ReadMe.txt 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. THIRD PARTY LICENSE TERMS AND CONDITIONS, NOTICES AND INFORMATION
  2. The license agreement for this product refers you to this file for details concerning terms and conditions applicable to third party software code included in this product, and for certain notices and other information IBM must provide to you under its license to certain software code. The relevant terms and conditions, notices and other information are provided or referenced below. Please note that any non-English version of the licenses below is unofficial and is provided to you for your convenience only. The English version of the licenses below, provided as part of the English version of this file, is the official version.
  3. Notwithstanding the terms and conditions of any other agreement you may have with IBM or any of its related or affiliated entities (collectively "IBM"), the third party software code identified below are "Excluded Components" and are subject to the following terms and conditions:
  4. - the Excluded Components are provided on an "AS IS" basis;
  5. - IBM DISCLAIMS ANY AND ALL EXPRESS AND IMPLIED WARRANTIES AND CONDITIONS WITH RESPECT TO THE EXCLUDED COMPONENTS, INCLUDING, BUT NOT LIMITED TO, THE WARRANTY OF NON-INFRINGEMENT OR INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE;
  6. - IBM will not be liable to you or indemnify you for any claims related to the Excluded Components; and
  7. - IBM will not be liable for any direct, indirect, incidental, special, exemplary, punitive or consequential damages with respect to the Excluded Components.
  8. ========================================================================
  9. This optional PKCS#11 component of ICC is derived from
  10. the RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki).
  11. The headers required to use this API are available from www.rsa.com.
  12. ========================================================================
  13. /* License to copy and use this software is granted provided that it is
  14. * identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface
  15. * (Cryptoki)" in all material mentioning or referencing this software.
  16. * License is also granted to make and use derivative works provided that
  17. * such works are identified as "derived from the RSA Security Inc. PKCS #11
  18. * Cryptographic Token Interface (Cryptoki)" in all material mentioning or
  19. * referencing the derived work.
  20. * RSA Security Inc. makes no representations concerning either the
  21. * merchantability of this software or the suitability of this software for
  22. * any particular purpose. It is provided "as is" without express or implied
  23. * warranty of any kind.
  24. */
  25. ========================================================================
  26. zlib: The program contains an embedded, statically linked copy of zlib. See www.zlib.net.
  27. A copy of the zlib license is appended below.
  28. ========================= Start zlib ====================================
  29. Copyright notice:
  30. (C) 1995-2004 Jean-loup Gailly and Mark Adler
  31. This software is provided 'as-is', without any express or implied
  32. warranty. In no event will the authors be held liable for any damages
  33. arising from the use of this software.
  34. Permission is granted to anyone to use this software for any purpose,
  35. including commercial applications, and to alter it and redistribute it
  36. freely, subject to the following restrictions:
  37. 1. The origin of this software must not be misrepresented; you must not
  38. claim that you wrote the original software. If you use this software
  39. in a product, an acknowledgment in the product documentation would be
  40. appreciated but is not required.
  41. 2. Altered source versions must be plainly marked as such, and must not be
  42. misrepresented as being the original software.
  43. 3. This notice may not be removed or altered from any source distribution.
  44. Jean-loup Gailly Mark Adler
  45. jloup@gzip.org madler@alumni.caltech.edu
  46. ============================== END zlib =================================
  47. OpenSSL: The Program is accompanied by software currently developed by The OpenSSL Project (http://www.openssl.org/). IBM obtained the majority of the OpenSSL software under the terms and conditions of the following licenses:
  48. ============================= Start OpenSSL =============================
  49. LICENSE ISSUES
  50. ==============
  51. The OpenSSL toolkit stays under a double license, i.e. both the conditions of
  52. the OpenSSL License and the original SSLeay license apply to the toolkit.
  53. See below for the actual license texts.
  54. OpenSSL License
  55. ---------------
  56. /* ====================================================================
  57. * Copyright (c) 1998-2018 The OpenSSL Project. All rights reserved.
  58. *
  59. * Redistribution and use in source and binary forms, with or without
  60. * modification, are permitted provided that the following conditions
  61. * are met:
  62. *
  63. * 1. Redistributions of source code must retain the above copyright
  64. * notice, this list of conditions and the following disclaimer.
  65. *
  66. * 2. Redistributions in binary form must reproduce the above copyright
  67. * notice, this list of conditions and the following disclaimer in
  68. * the documentation and/or other materials provided with the
  69. * distribution.
  70. *
  71. * 3. All advertising materials mentioning features or use of this
  72. * software must display the following acknowledgment:
  73. * "This product includes software developed by the OpenSSL Project
  74. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  75. *
  76. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  77. * endorse or promote products derived from this software without
  78. * prior written permission. For written permission, please contact
  79. * openssl-core@openssl.org.
  80. *
  81. * 5. Products derived from this software may not be called "OpenSSL"
  82. * nor may "OpenSSL" appear in their names without prior written
  83. * permission of the OpenSSL Project.
  84. *
  85. * 6. Redistributions of any form whatsoever must retain the following
  86. * acknowledgment:
  87. * "This product includes software developed by the OpenSSL Project
  88. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  89. *
  90. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  91. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  92. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  93. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  94. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  95. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  96. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  97. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  98. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  99. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  100. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  101. * OF THE POSSIBILITY OF SUCH DAMAGE.
  102. * ====================================================================
  103. *
  104. * This product includes cryptographic software written by Eric Young
  105. * (eay@cryptsoft.com). This product includes software written by Tim
  106. * Hudson (tjh@cryptsoft.com).
  107. *
  108. */
  109. Original SSLeay License
  110. -----------------------
  111. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  112. * All rights reserved.
  113. *
  114. * This package is an SSL implementation written
  115. * by Eric Young (eay@cryptsoft.com).
  116. * The implementation was written so as to conform with Netscapes SSL.
  117. *
  118. * This library is free for commercial and non-commercial use as long as
  119. * the following conditions are aheared to. The following conditions
  120. * apply to all code found in this distribution, be it the RC4, RSA,
  121. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  122. * included with this distribution is covered by the same copyright terms
  123. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  124. *
  125. * Copyright remains Eric Young's, and as such any Copyright notices in
  126. * the code are not to be removed.
  127. * If this package is used in a product, Eric Young should be given attribution
  128. * as the author of the parts of the library used.
  129. * This can be in the form of a textual message at program startup or
  130. * in documentation (online or textual) provided with the package.
  131. *
  132. * Redistribution and use in source and binary forms, with or without
  133. * modification, are permitted provided that the following conditions
  134. * are met:
  135. * 1. Redistributions of source code must retain the copyright
  136. * notice, this list of conditions and the following disclaimer.
  137. * 2. Redistributions in binary form must reproduce the above copyright
  138. * notice, this list of conditions and the following disclaimer in the
  139. * documentation and/or other materials provided with the distribution.
  140. * 3. All advertising materials mentioning features or use of this software
  141. * must display the following acknowledgement:
  142. * "This product includes cryptographic software written by
  143. * Eric Young (eay@cryptsoft.com)"
  144. * The word 'cryptographic' can be left out if the rouines from the library
  145. * being used are not cryptographic related :-).
  146. * 4. If you include any Windows specific code (or a derivative thereof) from
  147. * the apps directory (application code) you must include an acknowledgement:
  148. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  149. *
  150. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  151. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  152. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  153. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  154. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  155. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  156. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  157. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  158. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  159. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  160. * SUCH DAMAGE.
  161. *
  162. * The licence and distribution terms for any publically available version or
  163. * derivative of this code cannot be changed. i.e. this code cannot simply be
  164. * copied and put under another distribution licence
  165. * [including the GNU Public Licence.]
  166. */