslog.conf file, priority levels are specified in numerical form. For example, 4.3 - Host address spoofing ------8/usr/spool/mqueue/syslog While host name spoofing can be found out by asking a second opinion, it is much harder to find causes all messages with priority 8 (informational messages), and anything that is more urgent, to out that a host claims to have someone elses network address. And since host names are deduced be appended to the file from network addresses, address spoofing is at least as effective as name spoofing. /usr/spool/mqueue/syslog. The wrapper programs can give additional protection against hosts that claim to have an address Newer syslog implementations support message classes in addition to priority levels. Examples of that lies outside their own network. For example, some far-away host that claims to be a trusted message classes are: mail, daemon, auth and news. In the syslog.conf file, priority levels are host within your own network. Such things are possible even while the impersonated system is up specified with symbolic names: debug, info, notice, ..., emerg. For example, and running.

mail.debug /var/log/syslog This additional protection is not an invention of my own; it has been present for at least five years in the BSD rsh and rlogin daemons. causes all messages of class mail with priority debug (or more urgent) to be appended to the /var/ Unfortunately, that feature was added *after* 4.3 BSD came out, so that very few, if any, UNIX log/syslog file. vendors have adopted it. Our site, and many other ones, has been running these enhanced daemons By default, the wrapper logs go to the same place as the transaction logs of the sendmail daemon. for several years, and without any ill effects. The disposition can be changed by editing the Makefile and/or the syslog.conf file. Send a `kill - HUP' to the syslogd after changing its configuration file. Remember that syslogd, just like When the wrapper programs are compiled with -DKILL_IP_OPTIONS, the programs refuse to sendmail, insists on one or more TABs between the left-hand side and the right-hand side service TCP connections with IP source routing options. -DKILL_IP_OPTIONS is not needed on expressions in its configuration file. modern UNIX systems that can stop source-routed traffic in the kernel. Examples are 4.4BSD derivatives, Solaris 2.x, and Linux. See your system manuals for details. Solaris 2.x note: the syslog daemon depends on the m4 macro processor. The m4 program is installed as part of the software developer packages. If you are going to use this feature on SunOS 4.1.x you should apply patch 100804-03+ or 101790- something depending on your SunOS version. Trouble shooting note: when the syslogging does not work as expected, run the program by hand Otherwise you may experience "BAD TRAP" and "Data fault" panics when the getsockopt() (`syslogd -d') and see what really happens. system call is executed after a TCP RESET has been received. This is a kernel bug, it is not the fault of the wrappers. 4 - Features ------The feature is disabled by default. It can be turned on by editing the Makefile. The configuration and installation section below describes the Makefile editing process. 4.1 - Access control ------UDP services do not benefit from this additional protection. With UDP, all you can be certain of is the network packet's destination address. When compiled with -DHOSTS_ACCESS, the wrapper programs support a simple form of access control. Access can be controlled per host, per service, or combinations thereof. The software 4.4 - Client username lookups provides hooks for the execution of shell commands when an access control rule fires; this feature ------may be used to install "booby traps". For details, see the hosts_access.5 manual page, which is in `nroff -man' format. A later section describes how you can test your access control rules. The protocol proposed in RFC 931 provides a means to obtain the client user name from the client host. The requirement is that the client host runs an RFC 931-compliant daemon. The information Access control can also be used to connect clients to the "right" service. What is right may depend provided by such a daemon is not intended to be used for authentication purposes, but it can provide on the requested service, the origin of the request, and what host address the client connects to. additional information about the owner of a TCP connection. Examples: The RFC 931 protocol has diverged into different directions (IDENT, TAP, RFC 1413). To add to (1) A gopher or www database speaks native language when contacted from within the country, the confusion, they all use the same network port. The daemon wrappers implement a common otherwise it speaks English. subset of the protocols.

(2) A service provider offers different ftp, gopher or www services with different internet There are some limitations: the number of hosts that run an RFC 931 (or compatible) daemon is hostnames from one host (section 4.6). limited (but growing); client user name lookups do not work for datagram (UDP) services. More seriously, client user name lookups can cause noticeable delays with connections from non-UNIX Access control is enabled by default. It can be turned off by editing the Makefile, or by providing PCs. Recent PC software seem to have fixed this (for example NCSA telnet). The wrappers use a no access control tables. The install instructions below describe the Makefile editing process. 10-second timeout for RFC931 lookups, to accommodate slow networks and slow hosts.

