2N/A#pragma ident "%Z%%M% %I% %E% SMI"
2N/A Copyright 2003 Sun Microsystems, Inc. All rights reserved.
2N/A Use is subject to license terms.
2N/A Copyright (c) 2001 Carnegie Mellon University. All rights reserved.
2N/A Redistribution and use in source and binary forms, with or without
2N/A modification, are permitted provided that the following conditions
2N/A 1. Redistributions of source code must retain the above copyright
2N/A notice, this list of conditions and the following disclaimer.
2N/A 2. Redistributions in binary form must reproduce the above copyright
2N/A notice, this list of conditions and the following disclaimer in
2N/A the documentation
and/or other materials provided with the
2N/A 3. The name "Carnegie Mellon University" must not be used to
2N/A endorse or promote products derived from this software without
2N/A prior written permission. For permission or any other legal
2N/A details, please contact
2N/A Office of Technology Transfer
2N/A Carnegie Mellon University
2N/A Pittsburgh, PA 15213-3890
2N/A (412) 268-4387, fax: (412) 268-7395
2N/A tech-transfer@andrew.cmu.edu
2N/A 4. Redistributions of any form whatsoever must retain the following
2N/A "This product includes software developed by Computing Services
2N/A CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
2N/A THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
2N/A AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
2N/A FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
2N/A WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
2N/A AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
2N/A OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
2N/ACopyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
2N/ALicense to copy and use this software is granted provided that it
2N/Ais identified as the "RSA Data Security, Inc. MD5 Message-Digest
2N/AAlgorithm" in all material mentioning or referencing this software
2N/ALicense is also granted to make and use derivative works provided
2N/Athat such works are identified as "derived from the RSA Data
2N/ASecurity, Inc. MD5 Message-Digest Algorithm" in all material
2N/Amentioning or referencing the derived work.
2N/ARSA Data Security, Inc. makes no representations concerning either
2N/Athe merchantability of this software or the suitability of this
2N/Asoftware for any particular purpose. It is provided "as is"
2N/Awithout express or implied warranty of any kind.
2N/AThese notices must be retained in any copies of any part of this
2N/A This module contains code made available by IBM
2N/A Corporation on an AS IS basis. Any one receiving the
2N/A module is considered to be licensed under IBM copyrights
2N/A to use the IBM-provided source code in any way he or she
2N/A deems fit, including copying it, compiling it, modifying
2N/A it, and redistributing it, with or without
2N/A modifications. No license under any IBM patents or
2N/A patent applications is to be implied from this copyright
2N/A A user of the module should understand that IBM cannot
2N/A provide technical support for the module and will not be
2N/A responsible for any consequences of use of the program.
2N/A Any notices, including this one, are not to be removed
2N/A from the module without the prior written consent of