Data Size:
B6L (182 mm x 128 mm)
Book Size:
B6L (182 mm x 128 mm)
vii
sha2
AUTHOR: Aaron D. Gifford - http://www.aarongifford.com/
Copyright (c) 2000-2001, Aaron D. Gifford
All rights reserved.
You may obtain a copy of the license at
https://opensource.org/licenses/BSD-3-Clause
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Posix
Copyright (c) 1990, 1993
The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved.
Developed at SunPro, a Sun Microsystems, Inc. business.
Permission to use, copy, modify, and distribute this software is freely granted, provided that this notice is
preserved.
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc.
MD4 Message-Digest Algorithm” in all material mentioning or referencing this software or this function.
-CMP
The MIT License (MIT)
Copyright (c) 2014 Charles Gunyon
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without
limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the
Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions
of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
nanopb
Copyright (c) 2011 Petteri Aimonen <jpa at nanopb.mail.kapsi.fi>
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be
held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote
the original software. If you use this software in a product, an acknowledgment in the product
documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the
original software.
3. This notice may not be removed or altered from any source distribution.
KMM-BT358_E_B5A-3849-00_Cover_1st Draft.indd vii
KMM-BT358_E_B5A-3849-00_Cover_1st Draft.indd vii
9/6/2021 2:30:55 PM
9/6/2021 2:30:55 PM
Summary of Contents for KMM-BT209
Page 77: ...KMM BT358_E_FR indd 35 KMM BT358_E_FR indd 35 28 3 2022 11 14 06 AM 28 3 2022 11 14 06 AM ...
Page 111: ...KMM BT358_E_GE indd 35 KMM BT358_E_GE indd 35 28 3 2022 11 16 09 AM 28 3 2022 11 16 09 AM ...
Page 145: ...KMM BT358_E_NL indd 35 KMM BT358_E_NL indd 35 28 3 2022 11 19 43 AM 28 3 2022 11 19 43 AM ...
Page 146: ...KMM BT358_E_NL indd 36 KMM BT358_E_NL indd 36 28 3 2022 11 19 43 AM 28 3 2022 11 19 43 AM ...
Page 147: ...KMM BT358_E_NL indd 37 KMM BT358_E_NL indd 37 28 3 2022 11 19 43 AM 28 3 2022 11 19 43 AM ...