licenses.list.txt 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. ====================BSD-3-Clause====================
  2. /// licensed under the BSD license.
  3. ====================BSD-3-Clause====================
  4. // Redistribution and use in source and binary forms, with or without
  5. // modification, are permitted provided that the following conditions
  6. // are met:
  7. // 1. Redistributions of source code must retain the above copyright
  8. // notice, this list of conditions and the following disclaimer.
  9. // 2. Redistributions in binary form must reproduce the above copyright
  10. // notice, this list of conditions and the following disclaimer in the
  11. // documentation and/or other materials provided with the distribution.
  12. // 4. Neither the name of the University nor the names of its contributors
  13. // may be used to endorse or promote products derived from this software
  14. // without specific prior written permission.
  15. //
  16. // THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  17. // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  18. // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  19. // ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  20. // FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  21. // DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  22. // OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  23. // HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  24. // LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  25. // OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  26. // SUCH DAMAGE.
  27. ====================BSL-1.0====================
  28. // Permission is hereby granted, free of charge, to any person or organization
  29. // obtaining a copy of the software and accompanying documentation covered by
  30. // this license (the "Software") to use, reproduce, display, distribute,
  31. // execute, and transmit the Software, and to prepare derivative works of the
  32. // Software, and to permit third-parties to whom the Software is furnished to
  33. // do so, all subject to the following:
  34. //
  35. // The copyright notices in the Software and this entire statement, including
  36. // the above license grant, this restriction and the following disclaimer,
  37. // must be included in all copies of the Software, in whole or in part, and
  38. // all derivative works of the Software, unless such copies or derivative
  39. // works are solely in the form of machine-executable object code generated by
  40. // a source language processor.
  41. //
  42. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  43. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  44. // FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
  45. // SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE
  46. // FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
  47. // ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
  48. // DEALINGS IN THE SOFTWARE.
  49. ====================BSL-1.0====================
  50. // Permission to copy, use, modify, sell and distribute this software
  51. // is granted provided this copyright notice appears in all copies.
  52. // This software is provided "as is" without express or implied
  53. // warranty, and with no claim as to its suitability for any purpose.
  54. ====================BSL-1.0====================
  55. // SPDX-License-Identifier: BSL-1.0
  56. ====================BSL-1.0====================
  57. Boost Software License - Version 1.0 - August 17th, 2003
  58. Permission is hereby granted, free of charge, to any person or organization
  59. obtaining a copy of the software and accompanying documentation covered by
  60. this license (the "Software") to use, reproduce, display, distribute,
  61. execute, and transmit the Software, and to prepare derivative works of the
  62. Software, and to permit third-parties to whom the Software is furnished to
  63. do so, all subject to the following:
  64. The copyright notices in the Software and this entire statement, including
  65. the above license grant, this restriction and the following disclaimer,
  66. must be included in all copies of the Software, in whole or in part, and
  67. all derivative works of the Software, unless such copies or derivative
  68. works are solely in the form of machine-executable object code generated by
  69. a source language processor.
  70. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  71. IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  72. FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
  73. SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE
  74. FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
  75. ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
  76. DEALINGS IN THE SOFTWARE.
  77. ---------------------------------------------------------------------------
  78. Note:
  79. Individual files contain the following tag instead of the full license text.
  80. SPDX-License-Identifier: BSL-1.0
  81. This enables machine processing of license information based on the SPDX
  82. License Identifiers that are here available: http://spdx.org/licenses/
  83. ====================COPYRIGHT====================
  84. /// Copyright 2001-2004 Unicode, Inc.
  85. ====================COPYRIGHT====================
  86. /// Code taken from the Boost 1.33.1 library. Original copyright by Kevlin Henney. Modified for Poco
  87. /// by Applied Informatics.
  88. ====================COPYRIGHT====================
  89. // (C) Copyright Nicolai M. Josuttis 2001.
  90. // Permission to copy, use, modify, sell and distribute this software
  91. // is granted provided this copyright notice appears in all copies.
  92. // This software is provided "as is" without express or implied
  93. // warranty, and with no claim as to its suitability for any purpose.
  94. ====================COPYRIGHT====================
  95. // Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
  96. // rights reserved.
  97. ====================COPYRIGHT====================
  98. // Copyright (c) 1983, 1993
  99. // The Regents of the University of California. All rights reserved.
  100. ====================COPYRIGHT====================
  101. // Copyright (c) 2001 by Andrei Alexandrescu
  102. ====================COPYRIGHT====================
  103. // Copyright (c) 2004-20011, Applied Informatics Software Engineering GmbH.
  104. // and Contributors.
  105. ====================COPYRIGHT====================
  106. // Copyright (c) 2004-2006, Applied Informatics Software Engineering GmbH.
  107. // and Contributors.
  108. ====================COPYRIGHT====================
  109. // Copyright (c) 2004-2007, Applied Informatics Software Engineering GmbH.
  110. // and Contributors.
  111. ====================COPYRIGHT====================
  112. // Copyright (c) 2004-2008, Applied Informatics Software Engineering GmbH.
  113. // and Contributors.
  114. ====================COPYRIGHT====================
  115. // Copyright (c) 2004-2009, Applied Informatics Software Engineering GmbH.
  116. // and Contributors.
  117. ====================COPYRIGHT====================
  118. // Copyright (c) 2004-2010, Applied Informatics Software Engineering GmbH.
  119. // and Contributors.
  120. ====================COPYRIGHT====================
  121. // Copyright (c) 2004-2011, Applied Informatics Software Engineering GmbH.
  122. // and Contributors.
  123. ====================COPYRIGHT====================
  124. // Copyright (c) 2004-2012, Applied Informatics Software Engineering GmbH.
  125. // and Contributors.
  126. ====================COPYRIGHT====================
  127. // Copyright (c) 2004-2014, Applied Informatics Software Engineering GmbH.
  128. // and Contributors.
  129. ====================COPYRIGHT====================
  130. // Copyright (c) 2004-2016, Applied Informatics Software Engineering GmbH.
  131. // and Contributors.
  132. ====================COPYRIGHT====================
  133. // Copyright (c) 2005-2006, Applied Informatics Software Engineering GmbH.
  134. // and Contributors.
  135. ====================COPYRIGHT====================
  136. // Copyright (c) 2005-2007, Applied Informatics Software Engineering GmbH.
  137. // and Contributors.
  138. ====================COPYRIGHT====================
  139. // Copyright (c) 2005-2008, Applied Informatics Software Engineering GmbH.
  140. // and Contributors.
  141. ====================COPYRIGHT====================
  142. // Copyright (c) 2006, Applied Informatics Software Engineering GmbH.
  143. // and Contributors.
  144. ====================COPYRIGHT====================
  145. // Copyright (c) 2006-2007, Applied Informatics Software Engineering GmbH.
  146. // and Contributors.
  147. ====================COPYRIGHT====================
  148. // Copyright (c) 2006-2010, Applied Informatics Software Engineering GmbH.
  149. // and Contributors.
  150. ====================COPYRIGHT====================
  151. // Copyright (c) 2006-2011, Applied Informatics Software Engineering GmbH.
  152. // and Contributors.
  153. ====================COPYRIGHT====================
  154. // Copyright (c) 2006-2016, Applied Informatics Software Engineering GmbH.
  155. // and Contributors.
  156. ====================COPYRIGHT====================
  157. // Copyright (c) 2007, Applied Informatics Software Engineering GmbH.
  158. // and Contributors.
  159. ====================COPYRIGHT====================
  160. // Copyright (c) 2008, Applied Informatics Software Engineering GmbH.
  161. // and Contributors.
  162. ====================COPYRIGHT====================
  163. // Copyright (c) 2009, Applied Informatics Software Engineering GmbH.
  164. // and Contributors.
  165. ====================COPYRIGHT====================
  166. // Copyright (c) 2009-2010, Applied Informatics Software Engineering GmbH.
  167. // and Contributors.
  168. ====================COPYRIGHT====================
  169. // Copyright (c) 2010, Applied Informatics Software Engineering GmbH.
  170. // and Contributors.
  171. ====================COPYRIGHT====================
  172. // Copyright (c) 2010-2012, Applied Informatics Software Engineering GmbH.
  173. // and Contributors.
  174. ====================COPYRIGHT====================
  175. // Copyright (c) 2012, Applied Informatics Software Engineering GmbH.
  176. // and Contributors.
  177. ====================COPYRIGHT====================
  178. // Copyright (c) 2013, Applied Informatics Software Engineering GmbH.
  179. // and Contributors.
  180. ====================COPYRIGHT====================
  181. // Copyright (c) 2014, Applied Informatics Software Engineering GmbH.
  182. // and Contributors.
  183. ====================COPYRIGHT====================
  184. // Copyright (c) 2015, Applied Informatics Software Engineering GmbH.
  185. // and Contributors.
  186. ====================COPYRIGHT====================
  187. // Copyright Kevlin Henney, 2000, 2001, 2002. All rights reserved.
  188. ====================File: CONTRIBUTORS====================
  189. Guenter Obiltschnig
  190. Alex Fabijanic
  191. Peter Schojer
  192. Ferdinand Beyer
  193. Krzysztof Burghardt
  194. Claus Dabringer
  195. Caleb Epstein
  196. Eran Hammer-Lahav
  197. Chris Johnson
  198. Sergey Kholodilov
  199. Ryan Kraay
  200. Larry Lewis
  201. Andrew J. P. Maclean
  202. Andrew Marlow
  203. Paschal Mushubi
  204. Jiang Shan
  205. David Shawley
  206. Sergey Skorokhodov
  207. Tom Tan
  208. Sergey N. Yatskevich
  209. Marc Chevrier
  210. Philippe Cuvillier
  211. Marian Krivos
  212. Franky Braem
  213. Philip Prindeville
  214. Anton Yabchinskiy
  215. Rangel Reale
  216. Fabrizio Duhem
  217. Patrick White
  218. Mike Naquin
  219. Roger Meier
  220. Mathaus Mendel
  221. Arturo Castro
  222. Adrian Imboden
  223. Matej Knopp
  224. Patrice Tarabbia
  225. Lucas Clemente
  226. Karl Reid
  227. Pascal Bach
  228. Cristian Thiago Moecke
  229. Sergei Nikulov
  230. Aaron Kaluszka
  231. Iyed Bennour
  232. Scott Davis
  233. Kristin Cowalcijk
  234. Yuval Kashtan
  235. Christopher Baker
  236. Scott Davis
  237. Jeff Adams
  238. Martin Osborne
  239. Björn Schramke
  240. Francis Andre
  241. ====================NCSA====================
  242. // This file is distributed under the University of Illinois Open Source License
  243. ====================Public-Domain====================
  244. // Based on the public domain implementation by Peter C. Gutmann
  245. ====================RSA-MD====================
  246. // License to copy and use this software is granted provided that it
  247. // is identified as the "RSA Data Security, Inc. MD5 Message-Digest
  248. // Algorithm" in all material mentioning or referencing this software
  249. // or this function.
  250. //
  251. // License is also granted to make and use derivative works provided
  252. // that such works are identified as "derived from the RSA Data
  253. // Security, Inc. MD5 Message-Digest Algorithm" in all material
  254. // mentioning or referencing the derived work.
  255. //
  256. // RSA Data Security, Inc. makes no representations concerning either
  257. // the merchantability of this software or the suitability of this
  258. // software for any particular purpose. It is provided "as is"
  259. // without express or implied warranty of any kind.
  260. //
  261. // These notices must be retained in any copies of any part of this
  262. // documentation and/or software.
  263. ====================RSA-MD4====================
  264. // License to copy and use this software is granted provided that it
  265. // is identified as the "RSA Data Security, Inc. MD4 Message-Digest
  266. // Algorithm" in all material mentioning or referencing this software
  267. // or this function.
  268. //
  269. // License is also granted to make and use derivative works provided
  270. // that such works are identified as "derived from the RSA Data
  271. // Security, Inc. MD4 Message-Digest Algorithm" in all material
  272. // mentioning or referencing the derived work.
  273. //
  274. // RSA Data Security, Inc. makes no representations concerning either
  275. // the merchantability of this software or the suitability of this
  276. // software for any particular purpose. It is provided "as is"
  277. // without express or implied warranty of any kind.
  278. //
  279. // These notices must be retained in any copies of any part of this
  280. // documentation and/or software.