PacketiX VPN 4.0 Software End User License Agreement

PLEASE READ THE TERMS AND CONDITIONS OF THIS SOFTWARE END USER LICENSE AGREEMENT ("AGREEMENT") CAREFULLY.  THEY ARE INTENDED TO CREATE A LEGALLY BINDING AGREEMENT BETWEEN YOU, THE CUSTOMER (REGARDLESS OF WHETHER AS AN INDIVIDUAL OR ENTITY) AND US, SOFTETHER CORPORATION, A JAPANESE CORPORATION ("SOFTETHER").

THIS AGREEMENT SETS FORTH THE TERMS AND CONDITIONS UPON WHICH SOFTETHER  AND ITS LICENSORS (COLLECTIVELY, "SOFTETHER", "WE", "OUR" OR "US") PERMIT YOU TO DOWNLOAD, INSTALL AND USE THE PACKETIX VPN VERSION 4.0, RELATED MEDIA, FILES, MATERIALS AND DOCUMENTATION AND INTERNET-BASED SERVICE FUNCTIONING AS PART OF SUCH SOFTWARE (COLLECTIVELY, THE "SOFTWARE").

BY DOWNLOADING, INSTALLING OR USING THE SOFTWARE, AND/OR CLICKING ON THE "I ACCEPT/AGREE" BUTTON, ETC., YOU ARE SIGNIFYING YOUR AGREEMENT TO BE LEGALLY BOUND BY EACH OF THE TERMS AND CONDITIONS OF THIS AGREEMENT.  IF YOU DO NOT WISH TO BE LEGALLY BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT DOWNLOAD, INSTALL OR USE THE SOFTWARE, AND/OR CLICK ON THE "I DISAGREE/DECLINE" BUTTON.

USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A STATEMENT FOR WARNING AND DISCLAIMER.

1. Grant of a Limited License.

Subject to the terms of this Agreement, including, without limitation those described in Sections 2 and 3 below, and your payment of the subject license fee (if applicable), SoftEther hereby grants to you a limited, personal, non-exclusive, non-sublicensable, non-assignable, revocable right and license to download, install and use the Software on your computer in accordance with the instructions, specifications, documentation and conditions of accompanying license key or license issue key provided with the Software. 

2. Product License Key and Connection License Key. (This part is applied to VPN Server.)

In connection with the use of the Software, you must obtain and maintain in accordance with the terms of this Agreement a product license key and Connection License Key distributed by SoftEther.

Prior to downloading, installing or using the Software, you must obtain a valid product license key for the Software distributed by SoftEther (hereinafter "Product License Key").  You may not download, install or use the Software without having first obtained a valid Product License Key.  For purposes of this Agreement, a valid Product License Key means solely a license key which has been distributed directly by SoftEther or by its approved distributor (hereinafter "Partner"), or received through a channel specified by SoftEther.  In the event you possess a valid Product License Key, you may use the Software functions applicable to the license editions ("Editions") designated together with the Product License Key you have.   Of the functions incorporated into the Software, you may not use the functions applicable to those Editions which are not specified together with the Product License Key you have.  The functions which may or may not be used for each Edition shall be determined by SoftEther in its discretion, and shall be described in the applicable Software documentation and/or web sites.  In the event SoftEther specifies additional terms of use when distributing the Product License Key and the applicable Edition to you, you must use the Software in accordance with those additional terms.  In the event the additional terms conflicts with any portion of this Agreement, the additional terms shall supersede the conflicting terms herein and govern.

The customer should follow the following rule the edition that lies a product license key that the customer has about right or wrong of use of the function. SoftEther describes the number of computers or sites that can connect VPN clearly in the condition list that accompanies the document or the license key that relates to this case software and is published. When the VPN software is used, the customer should follow a condition concerned. 

In the event the Product License Key that you have has a time limit specified, your right to use the Software functions through the license keys shall expire upon such time limit being reached.

With respect to license keys distributed by SoftEther to you, you shall handle them in the same manner as you would any customary copyrighted computer programs or written materials, and you must not disclose to any third party or otherwise make available for public disclosure any part of or the entire License Key, License Issue Key and URLs of the secret web-site without SoftEther's prior written approval.  In the event you violate the foregoing provision and the license key is disclosed to multiple third parties, SoftEther may invalidate license key.

In the event the License Key you possess becomes invalid, you must immediately cease use of the Software functions you had been using through the subject license keys.  Moreover, in the event you no longer can use the Software because all license keys have become invalid, you must immediately uninstall the subject Software from the computer and you must delete or destroy the subject Software and any copies.  

With respect to the License Key you possess, you shall not do any of the following:

(a) When the "Maximum number of client connections" and the "Maximum number of bridge connections" that can be connected with the server function of this case software at the same time by way of the network is described clearly in the condition list that accompanies the document or the License Key or the License Issue Key that relates to this case software and is issued for the license that the customer has, you must follow it.

(b) To remove the restrictions which limits access to the use of certain Software functions by modifying a portion of the License Key, or through some other means.

(c) To use the License Key for purposes other than for the installation to use the Software. 

(d) Where an individual Software runs on an individual computer, simultaneously install and use License Keys for multiple types of Editions.

(e) To transfer a part of or the entire License Key to any third party without SoftEther's prior written approval. 

3. Server Function. (This part is applied to VPN Server.)

The maximum number of computers which can gain simultaneous access to your Software server function through a network connection shall be set as follows:

(a) When the Maximum number of client connections and the Maximum number of bridge connections that can be connected with the server function of this case software at the same time by way of the network is described clearly in the condition list that accompanies the document or the License Key or the License Issue Key that relates to this case software and is issued for the license that the customer has, you must follow it.

(b) Additionally, when SoftEther presents you any additional use condition lists, you  must follow the conditions.

The number of computers which may gains simultaneous access shall be calculated by differentiating based on the following two types of access modes.  SoftEther shall separately determine the technical conditions for each access and access modes, and shall conform to those conditions disclosed in the program code, manual or electronic materials. 

(a) Client access modes calculated based on the number of client accesses.

(b) Routing access modes or bridge access modes calculated based on the number of bridge accesses.

You may not permit access to the Software function from computers which exceed the maximum number of computers which are permitted to gain simultaneous access in the manner described above.  You hereby acknowledge and agree when offering functions in accordance with the license key details and the maximum number of access amounts, due to difficult or impossible technical limitations caused by underlying hardware or software, the performance of certain functions of the Software may decrease or become unstable.

4. Ownership.

We retain exclusive right, title and interest (including all intellectual property rights) in and to the Software, copies thereof, and all error corrections, bug-fixes, patches, updates, derivative works, improvements, modifications thereto (whether made by us, you, or otherwise).  The rights described in the foregoing sentence are our copyrighted work and are protected by the copyright laws of the United States, Japan, international copyright treaties and conventions, and/or other applicable laws.  All rights not written here are reserved.  The Software may contain certain licensed materials, and the licensors of those materials may enforce their rights in the event of any violation of this Agreement.

Nothing in this Agreement is intended to transfer any of the right, title and interest (including all intellectual property rights) described in the paragraph above from us to you or any third party.  If you are ever inadvertently or erroneous held or deemed to be the owner of any such rights, you agree to assign and hereby irrevocably assign to us all such rights as of the effective date of this Agreement, and agree to execute all documents to implement and confirm the letter and intent of the foregoing. 

Only those licenses expressly set forth in this Agreement are granted.  No other licenses are granted under this Agreement, whether by implication, estoppel, course of conduct, or otherwise.

5. Specific Limitations.

The licenses granted to you by this Agreement are personal to you and is subject to the following further limitations.  You shall not or permit any other person to:

(a) in whole or in part, (i) modify or create any derivative work of the Software, or (ii) copy, photocopy, reproduce, translate, disassemble, reverse engineer, decompile, or otherwise attempt to derive source code, underlying ideas, algorithms, structure, or organization of the Software;

(b) modify or remove any copyright, patent, confidentiality, trade mark, trade names and other marks, notices, labels or legends in the Software;

(c) sell, grant a security interest in or transfer reproductions of the Software to other parties in any way not expressly authorized herein; 

(d) assign, rent, lease or license the Software to others; 

(e) use the Software in a manner which has the effect of removing limitations on the functionalities incorporated therein.  Through the use of a license key, the Software incorporates a system which allows for the implementation or removal of certain functionality limitations.  You shall not or permit any other person to use the Software in a specific manner contrary to the customary use of the Software to activate part or all of the Software's functionalities which are not permitted;

(f) install any license keys into the Software which has not been approved by SoftEther;

(g) make more than one copy of the Software for purposes other than back-up; 

(h) use the Software in violation of any applicable laws or regulations; or

(i) separate or detach the component of the Software.

Your failure to comply with the restrictions and limitations listed above and elsewhere in this Agreement shall result in immediate, automatic termination of the license granted hereunder and may subject you to civil and/or criminal liability.  

6. Termination.

This Agreement is effective until terminated.  This Agreement may be terminated by either party on written notice if the other party is in breach of the terms of this Agreement (including failure to pay any amounts owed) and fails to remedy the breach within ten (10) days of receipt of notice thereof.  

This Agreement shall terminate automatically upon the occurrence of any of the following events: (a) Any proceedings are commenced by or against you under applicable bankruptcy laws naming you as the debtor; (b) one or more of your creditors takes possession of or is assigned substantially all of your tangible assets or current assets; (c) you make a general assignment for the benefit of your creditors; or (d) a receiver is appointed to manage all or substantially all of your assets.

Upon termination of this Agreement, you shall further immediately destroy or return to SoftEther the Software, any and all documents, notes and other materials regarding the Software provided by SoftEther, including, without limitation, all of SoftEther proprietary information and all copies and extracts of the foregoing. Upon request by SoftEther, you will certify in writing to its full compliance with this Section 6.

7. License Management Technology.

The Software may include certain license management technology.  In such an event, upon activation of the Software functions, the license management technology will automatically communicate with our license management server and verify whether the license key installed with the Software is valid.  The computer's IP address, the host name, the software version, and the digital license data may be transmitted via the Internet. Moreover, in the event we determine that the subject license key is invalid or this Agreement has expired, the subject Software may be automatically deactivated by the license management technology.  You acknowledge and agree to the application of our license management technology in the manner described herein.  

8. Upgrades and New Versions of the Software.

From time to time we may issue upgrades and new versions of the Software.  SoftEther shall determine in its sole discretion whether to license those upgrades and new versions separately and charge a separate license fee. However, when a regular contract of the subscription contract etc. has been concluded between SoftEther and you, SoftEther will offer you those upgrade and upgrade product according to the content of the contract only as for the upgrade of software during the duration of policy and the issue of the upgrade product without the extra charge.

9. Technical Support and Training.

In the event you enter into a separate agreement for technical support and training for the Software with SoftEther or its partner, you will be required to pay the fees (if applicable) in accordance with the procedures set forth therein.  Unless otherwise expressly agreed to in writing, SoftEther will not provide any technical support or training to you.

10. Limited Warranty.

WE EXPRESSLY DISCLAIM ANY WARRANTY FOR THE SOFTWARE, ANY COMPONENTS THERETO (INCLUDING, WITHOUT LIMITATION, THE "OPENSSL" SOFTWARE DEVELOPED BY THE OPENSSL PROJECT FOR USE IN THE OPENSSL TOOKIT, THE "WINPCAP" SOFTWARE DEVELOPED BY NETGROUP, POLITECNICO DI TORINO (ITALY), AND THE "ZLIB" SOFTWARE DEVELOPED BY JEAN-LOUP GAILLY AND MARK ADLER) AND ANY TECHNICAL SUPPORT SERVICES.  THE SOFTWARE, ANY COMPONENTS THERETO AND ANY TECHNICAL SUPPORT SERVICES ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF CONDITION, DEFECTS, USE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR USE, OR NONINFRINGEMENT.  YOU ASSUME THE ENTIRE RISK ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE AND ANY SUPPORT TECHNICAL SERVICES.  

11. Limitation of Liability.

NEITHER SOFTETHER NOR ITS PARENT, SUBSIDIARIES, AFFILIATES, AGENTS, DISTRIBUTORS, OR ITS LICENSORS SHALL BE LIABLE IN ANY WAY FOR LOSS OR DAMAGE OF ANY KIND RESULTING FROM YOUR USE OF THE SOFTWARE OR ANY SUPPORT SERVICES, INCLUDING, BUT NOT LIMITED TO, LOSS OF USE, DATA, PROFITS OR GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR ANY AND ALL OTHER DAMAGES OR LOSSES.  ANY WARRANTY AGAINST INFRINGEMENT THAT MAY BE PROVIDED IN SECTION 2-312(3) OF THE U.S. UNIFORM COMMERCIAL CODE AND/OR IN ANY OTHER COMPARABLE STATUTE IS EXPRESSLY DISCLAIMED. WE SHALL NOT BE RESPONSIBLE FOR ANY INTERRUPTIONS OF SERVICE, INCLUDING, BUT NOT LIMITED TO, ISP DISRUPTIONS, SOFTWARE OR HARDWARE FAILURES OR ANY OTHER EVENT WHICH MAY RESULT IN A LOSS OF DATA OR DISRUPTION OF SERVICE.  IN NO EVENT WILL WE, OUR PARENT, SUBSIDIARIES, AFFILIATES, AGENTS, DISTRIBUTORS, OR OUR LICENSORS BE LIABLE TO YOU FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE OR CONSEQUENTIAL DAMAGES ANY KIND OR NATURE WHETHER SUCH LIABILITY IS ASSERTED ON THE BASIS OF CONTRACT, TORT (INCLUDING NEGLIGENCE OR STRICT LIABILITY), OR OTHERWISE, EVEN IF ANY SUCH PARTY HAS BEEN ADVISED OF THE POSSIBLITY OF SUCH LOSS OR DAMAGE ARISING FROM ANY MATTER RELATING TO THIS AGREEMENT.  SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.
 
12. Equitable Remedies. 

You hereby agree that we would be irreparably damaged if the terms of this Agreement were not specifically enforced, and therefore you agree that we shall be entitled, without bond, other security, or proof of damages, to appropriate equitable remedies with respect to breaches of this Agreement, in addition to such other remedies as we may otherwise have available to it under applicable laws.  

You hereby agree to indemnify and hold us, our parent, subsidiaries, affiliates, agents, distributors, or our licensors harmless from and against any liabilities, damages, judgments, losses, costs and expenses (including reasonable attorneys' fees) arising out of your downloading, installation, or use of the Software, in a manner inconsistent with the terms and conditions of this Agreement.

In the event any litigation is brought by us, our parent, subsidiaries, affiliates, agents, distributors, or our licensors in connection with this Agreement and any such party is deemed a prevailing party, such party shall be entitled to recover from you all the costs, attorneys' fees and other expenses it incurred in such litigation. 

13. Amendments.

We reserve the right, in our sole discretion, to amend, add or delete any of the terms and conditions of this Agreement when the Software is upgraded, effective upon prior notice in a manner elected by SoftEther in its sole discretion.  If any future changes to this Agreement are unacceptable to you or cause you to no longer be in compliance with this Agreement, you may terminate this Agreement in accordance with the terms herein.  Your downloading, installation, or use of any updated or modified Software or your continued use of the Software following notice of changes to this Agreement signifies your acceptance of  any and all such changes.  We may change, modify, suspend, or discontinue any aspect of the Software at any time.  We may also impose limits on certain features or restrict your access to parts or all of the Software without notice or liability.  You disclaim any right, title or interest, monetary or otherwise, in any feature, content or intellectual property right contained in the Software. 

14. Miscellaneous.

14.1 This Agreement shall be deemed to have been made and executed in Japan without regard to conflicts of law provisions, and any dispute arising hereunder shall be resolved in accordance with the laws of Japan.  You agree that any claim asserted in any legal proceeding by one of the parties against the other shall be commenced and maintained in the Tokyo District Court located in Tokyo, Japan. This Agreement shall be construed and controlled by Japanese laws, and the parties further consent to exclusive jurisdiction and venue in the courts sitting in the special wards of Tokyo, Japan. You must waive all defenses of lack of personal jurisdiction and forum non conveniens.  Process may be served on either party in the manner authorized by applicable law or court rule.

14.2 In the event that any provision of this Agreement shall be held by a court or other tribunal of competent jurisdiction to be unenforceable, such provision will be enforced to the maximum extent permissible, and the remaining portions of this Agreement shall remain in full force and effect.  

14.3 This Agreement constitutes and contains the entire agreement between the parties with respect to the subject matter hereof and supersedes any prior oral or written agreements.

14.4 You acknowledge that we are subject to regulation by agencies of Japan, the United States, and other countries, which prohibits export of certain products or technology to certain countries or nationals of certain countries.  You will cooperate with us to obtain any export licenses that we reasonably believe necessary to effectuate the supply of the Software hereunder.  Moreover, you will comply fully with all relevant import and export laws, rules, and regulations of applicable jurisdictions to ensure that the Software is not imported or exported, directly or indirectly, in violation thereof.

14.5 SoftEther will not refund any fees paid by you in consideration for the Software upon termination or expiration of this Agreement.


*  *  *

I hereby acknowledge that I have read and understand the foregoing Agreement and agree that the action of downloading, installing, or using the Software is an acknowledgment of my agreement to be bound by the terms and conditions of the Agreement contained herein. 

Copyright (c) SoftEther Corporation. All rights reserved. SoftEther(R) and PacketiX(R) are trademarks or registered trademarks of SoftEther Corporation in Japan, the U.S., the People's Republic of China and/or other countries. All rights are reserved.

---
Note that the above copyright notices and use conditions do not apply on the software components listed in below which are included in this Software. When you use or distribute Software with including these libraries, you have to follow the conditions of these libraries.

These library's copyright notices and conditions are following;

-------------------

BitVisor(R) VPN Client Module (IPsec Driver):
Copyright (c) 2007, 2008 University of Tsukuba.
Copyright (C) 2007, 2008 National Institute of Information and Communications Technology.
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University of Tsukuba nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

-------------------

Microsoft(R) C Runtime Library:
(c) 2007 Microsoft Corporation. All Rights Reserved.

-------------------

RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki):

License to copy and use this software is granted provided that it is identified as "RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki)" in all material mentioning or referencing this software.

License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki)" in all material mentioning or  referencing the derived work.

RSA Security Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.

-------------------

WinPcap:
Copyright (c) 2001 - 2003 NetGroup, Politecnico di Torino (Italy)
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

-------------------

libedit:
Copyright (c) 1992, 1993 The Regents of the University of California.  All rights reserved.

This code is derived from software contributed to Berkeley by Christos Zoulas of Cornell University.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

-------------------

libiconv:

          GNU LIBRARY GENERAL PUBLIC LICENSE
               Version 2, June 1991

 Copyright (C) 1991 Free Software Foundation, Inc.
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
 Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the library GPL. It is
 numbered 2 because it goes with version 2 of the ordinary GPL.]

                Preamble

  The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.

  This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it. You can use it for your libraries, too.

  When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

  To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it.

  For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source
code. If you link a program with the library, you must provide complete object files to the recipients so that they can relink them with the library, after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

  Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the library.

  Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations.

  Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

  Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license.

  The reason we have a separate public license for some libraries is that they blur the distinction we usually make between modifying or adding to a program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is analogous to running a utility program or application program. However, in a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the ordinary General Public License treats it as such.

  Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing, because most developers did not use the libraries. We concluded that weaker conditions might promote sharing better.

  However, unrestricted linking of non-free programs would deprive the users of those programs of all benefit from the free status of the libraries themselves. This Library General Public License is intended to
permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs to change the free libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header files, but we have achieved it as regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries.

  The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the library.

  Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one.

          GNU LIBRARY GENERAL PUBLIC LICENSE
   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library
General Public License (also called "this License"). Each licensee is addressed as "you".

  A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.

  The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)

  "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.

  Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

  1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.

  You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

  2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

    a) The modified work must itself be a software library.

    b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.

    c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.

    d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.

    (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.

In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

  3. You may opt to apply the terms of the ordinary GNU General Public
License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.

  Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.

  This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

  4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.

  If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

  5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

  However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License.
Section 6 states terms for distribution of such executables.

  When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not.
Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.

  If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)

  Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

  6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.

  You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:

    a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above) ; and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)

    b) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.

    c) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.

    d) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.

  For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

  It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

  7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:

    a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.

    b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

  8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

  9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

  10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

  11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

  12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

  13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.

  14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

                NO WARRANTY

  15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

             END OF TERMS AND CONDITIONS

-------------------

ncurses:
Copyright (c) 1998-2005,2006 Free Software Foundation, Inc.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, distribute with modifications, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name(s) of the above copyright holders shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization.

-------------------

OpenSSL:
OpenSSL License
Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).  This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are aheared to.  The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code.  The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The licence and distribution terms for any publically available version or derivative of this code cannot be changed.  i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]

-------------------

zlib:
Acknowledgments:
  The deflate format used by zlib was defined by Phil Katz. The deflate and zlib specifications were written by L. Peter Deutsch. Thanks to all the people who reported problems and suggested various improvements in zlib; they are too numerous to cite here.

Copyright notice:
 (C) 1995-2004 Jean-loup Gailly and Mark Adler

  This software is provided 'as-is', without any express or implied warranty.  In no event will the authors be held liable for any damages arising from the use of this software.

  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

  1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
  2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
  3. This notice may not be removed or altered from any source distribution.

  Jean-loup Gailly        Mark Adler
  jloup@gzip.org          madler@alumni.caltech.edu

If you use the zlib library in a product, we would appreciate *not* receiving lengthy legal documents to sign. The sources are provided for free but without warranty of any kind.  The library has been entirely written by Jean-loup Gailly and Mark Adler; it does not include third-party code.

If you redistribute modified sources, we would appreciate that you include in the file ChangeLog history information documenting your changes. Please read the FAQ for more information on the distribution of modified source versions.

-------------------

Intel AESNI Sample Library:

Copyright (c) 2010, Intel Corporation
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Issue Date: Aug 6, 2010

-------------------

NOTES WRITTEN BY SOFTETHER CORPORATION

Note for users of non-Windows version of PacketiX VPN: The enumerated bundle of License Agreements above are copies of original License Agreements of each library programs which PacketiX VPN uses. PacketiX VPN is not a delivered work from these libraries. PacketiX VPN is a separated work from the libraries, but it may call functions of the libraries (whether or not PacketiX VPN calls such functions are depended on the user's intention to link them or not on user's side computer). While some libraries indicate GPL or LGPL as a condition to re-distribute, PacketiX VPN is not license under GPL nor LGPL. Therefore, we took special care not to make PacketiX VPN become delivered works of any GPL or LGPL libraries. In order to achieve that, both PacketiX VPN and GPL/LGPL libraries are distributed with isolated forms (means that any program files of PacketiX VPN are not bound nor linked to any GPL/LGPL libraries). If a user of PacketiX VPN wants to link GPL/LGPL libraries by their own decisions, operations and responsibilities, he may do that on his computer. However, if a delivered work under copyright law is created as a result of such an operation, such a delivered work must not re-distributed to other people, because it may violate GPL/LGPL libraries' conditions.

Note for users of Windows version of PacketiX VPN: For technical reason, the above texts are exactly same as a file which is also contained on the non-Windows version of PacketiX VPN. Actually, the Windows version of PacketiX VPN has no relations to any GPL/LGPL libraries enumerated above.

SoftEther Corporation provides source codes of some GPL/LGPL/other libraries listed above on its web server. Anyone can download, use and re-distribute them under individual licenses which are contained on each archive file, available from the following URL:
http://uploader.softether.co.jp/src/

