1 * Copyright (c) 1993, 1999 The Australian National University.
4 * Redistribution and use in source and binary forms are permitted
5 * provided that the above copyright notice and this paragraph are
6 * duplicated in all such forms and that any documentation,
7 * advertising materials, and other materials related to such
8 * distribution and use acknowledge that the software was developed
9 * by the Australian National University. The name of the University
10 * may not be used to endorse or promote products derived from this
11 * software without specific prior written permission.
12 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
13 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
14 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
16 * Copyright (c) 1994 The Australian National University.
17 * All rights reserved.
19 * Permission to use, copy, modify, and distribute this software and its
20 * documentation is hereby granted, provided that the above copyright
21 * notice appears in all copies. This software is provided without any
22 * warranty, express or implied. The Australian National University
23 * makes no representations about the suitability of this software for
26 * IN NO EVENT SHALL THE AUSTRALIAN NATIONAL UNIVERSITY BE LIABLE TO ANY
27 * PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
28 * ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF
29 * THE AUSTRALIAN NATIONAL UNIVERSITY HAVE BEEN ADVISED OF THE POSSIBILITY
32 * THE AUSTRALIAN NATIONAL UNIVERSITY SPECIFICALLY DISCLAIMS ANY WARRANTIES,
33 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
34 * AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
35 * ON AN "AS IS" BASIS, AND THE AUSTRALIAN NATIONAL UNIVERSITY HAS NO
36 * OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS,
39 * Copyright (c) 1989 Carnegie Mellon University.
40 * All rights reserved.
42 * Redistribution and use in source and binary forms are permitted
43 * provided that the above copyright notice and this paragraph are
44 * duplicated in all such forms and that any documentation,
45 * advertising materials, and other materials related to such
46 * distribution and use acknowledge that the software was developed
47 * by Carnegie Mellon University. The name of the
48 * University may not be used to endorse or promote products derived
49 * from this software without specific prior written permission.
50 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
51 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
52 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
54 * Copyright (c) 1995 Pedro Roque Marques
55 * All rights reserved.
57 * Redistribution and use in source and binary forms are permitted
58 * provided that the above copyright notice and this paragraph are
59 * duplicated in all such forms and that any documentation,
60 * advertising materials, and other materials related to such
61 * distribution and use acknowledge that the software was developed
62 * by Pedro Roque Marques. The name of the author may not be used to
63 * endorse or promote products derived from this software without
64 * specific prior written permission.
66 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
67 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
68 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
70 * Copyright (c) 1991 Gregory M. Christy.
71 * All rights reserved.
73 * Redistribution and use in source and binary forms are permitted
74 * provided that the above copyright notice and this paragraph are
75 * duplicated in all such forms and that any documentation,
76 * advertising materials, and other materials related to such
77 * distribution and use acknowledge that the software was developed
78 * by Gregory M. Christy. The name of the author may not be used to
79 * endorse or promote products derived from this software without
80 * specific prior written permission.
82 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
83 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
84 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
86 * Copyright (c) 1995 Eric Rosenquist, Strata Software Limited.
87 * http://www.strataware.com/
89 * All rights reserved.
91 * Redistribution and use in source and binary forms are permitted
92 * provided that the above copyright notice and this paragraph are
93 * duplicated in all such forms and that any documentation,
94 * advertising materials, and other materials related to such
95 * distribution and use acknowledge that the software was developed
96 * by Eric Rosenquist. The name of the author may not be used to
97 * endorse or promote products derived from this software without
98 * specific prior written permission.
100 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
101 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
102 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
104 ipv6cp.h - PPP IPV6 Control Protocol.
105 Copyright (C) 1999 Tommi Komulainen <Tommi.Komulainen@iki.fi>
107 Redistribution and use in source and binary forms are permitted
108 provided that the above copyright notice and this paragraph are
109 duplicated in all such forms. The name of the author may not be
110 used to endorse or promote products derived from this software
111 without specific prior written permission.
112 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
113 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
114 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
117 /* Original version, based on RFC2023 :
119 Copyright (c) 1995, 1996, 1997 Francis.Dupont@inria.fr, INRIA Rocquencourt,
120 Alain.Durand@imag.fr, IMAG,
121 Jean-Luc.Richier@imag.fr, IMAG-LSR.
123 Copyright (c) 1998, 1999 Francis.Dupont@inria.fr, GIE DYADE,
124 Alain.Durand@imag.fr, IMAG,
125 Jean-Luc.Richier@imag.fr, IMAG-LSR.
127 Ce travail a \351t\351 fait au sein du GIE DYADE (Groupement d'Int\351r\352t
128 \311conomique ayant pour membres BULL S.A. et l'INRIA).
130 Ce logiciel informatique est disponible aux conditions
131 usuelles dans la recherche, c'est-\340-dire qu'il peut
132 \352tre utilis\351, copi\351, modifi\351, distribu\351 \340 l'unique
133 condition que ce texte soit conserv\351 afin que
134 l'origine de ce logiciel soit reconnue.
136 Le nom de l'Institut National de Recherche en Informatique
137 et en Automatique (INRIA), de l'IMAG, ou d'une personne morale
138 ou physique ayant particip\351 \340 l'\351laboration de ce logiciel ne peut
139 \352tre utilis\351 sans son accord pr\351alable explicite.
141 Ce logiciel est fourni tel quel sans aucune garantie,
142 support ou responsabilit\351 d'aucune sorte.
143 Ce logiciel est d\351riv\351 de sources d'origine
144 "University of California at Berkeley" et
145 "Digital Equipment Corporation" couvertes par des copyrights.
147 L'Institut d'Informatique et de Math\351matiques Appliqu\351es de Grenoble (IMAG)
148 est une f\351d\351ration d'unit\351s mixtes de recherche du CNRS, de l'Institut
150 Polytechnique de Grenoble et de l'Universit\351 Joseph Fourier regroupant
151 sept laboratoires dont le laboratoire Logiciels, Syst\350mes, R\351seaux (LSR).
153 This work has been done in the context of GIE DYADE (joint R & D venture
154 between BULL S.A. and INRIA).
156 This software is available with usual "research" terms
157 with the aim of retain credits of the software.
158 Permission to use, copy, modify and distribute this software for any
159 purpose and without fee is hereby granted, provided that the above
160 copyright notice and this permission notice appear in all copies,
161 and the name of INRIA, IMAG, or any contributor not be used in advertising
162 or publicity pertaining to this material without the prior explicit
163 permission. The software is provided "as is" without any
164 warranties, support or liabilities of any kind.
165 This software is derived from source code from
166 "University of California at Berkeley" and
167 "Digital Equipment Corporation" protected by copyrights.
169 Grenoble's Institute of Computer Science and Applied Mathematics (IMAG)
170 is a federation of seven research units funded by the CNRS, National
171 Polytechnic Institute of Grenoble and University Joseph Fourier.
172 The research unit in Software, Systems, Networks (LSR) is member of IMAG.
175 * Copyright (c) 2000 Paul Mackerras.
176 * All rights reserved.
178 * Redistribution and use in source and binary forms are permitted
179 * provided that the above copyright notice and this paragraph are
180 * duplicated in all such forms. The name of the author may not be
181 * used to endorse or promote products derived from this software
182 * without specific prior written permission.
183 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
184 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
185 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
187 * The basic framework for this code came from the reference
188 * implementation for MD5. That implementation is Copyright (C)
189 * 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
191 * License to copy and use this software is granted provided that it
192 * is identified as the "RSA Data Security, Inc. MD5 Message-Digest
193 * Algorithm" in all material mentioning or referencing this software
196 * License is also granted to make and use derivative works provided
197 * that such works are identified as "derived from the RSA Data
198 * Security, Inc. MD5 Message-Digest Algorithm" in all material
199 * mentioning or referencing the derived work.
201 * RSA Data Security, Inc. makes no representations concerning either
202 * the merchantability of this software or the suitability of this
203 * software for any particular purpose. It is provided "as is"
204 * without express or implied warranty of any kind.
206 * These notices must be retained in any copies of any part of this
207 * documentation and/or software.
209 * NOTE: Cleaned-up and optimized, version of SHA1, based on the FIPS 180-1
210 * standard, available at http://www.itl.nist.gov/div897/pubs/fip180-1.htm
211 * Not as fast as one would like -- further optimizations are encouraged
214 Copyright (c) 1985, 1986 The Regents of the University of California.
217 This code is derived from software contributed to Berkeley by
218 James A. Woods, derived from original work by Spencer Thomas
221 Redistribution and use in source and binary forms, with or without
222 modification, are permitted provided that the following conditions
224 1. Redistributions of source code must retain the above copyright
225 notice, this list of conditions and the following disclaimer.
226 2. Redistributions in binary form must reproduce the above
227 copyright notice, this list of conditions and the following
228 disclaimer in the documentation and/or other materials provided
229 with the distribution.
230 3. All advertising materials mentioning features or use of this
231 software must display the following acknowledgement:
232 This product includes software developed by the University of
233 California, Berkeley and its contributors.
234 4. Neither the name of the University nor the names of its
235 contributors may be used to endorse or promote products derived
236 from this software without specific prior written permission.
238 THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS
239 IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
240 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
241 FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
242 REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
243 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
244 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
245 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
246 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
247 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
248 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
249 EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
251 Copyright (c) 1989 Regents of the University of California. All
254 Redistribution and use in source and binary forms are permitted
255 provided that the above copyright notice and this paragraph are
256 duplicated in all such forms and that any documentation,
257 advertising materials, and other materials related to such
258 distribution and use acknowledge that the software was developed
259 by the University of California, Berkeley. The name of the
260 University may not be used to endorse or promote products derived
261 from this software without specific prior written permission.
262 THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
263 IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
264 WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR