  (C) Copyright 1997,1998 Michael Stenns

   Permission to use, copy, modify, and distribute this program for
   non-commercial use and without fee is hereby granted. 

   This software is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 

   -------------------------------------------------------------------------------

   (C) Copyright 1991-1994 The Trustees of Indiana University

   Permission to use, copy, modify, and distribute this program for       
   non-commercial use and without fee is hereby granted, provided that    
   this copyright and permission notice appear on all copies and          
   supporting documentation, the name of Indiana University not be used   
   in advertising or publicity pertaining to distribution of the program  
   without specific prior permission, and notice be given in supporting   
   documentation that copying and distribution is by permission of        
   Indiana University.                                                    
                                                                          
   Indiana University makes no representations about the suitability of   
   this software for any purpose. It is provided "as is" without express  
   or implied warranty.                                                   
                                                                          
   -------------------------------------------------------------------------------

   This software uses the MD5 message-digest algorithm from RSA Data Security, Inc.
   Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
