1 /*************************************************************************** |
1 /*************************************************************************** |
2 * COPYING -- Describes the terms under which Nmap is distributed. A copy * |
2 * COPYING -- Describes the terms under which Nmap is distributed. * |
3 * of the GNU GPL is appended to this file. * |
|
4 * * |
3 * * |
5 ***********************IMPORTANT NMAP LICENSE TERMS************************ |
4 ***********************IMPORTANT NMAP LICENSE TERMS************************ |
6 * * |
5 * * |
7 * The Nmap Security Scanner is (C) 1996-2012 Insecure.Com LLC. Nmap is * |
6 * The Nmap Security Scanner is (C) 1996-2015 Insecure.Com LLC. Nmap is * |
8 * also a registered trademark of Insecure.Com LLC. This program is free * |
7 * also a registered trademark of Insecure.Com LLC. This program is free * |
9 * software; you may redistribute and/or modify it under the terms of the * |
8 * software; you may redistribute and/or modify it under the terms of the * |
10 * GNU General Public License as published by the Free Software * |
9 * GNU General Public License as published by the Free Software * |
11 * Foundation; Version 2 with the clarifications and exceptions described * |
10 * Foundation; Version 2 ("GPL"), BUT ONLY WITH ALL OF THE CLARIFICATIONS * |
12 * below. This guarantees your right to use, modify, and redistribute * |
11 * AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, * |
13 * this software under certain conditions. If you wish to embed Nmap * |
12 * modify, and redistribute this software under certain conditions. If * |
14 * technology into proprietary software, we sell alternative licenses * |
13 * you wish to embed Nmap technology into proprietary software, we sell * |
15 * (contact [email protected]). Dozens of software vendors already * |
14 * alternative licenses (contact [email protected]). Dozens of software * |
16 * license Nmap technology such as host discovery, port scanning, OS * |
15 * vendors already license Nmap technology such as host discovery, port * |
17 * detection, version detection, and the Nmap Scripting Engine. * |
16 * scanning, OS detection, version detection, and the Nmap Scripting * |
18 * * |
17 * Engine. * |
19 * Note that the GPL places important restrictions on "derived works", yet * |
18 * * |
20 * it does not provide a detailed definition of that term. To avoid * |
19 * Note that the GPL places important restrictions on "derivative works", * |
|
20 * yet it does not provide a detailed definition of that term. To avoid * |
21 * misunderstandings, we interpret that term as broadly as copyright law * |
21 * misunderstandings, we interpret that term as broadly as copyright law * |
22 * allows. For example, we consider an application to constitute a * |
22 * allows. For example, we consider an application to constitute a * |
23 * "derivative work" for the purpose of this license if it does any of the * |
23 * derivative work for the purpose of this license if it does any of the * |
24 * following: * |
24 * following with any software or content covered by this license * |
25 * o Integrates source code from Nmap * |
25 * ("Covered Software"): * |
26 * o Reads or includes Nmap copyrighted data files, such as * |
26 * * |
27 * nmap-os-db or nmap-service-probes. * |
27 * o Integrates source code from Covered Software. * |
28 * o Executes Nmap and parses the results (as opposed to typical shell or * |
28 * * |
29 * execution-menu apps, which simply display raw Nmap output and so are * |
29 * o Reads or includes copyrighted data files, such as Nmap's nmap-os-db * |
30 * not derivative works.) * |
30 * or nmap-service-probes. * |
31 * o Integrates/includes/aggregates Nmap into a proprietary executable * |
31 * * |
32 * installer, such as those produced by InstallShield. * |
32 * o Is designed specifically to execute Covered Software and parse the * |
33 * o Links to a library or executes a program that does any of the above * |
33 * results (as opposed to typical shell or execution-menu apps, which will * |
34 * * |
34 * execute anything you tell them to). * |
35 * The term "Nmap" should be taken to also include any portions or derived * |
35 * * |
36 * works of Nmap, as well as other software we distribute under this * |
36 * o Includes Covered Software in a proprietary executable installer. The * |
37 * license such as Zenmap, Ncat, and Nping. This list is not exclusive, * |
37 * installers produced by InstallShield are an example of this. Including * |
38 * but is meant to clarify our interpretation of derived works with some * |
38 * Nmap with other software in compressed or archival form does not * |
39 * common examples. Our interpretation applies only to Nmap--we don't * |
39 * trigger this provision, provided appropriate open source decompression * |
40 * speak for other people's GPL works. * |
40 * or de-archiving software is widely available for no charge. For the * |
41 * * |
41 * purposes of this license, an installer is considered to include Covered * |
42 * If you have any questions about the GPL licensing restrictions on using * |
42 * Software even if it actually retrieves a copy of Covered Software from * |
43 * Nmap in non-GPL works, we would be happy to help. As mentioned above, * |
43 * another source during runtime (such as by downloading it from the * |
44 * we also offer alternative license to integrate Nmap into proprietary * |
44 * Internet). * |
|
45 * * |
|
46 * o Links (statically or dynamically) to a library which does any of the * |
|
47 * above. * |
|
48 * * |
|
49 * o Executes a helper program, module, or script to do any of the above. * |
|
50 * * |
|
51 * This list is not exclusive, but is meant to clarify our interpretation * |
|
52 * of derived works with some common examples. Other people may interpret * |
|
53 * the plain GPL differently, so we consider this a special exception to * |
|
54 * the GPL that we apply to Covered Software. Works which meet any of * |
|
55 * these conditions must conform to all of the terms of this license, * |
|
56 * particularly including the GPL Section 3 requirements of providing * |
|
57 * source code and allowing free redistribution of the work as a whole. * |
|
58 * * |
|
59 * As another special exception to the GPL terms, Insecure.Com LLC grants * |
|
60 * permission to link the code of this program with any version of the * |
|
61 * OpenSSL library which is distributed under a license identical to that * |
|
62 * listed in the included docs/licenses/OpenSSL.txt file, and distribute * |
|
63 * linked combinations including the two. * |
|
64 * * |
|
65 * Any redistribution of Covered Software, including any derived works, * |
|
66 * must obey and carry forward all of the terms of this license, including * |
|
67 * obeying all GPL rules and restrictions. For example, source code of * |
|
68 * the whole work must be provided and free redistribution must be * |
|
69 * allowed. All GPL references to "this License", are to be treated as * |
|
70 * including the terms and conditions of this license text as well. * |
|
71 * * |
|
72 * Because this license imposes special exceptions to the GPL, Covered * |
|
73 * Work may not be combined (even as part of a larger work) with plain GPL * |
|
74 * software. The terms, conditions, and exceptions of this license must * |
|
75 * be included as well. This license is incompatible with some other open * |
|
76 * source licenses as well. In some cases we can relicense portions of * |
|
77 * Nmap or grant special permissions to use it in other open source * |
|
78 * software. Please contact [email protected] with any such requests. * |
|
79 * Similarly, we don't incorporate incompatible open source software into * |
|
80 * Covered Software without special permission from the copyright holders. * |
|
81 * * |
|
82 * If you have any questions about the licensing restrictions on using * |
|
83 * Nmap in other works, are happy to help. As mentioned above, we also * |
|
84 * offer alternative license to integrate Nmap into proprietary * |
45 * applications and appliances. These contracts have been sold to dozens * |
85 * applications and appliances. These contracts have been sold to dozens * |
46 * of software vendors, and generally include a perpetual license as well * |
86 * of software vendors, and generally include a perpetual license as well * |
47 * as providing for priority support and updates. They also fund the * |
87 * as providing for priority support and updates. They also fund the * |
48 * continued development of Nmap. Please email [email protected] for * |
88 * continued development of Nmap. Please email [email protected] for further * |
49 * further information. * |
89 * information. * |
50 * * |
90 * * |
51 * As a special exception to the GPL terms, Insecure.Com LLC grants * |
91 * If you have received a written license agreement or contract for * |
52 * permission to link the code of this program with any version of the * |
92 * Covered Software stating terms other than these, you may choose to use * |
53 * OpenSSL library which is distributed under a license identical to that * |
93 * and redistribute Covered Software under those terms instead of these. * |
54 * listed in the included docs/licenses/OpenSSL.txt file, and distribute * |
|
55 * linked combinations including the two. You must obey the GNU GPL in all * |
|
56 * respects for all of the code used other than OpenSSL. If you modify * |
|
57 * this file, you may extend this exception to your version of the file, * |
|
58 * but you are not obligated to do so. * |
|
59 * * |
|
60 * If you received these files with a written license agreement or * |
|
61 * contract stating terms other than the terms above, then that * |
|
62 * alternative license agreement takes precedence over these comments. * |
|
63 * * |
94 * * |
64 * Source is provided to this software because we believe users have a * |
95 * Source is provided to this software because we believe users have a * |
65 * right to know exactly what a program is going to do before they run it. * |
96 * right to know exactly what a program is going to do before they run it. * |
66 * This also allows you to audit the software for security holes (none * |
97 * This also allows you to audit the software for security holes. * |
67 * have been found so far). * |
|
68 * * |
98 * * |
69 * Source code also allows you to port Nmap to new platforms, fix bugs, * |
99 * Source code also allows you to port Nmap to new platforms, fix bugs, * |
70 * and add new features. You are highly encouraged to send your changes * |
100 * and add new features. You are highly encouraged to send your changes * |
71 * to [email protected] for possible incorporation into the main * |
101 * to the [email protected] mailing list for possible incorporation into the * |
72 * distribution. By sending these changes to Fyodor or one of the * |
102 * main distribution. By sending these changes to Fyodor or one of the * |
73 * Insecure.Org development mailing lists, or checking them into the Nmap * |
103 * Insecure.Org development mailing lists, or checking them into the Nmap * |
74 * source code repository, it is understood (unless you specify otherwise) * |
104 * source code repository, it is understood (unless you specify otherwise) * |
75 * that you are offering the Nmap Project (Insecure.Com LLC) the * |
105 * that you are offering the Nmap Project (Insecure.Com LLC) the * |
76 * unlimited, non-exclusive right to reuse, modify, and relicense the * |
106 * unlimited, non-exclusive right to reuse, modify, and relicense the * |
77 * code. Nmap will always be available Open Source, but this is important * |
107 * code. Nmap will always be available Open Source, but this is important * |
434 This General Public License does not permit incorporating your program into |
463 This General Public License does not permit incorporating your program into |
435 proprietary programs. If your program is a subroutine library, you may |
464 proprietary programs. If your program is a subroutine library, you may |
436 consider it more useful to permit linking proprietary applications with the |
465 consider it more useful to permit linking proprietary applications with the |
437 library. If this is what you want to do, use the GNU Library General Public |
466 library. If this is what you want to do, use the GNU Library General Public |
438 License instead of this License. |
467 License instead of this License. |
439 |
|
440 LICENSE ISSUES |
|
441 ============== |
|
442 |
|
443 The OpenSSL toolkit stays under a dual license, i.e. both the conditions of |
|
444 the OpenSSL License and the original SSLeay license apply to the toolkit. |
|
445 See below for the actual license texts. Actually both licenses are BSD-style |
|
446 Open Source licenses. In case of any license issues related to OpenSSL |
|
447 please contact [email protected]. |
|
448 |
|
449 OpenSSL License |
|
450 --------------- |
|
451 |
|
452 /* ==================================================================== |
|
453 * Copyright (c) 1998-2004 The OpenSSL Project. All rights reserved. |
|
454 * |
|
455 * Redistribution and use in source and binary forms, with or without |
|
456 * modification, are permitted provided that the following conditions |
|
457 * are met: |
|
458 * |
|
459 * 1. Redistributions of source code must retain the above copyright |
|
460 * notice, this list of conditions and the following disclaimer. |
|
461 * |
|
462 * 2. Redistributions in binary form must reproduce the above copyright |
|
463 * notice, this list of conditions and the following disclaimer in |
|
464 * the documentation and/or other materials provided with the |
|
465 * distribution. |
|
466 * |
|
467 * 3. All advertising materials mentioning features or use of this |
|
468 * software must display the following acknowledgment: |
|
469 * "This product includes software developed by the OpenSSL Project |
|
470 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
|
471 * |
|
472 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
|
473 * endorse or promote products derived from this software without |
|
474 * prior written permission. For written permission, please contact |
|
475 * [email protected]. |
|
476 * |
|
477 * 5. Products derived from this software may not be called "OpenSSL" |
|
478 * nor may "OpenSSL" appear in their names without prior written |
|
479 * permission of the OpenSSL Project. |
|
480 * |
|
481 * 6. Redistributions of any form whatsoever must retain the following |
|
482 * acknowledgment: |
|
483 * "This product includes software developed by the OpenSSL Project |
|
484 * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
|
485 * |
|
486 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
|
487 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
488 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
|
489 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
|
490 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
491 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
|
492 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
|
493 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
494 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
|
495 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|
496 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
|
497 * OF THE POSSIBILITY OF SUCH DAMAGE. |
|
498 * ==================================================================== |
|
499 * |
|
500 * This product includes cryptographic software written by Eric Young |
|
501 * ([email protected]). This product includes software written by Tim |
|
502 * Hudson ([email protected]). |
|
503 * |
|
504 */ |
|
505 |
|
506 Original SSLeay License |
|
507 ----------------------- |
|
508 |
|
509 /* Copyright (C) 1995-1998 Eric Young ([email protected]) |
|
510 * All rights reserved. |
|
511 * |
|
512 * This package is an SSL implementation written |
|
513 * by Eric Young ([email protected]). |
|
514 * The implementation was written so as to conform with Netscapes SSL. |
|
515 * |
|
516 * This library is free for commercial and non-commercial use as long as |
|
517 * the following conditions are aheared to. The following conditions |
|
518 * apply to all code found in this distribution, be it the RC4, RSA, |
|
519 * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
|
520 * included with this distribution is covered by the same copyright terms |
|
521 * except that the holder is Tim Hudson ([email protected]). |
|
522 * |
|
523 * Copyright remains Eric Young's, and as such any Copyright notices in |
|
524 * the code are not to be removed. |
|
525 * If this package is used in a product, Eric Young should be given attribution |
|
526 * as the author of the parts of the library used. |
|
527 * This can be in the form of a textual message at program startup or |
|
528 * in documentation (online or textual) provided with the package. |
|
529 * |
|
530 * Redistribution and use in source and binary forms, with or without |
|
531 * modification, are permitted provided that the following conditions |
|
532 * are met: |
|
533 * 1. Redistributions of source code must retain the copyright |
|
534 * notice, this list of conditions and the following disclaimer. |
|
535 * 2. Redistributions in binary form must reproduce the above copyright |
|
536 * notice, this list of conditions and the following disclaimer in the |
|
537 * documentation and/or other materials provided with the distribution. |
|
538 * 3. All advertising materials mentioning features or use of this software |
|
539 * must display the following acknowledgement: |
|
540 * "This product includes cryptographic software written by |
|
541 * Eric Young ([email protected])" |
|
542 * The word 'cryptographic' can be left out if the rouines from the library |
|
543 * being used are not cryptographic related :-). |
|
544 * 4. If you include any Windows specific code (or a derivative thereof) from |
|
545 * the apps directory (application code) you must include an acknowledgement: |
|
546 * "This product includes software written by Tim Hudson ([email protected])" |
|
547 * |
|
548 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
|
549 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
550 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
551 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
|
552 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|
553 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
|
554 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
555 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
556 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
557 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
|
558 * SUCH DAMAGE. |
|
559 * |
|
560 * The licence and distribution terms for any publically available version or |
|
561 * derivative of this code cannot be changed. i.e. this code cannot simply be |
|
562 * copied and put under another distribution licence |
|
563 * [including the GNU Public Licence.] |
|