<<如要打印本文档,请使用宋体 10 号字>> 趋势科技(中国)有限公司 2016 年 3 月 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 趋势科技(TM) 移动安全企业版 9.6 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 注意:此自述文件在产品发布之时是最新的。但是,您仍应访问趋势科技的以 下 Web 站点,检查是否有文档更新: http://www.trendmicro.com/download/zh-cn/ 趋势科技一直致力于改进其文档。如对该文档或趋势科技的任何其他文档有任 何问题、意见或建议,请通过 docs@trendmicro.com 与我们联系。 我们始终欢迎您的反馈。 请通过以下 Web 站点评估此文档: http://www.trendmicro.com/download/documentation/rating.asp. 目录 ===================================================================== 1. 关于趋势科技移动安全 1.1 版本概述 1.2 适用对象 2. 新增功能 3. 文档集 4. 系统要求 5. 安装前准备 6. 安装 7. 安装后配置 8. 已知问题 9. 发布历史 10. 联系信息 11. 关于趋势科技 12. 使用授权协议 ===================================================================== 1. 关于趋势科技移动安全 ======================================================================== 1.1 版本概述 ===================================================================== 趋势科技(TM) 移动安全企业版 9.6 使用最新的安全技术防御对移动设备的威 胁。集成的过滤器还能阻止不想接听的来电和不想接收的文本消息。移动安全 同时还提供 Web 安全,它通过阻止对危险 Web 站点的访问来防范网络诈骗(例 如网络钓鱼和域名欺诈)。登录密码保护有助于防范对移动设备的未授权访问。 此版本移动安全具有下列功能: - 支持多个平台,包括 iOS、Android 和 Windows Phone - 预设或手动组件更新,可确保具有最新的病毒码、安全策略和程序版本 - 登录身份验证可防止他人对移动设备进行未经授权的访问 - 使用预置密码实现卸载保护 - 采用广受赞誉的防恶意软件扫描技术防御移动恶意软件威胁 - Web 安全可确保安全地浏览 Internet - 短信过滤可阻止不需要的文本消息 - 来过滤可阻止匿名和不需要的来电 - 全面的日志功能可追踪扫描结果、发现的安全威胁、过滤的文本消息和 来电及其他事件 - 管理员能够执行以下操作: - 在移动设备上配置 Wi-Fi 设置和控制各种功能 - 强制进行密码认证和配置密码复杂性 - 允许或阻止在移动设备上安装某些应用程序 - 在“企业应用程序”中为用户创建应在移动设备上安装的应用程序的列表 - 对移动设备上的数据进行远程锁定、定位和擦除 - 使用 IMEI 号和/或 Wi-Fi MAC 地址批量验证移动设备。 1.2 适用对象 ===================================================================== 希望安装移动安全企业版 9.6 或从移动安全企业版 9.0 或更高版本进行升级 的用户。 2. 新增功能 ======================================================================== 移动安全企业版 9.6 新增了以下新功能: - 用户管理:使管理员可以分别管理用户和邀请 - 按需报告:管理员现在可以选择根据需要生成报告。 - 适用于 Android 的安全扫描:移动安全现在支持漏洞扫描和被篡改的应用程 序扫描以提高安全性。 - 新增小部件:此版本新增了五个小部件,用于显示有关 Android 安全扫描和 iOS 恶意软件扫描的信息。 - iOS 恶意软件扫描摘要 - Android 恶意软件扫描摘要 - Android 隐私扫描摘要 - Android 被篡改的应用程序扫描摘要 - Android 漏洞扫描摘要 - 新增 iOS 应用程序版本:管理员可以选择部署新版本的 iOS 应用程序,该 新版本仅支持安全扫描,并与第三方移动设备管理 (MDM) 应用程序结合使用。 - 预设扫描:使管理员可以基于指定的预设每日、每周或每月运行一次恶意软 件扫描和安全扫描。 3. 文档集 ======================================================================== 除此 readme.txt 文件之外,此产品的文档集还包括以下内容: - 管理员指南 -- 面向网络管理员的产品概述和详细配置说明。 - 安装和部署指南 -- 安装规划、安装和初始安装指南,以及能够让您正常使 用程序的基本信息。 手册的电子版本可在以下位置找到: http://www.trendmicro.com/download/zh-cn/ - 联机帮助 -- 与上下文相关的帮助窗口,可为执行任务提供指南。 - 知识库 -- 已知产品问题的可搜索数据库,包括特定问题解决和疑难解答 的主题。 http://esupport.trendmicro.com/zh-cn/default.aspx 4. 系统要求 ======================================================================== 趋势科技移动安全企业版 9.6 对安装此版本的计算机的硬件和软件规格的要求 如下: 4.1 移动安全管理服务器: ===================================================================== 硬件 ~~~~~~~~ - 1GHz Intel(TM) Pentium(TM) 处理器或同等产品 - 至少 1GB 内存 - 至少 400MB 可用磁盘空间 平台 ~~~~~~~~ - Microsoft Windows 2008 Server 系列 - Microsoft Windows 2008 R2 Server 系列 - Microsoft Windows 2012 Server 系列 - Microsoft Windows 2012 R2 Server 系列 推荐的平台 ~~~~~~~~~~ - Windows Server 2008 R2 Enterprise Edition - Windows Server 2008 Enterprise Edition SP1 - Windows Server 2008 Standard Edition - Windows Web Server 2008 Edition SP1 4.2 移动安全通信服务器 ===================================================================== 硬件 ~~~~~~~~ - 1GHz Intel(TM) Pentium(TM) 处理器或同等产品 - 至少 1GB 内存 - 至少 40MB 可用磁盘空间 平台 ~~~~~~~~ - Microsoft Windows 2008 