readme-redist-bins.txt 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. 1. libmagic (ext/fileinfo) see ext/fileinfo/libmagic/LICENSE
  2. 2. Oniguruma (ext/mbstring) see ext/mbstring/oniguruma/COPYING
  3. 3. libmbfl (ext/mbstring) see ext/mbstring/libmbfl/LICENSE
  4. 4. pcrelib (ext/pcre) see ext/pcre/pcrelib/LICENCE
  5. 5. ext/standard crypt
  6. 6. ext/standard crypt's blowfish implementation
  7. 7. Sqlite/Sqlite3 ext/sqlite3 ext/sqlite
  8. 8. ext/standard/rand
  9. 9. ext/standard/scanf
  10. 10. ext/standard/strnatcmp.c
  11. 11. ext/standard/uuencode
  12. 12. libxmlrpc ext/xmlrpc
  13. 13. libzip ext/zip
  14. 14. main/snprintf.c
  15. 15. main/strlcat
  16. 16. main/strlcpy
  17. 17. libgd see ext/gd/libgd/COPYING
  18. 5. ext/standard crypt
  19. FreeSec: libcrypt for NetBSD
  20. Copyright (c) 1994 David Burren
  21. All rights reserved.
  22. Redistribution and use in source and binary forms, with or without
  23. modification, are permitted provided that the following conditions
  24. are met:
  25. 1. Redistributions of source code must retain the above copyright
  26. notice, this list of conditions and the following disclaimer.
  27. 2. Redistributions in binary form must reproduce the above copyright
  28. notice, this list of conditions and the following disclaimer in the
  29. documentation and/or other materials provided with the distribution.
  30. 3. Neither the name of the author nor the names of other contributors
  31. may be used to endorse or promote products derived from this software
  32. without specific prior written permission.
  33. THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
  34. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  35. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  36. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  37. FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  38. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  39. OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  40. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  41. LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  42. OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  43. SUCH DAMAGE.
  44. 6. ext/standard crypt's blowfish implementation
  45. The crypt_blowfish homepage is:
  46. http://www.openwall.com/crypt/
  47. This code comes from John the Ripper password cracker, with reentrant
  48. and crypt(3) interfaces added, but optimizations specific to password
  49. cracking removed.
  50. Written by Solar Designer <solar at openwall.com> in 1998-2011.
  51. No copyright is claimed, and the software is hereby placed in the public
  52. domain. In case this attempt to disclaim copyright and place the software
  53. in the public domain is deemed null and void, then the software is
  54. Copyright (c) 1998-2011 Solar Designer and it is hereby released to the
  55. general public under the following terms:
  56. Redistribution and use in source and binary forms, with or without
  57. modification, are permitted.
  58. There's ABSOLUTELY NO WARRANTY, express or implied.
  59. It is my intent that you should be able to use this on your system,
  60. as part of a software package, or anywhere else to improve security,
  61. ensure compatibility, or for any other purpose. I would appreciate
  62. it if you give credit where it is due and keep your modifications in
  63. the public domain as well, but I don't require that in order to let
  64. you place this code and any modifications you make under a license
  65. of your choice.
  66. This implementation is mostly compatible with OpenBSD's bcrypt.c (prefix
  67. "$2a$") by Niels Provos <provos at citi.umich.edu>, and uses some of his
  68. ideas. The password hashing algorithm was designed by David Mazieres
  69. <dm at lcs.mit.edu>. For more information on the level of compatibility,
  70. please refer to the comments in BF_set_key() and to the crypt(3) man page
  71. included in the crypt_blowfish tarball.
  72. There's a paper on the algorithm that explains its design decisions:
  73. http://www.usenix.org/events/usenix99/provos.html
  74. Some of the tricks in BF_ROUND might be inspired by Eric Young's
  75. Blowfish library (I can't be sure if I would think of something if I
  76. hadn't seen his code).
  77. 7. Sqlite/Sqlite3 ext/sqlite3 ext/sqlite
  78. The author disclaims copyright to this source code. In place of
  79. a legal notice, here is a blessing:
  80. May you do good and not evil.
  81. May you find forgiveness for yourself and forgive others.
  82. May you share freely, never taking more than you give.
  83. 8. ext/standard/rand
  84. The following php_mt_...() functions are based on a C++ class MTRand by
  85. Richard J. Wagner. For more information see the web page at
  86. http://www-personal.engin.umich.edu/~wagnerr/MersenneTwister.html
  87. Mersenne Twister random number generator -- a C++ class MTRand
  88. Based on code by Makoto Matsumoto, Takuji Nishimura, and Shawn Cokus
  89. Richard J. Wagner v1.0 15 May 2003 rjwagner@writeme.com
  90. The Mersenne Twister is an algorithm for generating random numbers. It
  91. was designed with consideration of the flaws in various other generators.
  92. The period, 2^19937-1, and the order of equidistribution, 623 dimensions,
  93. are far greater. The generator is also fast; it avoids multiplication and
  94. division, and it benefits from caches and pipelines. For more information
  95. see the inventors' web page at http://www.math.keio.ac.jp/~matumoto/emt.html
  96. Reference
  97. M. Matsumoto and T. Nishimura, "Mersenne Twister: A 623-Dimensionally
  98. Equidistributed Uniform Pseudo-Random Number Generator", ACM Transactions on
  99. Modeling and Computer Simulation, Vol. 8, No. 1, January 1998, pp 3-30.
  100. Copyright (C) 1997 - 2002, Makoto Matsumoto and Takuji Nishimura,
  101. Copyright (C) 2000 - 2003, Richard J. Wagner
  102. All rights reserved.
  103. Redistribution and use in source and binary forms, with or without
  104. modification, are permitted provided that the following conditions
  105. are met:
  106. 1. Redistributions of source code must retain the above copyright
  107. notice, this list of conditions and the following disclaimer.
  108. 2. Redistributions in binary form must reproduce the above copyright
  109. notice, this list of conditions and the following disclaimer in the
  110. documentation and/or other materials provided with the distribution.
  111. 3. The names of its contributors may not be used to endorse or promote
  112. products derived from this software without specific prior written
  113. permission.
  114. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  115. "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  116. LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  117. A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
  118. CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  119. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  120. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
  121. PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
  122. LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  123. NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  124. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  125. 9. ext/standard/scanf
  126. scanf.c --
  127. This file contains the base code which implements sscanf and by extension
  128. fscanf. Original code is from TCL8.3.0 and bears the following copyright:
  129. This software is copyrighted by the Regents of the University of
  130. California, Sun Microsystems, Inc., Scriptics Corporation,
  131. and other parties. The following terms apply to all files associated
  132. with the software unless explicitly disclaimed in individual files.
  133. The authors hereby grant permission to use, copy, modify, distribute,
  134. and license this software and its documentation for any purpose, provided
  135. that existing copyright notices are retained in all copies and that this
  136. notice is included verbatim in any distributions. No written agreement,
  137. license, or royalty fee is required for any of the authorized uses.
  138. Modifications to this software may be copyrighted by their authors
  139. and need not follow the licensing terms described here, provided that
  140. the new terms are clearly indicated on the first page of each file where
  141. they apply.
  142. IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY
  143. FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
  144. ARISING OUT OF THE USE OF THIS SOFTWARE, ITS DOCUMENTATION, OR ANY
  145. DERIVATIVES THEREOF, EVEN IF THE AUTHORS HAVE BEEN ADVISED OF THE
  146. POSSIBILITY OF SUCH DAMAGE.
  147. THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY WARRANTIES,
  148. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY,
  149. FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THIS SOFTWARE
  150. IS PROVIDED ON AN "AS IS" BASIS, AND THE AUTHORS AND DISTRIBUTORS HAVE
  151. NO OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR
  152. MODIFICATIONS.
  153. GOVERNMENT USE: If you are acquiring this software on behalf of the
  154. U.S. government, the Government shall have only "Restricted Rights"
  155. in the software and related documentation as defined in the Federal
  156. Acquisition Regulations (FARs) in Clause 52.227.19 (c) (2). If you
  157. are acquiring the software on behalf of the Department of Defense, the
  158. software shall be classified as "Commercial Computer Software" and the
  159. Government shall have only "Restricted Rights" as defined in Clause
  160. 252.227-7013 (c) (1) of DFARs. Notwithstanding the foregoing, the
  161. authors grant the U.S. Government and others acting in its behalf
  162. permission to use and distribute the software in accordance with the
  163. terms specified in this license.
  164. 10. ext/standard/strnatcmp.c
  165. strnatcmp.c -- Perform 'natural order' comparisons of strings in C.
  166. Copyright (C) 2000 by Martin Pool <mbp@humbug.org.au>
  167. This software is provided 'as-is', without any express or implied
  168. warranty. In no event will the authors be held liable for any damages
  169. arising from the use of this software.
  170. Permission is granted to anyone to use this software for any purpose,
  171. including commercial applications, and to alter it and redistribute it
  172. freely, subject to the following restrictions:
  173. 1. The origin of this software must not be misrepresented; you must not
  174. claim that you wrote the original software. If you use this software
  175. in a product, an acknowledgment in the product documentation would be
  176. appreciated but is not required.
  177. 2. Altered source versions must be plainly marked as such, and must not be
  178. misrepresented as being the original software.
  179. 3. This notice may not be removed or altered from any source distribution.
  180. 11. ext/standard/uuencode
  181. Portions of this code are based on Berkeley's uuencode/uudecode
  182. implementation.
  183. Copyright (c) 1983, 1993
  184. The Regents of the University of California. All rights reserved.
  185. Redistribution and use in source and binary forms, with or without
  186. modification, are permitted provided that the following conditions
  187. are met:
  188. 1. Redistributions of source code must retain the above copyright
  189. notice, this list of conditions and the following disclaimer.
  190. 2. Redistributions in binary form must reproduce the above copyright
  191. notice, this list of conditions and the following disclaimer in the
  192. documentation and/or other materials provided with the distribution.
  193. 3. All advertising materials mentioning features or use of this software
  194. must display the following acknowledgement:
  195. This product includes software developed by the University of
  196. California, Berkeley and its contributors.
  197. 4. Neither the name of the University nor the names of its contributors
  198. may be used to endorse or promote products derived from this software
  199. without specific prior written permission.
  200. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  201. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  202. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  203. ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  204. FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  205. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  206. OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  207. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  208. LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  209. OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  210. SUCH DAMAGE.
  211. 12. libxmlrpc ext/xmlrpc
  212. Copyright 2000 Epinions, Inc.
  213. Subject to the following 3 conditions, Epinions, Inc. permits you, free
  214. of charge, to (a) use, copy, distribute, modify, perform and display this
  215. software and associated documentation files (the "Software"), and (b)
  216. permit others to whom the Software is furnished to do so as well.
  217. 1) The above copyright notice and this permission notice shall be included
  218. without modification in all copies or substantial portions of the
  219. Software.
  220. 2) THE SOFTWARE IS PROVIDED "AS IS", WITHOUT ANY WARRANTY OR CONDITION OF
  221. ANY KIND, EXPRESS, IMPLIED OR STATUTORY, INCLUDING WITHOUT LIMITATION ANY
  222. IMPLIED WARRANTIES OF ACCURACY, MERCHANTABILITY, FITNESS FOR A PARTICULAR
  223. PURPOSE OR NONINFRINGEMENT.
  224. 3) IN NO EVENT SHALL EPINIONS, INC. BE LIABLE FOR ANY DIRECT, INDIRECT,
  225. SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES OR LOST PROFITS ARISING OUT
  226. OF OR IN CONNECTION WITH THE SOFTWARE (HOWEVER ARISING, INCLUDING
  227. NEGLIGENCE), EVEN IF EPINIONS, INC. IS AWARE OF THE POSSIBILITY OF SUCH
  228. DAMAGES.
  229. 13. libzip ext/zip
  230. zip.h -- exported declarations.
  231. Copyright (C) 1999-2009 Dieter Baron and Thomas Klausner
  232. This file is part of libzip, a library to manipulate ZIP archives.
  233. The authors can be contacted at <libzip@nih.at>
  234. Redistribution and use in source and binary forms, with or without
  235. modification, are permitted provided that the following conditions
  236. are met:
  237. 1. Redistributions of source code must retain the above copyright
  238. notice, this list of conditions and the following disclaimer.
  239. 2. Redistributions in binary form must reproduce the above copyright
  240. notice, this list of conditions and the following disclaimer in
  241. the documentation and/or other materials provided with the
  242. distribution.
  243. 3. The names of the authors may not be used to endorse or promote
  244. products derived from this software without specific prior
  245. written permission.
  246. THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS
  247. OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  248. WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  249. ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
  250. DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  251. DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  252. GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  253. INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
  254. IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  255. OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
  256. IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  257. 14. main/snprintf.c
  258. Copyright (c) 2002, 2006 Todd C. Miller <Todd.Miller@courtesan.com>
  259. Permission to use, copy, modify, and distribute this software for any
  260. purpose with or without fee is hereby granted, provided that the above
  261. copyright notice and this permission notice appear in all copies.
  262. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  263. WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  264. MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  265. ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  266. WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  267. ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  268. OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  269. Sponsored in part by the Defense Advanced Research Projects
  270. Agency (DARPA) and Air Force Research Laboratory, Air Force
  271. Materiel Command, USAF, under agreement number F39502-99-1-0512.
  272. main/spprintf
  273. Copyright (c) 1995-1998 The Apache Group. All rights reserved.
  274. Redistribution and use in source and binary forms, with or without
  275. modification, are permitted provided that the following conditions
  276. are met:
  277. 1. Redistributions of source code must retain the above copyright
  278. notice, this list of conditions and the following disclaimer.
  279. 2. Redistributions in binary form must reproduce the above copyright
  280. notice, this list of conditions and the following disclaimer in
  281. the documentation and/or other materials provided with the
  282. distribution.
  283. 3. All advertising materials mentioning features or use of this
  284. software must display the following acknowledgment:
  285. "This product includes software developed by the Apache Group
  286. for use in the Apache HTTP server project (http://www.apache.org/)."
  287. 4. The names "Apache Server" and "Apache Group" must not be used to
  288. endorse or promote products derived from this software without
  289. prior written permission.
  290. 5. Redistributions of any form whatsoever must retain the following
  291. acknowledgment:
  292. "This product includes software developed by the Apache Group
  293. for use in the Apache HTTP server project (http://www.apache.org/)."
  294. THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP ``AS IS'' AND ANY
  295. EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  296. IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  297. PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR
  298. ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  299. SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  300. NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  301. LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  302. HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  303. STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  304. ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  305. OF THE POSSIBILITY OF SUCH DAMAGE.
  306. ====================================================================
  307. This software consists of voluntary contributions made by many
  308. individuals on behalf of the Apache Group and was originally based
  309. on public domain software written at the National Center for
  310. Supercomputing Applications, University of Illinois, Urbana-Champaign.
  311. For more information on the Apache Group and the Apache HTTP server
  312. project, please see <http://www.apache.org/>.
  313. This code is based on, and used with the permission of, the
  314. SIO stdio-replacement strx_* functions by Panos Tsirigotis
  315. <panos@alumni.cs.colorado.edu> for xinetd.
  316. 15. main/strlcat
  317. 16. main/strlcpy
  318. Copyright (c) 1998 Todd C. Miller <Todd.Miller@courtesan.com>
  319. All rights reserved.
  320. Redistribution and use in source and binary forms, with or without
  321. modification, are permitted provided that the following conditions
  322. are met:
  323. 1. Redistributions of source code must retain the above copyright
  324. notice, this list of conditions and the following disclaimer.
  325. 2. Redistributions in binary form must reproduce the above copyright
  326. notice, this list of conditions and the following disclaimer in the
  327. documentation and/or other materials provided with the distribution.
  328. 3. The name of the author may not be used to endorse or promote products
  329. derived from this software without specific prior written permission.
  330. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
  331. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
  332. AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
  333. THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
  334. EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
  335. PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
  336. OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  337. WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
  338. OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  339. ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.