The hosts_options.5 manual page (`nroff -man' format) documents an extended version of the By default, the wrappers will do username lookup only when the access control rules require them access control language. The extensions are disabled by default. See the section below on language to do so (via user@host client patterns, see the hosts_access.5 manual page) or when the username extensions. is needed for % expansions.

Later System V implementations provide the Transport Level Interface (TLI), a network You can configure the wrappers to always perform client username lookups, by editing the programming interface that performs functions similar to the Berkeley socket programming Makefile. The client username lookup timeout period (10 seconds default) can be changed by interface. Like Berkeley sockets, TLI was designed to cover multiple protocols, not just Internet. editing the Makefile. The installation sections below describe the Makefile editing process.

When the wrapper discovers that the TLI interface sits on top of a TCP/IP or UDP/IP conversation On System V with TLI-based network services, client username lookups will be possible only it uses this knowledge to provide the same functions as with traditional socket-based applications. when the underlying network protocol is TCP/IP. When some other protocol is used underneath TLI, the host address will be some universal magic cookie that may not even be usable for access control purposes. 4.5 - Language extensions ------4.2 - Host name spoofing ------The wrappers sport only a limited number of features. This is for a good reason: programs that run at high privilege levels must be easy to verify. And the smaller a program, the easier to verify. There With some network applications, such as RSH or RLOGIN, the client host name plays an important is, however, a provision to add features. role in the authentication process. Host name information can be reliable when lookups are done from a _local_ hosts table, provided that the client IP address can be trusted. The options.c module provides a framework for language extensions. Quite a few extensions have already been implemented; they are documented in the With _distributed_ name services, authentication schemes that rely on host names become more hosts_options.5 document, which is in `nroff -man' format. Examples: changing the severity level problematic. The security of your system now may depend on some far-away DNS (domain name at which a request for service is logged; "allow" and "deny" keywords; running a customized server server) outside your own control. instead of the standard one; many others.

33 The language extensions are not enabled by default because they introduce an incompatible change W.R. Cheswick, "An Evening with Berferd, In Which a Cracker is Lured, Endured, and to the access control language syntax. Instructions to enable the extensions are given in the Studied", Proceedings of the Winter USENIX Conference (San Francisco), January 1992. Makefile. research.att.com:/dist/internet_security/berferd.ps 4.6 - Multiple ftp/gopher/www archives on one host ------An updated version of the latter paper appeared in:

Imagine one host with multiple internet addresses. These addresses do not need to have the same W.R. Cheswick, S.M. Bellovin, "Firewalls and Internet Security", Addison-Wesley, 1994. internet hostname. Thus, it is possible to offer services with different internet hostnames from just one host. Discussions on internet firewalls are archived on ftp.greatcircle.com. Subscribe to the mailing list by sending a message to Service providers can use this to offer organizations a presence on the "net" with their own internet [email protected] hostname, even when those organizations aren't connected to the Internet at all. To the end user it makes no difference, because applications use internet hostnames. With in the body (not subject): subscribe firewalls.

There are several ways to assign multiple addresses to one machine. 5.2 - Related software The nice way is to take an existing network interface and to assign additional internet addresses ------with the `ifconfig' command. Examples: Network daemons etc. with enhanced logging capabilities can generate massive amounts of Solaris 2: ifconfig le0:1

netmask up information: our 150+ generate several hundred kbytes each day. egrep-based filters 4.4 BSD: ifconfig en0 alias
netmask can help to suppress some of the noise. A more powerful tool is the Swatch monitoring system by Stephen E. Hansen and E. Todd Atkins. Swatch can process log files in real time and can associate On other systems one has to increase the number of network interfaces: arbitrary actions with patterns; its applications are by no means restricted to security. Swatch is either with hardware interfaces, or with pseudo interfaces like SLIP or PPP. The interfaces do not available ftp.stanford.edu, directory /general/security-tools/swatch. need to be attached to anything. They just need to be up and to be assigned a suitable internet address and mask. Socks, described in the UNIX Security III proceedings, can be used to control network traffic from hosts on an internal network, through a firewall host, to the outer world. Socks consists of a daemon With the wrapper software, `daemon@host' access control patterns can be used to distinguish that is run on the firewall host, and of a library with routines that redirect application socket calls requests by the network address that they are aimed at. Judicious use of the `twist' option (see the through the firewall daemon. Socks is available from s1.gov in /pub/firewalls/socks.tar.Z. hosts_options.5 file, `nroff -man' format) can guide the requests to the right server. These can be servers that live in separate chroot areas, or servers modified to take additional context from the For a modified Socks version by Ying-Da Lee ([email protected]) try command line, or a combination. ftp.nec.com, directory /pub/security/socks.cstc.

Another way is to modify gopher or www listeners so that they bind to only one specific network Tcpr is a set of perl scripts by Paul Ziemba that enable you to run ftp and telnet commands across address. Multiple gopher or www servers can then be run side by side, each taking requests sent to a firewall. Unlike socks it can be used with unmodified client software. Available from its respective network address. ftp.alantec.com, /pub/tcpr.

4.7 - Banner messages The TIS firewall toolkit provides a multitude of tools to build your own internet firewall system. ------ftp.tis.com, directory /pub/firewalls.

Some sites are required to present an informational message to users before they attempt to login. Versions of rshd and rlogind, modified to report the client user name in addition to the client host Banner messages can also be useful when denying service: instead of simply dropping the name, are available for anonymous ftp (ftp.win.tue.nl:/pub/security/logdaemon-XX.tar.Z). These connection a polite explanation is given first. Finally, banners can be used to give your system a programs are drop-in replacements for SunOS 4.x, Ultrix 4.x, SunOS 5.x and HP-UX 9.x. This more personal touch. archive also contains ftpd/rexecd/login versions that support S/Key or SecureNet one-time passwords in addition to traditional UNIX reusable passwords. The wrapper software provides easy-to-use tools to generate pre-login banners for ftp, telnet, rlogin etc. from a single prototype banner textfile. Details on banners and on-the-fly % The securelib shared library by William LeFebvre can be used to control access to network expansions are given in the hosts_options.5 manual page (`nroff -man' format). An example is daemons that are not run under control of the inetd or that serve more than one client, such as the given in the file Banners.Makefile. NFS mount daemon that runs until the machine goes down. Available from eecs.nwu.edu, file /pub/ securelib.tar. In order to support banner messages the wrappers have to be built with language extensions enabled. See the section on language extensions. xinetd (posted to comp.sources.unix) is an inetd replacement that provides, among others, logging, username lookup and access control. 4.8 - Sequence number guessing However, it does not support the System V TLI services, and involves much more source code than ------the daemon wrapper programs. Available from ftp.uu.net, directory /usenet/comp.sources.unix.

Recently, systems came under attack from intruders that exploited a well-known weakness in TCP/ netlog from Texas A&M relies on the SunOS 4.x /dev/nit interface to passively watch all TCP and IP sequence number generators. This weakness allows intruders to impersonate trusted hosts. UDP network traffic on a network. The current version is on net.tamu.edu in /pub/security/TAMU. Break-ins have been reported via the rsh service. In fact, any network service can be exploited that trusts the client host name or address. Where shared libraries or router-based packet filtering are not an option, an alternative portmap daemon can help to prevent hackers from mounting your NFS file systems using the proxy RPC A long-term solution is to stop using network services that trust the client host name or address, facility. and to use data encryption instead. ftp.win.tue.nl:/pub/security/portmap-X.shar.Z was tested with SunOS 4.1.X Ultrix 3.0 and Ultrix 4.x, HP-UX 8.x and some version of AIX. The protection is less effective than that of the securelib A short-term solution, as outlined in in CERT advisory CA-95:01, is to configure network routers library because portmap is mostly a dictionary service. so that they discard datagrams from "outside" with an "inside" source address. This approach is most fruitful when you do not trust any hosts outside your local network. An rpcbind replacement (the Solaris 2.x moral equivalent of portmap) can be found on ftp.win.tue.nl in /pub/security. It prevents hackers from mounting your NFS file systems by using The IDENT (RFC931 etc.) client username lookup protocol can help to detect host impersonation the proxy RPC facility. attacks. Before accepting a client request, the wrappers can query the client's IDENT server and find out that the client never sent that request. Source for a portable RFC 931 (TAP, IDENT, RFC 1413) daemon by Peter Eriksson is available from ftp.lysator.liu.se:/pub/ident/servers. When the client host provides IDENT service, a negative IDENT lookup result (the client matches `UNKNOWN@host') is strong evidence of a host impersonation attack. Some TCP/IP implementations come without syslog library. Some come with the library but have no syslog daemon. A replacement can be found in ftp.win.tue.nl:/pub/security/surrogate- A positive IDENT lookup result (the client matches `KNOWN@host') is less trustworthy. It is syslog.tar.Z. The fakesyslog library that comes with the nntp sources reportedly works well, too. possible for an attacker to spoof both the client request and the IDENT lookup connection, although doing so should be much harder than spoofing just a client request. Another possibility is 6 - Limitations that the client's IDENT server is lying. ------

Client username lookups are described in more detail in a previous section. Pointers to IDENT 6.1 - Known wrapper limitations daemon software are described in the section on related software. ------

5 - Other works Many UDP (and rpc/udp) daemons linger around for a while after they have serviced a request, just ------in case another request comes in. In the inetd configuration file these daemons are registered with the `wait' option. Only the request that started such a daemon will be seen by the wrappers. Such 5.1 - Related documents daemons are better protected with the securelib shared library (see: Related software). ------The wrappers do not work with RPC services over TCP. These services are registered as rpc/tcp in The war story behind the tcp wrapper tools is described in: the inetd configuration file. The only non-trivial service that is affected by this limitation is rexd, which is used by the on(1) command. This is no great loss. On most systems, rexd is less secure W.Z. Venema, "TCP WRAPPER, network monitoring, access control and booby traps", UNIX than a wildcard in /etc/hosts.equiv. Security Symposium III Proceedings (Baltimore), September 1992. Some RPC requests (for example: rwall, rup, rusers) appear to come from the server host. What ftp.win.tue.nl:/pub/security/tcp_wrapper.ps.Z (postscript) happens is that the client broadcasts its request to all portmap daemons on its network; each ftp.win.tue.nl:/pub/security/tcp_wrapper.txt.Z (flat text) portmap daemon forwards the request to a daemon on its own system. As far as the rwall etc. daemons know, the request comes from the local host. The same cracker is also described in:

34 Portmap and RPC (e.g. NIS and NFS) (in)security is a topic in itself. Decide which services you want to monitor. Move the corresponding vendor-provided daemon See the section in this document on related software. programs to the location specified by the REAL_DAEMON_DIR constant in the Makefile, and fill the holes with copies of the tcpd program. That is, one copy of (or link to) the tcpd program for 6.2 - Known system software bugs each service that you want to monitor. For example, to monitor the use of your finger service: ------# mkdir REAL_DAEMON_DIR Workarounds have been implemented for several bugs in system software. # mv /usr/etc/in.fingerd REAL_DAEMON_DIR They are described in the Makefile. Unfortunately, some system software bugs cannot be worked # cp tcpd /usr/etc/in.fingerd around. The result is loss of functionality. The example applies to SunOS 4. With other UNIX implementations the network daemons live in IRIX has so many bugs that it has its own README.IRIX file. /usr/libexec, /usr/sbin or in /etc, or have no "in." prefix to their names, but you get the idea.

Older ConvexOS versions come with a broken recvfrom(2) implementation. File protections: the wrapper, all files used by the wrapper, and all directories in the path leading This makes it impossible for the daemon wrappers to look up the client host address (and hence, to those files, should be accessible but not writable for unprivileged users (mode 755 or mode 555). the name) in case of UDP requests. Do not install the wrapper set-uid. A patch is available for ConvexOS 10.1; later releases should be OK. Ultrix only: If you want to monitor the SYSTAT service, move the vendor-provided miscd daemon With early Solaris (SunOS 5) versions, the syslog daemon will leave behind zombie processes to the location specified by the REAL_DAEMON_DIR macro in the Makefile, and install the when writing to logged-in users. Workaround: increase the syslogd threshold for logging to users, miscd wrapper at the original miscd location. or reduce the wrapper's logging severity. In the absence of any access-control tables, the daemon wrappers will just maintain a record of On some systems, the optional RFC 931 etc. client username lookups may trigger a kernel bug. network connections made to your system. When a client host connects to your system, and the RFC 931 connection from your system to that client is rejected by a router, your kernel may drop all connections with that client. This is not a 7.2 - Advanced configuration and installation bug in the wrapper programs: complain to your vendor, and don't enable client user name lookups ------until the bug has been fixed. The advanced recipe leaves your daemon executables alone, but involves simple modifications to Reportedly, SunOS 4.1.1, Next 2.0a, ISC 3.0 with TCP 1.3, and AIX 3.2.2 and later are OK. the inetd configuration file.

Sony News/OS 4.51, HP-UX 8-something and Ultrix 4.3 still have the bug. Type `make' and follow the instructions. The Makefile comes with ready-to-use templates for many Reportedly, a fix for Ultrix is available (CXO-8919). common UNIX implementations (sun, ultrix, hp-ux, aix, irix, ...).

The following procedure can be used (from outside the tue.nl domain) to find out if your kernel has IRIX users should read the warnings in the README.IRIX file first. the bug. From the system under test, do: When the `make' succeeds the result is five executables (six in case of Ultrix). % ftp 131.155.70.19 You can use the `tcpdchk' program to identify the most common problems in your wrapper and This command attempts to make an ftp connection to our anonymous ftp server (ftp.win.tue.nl). inetd configuration files. When the connection has been established, run the following command from the same system With the `tcpdmatch' program you can examine how the wrapper would react to specific requests under test, while keeping the ftp connection open: for service.

% telnet 131.155.70.19 111 The `try-from' program tests the host and username lookup code. Run it from a remote shell command (`rsh host /some/where/try-from') and it should be able to figure out from what system Do not forget the `111' at the end of the command. This telnet command attempts to connect to our it is being called. portmap process. The telnet command should fail with: "host not reachable", or with a timeout error. If your ftp connection gets messed up, you have the bug. If the telnet command does not fail, The `safe_finger' command should be used when you implement a booby trap: it gives better please let me know a.s.a.p.! protection against nasty stuff that remote hosts may do in response to your finger probes.

For those who care, the bug is that the BSD kernel code was not careful enough with incoming The tcpd program can be used to monitor the telnet, finger, ftp, exec, rsh, rlogin, tftp, talk, comsat ICMP UNREACHABLE control messages (it ignored the local and remote port numbers, and and other tcp or udp services that have a one-to-one mapping onto executable files. therefore zapped *all* connections with the remote system). The bug is still present in the BSD NET/1 source release (1989) but apparently has been fixed in BSD NET/2 (1991). With System V.4-style systems, the tcpd program can also handle TLI services. When TCP/IP or UDP/IP is used underneath TLI, tcpd provides the same functions as with socket-based 7 - Configuration and installation applications. When some other protocol is used underneath TLI, functionality will be limited (no ------client username lookups, weird network address formats).

7.1 - Easy configuration and installation The tcpd program can also be used for services that are marked as rpc/udp in the inetd configuration ------file, but not for rpc/tcp services such as rexd. You probably do not want to run rexd anyway. On most systems it is even less secure than a wildcard in /etc/hosts.equiv. The "easy" recipe requires no changes to existing software or configuration files. Basically, you move the daemons that you want to protect to a different directory and plug the resulting holes with Install the tcpd command in a suitable place. Apollo UNIX users will want to install it under a copies of the wrapper programs. different name because the name "tcpd" is already taken; a suitable name would be "frontd".

If you don't run Ultrix, you won't need the miscd wrapper program. The miscd daemon implements File protections: the wrapper, all files used by the wrapper, and all directories in the path leading among others the SYSTAT service, which produces the same output as the WHO command. to those files, should be accessible but not writable for unprivileged users (mode 755 or mode 555). Do not install the wrapper set-uid. Type `make' and follow the instructions. The Makefile comes with ready-to-use templates for many common UNIX implementations (sun, ultrix, hp-ux, aix, irix,...). Then perform the following edits on the inetd configuration file (usually /etc/inetd.conf or /etc/inet/inetd.conf): IRIX has so many bugs that it has its own README.IRIX file. finger stream tcp nowait nobody /usr/etc/in.fingerd in.fingerd When the `make' succeeds the result is five executables (six in case of Ultrix). ^^^^^^^^^^^^^^^^^^^ becomes: You can use the `tcpdchk' program to identify the most common problems in your wrapper and inetd configuration files. finger stream tcp nowait nobody /usr/etc/tcpd in.fingerd ^^^^^^^^^^^^^ With the `tcpdmatch' program you can examine how the wrapper would react to specific requests Send a `kill -HUP' to the inetd process to make the change effective. for service. Some IRIX inetd implementations require that you first disable the finger service (comment out the finger service and `kill -HUP' the inetd) before you can turn on the modified version. Sending a The `safe_finger' command should be used when you implement booby traps: it gives better HUP twice seems to work just as well for IRIX 5.3, 6.0, 6.0.1 and 6.1. protection against nasty stuff that remote hosts may do in response to your finger probes. AIX note: you may have to execute the `inetimp' command after changing the inetd configuration The `try-from' program tests the host and username lookup code. Run it from a remote shell file. command (`rsh host /some/where/try-from') and it should be able to figure out from what system it is being called. The example applies to SunOS 4. With other UNIX implementations the network daemons live in /usr/libexec, /usr/sbin, or /etc, the network daemons have no "in." prefix to their names, or the The tcpd program can be used to monitor the telnet, finger, ftp, exec, rsh, rlogin, tftp, talk, comsat username field in the inetd configuration file may be missing. and other tcp or udp services that have a one-to-one mapping onto executable files. When the finger service works as expected you can perform similar changes for other network The tcpd program can also be used for services that are marked as rpc/udp in the inetd configuration services. Do not forget the `kill -HUP'. file, but not for rpc/tcp services such as rexd. You probably do not want to run rexd anyway. On most systems it is even less secure than a wildcard in /etc/hosts.equiv. The miscd daemon that comes with Ultrix implements several network services. It decides what to do by looking at its process name. One of the services is systat, which is a kind of limited finger With System V.4-style systems, the tcpd program can also handle TLI services. When TCP/IP or service. If you want to monitor the systat service, install the miscd wrapper in a suitable place and UDP/IP is used underneath TLI, tcpd provides the same functions as with socket-based update the inetd configuration file: applications. When some other protocol is used underneath TLI, functionality will be limited (no client username lookups, weird network address formats). systat stream tcp nowait /suitable/place/miscd systatd

35 Ultrix 4.3 allows you to specify a user id under which the daemon will be executed. This feature is The access control routines can easily be integrated with other programs. The hosts_access.3 not documented in the manual pages. Thus, the example would become: manual page (`nroff -man' format) describes the external interface of the libwrap.a library.

systat stream tcp nowait nobody /suitable/place/miscd systatd The tcpd program can even be used to control access to the mail service. This can be useful when you suspect that someone is trying out some obscure sendmail bug, or when a remote site is Older Ultrix systems still run all their network daemons as root. misconfigured and keeps hammering your mail daemon.

In the absence of any access-control tables, the daemon wrappers will just maintain a record of In that case, sendmail should not be run as a stand-alone network listener, but it should be registered network connections made to your system. in the inetd configuration file. For example: 7.3 - Daemons with arbitrary path names ------smtp stream tcp nowait root /usr/etc/tcpd /usr/lib/sendmail -bs

The above tcpd examples work fine with network daemons that live in a common directory, but You will still need to run one sendmail background process to handle queued-up outgoing mail. A sometimes that is not practical. Having soft links all over your file system is not a clean solution, command like: either. /usr/lib/sendmail -q15m Instead you can specify, in the inetd configuration file, an absolute path name for the daemon process name. For example, (no `-bd' flag) should take care of that. You cannot really prevent people from posting forged mail this way, because there are many unprotected smtp daemons on the network. ntalk dgram udp wait root /usr/etc/tcpd /usr/local/lib/ntalkd 8 - Acknowledgements When the daemon process name is an absolute path name, tcpd ignores the value of the ------REAL_DAEMON_DIR constant, and uses the last path component of the daemon process name for logging and for access control. Many people contributed to the evolution of the programs, by asking inspiring questions, by suggesting features or bugfixes, or by submitting source code. Nevertheless, all mistakes and bugs 7.4 - Building and testing the access control rules in the wrappers are my own. ------Thanks to Brendan Kehoe (cs.widener.edu), Heimir Sverrisson (hafro.is) and Dan Bernstein In order to support access control the wrappers must be compiled with the -DHOSTS_ACCESS (kramden.acf.nyu.edu) for feedback on an early release of this product. The host name/address option. The access control policy is given in the form of two tables (default: /etc/hosts.allow and / check was suggested by John Kimball (src.honeywell.com). Apollo's UNIX environment has some etc/hosts.deny). peculiar quirks: Willem-Jan Withagen (eb.ele.tue.nl), Pieter Schoenmakers (es.ele.tue.nl) and Access control is disabled when there are no access control tables, or when the tables are empty. Charles S. Fuller (wccs.psc.edu) provided assistance. Hal R. Brand (addvax.llnl.gov) told me how to get the client IP address in case of datagram-oriented services, and suggested the optional shell If you haven't used the wrappers before I recommend that you first run them a couple of days command feature. Shabbir Safdar (mentor.cc.purdue.edu) provided a first version of a much- without any access control restrictions. The logfile records should give you an idea of the process needed manual page. Granville Boman Goza, IV (sei.cmu.edu) suggested to use the client IP names and of the host names that you will have to build into your access control rules. address even when the host name is available. Casper H.S. Dik (fwi.uva.nl) provided additional insight into DNS spoofing techniques. The bogus daemon feature was inspired by code from The syntax of the access control rules is documented in the file hosts_access.5, which is in `nroff Andrew Macpherson (BNR Europe Ltd). Steve Bellovin (research.att.com) confirmed some of my -man' format. This is a lengthy document, and no-one expects you to read it right away from suspicions about the darker sides of TCP/IP insecurity. Risks of automated fingers were pointed beginning to end. Instead, after reading the introductory section, skip to the examples at the end so out by Borja Marcos (we.lc.ehu.es). Brad Plecs (jhuspo.ca.jhu.edu) was kind enough to try my that you get a general idea of the language. early TLI code and to work out how DG/UX differs from Solaris. Then you can appreciate the detailed reference sections near the beginning of the document. John P. Rouillard (cs.umb.edu) deserves special mention for his persistent, but constructive, The examples in the hosts_access.5 document (`nroff -man' format) show two specific types of nagging about wrong or missing things, and for trying out and discussing embryonic code or ideas. access control policy: 1) mostly closed (only permitting access from a limited number of systems) and 2) mostly open (permitting access from everyone except a limited number of trouble makers). Last but not least, Howard Chu (hanauma.jpl.nasa.gov), Darren Reed (coombs.anu.edu.au), Icarus You will have to choose what model suits your situation best. Sparry (gdr.bath.ac.uk), Scott Schwartz (cs.psu.edu), John A. Kunze (violet.berkeley.edu), Daniel Implementing a mixed policy should not be overly difficult either. Len Schales (engr.latech.edu), Chris Turbeville (cse.uta.edu), Paul Kranenburg (cs.few.eur.nl), Marc Boucher (cam.org), Dave Mitchell (dcs.shef.ac.uk), Andrew Maffei, Adrian van Bloois, Rop Optional extensions to the access control language are described in the hosts_options.5 document Gonggrijp, John C. Wingenbach, Everett F. Batey and many, many others provided fixes, code (`nroff -man' format). fragments, or ideas for improvements.

The `tcpdchk' program examines all rules in your access control files and reports any problems it Wietse Venema ([email protected]) can find. `tcpdchk -v' writes to standard output a pretty-printed list of all rules. `tcpdchk -d' Department of Mathematics and Computing Science examines the hosts.access and hosts.allow files in the current directory. This program is described Eindhoven University of Technology in the tcpdchk.8 document (`nroff -man' format). P.O. Box 513 5600 MB Eindhoven The `tcpdmatch' command can be used to try out your local access control files. The command The Netherlands syntax is: Currently visiting IBM T.J. Watson Research, Hawthorne NY, USA. tcpdmatch process_name hostname (e.g.: tcpdmatch in.tftpd localhost)

tcpdmatch process_name address (e.g.: tcpdmatch in.tftpd 127.0.0.1) Zlib

This way you can simulate what decisions will be made, and what actions will be taken, when hosts ZLIB DATA COMPRESSION LIBRARY connect to your own system. The program is described in the tcpdmatch.8 document (`nroff -man' format). zlib 1.2.3 is a general purpose data compression library. All the code is thread safe. The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files Note 1: `tcpdmatch -d' will look for hosts.{allow,deny} tables in the current working directory. This http://www.ietf.org/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) is useful for testing new rules without bothering your users. and rfc1952.txt (gzip format). These documents are also available in other formats from ftp:// ftp.uu.net/graphics/png/documents/zlib/zdoc-index.html Note 2: you cannot use the `tcpdmatch' command to simulate what happens when the local system connects to other hosts. All functions of the compression library are documented in the file zlib.h (volunteer to write man pages welcome, contact [email protected]). A usage example of the library is given in the file In order to find out what process name to use, just use the service and watch the process name that example.c which also tests that the library is working correctly. Another example is given in the shows up in the logfile. Alternatively, you can look up the name from the inetd configuration file. file minigzip.c. The compression library itself is composed of all source files except example.c and Coming back to the tftp example in the tutorial section above: minigzip.c.

tftp dgram udp wait root /usr/etc/tcpd in.tftpd -s /tftpboot To compile all files and run the test program, follow the instructions given at the top of Makefile. In short "make test; make install" should work for most machines. For Unix: "./configure; make This entry causes the inetd to run the wrapper program (tcpd) with a process name `in.tftpd'. This test; make install". For MSDOS, use one of the special makefiles such as Makefile.msc. For VMS, is the name that the wrapper will use when scanning the access control tables. Therefore, `in.tftpd' use make_vms.com. is the process name that should be given to the `tcpdmatch' command. On your system the actual inetd.conf entry may differ (tftpd instead of in.tftpd, and no `root' field), but you get the idea. Questions about zlib should be sent to , or to Gilles Vollant for the Windows DLL version. The zlib home page is http://www.zlib.org When you specify a host name, the `tcpdmatch' program will use both the host name and address. or http://www.gzip.org/zlib/ Before reporting a problem, please check this site to verify that you This way you can simulate the most common case where the wrappers know both the host address have the latest version of zlib; otherwise get the latest version and check whether the problem still and the host name. The `tcpdmatch' program will iterate over all addresses that it can find for the exists or not. given host name. PLEASE read the zlib FAQ http://www.gzip.org/zlib/zlib_faq.html before asking for help. When you specify a host address instead of a host name, the `tcpdmatch' program will pretend that the host name is unknown, so that you can simulate what happens when the wrapper is unable to Mark Nelson wrote an article about zlib for the Jan. 1997 look up the client host name. issue of Dr. Dobb's Journal; a copy of the article is available in http://dogma.net/markn/articles/zlibtool/zlibtool.htm 7.5 - Other applications ------The changes made in version 1.2.3 are documented in the file ChangeLog.

Unsupported third party contributions are provided in directory "contrib".

36 A Java implementation of zlib is available in the Java Development Kit http://java.sun.com/j2se/1.4.2/docs/api/java/util/zip/package-summary.html See the zlib home page http://www.zlib.org for details.

A Perl interface to zlib written by Paul Marquess is in the CPAN (Comprehensive Perl Archive Network) sites http://www.cpan.org/modules/by-module/Compress/

A Python interface to zlib written by A.M. Kuchling is available in Python 1.5 and later versions, see http://www.python.org/doc/lib/module-zlib.html

A zlib binding for TCL written by Andreas Kupries is availlable at http://www.oche.de/~akupries/soft/trf/trf_zip.html

An experimental package to read and write files in .zip format, written on top of zlib by Gilles Vollant , is available in the contrib/minizip directory of zlib.

Notes for some targets:

- For Windows DLL versions, please see win32/DLL_FAQ.txt

- For 64-bit Irix, deflate.c must be compiled without any optimization. With -O, one libpng test fails. The test works in 32 bit mode (with the -n32 compiler flag). The compiler bug has been reported to SGI.

- zlib doesn't work with gcc 2.6.3 on a DEC 3000/300LX under OSF/1 2.1 it works when compiled with cc.

- On Digital Unix 4.0D (formely OSF/1) on AlphaServer, the cc option -std1 is necessary to get gzprintf working correctly. This is done by configure.

- zlib doesn't work on HP-UX 9.05 with some versions of /bin/cc. It works with other compilers. Use "make test" to check your compiler.

- gzdopen is not supported on RISCOS, BEOS and by some Mac compilers.

- For PalmOs, see http://palmzlib.sourceforge.net/

- When building a shared, i.e. dynamic library on Mac OS X, the library must be installed before testing (do "make install" before "make test"), since the library location is specified in the library.

Acknowledgments:

The deflate format used by zlib was defined by Phil Katz. The deflate and zlib specifications were written by L. Peter Deutsch. Thanks to all the people who reported problems and suggested various improvements in zlib; they are too numerous to cite here.

Copyright notice:

(C) 1995-2004 Jean-loup Gailly and Mark Adler

This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution.

Jean-loup Gailly Mark Adler [email protected] [email protected]

If you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents to sign. The sources are provided for free but without warranty of any kind. The library has been entirely written by Jean-loup Gailly and Mark Adler; it does not include third-party code.

If you redistribute modified sources, we would appreciate that you include in the file ChangeLog history information documenting your changes. Please read the FAQ for more information on the distribution of modified source versions.

37 Sony Corporation