Server 系列 - Microsoft Windows 2008 R2 Server 系列 - Microsoft Windows 2012 Server 系列 - Microsoft Windows 2012 R2 Server 系列 推荐的平台 ~~~~~~~~~~ - Windows Server 2008 R2 Enterprise Edition - Windows Server 2008 Enterprise Edition SP1 - Windows Server 2008 Standard Edition - Windows Web Server 2008 Edition SP1 4.3 移动安全 Exchange 连接器 ===================================================================== 平台 ~~~~~~~~ - Windows Server 2008 R2(64 位) - Windows Server 2012(64 位) - Windows Server 2012 R2(64 位) 硬件 ~~~~~~~~ - 1GHz Intel(TM) Pentium(TM) 处理器或同等产品 - 至少 1GB 内存 - 至少 200MB 可用磁盘空间 4.4 SQL Server ===================================================================== - Microsoft SQL Server 2008/2008 R2/2012/2008 Express/ 2008 R2 Express/2012 Express/2014/2014 Express 4.5 iOS 移动设备 ===================================================================== 操作系统 ~~~~~~~~ - iOS 6.x - iOS 7.x - iOS 8.x - iOS 9.x 存储空间 ~~~~~~~~ 最低 3MB 4.6 Android 移动设备 ===================================================================== 操作系统 ~~~~~~~~ - Android 2.3 Gingerbread - Android 3.0 Honeycomb - Android 4.0 Ice Cream Sandwich - Android 4.1 Jelly Bean - Android 4.2 Jelly Bean - Android 4.3 Jelly Bean - Android 4.4 KitKat - Android 5.0 Lollipop - Android 5.1 Lollipop - Android 6.0 Marshmallow 存储空间 ~~~~~~~~ 最低 8MB 4.7 Windows Phone 移动设备 ===================================================================== 操作系统 ~~~~~~~~ - Windows Phone 8.0 - Windows Phone 8.1 5. 安装前准备 ======================================================================== 有关详细的安装前配置和准备,请参阅《安装和部署指南》。 6. 安装 ======================================================================== 本部分阐述了安装此产品的重要步骤。有关安装步骤的详细信息,请参阅《安 装和部署指南》。 移动安全企业版包括四个组件: - 移动安全管理服务器 - 移动安全通信服务器 - Exchange 连接器 - 移动安全代理(移动安全客户端) 可根据网络拓扑和需求,仅安装所需组件。 移动安全管理服务器 --------------------------------------------------------------------- 移动安全管理服务器允许您通过管理 Web 控制台控制移动安全客户端。移动设 备注册到服务器后,即可配置移动安全客户端策略并执行更新。 移动安全通信服务器 --------------------------------------------------------------------- 移动安全通信服务器负责处理移动安全管理服务器与移动安全代理之间的通信。 移动安全代理可连接到通信服务器的公共 IP 地址。 移动安全企业版支持两种类型的通信服务器: 本地通信服务器(安装在本地网 络中)和云通信服务器(安装在云中并由趋势科技维护)。 Exchange 连接器 --------------------------------------------------------------------- 如果要管理使用 Exchange ActiveSync 服务的 Windows Phone、Android 或 iOS 移动设备,可以安装 Exchange 连接器。 移动安全代理(移动安全客户端) --------------------------------------------------------------------- 使用下列方法之一在支持的平台上安装移动安全代理(移动安全客户端程序): - 电子邮件通知 - 手动安装 注释: 在访问过趋势科技移动安全 Web 控制台的 Web 浏览器上,请在升级到移动安 全 9.6 之后清除 Web 浏览器缓存。 注释:趋势科技无法保证移动安全与文件系统加密软件之间的兼容性。提供类 似功能(例如反恶意软件扫描、短信管理和防火墙防护)的软件产品也 可能与移动安全不兼容。系统可能会提示您需要先卸载这些软件产品, 然后才能在移动设备上安装移动安全。 7. 安装后配置 ======================================================================== 有关安装后配置的信息,请参阅《管理员指南》。 8. 已知问题 ======================================================================== 8.1 即使在执行以下操作后,移动安全服务器中显示的移动设备状态仍不为 “非活动”: - Android 移动安全代理已卸载。 - iOS“MDM 注册配置文件”已从移动设备中删除。 --------------------------------------------------------------------- 在移动设备未连接到网络的情况下,如果卸载 Android 移动安全客户端或从移 动设备中删除 iOS“MDM 注册配置文件”,可能会出现此情况。因此,即使在 移动设备上卸载了移动安全客户端之后,移动安全服务器仍会在“设备”列表 中显示该移动设备。但是,移动设备状态会变为“未同步”。 8.2 Exchange ActiveSync 配置策略中未包含用户名和电子邮件地址信息。 --------------------------------------------------------------------- 如果没有为 iOS 移动设备配置用户名或电子邮件地址,便会发生这种情况。若 要解决此问题,请通过“管理员”>“Active Directory 设置”配置 Active Directory,然后再次从 Active Directory 添加用户。 8.3 移动安全无法从 Android 移动设备中读取电话号码。 --------------------------------------------------------------------- 移动安全需要使用默认的 Android API 从移动设备中读取电话号码。如果移动 设备未使用默认的 Android API,则移动安全无法读取电话号码。如果电话号 码未存储在运营商的数据库中,而存储在 SIM 卡上,也会发生这种情况。 8.4 用户无法从非定制应用程序包升级到定制应用程序包。 --------------------------------------------------------------------- 由于定制应用程序包和非定制应用程序包使用不同的证书进行身份验证,因此 非定制应用程序包无法升级为定制应用程序包,反之亦然。若要解决此问题, 请手动从手机中删除移动安全,然后安装定制应用程序包。 8.5 Android 或 iOS 移动安全客户端有时收不到来自服务器的策略更新和/或 远程锁定/擦除/定位指令。 --------------------------------------------------------------------- 如果客户端与服务器之间的网络连接不稳定,则可能会发生该已知问题。 8.6 使用 Exchange ActiveSync 的 Android 移动设备有时不会在移动安全的 “Exchange ActiveSync 设备”选项卡中显示正确状态。 --------------------------------------------------------------------- 如果移动安全管理服务器无法从 Exchange 服务器获取正确的移动设备标识, 可能会出现此情况。 8.7 移动安全客户端有时无法连接到云通信服务器 (CCS)。 --------------------------------------------------------------------- 移动安全客户端通过 Internet 与云通信服务器连接。如果移动设备和云通信 服务器之间的连接不稳定,可能会出现此已知问题。 8.8 使用趋势科技移动安全管理 Web 控制台时,Internet Explorer 崩溃。 --------------------------------------------------------------------- 如果移动安全管理 Web 控制台持续一段时间在 Internet Explorer 中未关闭 (具体取决于内存大小),会出现内存泄露,并导致 Internet Explorer 崩溃。 有关详细信息,请参阅以下链接: http://support.microsoft.com/kb/982094/zh-cn 8.9 即使将 Exchange 连接器从计算机中卸载,移动安全仍然将 Exchange 连 接器的状态显示为“已连接”。此外,移动安全无法重新安装 Exchange 连接 器,因为安装程序无法连接到移动安全服务器。 --------------------------------------------------------------------- 当 Exchange 连接器在与移动安全管理服务器断开连接的情况下卸载时,可能 会出现此情况。管理服务器无法从 Exchange 连接器接收卸载通知,因此显示 了错误的状态。 如果移动安全将 Exchange 连接器的状态显示为“已连接”,它将不能连接到 其他 Exchange 连接器。 若要解决此已知问题,请执行以下步骤: 1. 登录移动安全管理 Web 控制台。 2. 使用同一 Web 浏览器,打开以下 URL: https://:/mdm/cgi/web_service.dll? tmms_action=mdm_register_new_connector 3. 将 用实际的移动安全服务器和端口号替换。 4. 按 Enter。 应该会出现以下消息。 { "error_code" :1, "message" :"Success", "timestamp" :xxxxxxxxxx } 其中,xxxxxxxxxx 显示当前时间戳。 执行以上步骤之后,移动安全将重置 Exchange 服务器集成设置,您应该能够 安装 Exchange 连接器。 8.10 在纯 IPv6 环境中部署趋势科技移动安全时,无法访问某些外部 Web 服务。 --------------------------------------------------------------------- 外部 Web 服务不支持 IPv6 时会出现这种情况。 8.11 管理服务器使用 IPv6 连接 SMTP 服务器或 Active Directory 时,无法 访问这些服务器。 --------------------------------------------------------------------- 管理服务器无法使用 IPv6 访问 SMTP 服务器或 Active Directory。 8.12 有时,iOS 移动安全客户端无法在移动安全服务器中注册。 --------------------------------------------------------------------- 当 SCEP 服务器使用 IPv6 数字地址注册 iOS 移动设备时会出现这种情况。要 解决此已知问题,请使用域名在移动安全 Web 控制台上配置 SCEP。 8.13 移动安全无法删除某些移动设备上的 Microsoft Exchange 电子邮件帐户。 --------------------------------------------------------------------- 在运行 Android 5.0 或更高版本的移动设备上执行选择性擦除时,会由于操作 系统限制而发生此已知问题。 8.14 移动安全无法在处于省电模式的 Android 设备上运行云扫描和执行策略 更新。 --------------------------------------------------------------------- 此已知问题会影响在 Android 5.0 或更高版本上运行的设备。当设备处于省电 模式时,网络连接处于禁用状态并且移动安全无法运行云扫描或执行策略更新。 8.15 移动安全无法获取运行 Android 6.0 或更高版本的移动设备的蓝牙 MAC 地址。 --------------------------------------------------------------------- 由于操作系统限制发生了此已知问题。 因此,移动安全不在移动安全 Web 控制台上显示受影响设备的蓝牙 MAC 地址。 9. 发布历史 ======================================================================== 企业版 9.5 版 2015 年 9 月 企业版 9.3 版 2015 年 6 月 企业版 9.2 版 2015 年 3 月 企业版 9.1 版 2014 年 12 月 企业版 9.0 版 2013 年 7 月 企业版 8.0 版 2012 年 6 月 企业版 7.1 版 2011 年 12 月 企业版 7.0 版 2011 年 6 月 10. 联系信息 ======================================================================== 趋势科技软件的使用授权通常只包括自购买之日起为期一(1)年的产品更新、 病毒码文件更新及基础技术支持的权利。第一年以后的维护,应每年按照趋势 科技当时的维护费用标准续订。 可以通过传真、电话和电子邮件联系趋势科技,也可以访问我们的站点: http://www.trendmicro.com 您可以从此 Web 站点下载所有趋势科技产品的评估版。 中国地区通信地址/电话号码 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 有关趋势科技(中国)有限公司的联系方式,请参考: http://www.trendmicro.com.cn/cn/about-us/index.html 将显示趋势科技的“关于趋势科技”窗口。单击该窗口中“与我们联系”部分 的相应链接。 注释:以上信息如有更改,恕不另行通知。 11. 关于趋势科技 ======================================================================== 趋势科技公司提供病毒防护、反垃圾邮件及内容过滤安全软件与服务。趋势科 技帮助全球的公司自一个中心位置将病毒和其他恶意代码阻止于台式机之外。 版权所有 2016,趋势科技(中国)有限公司/Trend Micro Incorporated。保 留所有权利。Trend Micro 和 t- 球徽标是趋势科技(中国)有限公司/Trend Micro Incorporated 的商标并且在某些司法辖区已注册。其他所有标志是其对 应公司的商标或注册商标。 12. 使用授权协议 ======================================================================== 有关您与趋势科技(中国)有限公司的许可协议的信息可在以下站点查阅: http://www.trendmicro.com.cn/cn/about-us/legal-notice/index.html 可通过以下方式查看第三方许可协议: - 在应用程序的用户界面选择“关于”选项 - 参见《用户指南》的“法律”页面 OpenSSL License Agreement ~~~~~~~~~~~~~~~~~~~~~~~~~ OpenSSL License Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)" THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ==================================================================== This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License ~~~~~~~~~~~~~~~~~~~~~~~ Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be givenattribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] Boost License Agreement ~~~~~~~~~~~~~~~~~~~~~~~ Boost Software License - Version 1.0 - August 17th, 2003 Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Log4cxx License Agreement ~~~~~~~~~~~~~~~~~~~~~~~~~ Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s)with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. gSOAP License Agreement ~~~~~~~~~~~~~~~~~~~~~~~ gSOAP Public License Version 1.3b The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). This license applies to the gSOAP software package, with the exception of the wsdl2h source code located in gsoap/wsdl, all code generated by wsdl2h, the UDDI source code gsoap/uddi2, and the web server sample source code samples/webserver. To use all of the software commercially, a commercial license has to be obtained from www.genivia.com. 1 DEFINITIONS. 1.0.1. 1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications. 1.2. "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source Code. 1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A. 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License. 1.8. "License" means this document. 1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. B. Any new file that contains any part of the Original Code, or previous Modifications. 1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2 SOURCE CODE LICENSE. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Initial Developer, to make, have made, use and sell ("offer to sell and import") the Original Code, Modifications, or portions thereof, but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Original Code, Modifications, or any combination or portions thereof. (c) (d) 2.2. Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Contributor, to make, have made, use and sell ("offer to sell and import") the Contributor Version (or portions thereof), but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Contributor Version (or portions thereof). (c) (d) 3 DISTRIBUTION OBLIGATIONS. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. Any Modification created by You will be provided to the Initial Developer in Source Code form and are subject to the terms of the License. 3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code. 3.4. Intellectual Property Matters. (a) Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License. 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. 3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. If you distribute executable versions containing Covered Code as part of a product, you must reproduce the notice in Exhibit B in the documentation and/or other materials provided with the product. 3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. 3.8. Restrictions. You may not remove any product identification, copyright, proprietary notices or labels from gSOAP. 4 INABILITY TO COMPLY DUE TO STATUTE OR REGULATION. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. 5 APPLICATION OF THIS LICENSE. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. 6 VERSIONS OF THE LICENSE. 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. 6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrase "gSOAP" or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the gSOAP Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.) 7 DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. LIMITED LIABILITY THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. UNDER NO CIRCUMSTANCES WILL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF THE AUTHORS HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL THE AUTHORS BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR SERVICES. YOU ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8 TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive. 8.2. 8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license. 8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination. 9 LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 10 U.S. GOVERNMENT END USERS. 11 MISCELLANEOUS. 12 RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. EXHIBIT A. "The contents of this file are subject to the gSOAP Public License Version 1.3 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.cs.fsu.edu/ engelen/soaplicense.html Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c, stdsoap2.c, stdsoap.cpp, stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l, soapcpp2_yacc.y, error2.h, error2.c, symbol2.c, init2.c, soapdoc2.html, and soapdoc2.pdf, httpget.h, httpget.c, stl.h, stldeque.h, stllist.h, stlvector.h, stlset.h. The Initial Developer of the Original Code is Robert A. van Engelen. Portions created by Robert A. van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. Contributor(s): "________________________." [Note: The text of this Exhibit A may differ slightly form the text of the notices in the Source Code files of the Original code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] EXHIBIT B. "Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (C) 2001-2009 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." zlib License Agreement ~~~~~~~~~~~~~~~~~~~~~~ Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution.