(c) Copyright 2015-2020 Hewlett Packard Enterprise Development LP
All rights reserved. Unpublished rights reserved under the copyright laws of
the United States of America.

I. HEWLETT PACKARD ENTERPRISE LICENSE AGREEMENT

   PLEASE READ THIS HPE LICENSE AGREEMENT ("AGREEMENT") CAREFULLY. THIS
   AGREEMENT IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR A
   SINGLE LEGAL ENTITY) ("YOU") AND HEWLETT PACKARD ENTERPRISE COMPANY ("HPE").
   USE OF THE SOFTWARE INCLUDING, WITHOUT LIMITATION, ANY DOCUMENTATION, AND/OR
   ANY ANCILLARY SOFTWARE, IS SUBJECT TO THE LICENSE TERMS SET FORTH BELOW AND
   THE APPLICABLE "HEWLETT PACKARD ENTERPRISE SOFTWARE PRODUCT 'AS IS' WARRANTY
   STATEMENT" ("AS IS WARRANTY") FOR THIS SOFTWARE THAT IS PROVIDED TO YOU BELOW.

   BY CHECKING THE BOX NEXT TO "I accept the terms in the License Agreement," OR
   BY COPYING, INSTALLING, OR OTHERWISE USING THE SOFTWARE, YOU INDICATE YOUR
   ACCEPTANCE OF AND AGREE TO BE BOUND BY AND COMPLY WITH THE FOLLOWING TERMS
   AND CONDITIONS, THE AS IS WARRANTY, AND THE TERMS AND CONDITIONS RELATING TO
   THE ANCILLARY SOFTWARE ("ANCILLARY TERMS"). USE OF ANCILLARY SOFTWARE SHALL
   BE GOVERNED BY THE ANCILLARY TERMS CORRESPONDING TO THAT SOFTWARE, EXCEPT
   THAT THE DISCLAIMER OF WARRANTIES AND LIMITATION OF LIABILITIES PROVISIONS
   CONTAINED IN THE APPLICABLE AS IS WARRANTY SHALL ALSO APPLY TO SUCH ANCILLARY
   SOFTWARE. IF YOU CHOOSE TO ACCEPT THIS AGREEMENT WITHOUT REVIEWING SUCH
   ANCILLARY TERMS YOU WILL BE DEEMED TO HAVE ACCEPTED SUCH ANCILLARY TERMS.

   IF YOU DO NOT AGREE TO ALL SUCH TERMS AND CONDITIONS AND DO NOT PLACE A CHECK
   IN THE APPLICABLE BOX, THEN (A) HPE GRANTS YOU NO LICENSE TO THE SOFTWARE,
   (B) YOU MAY NOT COPY, INSTALL, OR OTHERWISE USE THE SOFTWARE, AND (C) UPON
   THE PROMPT RETURN OF THE SOFTWARE TO HPE YOU WILL RECEIVE A FULL REFUND OF
   ANY APPLICABLE LICENSE FEES ACTUALLY PAID BY YOU.

   A. DEFINITIONS

      "Ancillary Software" means all or any portion of Software provided under
      public, open source, or third party license terms. HPE Ancillary Software,
      if any, is identified by either noting the relevant party's ownership
      within each Ancillary Software program file and/or by providing
      information in the "README" file that is provided as part of the download
      of the Software.

      "Delivery" means (the date on which HPE makes Software available for
      electronic transmission to or download by Customer.

      "Device" means a controller, processor, or other hardware and related
      operating system Software.

      "Documentation" means the end user manual, Specifications, application
      notes, and other technical documentation sold or otherwise made generally
      available by HPE for Use of Software, whether in tangible, online,
      electronic, or other form.

      "HPE Software" means Software other than Ancillary Software.

      "License Fee" means the fee or fees designated by HPE for Use of Software
      set forth on this website, if any, at the time this Agreement is entered
      into. Different License Fees may apply to particular Software if more than
      one Software License is available for that Software.

      "Software" means one or more programs capable of operating on a Device,
      associated media, and related Documentation; "Firmware" means Software
      fixed in a Device and not removable in normal operation.

      "Specifications" means specific technical information about Software which
      is published in HPE manuals and technical data sheets in effect on the
      date HPE electronically transmits Software to Customer.

      "Use" means storing, loading, installing, executing or displaying Software
      on a single Device in accordance with the Documentation. HPE may also
      specify Use authorizations or restrictions in the terms accompanying the
      Software.

   B. LICENSE

      1. In return for the applicable License Fee, HPE grants You a
      non-exclusive license to Use the Software in conformance with the terms
      set forth herein. In the event of a conflict, the Ancillary Terms that
      accompany the Software will take precedence over the Use restrictions and
      authorizations specified by HPE and the terms set forth herein, and any
      additional Use restrictions or authorizations specified by HPE will take
      precedence over the terms set forth herein.

      2. Unless otherwise specified, in return for the applicable License Fee,
      HPE grants You a license to Use one copy of the Software on one Device at
      any one time. You may only use Firmware to enable the Device to function
      in accordance with its Specifications.

      3. All Software licenses will be perpetual unless this Software is
      provided for evaluation purposes, in which case the duration of this
      license is for the evaluation period only, or unless the Software license
      is terminated or transferred in accordance with Sections B.9 and B.10.
      Unless stated otherwise in the description of the Software for which
      this license applies, licenses granted for evaluation purposes shall be
      for a period of thirty (30) days.

      4. Software is owned and copyrighted by Hewlett Packard Enterprise
      Development LP or by third party suppliers. This Agreement confers no
      title or ownership and is not a sale of any rights in the Software. Third
      party suppliers are intended beneficiaries under these terms and
      conditions and may protect their rights in the Software in the event of
      any infringement.

      5. Unless otherwise permitted by HPE, You may only make copies or
      adaptations of the Software for archival purposes or when copying or
      adaptation is an essential step in the authorized Use of the Software on
      a backup Device, provided that copies and adaptations are used in no other
      manner and provided further that the Use on the backup Device is
      discontinued when the original or replacement Device becomes operable.

      6. You must reproduce all copyright notices in or on the original
      Software on all permitted copies or adaptations. You may not remove,
      deface, or obscure any Software product identification, copyright notices,
      or proprietary notices.

      7. Updates, upgrades, enhancements, or other support may only be available
      under separate HPE Support agreements. Nothing in this Agreement grants
      you any right to purchase or receive support services, and HPE is under
      no obligation to make such support available to you. HPE reserves the
      right to require additional licenses and fees for Software upgrades or
      other enhancements, or for Use of the Software on upgraded Devices.

      8. You will not modify, reverse engineer, disassemble, decrypt, or
      decompile the Software without HPE's prior written consent. Where You have
      other statutory rights, You will provide HPE with reasonably detailed
      information regarding any intended modifications, reverse engineering,
      disassembly, decryption, or decompilation.

      9. You may only transfer this Agreement subject to HPE's prior written
      authorization and payment to HPE of any applicable fee(s). Upon transfer
      of this Agreement, You will immediately deliver all copies of the Software
      to the transferee. The transferee must agree in writing to the terms of
      this Agreement. All Agreement terms and conditions will be binding on
      involuntary transferees, notice of which is hereby given. Your rights
      under this Agreement will automatically terminate upon transfer.
      Notwithstanding anything in the foregoing to the contrary, if You transfer
      a Device to a third party, You may transfer the associated Firmware
      without additional written authorization from HPE.

      10. HPE may terminate this Agreement or your or any transferee's or
      sublicensee's rights under this Agreement upon notice for failure to
      comply with its terms or conditions. Immediately upon any termination, the
      Software and all copies of the Software will be destroyed or returned to
      HPE. Copies of the Software that are merged into adaptations, except for
      individual pieces of data in Your or any transferee's or sublicensee's
      database, will be removed and destroyed or returned to HPE. With HPE's
      written consent, one copy of the Software may be retained subsequent to
      termination solely for archival purposes. At HPE's request, You will
      certify in writing to HPE that You have complied with this Section.

      11. If the Software is licensed for use in the performance of a U.S.
      government prime contract or subcontract, You agree that, consistent with
      FAR 12.211 and 12.212, commercial computer software, computer software
      documentation and technical data for commercial items are licensed under
      vendor's standard commercial license.

      12. HPE and its suppliers reserve all rights not expressly granted herein
      to You. Nothing herein should be construed as granting You, by
      implication, estoppel or otherwise, a license relating to Software other
      than as expressly stated above in this Section. You have no right to rent
      or lease Software, to use or make the Software available for commercial
      timesharing or service bureau purposes, or to copy Software onto or
      otherwise make it available on, to, or through any public or distributed
      network.

   C. GENERAL

      1. Except as expressly provided in Section B.9 above, You may not assign,
      delegate, or otherwise transfer these terms and conditions or any rights
      or obligations hereunder without prior written consent from HPE. Any such
      attempted assignment, delegation, or other transfer will be null and void,
      and HPE may terminate this Agreement in the event thereof.

      2. You agree to comply with the trade-related laws and regulations of the
      U.S. and other national governments. If you export, import or otherwise
      transfer products provided under this Agreement, you will be responsible
      for obtaining any required export or import authorizations. You confirm
      that you are not located in a country that is subject to trade control
      sanctions (currently Cuba, Iran, N. Korea, N. Sudan, and Syria) and
      further agree that you will not retransfer the products to any such
      country. HPE may suspend its performance under this Agreement to the
      extent required by laws applicable to either party.

      3. Upon thirty (30) days prior written notice, and no more than once
      during any twelve-month period, HPE (or its designee) may conduct an
      audit of Your records and facilities to verify Your compliance with this
      Agreement. You will provide HPE with access to the records, hardware, and
      employees reasonably necessary for HPE to exercise its rights under this
      Section C.3. HPE may make and maintain copies of such records. In the
      event such an audit reveals an underpayment by You, You shall immediately
      pay such underpayment upon HPE's request, together with the costs
      reasonably incurred by HPE in connection with the audit and seeking Your
      compliance with this Section C.3.

      4. This Agreement shall be construed in accordance with the laws of the
      State of California, without regard to conflict of laws principles. The
      United Nations Convention on Contracts for the International Sale of Goods
      does not apply.

      5. Provisions herein which by their nature extend beyond the termination
      of any sale or license of Software will remain in effect until fulfilled.

      6. If any term or provision herein is determined to be illegal or
      unenforceable, the validity or enforceability of the remainder of the
      terms or provisions herein will remain in full force and effect.

      7. Failure or delay in enforcing any right or provision of this Agreement
      shall not be deemed a waiver of such right or provision with respect to
      any subsequent breach.

      8. Except as specified herein, these terms and conditions constitute the
      entire agreement between HPE and You, and supersede any previous
      communications, representations or agreements between the parties,
      whether oral or written, regarding transactions hereunder. Your additional
      or different terms and conditions will not apply. The terms and conditions
      of this Agreement may not be changed except by a written amendment signed
      by an authorized representative of each party.

II. HEWLETT PACKARD ENTERPRISE SOFTWARE PRODUCT ‘AS IS’ WARRANTY STATEMENT

   DISCLAIMER

      TO THE EXTENT ALLOWED BY LOCAL LAW, THIS HPE SOFTWARE PRODUCT ("SOFTWARE")
      IS PROVIDED TO YOU "AS IS" WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
      WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED. HPE SPECIFICALLY DISCLAIMS
      ANY IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY
      QUALITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE. Some
      countries, states and provinces do not allow exclusions of implied
      warranties or conditions, so the above exclusion may not apply to you.
      You may have other rights that vary from country to country, state to
      state, or province to province.

   LIMITATION OF LIABILITY

      EXCEPT TO THE EXTENT PROHIBITED BY LOCAL LAW, IN NO EVENT WILL HPE OR ITS
      SUBSIDIARIES, AFFILIATES OR SUPPLIERS BE LIABLE FOR DIRECT, SPECIAL,
      INCIDENTAL, CONSEQUENTIAL OR OTHER DAMAGES (INCLUDING LOST PROFIT, LOST
      DATA, OR DOWNTIME COSTS), ARISING OUT OF THE USE, INABILITY TO USE, OR
      THE RESULTS OF USE OF THE SOFTWARE, WHETHER BASED IN WARRANTY, CONTRACT,
      TORT OR OTHER LEGAL THEORY, AND WHETHER OR NOT ADVISED OF THE POSSIBILITY
      OF SUCH DAMAGES. Your use of the Software is entirely at your own risk.
      Should the Software prove defective, you assume the entire cost of all
      service, repair or correction. Some countries, states and provinces do not
      allow the exclusion or limitation of liability for incidental or
      consequential damages, so the above limitation may not apply to you.

   NOTE

      EXCEPT TO THE EXTENT ALLOWED BY LOCAL LAW, THESE WARRANTY TERMS DO NOT
      EXCLUDE, RESTRICT OR MODIFY, AND ARE IN ADDITION TO, THE MANDATORY
      STATUTORY RIGHTS APPLICABLE TO THE LICENSE OF THE SOFTWARE TO YOU.

III. HPE Global Master Privacy Policy - November 2015

   A. Scope

      1. This HPE Global Master Privacy Policy applies to the collection,
      storage, processing, transfer, and use of personal information concerning
      covered individuals, except where the contract with a covered individual
      defines different requirements. Personal information includes any data by
      which a person can be identified or located, as well as any data to which
      HPE has access in customer systems.

      2. Personal information may be collected from covered individuals through
      a variety of means, including, as examples, websites, other ordering
      channels, and service or employment processes. HPE may also obtain
      personal information about covered individuals from other publicly or
      commercially available sources we deem credible.

      3. This global master policy governs customer and employee data protection
      policies; implementation standards; rulebooks; business processes;
      applications; web, product, and service developments; and technology
      roadmaps.

      4. All HPE employees, board members, and contracted parties working on
      behalf of HPE must comply with these policies, even if local law is less
      restrictive. Specific practices are tailored to meet the legal,
      regulatory, and cultural requirements of the countries and regions where
      HPE operates.

   B. Global Policy fundamentals
      1. Our privacy policies reflect current global principles and standards on
      handling personal information. These principles include notice of data
      use, choice of data use, data access, data integrity, security, onward
      transfer, and enforcement/oversight. We abide by the privacy laws in the
      countries where we do business.

   C. Master Policy principles
      1. HPE recognizes that the personal information it receives is held in a
      position of trust. We seek to fulfill that trust by adhering to the
      following general principles regarding personal data.

         a. Notice and choice of data use
            i. HPE does not sell, rent or lease personal information of covered
            individuals.

            ii. HPE provides notice and choice to individuals regarding the type
            of personal information collected and its intended uses.

            iii. HPE reviews the purposes for which data is to be collected from
            covered individuals to ensure that our data collection supports
            reasonable business requirements.

            iv. HPE does not use personal information obtained from covered
            individuals for purposes that are incompatible with the purposes
            stated in our notices.

         b. Data access
            i. HPE provides individuals with reasonable access to the personal
            information they provided to HPE and the ability to review and
            correct it, as applicable.

         c. Data integrity
            i. HPE takes reasonable steps to ensure that all applicable personal
            information is accurate, complete and current.

         d. Data security
            i. HPE is committed to protecting personal information against
            unauthorized use or disclosure.

            ii. HPE provides additional levels of protection for data considered
            to be sensitive personal data.

         e. Onward transfer
            i. HPE does not transfer personal information provided by covered
            individuals to third parties unless those third parties promise to
            give the data the equivalent level of protection that HPE provides.

            ii. As a global company operating in many locations around the
            world, HPE may use Global Delivery Centers located outside of the
            country where the data is collected.

         f. Enforcement/Oversight
            i. HPE uses best commercial practices to obtain personal information
            by lawful and fair means.

            ii. HPE complies with relevant privacy and data protection laws in
            the locations in which HPE operates.

            iii. HPE addresses complaints or disputes regarding personal
            information promptly and courteously.

         To review the most current policy You may access the following link:
           https://www.hpe.com/us/en/privacy/master-policy.html

  ====================================================================
                         ANCILLARY SOFTWARE
  ====================================================================

OpenSSL License
====================================================================
  Copyright (c) 1998-2008 The OpenSSL Project.  All rights reserved.

  Redistribution and use in source and binary forms, with or without
  modification, are permitted provided that the following conditions
  are met:

  1. Redistributions of source code must retain the above copyright
     notice, this list of conditions and the following disclaimer.

  2. Redistributions in binary form must reproduce the above copyright
     notice, this list of conditions and the following disclaimer in
     the documentation and/or other materials provided with the
     distribution.

  3. All advertising materials mentioning features or use of this
     software must display the following acknowledgment:
     "This product includes software developed by the OpenSSL Project
     for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

  4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
     endorse or promote products derived from this software without
     prior written permission. For written permission, please contact
     openssl-core@openssl.org.

  5. Products derived from this software may not be called "OpenSSL"
     nor may "OpenSSL" appear in their names without prior written
     permission of the OpenSSL Project.

  6. Redistributions of any form whatsoever must retain the following
     acknowledgment:
     "This product includes software developed by the OpenSSL Project
     for use in the OpenSSL Toolkit (http://www.openssl.org/)"

  THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
  ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  OF THE POSSIBILITY OF SUCH DAMAGE.
  ====================================================================

  This product includes cryptographic software written by Eric Young
  (eay@cryptsoft.com).  This product includes software written by Tim
  Hudson (tjh@cryptsoft.com).


 Original SSLeay License
 -----------------------

Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
All rights reserved.

  This package is an SSL implementation written
  by Eric Young (eay@cryptsoft.com).
  The implementation was written so as to conform with Netscapes SSL.

  This library is free for commercial and non-commercial use as long as
  the following conditions are aheared to.  The following conditions
  apply to all code found in this distribution, be it the RC4, RSA,
  lhash, DES, etc., code; not just the SSL code.  The SSL documentation
  included with this distribution is covered by the same copyright terms
  except that the holder is Tim Hudson (tjh@cryptsoft.com).

  Copyright remains Eric Young's, and as such any Copyright notices in
  the code are not to be removed.
  If this package is used in a product, Eric Young should be given attribution
  as the author of the parts of the library used.
  This can be in the form of a textual message at program startup or
  in documentation (online or textual) provided with the package.

  Redistribution and use in source and binary forms, with or without
  modification, are permitted provided that the following conditions
  are met:
  1. Redistributions of source code must retain the copyright
     notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright
     notice, this list of conditions and the following disclaimer in the
     documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software
     must display the following acknowledgement:
     "This product includes cryptographic software written by
      Eric Young (eay@cryptsoft.com)"
     The word 'cryptographic' can be left out if the rouines from the library
     being used are not cryptographic related :-).
  4. If you include any Windows specific code (or a derivative thereof) from
     the apps directory (application code) you must include an acknowledgement:
     "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

  THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED
  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO
  EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
  INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
  OR PROFITS; OR BUSINESS INTERRUPTION)
  HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
  OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

  The licence and distribution terms for any publically available version or
  derivative of this code cannot be changed.  i.e. this code cannot simply be
  copied and put under another distribution licence
  [including the GNU Public Licence.]

  ********************************************************************
  Linux-PAM License
  *****************

  Unless otherwise *explicitly* stated the following text describes the licensed
  conditions under which the contents of this Linux-PAM release may be
  distributed:

  Redistribution and use in source and binary forms of Linux-PAM, with or
  without modification, are permitted provided that the following conditions
  are met:

  1. Redistributions of source code must retain any existing copyright notice,
     and this entire permission notice in its entirety, including the disclaimer
     of warranties.

  2. Redistributions in binary form must reproduce all prior and current
     copyright notices, this list of conditions, and the following disclaimer in
     the documentation and/or other materials provided with the distribution.

  3. The name of any author may not be used to endorse or promote products
     derived from this software without their specific prior written permission.

  ALTERNATIVELY, this product may be distributed under the terms of the GNU
  General Public License, in which case the provisions of the GNU GPL are
  required INSTEAD OF the above restrictions. (This clause is necessary due to
  a potential conflict between the GNU GPL and the restrictions contained in
  a BSD-style copyright.)

  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
  FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

  ********************************************************************
  curl License
  ************

  Copyright (c) 1996 - 2016, Daniel Stenberg, daniel@haxx.se, and many
  contributors, see the THANKS file. All rights reserved.

  Permission to use, copy, modify, and distribute this software for any purpose
  with or without fee is hereby granted, provided that the above copyright
  notice and this permission notice appear in all copies.

  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
  IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
  DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
  OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
  OR OTHER DEALINGS IN THE SOFTWARE.

  Except as contained in this notice, the name of a copyright holder shall not
  be used in advertising or otherwise to promote the sale, use or other dealings
  in this Software without prior written authorization of the copyright holder.

  ********************************************************************
  zLib License
  *****************

  zlib.h -- interface of the 'zlib' general purpose compression library version
  1.2.8, April 28th, 2013

Copyright (C) 1995-2013 Jean-loup Gailly and Mark Adler

This software is provided 'as-is', without any express or implied warranty. In
no event will the authors be held liable for any damages arising from the use
of this software.

Permission is granted to anyone to use this software for any purpose, including
commercial applications, and to alter it and redistribute it freely, subject to
the following restrictions:

1. The origin of this software must not be misrepresented; you must not claim
   that you wrote the original software. If you use this software in a product,
   an acknowledgment in the product documentation would be appreciated but is
   not required.

2. Altered source versions must be plainly marked as such, and must not be
   misrepresented as being the original software.

3. This notice may not be removed or altered from any source distribution.

Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu
