<> Trend Micro, Inc. 28 Mars 2014 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Trend Micro(TM) Mobile Security for Enterprise Version 9.0 Service Pack 1 (SP1) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Remarques : Ce fichier Lisez-moi est en application au moment de la publication du produit. Toutefois, il vous est recommandé de vérifier si des mises à jour de documentation sont disponibles sur le site Web de Trend Micro : http://downloadcenter.trendmicro.com/?regs=FR Trend Micro cherche en permanence à améliorer sa documentation. Si vous avez des questions, des commentaires ou des suggestions sur ce document ou toute autre publication de Trend Micro, merci de nous contacter à docs@trendmicro.com. Vos remarques sont toujours les bienvenues. Vous pouvez évaluer cette documentation sur le site Web suivant : http://www.trendmicro.com/download/documentation/rating.asp. Sommaire ===================================================================== 1. À propos de Trend Micro Mobile Security 1.1 Présentation de cette version 1.2 À qui cette version est-elle destinée ? 2. Nouveautés 3. Documentation 4. Configuration minimale requise 5. Préparation de la préinstallation 6. Installation 7. Configuration après l'installation 8. Problèmes connus 9. Historique des versions 10. Contact 11. À propos de Trend Micro 12. Contrat de licence ===================================================================== 1. À propos de Trend Micro Mobile Security ===================================================================== 1.1 Présentation de cette version ===================================================================== Trend Micro(TM) Mobile Security for Enterprise 9.0 SP1 intègre les technologies de sécurité les plus avancées pour protéger les dispositifs mobiles des menaces. Les filtres intégrés peuvent également bloquer les appels téléphoniques et les SMS indésirables. Mobile Security possède aussi la sécurité Web qui peut vous aider à vous protéger contre la fraude en ligne, comme le phishing et le pharming, en bloquant l'accès à certains sites à risque sur le Web. La fonction de protection par mot de passe de connexion permet de protéger votre dispositif mobile d'un accès non autorisé. Cette version de Mobile Security offre les fonctions suivantes : - Une prise en charge de nombreuses plates-formes, parmi lesquelles iOS, Android, BlackBerry, Windows Mobile et Symbian - Des mises à jour manuelles ou programmées de composants à partir du serveur Trend Micro Mobile Security pour vous assurer la mise à jour des signatures, des stratégies de sécurité et des programmes - L'authentification des connexions pour empêcher un accès non autorisé au dispositif mobile - Une protection contre les désinstallations à l'aide d'un mot de passe prédéfini - La technologie de scan anti-programmes malveillants primée contre les menaces mobiles - La sécurité Internet pour garantir une navigation sécurisée sur Internet - Un filtrage des messages SMS pour bloquer les SMS indésirables - Une fonction de filtrage des appels pour bloquer les appels anonymes ou non sollicités - Des journaux complets permettant de suivre les résultats d'analyse, les menaces de sécurité trouvées, les SMS et les appels filtrés, les règles de pare-feu appliquées, et d'autres événements - Elle permet à l'administrateur de : - Fournir les paramètres Wi-Fi et de contrôler différentes fonctions des dispositifs mobiles - Appliquer l'authentification par mot de passe et configurer la complexité du mot de passe - Autoriser ou bloquer l'installation de certaines applications sur les dispositifs mobiles - Créer une liste d'applications pour les utilisateurs, à installer sur leurs dispositifs mobiles par le biais des applications d'entreprise - Verrouiller, localiser ou supprimer à distance les données du dispositif mobile - Authentification d'un lot de dispositifs mobiles en utilisant leurs numéros IMEI et/ou leurs adresses Wi-Fi MAC. 1.2 À qui cette version est-elle destinée ? ===================================================================== Tout utilisateur qui veut installer Mobile Security for Enterprise Version 9.0 SP1. 