X-15 – Konica Minolta magicolor 4750EN-4750DN User Manual
Page 16
x-15
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and
its documentation for any purpose and without fee is hereby granted, provided that the above
copyright notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation, and that the name of FundsXpress. not be used in
advertising or publicity pertaining to distribution of the software without specific, written prior
permission. FundsXpress makes no representations about the suitability of this software for
any purpose. It is provided "as is" without express or implied warranty.
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MER-
CHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The implementation of the Yarrow pseudo-random number generator in src/lib/crypto/yarrow
has the following copyright:
Copyright 2000 by Zero-Knowledge Systems, Inc.
Permission to use, copy, modify, distribute, and sell this software and its documentation for any
purpose is hereby granted without fee, provided that the above copyright notice appear in all
copies and that both that copyright notice and this permission notice appear in supporting doc-
umentation, and that the name of Zero-Knowledge Systems, Inc. not be used in advertising or
publicity pertaining to distribution of the software without specific, written prior permission.
Zero-Knowledge Systems, Inc. makes no representations about the suitability of this software
for any purpose. It is provided "as is" without express or implied warranty.
ZERO-KNOWLEDGE SYSTEMS, INC. DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS, IN NO EVENT SHALL ZERO-KNOWLEDGE SYSTEMS, INC. BE LIABLE FOR ANY
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSO-
EVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The implementation of the AES encryption algorithm in src/lib/crypto/aes has the following
copyright:
Copyright © 2001, Dr Brian Gladman <[email protected]>, Worcester, UK.
All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both source and binary form is allowed (with or
without changes) provided that:
1. distributions of this source code include the above copyright notice, this list of conditions and
the following disclaimer;
2. distributions in binary form include the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products built using this software without
specific written permission.
DISCLAIMER
This software is provided 'as is' with no explcit or implied warranties in respect of any proper-
ties, including, but not limited to, correctness and fitness for purpose.
Portions contributed by Red Hat, including the pre-authentication plug-ins framework, contain
the following copyright:
Copyright © 2006 Red Hat, Inc.
Portions copyright © 2006 Massachusetts Institute of Technology
All Rights Reserved.