2 * Copyright (c) 1980, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Christos Zoulas. All rights reserved.
7 * Gunnar Ritter. All rights reserved.
8 * Copyright (c) 2012 - 2014 Steffen (Daode) Nurpmeso. All rights reserved.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgements:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * This product includes software developed by Christos Zoulas.
23 * This product includes software developed by Gunnar Ritter
24 * and his contributors.
25 * 4. Neither the name of the University nor the names of its contributors
26 * nor the name of Gunnar Ritter nor the names of his contributors
27 * may be used to endorse or promote products derived from this software
28 * without specific prior written permission.
30 * THIS SOFTWARE IS PROVIDED ``AS IS'', AND ANY EXPRESS OR IMPLIED WARRANTIES,
31 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
32 * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
33 * THE DEVELOPERS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY DIRECT, INDIRECT,
34 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
35 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
36 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
37 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
38 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
39 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
42 ==========================================================================
44 QP quoting idea, _b64_decode(), b64_encode():
47 * Copyright (c) 2006 The NetBSD Foundation, Inc.
48 * All rights reserved.
50 * This code is derived from software contributed to The NetBSD Foundation
53 * Redistribution and use in source and binary forms, with or without
54 * modification, are permitted provided that the following conditions
56 * 1. Redistributions of source code must retain the above copyright
57 * notice, this list of conditions and the following disclaimer.
58 * 2. Redistributions in binary form must reproduce the above copyright
59 * notice, this list of conditions and the following disclaimer in the
60 * documentation and/or other materials provided with the distribution.
62 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
63 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
64 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
65 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
66 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
67 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
68 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
69 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
70 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
71 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
72 * POSSIBILITY OF SUCH DAMAGE.
75 ==========================================================================
78 The Institute of Electrical and Electronics Engineers and The Open Group,
79 have given us permission to reprint portions of their documentation.
81 In the following statement, the phrase ``this text'' refers to portions
82 of the system documentation.
84 Portions of this text are reprinted and reproduced in electronic form in
85 the 'nail' mail user agent, from IEEE Std 1003.1, 2003 Edition, Standard for
86 Information Technology -- Portable Operating System Interface (POSIX),
87 The Open Group Base Specifications Issue 6, Copyright (C) 2001-2003 by the
88 Institute of Electrical and Electronics Engineers, Inc and The Open Group.
89 In the event of any discrepancy between these versions and the original
90 IEEE and The Open Group Standard, the original IEEE and The Open Group
91 Standard is the referee document.
93 The original Standard can be obtained online at
94 http://www.opengroup.org/unix/online.html .
96 This notice shall appear on any product containing this material.
98 ==========================================================================
99 imap_gssapi.h, smtp_gssapi.h:
100 partially derived from sample code in:
103 * GSS-API Programming Guide
104 * Part No: 816-1331-11
105 * Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A.
107 * (c) 2002 Sun Microsystems
110 * Copyright 1994 by OpenVision Technologies, Inc.
112 * Permission to use, copy, modify, distribute, and sell this software
113 * and its documentation for any purpose is hereby granted without fee,
114 * provided that the above copyright notice appears in all copies and
115 * that both that copyright notice and this permission notice appear in
116 * supporting documentation, and that the name of OpenVision not be used
117 * in advertising or publicity pertaining to distribution of the software
118 * without specific, written prior permission. OpenVision makes no
119 * representations about the suitability of this software for any
120 * purpose. It is provided "as is" without express or implied warranty.
122 * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
123 * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
124 * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR
125 * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
126 * USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
127 * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
128 * PERFORMANCE OF THIS SOFTWARE.
131 ==========================================================================
133 derived from RFC 1321:
135 Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
138 License to copy and use this software is granted provided that it
139 is identified as the "RSA Data Security, Inc. MD5 Message-Digest
140 Algorithm" in all material mentioning or referencing this software
143 License is also granted to make and use derivative works provided
144 that such works are identified as "derived from the RSA Data
145 Security, Inc. MD5 Message-Digest Algorithm" in all material
146 mentioning or referencing the derived work.
148 RSA Data Security, Inc. makes no representations concerning either
149 the merchantability of this software or the suitability of this
150 software for any particular purpose. It is provided "as is"
151 without express or implied warranty of any kind.
153 These notices must be retained in any copies of any part of this
154 documentation and/or software.
156 ==========================================================================
160 Network Working Group H. Krawczyk
161 Request for Comments: 2104 IBM
162 Category: Informational M. Bellare
169 HMAC: Keyed-Hashing for Message Authentication
173 This memo provides information for the Internet community. This memo
174 does not specify an Internet standard of any kind. Distribution of
175 this memo is unlimited.
177 Appendix -- Sample Code