2. Nouveautés ===================================================================== - Intégration complète avec Trend Micro Control Manager. - Cette version permet le chargement du journal d'état, des informations utilisateur et des informations des dispositifs mobiles vers Trend Micro Control Manager. - Prise en charge de l'authentification unique pour permettre à l'administrateur de Trend Micro Control Manager d'accéder à la console Web de Trend Micro Mobile Security sans avoir à fournir d'informations d'authentification. - Paramètres de point d'accès Wi-Fi pour dispositifs mobiles iOS  7.0 ou version supérieure. - Paramètres de gestion « Open-in » accessibles aux administrateurs, leur permettant de protéger les données d'entreprise en limitant l'ouverture de fichiers dans certaines applications. - Prise en charge de l'authentification unique pour les dispositifs mobiles iOS 7.0 ou version supérieure afin de permettre l'utilisation des mêmes informations d'authentification sur un ensemble d'applications spécifiées par l'administrateur. - Prise en charge de la protection contre les menaces Internet pour les dispositifs mobiles iOS 7.0 ou version supérieure afin de filtrer certains sites Web ou tout contenu réservé aux adultes. - Prise en charge du VPN par application pour les dispositifs mobiles iOS 7.0 ou version supérieure, afin de permettre aux administrateurs de lier un VPN à certaines applications, de sorte que ces dernières utilisent ce VPN pour accéder au réseau. - Prise en charge IPv6 pour les agents de serveur et de dispositif mobile. - Prise en charge d'Exchange Connector pour Microsoft Exchange Server   2013 3. Documentation ======================================================================== Outre ce fichier Lisez-moi, la documentation du produit comprend les éléments suivants : - Manuel de l'administrateur : présentation du produit et instructions de configuration détaillées pour les administrateurs réseau. - Manuel d'installation et de déploiement : planification de l'installation, instructions d'installation et de configuration initiale et informations de base visant à aider l'utilisateur à travailler efficacement. - Manuel de l'utilisateur : présentation du produit et configuration détaillée pour les dispositifs mobiles. Les versions électroniques des manuels sont disponibles à l'adresse suivante : http://downloadcenter.trendmicro.com/?regs=FR - Aide en ligne : écrans d'aide contextuelle destinés à guider l'utilisateur dans l'exécution d'une tâche. - Base de connaissances : base de données consultable regroupant les solutions liées aux problèmes connus et les conseils de dépannage : http://esupport.trendmicro.com/ 4. Configuration minimale requise ======================================================================== Pour l'installation de Trend Micro Mobile Security for Enterprise 9.0 SP1 les configurations minimales pour le logiciel et le matériel sont les suivantes : 4.1 Serveur d'administration Mobile Security : ======================================================================== Matériel ~~~~~~~~ - Processeur Intel(TM) Pentium(TM) 1 GHz ou équivalent - Au minimum 1 Go de RAM - Au minimum 300 Mo d'espace disque disponible - Un écran d'au moins 256 couleurs prenant en charge une résolution de 800x600 Plate-forme ~~~~~~~~ - Famille des systèmes d'exploitation Microsoft Windows 2003 Server - Famille des systèmes d'exploitation Microsoft Windows 2003 R2 Server - Famille des systèmes d'exploitation Microsoft Windows 2008 Server - Famille des systèmes d'exploitation Microsoft Windows 2008 R2 Server - Famille des systèmes d'exploitation Microsoft Windows 2012 Server - Famille des systèmes d'exploitation Microsoft Windows 2012 R2 Server Plate-forme recommandée ~~~~~~~~ - Windows Server 2003 R2 Enterprise Edition - Windows Server 2003 Enterprise Edition - Windows Server 2008 R2 Enterprise Edition - Windows Server 2008 Enterprise Edition SP1 - Windows Server 2008 Standard Edition - Windows Web Server 2008 Edition SP1 4.2 Serveur de communication Mobile Security ======================================================================== Matériel ~~~~~~~~ - Processeur Intel(TM) Pentium(TM) 1 GHz ou équivalent - Au minimum 1 Go de RAM - Au minimum 40 Mo d'espace disque disponible - Un écran d'au moins 256 couleurs prenant en charge une résolution de 800x600 Plate-forme ~~~~~~~~ - Famille des systèmes d'exploitation Microsoft Windows 2003 Server - Famille des systèmes d'exploitation Microsoft Windows 2003 R2 Server - Famille des systèmes d'exploitation Microsoft Windows 2008 Server - Famille des systèmes d'exploitation Microsoft Windows 2008 R2 Server - Famille des systèmes d'exploitation Microsoft Windows 2012 Server - Famille des systèmes d'exploitation Microsoft Windows 2012 R2 Server Plate-forme recommandée ~~~~~~~~~~~~~~~~~~~~ - Windows Server 2008 R2 Enterprise Edition - Windows Server 2008 Enterprise Edition SP1 - Windows Server 2003 R2 Enterprise Edition - Windows Server 2003 Enterprise Edition - Windows Server 2008 Standard Edition - Windows Web Server 2008 Edition SP1 4.3 Connecteur Exchange Mobile Security ======================================================================== Plate-forme ~~~~~~~~ Windows Server 2008 R2 (64-bit) Matériel ~~~~~~~~ - Processeur 1-GHz Intel™ Pentium™ ou équivalent - Au minimum 1 Go de RAM - Au minimum 200 Mo d'espace disque disponible 4.4 Expéditeur de SMS ======================================================================== Système d'exploitation ~~~~~~~~~~~~~~~~~~~~ - Android 2.1 et ultérieur 4.5 Web Serveur pour le serveur de communication ======================================================================== - Microsoft Internet Information Server (IIS) 6.0/7.0/7.5 4.6 SQL Server ======================================================================== - Microsoft SQL Server 2005/2008/2008 R2/2012/2005 Express/2008 Express/ 2008 R2 Express/2012 Express 4.7 BlackBerry Enterprise Server ======================================================================== - BES 5.x 4.8 Dispositif mobile iOS ======================================================================== Système d'exploitation ~~~~~~~~~~~~~~~~~~~~ - iOS4.3 et ultérieur Espace disque disponible ~~~~~~~~~~~~~~~~~~~~ 3 Mo minimum Mémoire ~~~~~~~~ 4 Mo 4.9 Dispositif mobile Symbian S60 ======================================================================== Plate-forme ~~~~~~~~ Series 60 3e/5e Édition Système d'exploitation ~~~~~~~~~~~~~~~~~~~~ Symbian OS(TM) 9.x Espace disque disponible ~~~~~~~~~~~~~~~~~~~~ 5 Mo minimum Mémoire ~~~~~~~~ 2 Mo minimum ; 3 Mo recommandé 4.10 Dispositif Windows Mobile ======================================================================== Système d'exploitation ~~~~~~~~~~~~~~~~~~~~ - Windows Mobile 5 PocketPC Téléphone/PocketPC/Smartphone - Windows Mobile 6 Professional/Classic/Standard Espace disque disponible ~~~~~~~~~~~~~~~~~~~~ 5,5 Mo Mémoire ~~~~~~~~ 3 Mo 4.11 Dispositif mobile Android ======================================================================== Système d'exploitation ~~~~~~~~~~~~~~~~~~~~ - Android 2.1 ou version ultérieure Espace disque disponible ~~~~~~~~~~~~~~~~~~~~ 8 Mo minimum Mémoire ~~~~~~~~ 10 Mo 5. Préparation de la préinstallation ======================================================================== Consultez le Manuel d'installation et de déploiement pour connaître les étapes détaillées de la configuration et de la préparation de la préinstallation. 6. Installation ======================================================================== Cette section décrit les étapes clés de l'installation de ce produit. Pour des étapes détaillées d'installation, veuillez consulter le Manuel d'installation et de déploiement. Mobile Security for Enterprise 9.0 est constitué de cinq éléments : - Serveur d'administration Mobile Security - Serveur de communication Mobile Security - Expéditeur de SMS - Connecteur Exchange - Agents de dispositif mobile (les clients Mobile Security) En fonction de votre topologie réseau et de vos besoins, vous pouvez installer uniquement les composants nécessaires. Serveur d'administration Mobile Security --------------------------------------------------------------------- Le serveur d'administration Mobile Security vous permet de contrôler les agents de dispositif mobile à partir de la console Web d'administration. Une fois les dispositifs mobiles inscrits sur le serveur, vous pouvez configurer les stratégies des agents de dispositif mobile et effectuer des mises à jour. Serveur de communication Mobile Security --------------------------------------------------------------------- Le serveur de communication Mobile Security gère les communications entre le serveur d'administration Mobile Security et les agents de dispositifs mobiles. Les agents de dispositif mobile peuvent se connecter à l'adresse IP publique du serveur de communication. Mobile Security for Enterprise 9.0 SP1 prend en charge deux types de serveur de communication : le serveur de communication local (qui est installé dans le réseau local) et le serveur de communication du nuage (qui est installé dans le nuage et est maintenu par Trend Micro). Connecteur Exchange --------------------------------------------------------------------- Vous pouvez installer le connecteur Exchange si vous avez l'intention de de gérer des dispositifs mobiles Windows Phone, Android ou iOS qui utilisent le service Exchange ActiveSync. Expéditeur de SMS --------------------------------------------------------------------- Vous pouvez installer un expéditeur de SMS si vous souhaitez utiliser la fonction de messagerie SMS pour les notifications. Agent de dispositif mobile (client Mobile Security) --------------------------------------------------------------------- Installez l'agent de dispositif mobile (le programme client Mobile Security) sur les plates-formes de dispositifs mobiles prises en charge à l'aide de l'une des méthodes suivantes : - Notification par message SMS - Notification par message électronique - Carte mémoire - Installation manuelle Remarque : Sur un navigateur Web via lequel vous avez accédé à la console Web de Trend Micro Mobile Security, nettoyez le cache du navigateur après avoir procédé à la mise à niveau vers Mobile Security 9.0 SP1. Remarque : Trend Micro ne peut pas garantir la compatibilité entre Mobile Security et les logiciels de chiffrement du système de fichiers. D'autres produits logiciels offrant des fonctionnalités similaires, telles que le scan anti-programmes malveillants, la gestion SMS et la protection par pare-feu, risquent également d'être incompatibles avec Mobile Security. Vous pouvez être invité à désinstaller ces programmes avant de pouvoir installer Mobile Security sur votre dispositif mobile. 7. Configuration après l'installation ======================================================================== Consultez le Manuel de l'administrateur pour obtenir des informations sur la configuration après l'installation. 8. Problèmes connus ======================================================================== 8.1 L'état du dispositif mobile qui s'affiche dans le serveur Mobile Security n'est pas "Inactif" même après que : - l'agent de dispositif mobile Windows Mobile/Symbian/Android est désinstallé, - le "profil d'inscription MDM" iOS est supprimé du dispositif mobile. --------------------------------------------------------------------- Cela peut arriver si l'agent de dispositif mobile Windows Mobile/Symbian/Android est désinstallé ou si le "profil d'inscription MDM" iOS est supprimé du dispositif mobile alors qu'il n'est pas connecté au réseau. En conséquence, le serveur Mobile Security continue d'afficher le dispositif mobile dans la liste de dispositifs, même après la désinstallation du client Mobile Security du dispositif mobile. Cependant, le dispositif mobile passe à l'état "Désynchronisé". 8.2 Impossible d'enregistrer les paramètres du serveur de communication si le mot de passe des informations d'identification du service d'administration BlackBerry contient un tiret (-). --------------------------------------------------------------------- L'outil de commande BlackBerry ne prend pas en charge le tiret (-) dans les mots de passe des informations d'identification du service d'administration BlackBerry. En conséquence, si cette situation survient, Mobile Security ne pourra pas enregistrer les paramètres du serveur de communication. 8.3 La stratégie de mise en service d'Exchange ActiveSync ne contient ni le nom ni l'adresse électronique de l'utilisateur. --------------------------------------------------------------------- Ce problème survient si le nom ou l'adresse électronique de l'utilisateur n'est pas configuré pour le dispositif mobile iOS. Pour résoudre ce problème, configurez Active Directory par le biais de "Administrateur" > "Paramètres Active Directory", puis rajoutez l'utilisateur d'Active Directory. 8.4 Mobile Security ne peut pas déchiffrer les numéros de téléphone des dispositifs mobiles Android. --------------------------------------------------------------------- Mobile Security requiert l'API Android par défaut pour déchiffrer les numéros de téléphone d'un dispositif mobile. Si le dispositif mobile n'utilise pas l'API Android par défaut, Mobile Security ne peut déchiffrer les numéros de téléphone. Ceci peut également survenir si le numéro de téléphone n'est pas stocké dans la carte SIM, mais dans la base de données de l'opérateur. 8.5 Les utilisateurs ne peuvent pas mettre à niveau le package d'application non personnalisée vers un package d'applications personnalisée. --------------------------------------------------------------------- Comme les packages d'application personnalisée et non personnalisée utilisent des certificats d'authentification différents, il n'est pas possible de réaliser une mise à niveau du package d'application non personnalisée vers un package d'application personnalisée, et réciproquement. Pour résoudre ce problème, supprimez manuellement Mobile Security du téléphone mobile puis réinstallez le package d'application personnalisée. 8.6 Parfois, les agents de dispositif mobile Android ou iOS ne reçoivent pas de mise à jour de stratégie ou d'instruction de verrouillage/effacement/localisation à distance émise par le serveur. --------------------------------------------------------------------- Si la connexion réseau entre le client et le serveur n'est pas stable, ce problème connu peut survenir. 8.7 Il peut arriver qu'un dispositif mobile Android utilisant Exchange ActiveSync n'affiche pas l'état correct dans l'onglet Dispositifs Exchange ActiveSync dans Mobile Security. --------------------------------------------------------------------- Ce cas se produit lorsque le serveur Mobile Security n'est pas en mesure d'obtenir l'identité correcte du dispositif mobile depuis Exchange Server. 8.8 Le serveur Mobile Security affiche plusieurs enregistrements du même dispositif Symbian or Windows Mobile. --------------------------------------------------------------------- Si un dispositif Symbian or Windows Mobile se réinscrit sur le serveur, le serveur Mobile Security crée un nouvel enregistrement pour le même dispositif mobile. Vous pouvez sans risque supprimer de Mobile Security l'enregistrement le plus ancien. 8.9 Les agents de dispositif mobile ne peuvent parfois pas se connecter au serveur de communication du nuage (CCS). --------------------------------------------------------------------- Les agents de dispositif mobile se connectent par Internet au serveur de communication du nuage. Ce problème connu peut survenir si la connexion entre l'agent de dispositif mobile et le serveur de communication du nuage est instable. 8.10 Internet Explorer plante lors de l'utilisation de la console Web d'administration de Trend Micro Mobile Security. --------------------------------------------------------------------- Si la console Web d'administration Mobile Security n'est pas fermée dans Internet Explorer pendant un certain temps (variable suivant la taille de la mémoire), le problème de mémoire insuffisante survient et entraîne le plantage d'Internet Explorer. Pour plus de détails consultez : http://support.microsoft.com/kb/982094/en-us 8.11 Le programme d'installation du serveur d'administration ne peut pas installer SQL Server 2005 Express. --------------------------------------------------------------------- Comme Windows Server 2012 ne prend pas en charge SQL Server 2005 Express, cela peut se produire si vous essayez d'installer le serveur d'administration sur Windows Server 2012. Pour résoudre le problème, connectez-vous à la base de données sur un autre ordinateur, ou installez une version de SQL Server prise en charge et connectez-vous à la base de données existante pendant l'installation du serveur d'administration. 8.12 Mobile Security affiche l'état du connecteur Exchange comme Connecté, même lorsque le connecteur Exchange a été désinstallé de l'ordinateur. De plus, le connecteur Exchange ne peut pas se réinstaller puisque le programme d'installation ne peut pas se connecter au serveur Mobile Security. --------------------------------------------------------------------- Cela se produit lorsque le connecteur Exchange est désinstallé alors qu'il est déconnecté du serveur Mobile Security. Le serveur Mobile Security n'a pas pu recevoir la notification de désintallation du connecteur Exchange, et il affichera donc un état incorrect. S'il affiche Connecté pour l'état du connecteur Exchange, le serveur Mobile Security ne cherchera pas à se connecter à un autre connecteur Exchange. Pour résoudre ce problème connu, suivez la procédure suivante : 1. Connectez-vous à la console d'administration Mobile Security. 2. Avec le même navigateur Internet, ouvrez l'URL suivante : https://:/mdm/cgi/web_service.dll?tmms_action=mdm_register_new_connector 3. Remplacez et avec les véritables serveur Mobile Security et numéro de port. 4. Appuyez sur Entrée. Le message suivant devrait apparaître : { "error_code" : 1, "message" : "Réussi", "heure" : xxxxxxxxxx } xxxxxxxxxx étant l'horodatage. Après avoir exécuté les étapes qui précédent, Mobile Security réinitialisera les paramètres d'intégration d'Exchange Server, et vous devriez pouvoir maintenant installer le connecteur Exchange. 8.13 Impossible d'accéder à certains services Web externes lorsque Trend Micro Mobile Security est déployé dans un environnement IPv6 pur. --------------------------------------------------------------------- Cela se produit lorsque les services Web externes ne prennent pas en charge IPv6. 8.14 Impossible d'accéder au serveur SMTP ou à Active Directory lorsque le serveur d'administration connecte ces serveurs à l'aide d'IPv6. --------------------------------------------------------------------- Il s'agit d'un problème connu dans cette version. 8.15 Il arrive que les agents de dispositif mobile iOS ne parviennent pas à s'inscrire auprès du serveur Mobile Security. --------------------------------------------------------------------- Cela se produit lorsque le serveur SCEP utilise une adresse IPv6 numérique pour inscrire des dispositifs mobiles iOS. Pour résoudre ce problème, configurez SCEP à l'aide du nom de domaine sur la console Web de Mobile Security. 9. Historique des versions ======================================================================== Enterprise Edition Version 7.0 Juin 2011 Enterprise Edition Version 7.1 Déc 2011 Enterprise EditionVersion 8.0 Juin 2012 Enterprise EditionVersion 9.0 juillet 2013 10. Contact ======================================================================== Une licence de logiciel Trend Micro inclut généralement le droit de bénéficier de mises à jour de produit, de mises à jour de fichiers de signatures et de l'assistance technique de base pendant un (1) an à partir de la date d'achat. Une fois cette période terminée, la maintenance doit être renouvelée tous les ans par le biais des forfaits de maintenance de Trend Micro alors en vigueur. Vous pouvez contacter Trend Micro par fax, téléphone et par e-mail, ou vous rendre sur notre site à l'adresse suivante : http://www.trendmicro.com Des versions d'évaluation des produits Trend Micro peuvent être téléchargées depuis notre site Web. Adresses postales/numéros de téléphone ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Pour des informations dans les régions Asie/Pacifique, Australie et Nouvelle Zélande, Europe, Amérique Latine et Canada, veuillez consulter : http://www.trendmicro.com/en/about/overview.htm L'écran « A propos » de Trend Micro s'affiche. Cliquez sur le lien correspondant dans la section « Nous contacter » de l'écran. Remarque : ces informations peuvent être modifiées sans préavis. 11. À propos de Trend Micro ======================================================================== Trend Micro, Inc. fournit des produits de sécurité et services de protection antivirus, anti-spam et filtrage de contenu. Trend Micro permet aux entreprises du monde entier de se protéger, à partir d'un point central, des virus et autres codes malveillants avant qu'ils ne parviennent à atteindre les postes de travail des utilisateurs. Copyright 2014, Trend Micro Incorporated. Tous droits réservés. Trend Micro et le logo t-ball sont des marques commerciales ou des marques déposées de Trend Micro Incorporated et sont enregistrées dans certaines juridictions. Toutes les autres marques sont des marques commerciales ou marques déposées de leurs propriétaires respectifs. 12. Contrat de licence ======================================================================== Vous pouvez consulter des informations à propos de votre contrat de licence Trend Micro sur le site : http://us.trendmicro.com/us/about/company/user_license_agreements/ Les contrats de licence de tierces parties peuvent être consultés en : - sélectionnant l'option "À propos" dans l'interface utilisateur de l'application - se référant à la page "Informations légales" du Manuel de l'utilisateur. OpenSSL License Agreement ~~~~~~~~~~~~~~~~~~~~~~~~~ OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ==================================================================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License ~~~~~~~~~~~~~~~~~~~~~~~ Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be givenattribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] Boost License Agreement ~~~~~~~~~~~~~~~~~~~~~~~ Boost Software License - Version 1.0 - August 17th, 2003 Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Log4cxx License Agreement ~~~~~~~~~~~~~~~~~~~~~~~~~ Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s)with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. gSOAP License Agreement ~~~~~~~~~~~~~~~~~~~~~~~ gSOAP Public License Version 1.3b The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). This license applies to the gSOAP software package, with the exception of the wsdl2h source code located in gsoap/wsdl, all code generated by wsdl2h, the UDDI source code gsoap/uddi2, and the Web server sample source code samples/webserver. To use all of the software commercially, a commercial license has to be obtained from www.genivia.com. 1 DEFINITIONS. 1.0.1. 1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications. 1.2. "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source Code. 1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A. 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License. 1.8. "License" means this document. 1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. B. Any new file that contains any part of the Original Code, or previous Modifications. 1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2 SOURCE CODE LICENSE. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Initial Developer, to make, have made, use and sell ("offer to sell and import") the Original Code, Modifications, or portions thereof, but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Original Code, Modifications, or any combination or portions thereof. (c) (d) 2.2. Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Contributor, to make, have made, use and sell ("offer to sell and import") the Contributor Version (or portions thereof), but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Contributor Version (or portions thereof). (c) (d) 3 DISTRIBUTION OBLIGATIONS. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. Any Modification created by You will be provided to the Initial Developer in Source Code form and are subject to the terms of the License. 3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code. 3.4. Intellectual Property Matters. (a) Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License. 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. 3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. If you distribute executable versions containing Covered Code as part of a product, you must reproduce the notice in Exhibit B in the documentation and/or other materials provided with the product. 3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. 3.8. Restrictions. You may not remove any product identification, copyright, proprietary notices or labels from gSOAP. 4 INABILITY TO COMPLY DUE TO STATUTE OR REGULATION. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. 5 APPLICATION OF THIS LICENSE. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. 6 VERSIONS OF THE LICENSE. 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. 6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrase "gSOAP" or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the gSOAP Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.) 7 DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. LIMITED LIABILITY THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. UNDER NO CIRCUMSTANCES WILL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF THE AUTHORS HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL THE AUTHORS BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR SERVICES. YOU ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8 TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive. 8.2. 8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license. 8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination. 9 LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 10 U.S. GOVERNMENT END USERS. 11 MISCELLANEOUS. 12 RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. EXHIBIT A. "The contents of this file are subject to the gSOAP Public License Version 1.3 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.cs.fsu.edu/ engelen/soaplicense.html Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c, stdsoap2.c, stdsoap.cpp, stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l, soapcpp2_yacc.y, error2.h, error2.c, symbol2.c, init2.c, soapdoc2.html, and soapdoc2.pdf, httpget.h, httpget.c, stl.h, stldeque.h, stllist.h, stlvector.h, stlset.h. The Initial Developer of the Original Code is Robert A. van Engelen. Portions created by Robert A. van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. Contributor(s): "________________________." [Note: The text of this Exhibit A may differ slightly form the text of the notices in the Source Code files of the Original code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] EXHIBIT B. "Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (C) 2001-2009 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." zlib License Agreement ~~~~~~~~~~~~~~~~~~~~~~ Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution.