Refactor dotfiles into .config

Include local bin files
This commit is contained in:
Daniel McKnight 2025-06-01 17:06:11 -07:00
parent 2741ae520b
commit d2467209b7
204 changed files with 44454 additions and 3 deletions

View file

@ -170,7 +170,7 @@ which helm 1> /dev/null && source <(helm completion bash)
# Helpful Aliases # Helpful Aliases
if [ -n "${SUDO_USER}" ]; then if [ -n "${SUDO_USER}" ]; then
alias nano="nano --rcfile \"/home/${SUDO_USER}/.nanorc\"" alias nano="nano --rcfile \"/home/${SUDO_USER}/.config/nano/nanorc\""
fi fi
# History customization # History customization

View file

@ -3,7 +3,7 @@ set -g prefix C-space
bind-key C-space send-prefix bind-key C-space send-prefix
# Shortcut to custom hints # Shortcut to custom hints
bind h run-shell "tmux popup -xC -yC -w50% -h75% 'cat ~/.tmux/hints'" bind h run-shell "tmux popup -xC -yC -w50% -h75% 'cat ~/.config/tmux/hints'"
# Shortcut to sync panes # Shortcut to sync panes
bind C-x setw synchronize-panes bind C-x setw synchronize-panes
@ -32,7 +32,7 @@ bind -n C-S-Left previous-window
bind -n C-S-Right next-window bind -n C-S-Right next-window
# Config # Config
bind R source-file ~/.tmux.conf \; display "Config reloaded!" bind R source-file ~/.config/tmux/tmux.conf \; display "Config reloaded!"
# Colors # Colors
set -g default-terminal "screen-256color" set -g default-terminal "screen-256color"

1
.gitignore vendored
View file

@ -1,3 +1,4 @@
.config/nvim/lazy-lock.json .config/nvim/lazy-lock.json
.luarc.json .luarc.json
.tmux/plugins/* .tmux/plugins/*
.config/tmux/plugins/*

View file

@ -0,0 +1,24 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCsKOBKlCTGLJxV
EoGwJ7/k9XuHDscJ8iKjjBae0AI+pUCWoAAWwi4yzncuhH7kBozLFZ5z5OEIoJSg
3/cuX11F7/zrc5Iz3gTPFcmB3lxuOrXs4m/YqdhQbtRyUynVq60cXJRAfLVvEXpX
yFADtT4xjuazcjwc4QULAslCVA12U6hIcDO7meauijYiN5DN9/KSJaof6iTK7gkM
PTRcXuNMTD+4CKwriVZcYMTyOPft6SOLQ1SjAk59rK/VuD0NUvZddL+Tk7nkyDPz
yNN9jnVlzel3V9CPpnOubY9HsQSxOALYNNc8MBul+4aZgAvFuPC3U+3ObFBSCa+q
MNtaUPf7AgMBAAECggEAPTJKiDgg2lEBQTxS3UtD6x9Xyap3FhH8PiaN4+YM5jfX
vbMiVPSxd13s/5wZfvTVF1uX95pkY6yxKH50XweHIFUukoOCdO12yCX2ezOPp583
C/1xxJKbUfwTiJAHTuy3nF1MVZ/+3nxYANwzlR3X/cXOO/tfYuSZ5lAXOnymTGjb
IF4iOcQ+h6ihnkXHDdUo0Uv6uTnUYuTDBsXyYn9jQbxDJxIxT0AD1KMthGUR9+gb
gYjiFdw5pQAimjPFpSFCoSr/auGeJ9Q8F+YG9xw8pm/rZLG4XpQlXjR9oC64EueV
4NySL9YZfKlM3eDGEGs1kZBN4eEP9RmTGpicqPwwAQKBgQDWWiEtxHVuA4Hec+9z
NYXDfp+p2npFzQDrhWFxXBz7yjun1tOBX93IhZ8XDKqqgq+wiM82x0wyEHNDeoNZ
oS1/qL4Nl3OLkBBE1h1zT//1VMrj4y9gqoLw5g2+AI4I8Ng0Y4Ha8R4wDc2zmNas
3kCGKa7bE2P2IgEQwPJNiOugyQKBgQDNnBjXSQFkJEXHbdlJsAxPAVxf3MWGD5V9
Zmh/CkKLXSWjco43ymzAP9KI4/Hsv69jyGIkjan8D8ETc5N7w6GCoqE8/0d3XrbW
A/nORn0NZlMAbdwpYuQruVImJkw2G3R1C1qDMJr18A96Tu3mGZD3P4OsM3vZPaSp
ly55Z6DYowKBgQCeaqAIxiAPfXIWqNI38D96uvNfQcOKILdkWQAqGmylPdIW+fL4
s5QipXZtP4RGXi1gJ8wU7PgILBYzsbCvpioNJfXH772KUJ9lcGT1mxNNCiykfXu/
UmVRioRvftN6Eh2Hol8PI5Iu65Sx/evyeJNxVA8Rg+QlvP3Slva8jMuv2QKBgE/h
06zgyk+T4CBpR0Bfy4huaOs9pOg+6b98qCCjZdMrb1IfUa3PUY0nvq48kWN/3a6Q
zcCR4Xbyz/q0rpopGXjdonNGYwe3nqVrigRgUnmARcMm66CQsUFjkM0NmBJ1fDt1
G8dYfPwMNpc4TylUyYOmA4xFvFpcnrrc58t3PYCtAoGADp9TguRMrNi9L0HSl3k9
ltwzW5uXFvqmG3ozONsVnzmU8JIrKM3nMKaH0LB+xlRn1fwGZj1vU0zDPF4dZlud
eawJVqe0SF9PJfxcUB6U/rqgCRpev0/qr7ee9J/WkDZp/Vw0FrxcLcoSr9pYrEjd
1lpHxLYm8rkM8kXRfcAGrxc=
-----END PRIVATE KEY-----

View file

@ -0,0 +1,29 @@
; **************************************************************************
; * Global options *
; **************************************************************************
; Debugging stuff (may useful for troubleshooting)
debug = 7
; output = stunnel.log
; PID is created inside the chroot jail
pid =
; **************************************************************************
; * Service defaults may also be specified in individual service sections *
; **************************************************************************
; Certificate/key is needed in server mode and optional in client mode
cert = /tmp/mail.pem
; force stunnel to use TLSv1.2 only
sslVersion = TLSv1.2
ciphers=HIGH
; Disable support for insecure SSLv3 protocol
options = NO_SSLv3
; **************************************************************************
; * Service definitions (remove all services for inetd mode) *
; **************************************************************************

Binary file not shown.

View file

@ -0,0 +1 @@
This is used to as a lock key, please do not remove it.

View file

@ -0,0 +1,52 @@
-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDgFgJ/kX4nVvKd
HRasBftPwnOKLxnnCzcng3CXnNL1xySwm7EhrmX2Y6mRbDqNbKUfg9Wa/1pQoWP7
Jnbe+xkCdfqpKSSBMXJTZQcH5tl8MxhbfgFMepUC8a4nZ5XPy9eEo2dtqD/Q2/cU
++ug9TZ2FPdYcVa20AddSK3/0U2wJ2Rs3VW1h4sMrqcDQHTRJZxQwWmZvPrYKqQm
JZc8EaivU0PSFpkW6hv3IXSSxkWkaT1Al5OFRv7plIidHoKDw4o01WsNxpEE0W3N
ckKlygueNX0aPwZLrWMvlDmClndAmInQc26Clg+tIvZRpArnaQYkR7p8JSEcElS9
R6cH81GfAgMBAAECggEAT/uLKL1lqeT+89VOIliAOxfM5aWqOS1nolLn/TWclt1d
2yu3La5x9l/cRmu6+n+s8HK963T5Z44zgZFZHH3Dj31M2tQ0k2hyxhFpUQi01//k
0cNH82RNi5936divQFwhsNYiNKG5JXNd3b+NewYLSlpxbsAFk3rtJf6rHIQ4lobN
6xObRBWI58vTojjM00MGtfKehzt/MOqfs+cCU74i6nG3qGk7KLzdHLJ90aKCjMbI
S6CTyHixWNUKVau0CzvjbQDdGIa/R329JzDIxiN+Sr5UYNZyFx7XzIdXrTF5knY0
REyIEvY0kMGRi9y0jUu/6PPgQQtnT3RhXH8bqIh3AQKBgQD1GmfYfxmd5AqTQPBF
2Tgw+lQKG8j5M/jKvz4G/+TQ05O2EeVG6KOugNIKQBX2ZeoDoiBj7WTECqEegaEO
v++ArKJI4IKTzfleLsNz7Y9rhaX5QSZxDUxJDKEJxrX2PG/ktZse2lruspzzmCVM
OQwYCADIoand8VYDMCgIa9RilQKBgQDqDGa2CWtVMuuRrd2AbyyFrg0xVQtmXViK
RY/E0sIiAguGdfB+dc3kmjXpDVgv6Jg1kLXhDF2R4VUWSobNKp0+qnkQY4FdXWYx
iSr0pCIQAXvpxFDCRYxdQGBnir+CuWR01jItsVrqRTmkBa8Rkf467dVgo7jOmtkz
mWAkp6HqYwKBgDle0OfP+EMI2aDWFmeDDLAKKBmln0kVbSqn0PD6fKiUnYKEddI/
KfDynjdgAMQH3tqy3DoHmwp4InZtiTFWo8zOm73LL0VBdRkigQVlmahlRBAvu7vC
jRScLCWJqZXVV6uFBqYWHiq5DBvIhRJuV/JYDTbpAEW+848TeoteEfxxAoGBAMeA
EKEEgGgcQm5n7JIIscO1K+usGU6FLO6YAsd7+xyv75EKwReaZQmCZYek51HXCr9F
/bK6LpwlnbiliCgkNervtshAeUnTTkPVLzdfHOXVzgDiZRBj5hSqxkIcI8hTLQzm
c9k8/0kH/u0QJz1r22/xwNtiUypRFemEyE4WUc8PAoGAV1Nlb9qxIEXf6B8TzJ5s
i5LxoMlRwoafh7oJDhxcIDILS3bMXAPRkeQgPz0STbhLu0SPjYlWGaFYZSoO5Fym
VrPBaM3Ikj32/Xd6owFNhbrF3McA21a6NibDZmCnuwNjdlG7FZ8ZpvdWGMqSbbbH
QRTIRaGaPhhPlG8Kewpsv3A=
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -0,0 +1,24 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,27 @@
; **************************************************************************
; * Global options *
; **************************************************************************
; Debugging stuff (may useful for troubleshooting)
debug = 7
; output = stunnel.log
; **************************************************************************
; * Service defaults may also be specified in individual service sections *
; **************************************************************************
; Certificate/key is needed in server mode and optional in client mode
cert = mail.pem
; force stunnel to use TLSv1.2 only
sslVersion = TLSv1.2
ciphers=HIGH
; Disable support for insecure SSLv3 protocol
options = NO_SSLv3
; **************************************************************************
; * Service definitions (remove all services for inetd mode) *
; **************************************************************************

Binary file not shown.

View file

@ -0,0 +1,2 @@
Router=10.0.10.255:Router
Backup IPMI=10.0.0.189:DESCRIPTION

2828
.local/bin/IPMIView/IPMIView20 Executable file

File diff suppressed because it is too large Load diff

Binary file not shown.

View file

@ -0,0 +1,137 @@
# LaunchAnywhere (tm) Executable Properties File - Flexera Software LLC
# LAX.APPLICATION.NAME
# --------------------
# the default name of this executable -- do not edit
lax.application.name=IPMIView20
# LAX.CLASS.PATH
# --------------
# the Java classpath necessary to run this application
# Can be separated by colons (Mac OS/Unix) or semicolons (Windows)
lax.class.path=iKVM.jar:IPMIView20.jar:TrapView.jar:JViewerX9.jar:lax.jar
# LAX.COMMAND.LINE.ARGS
# ---------------------
# what will be passed to the main method -- be sure to quote arguments with spaces in them
lax.command.line.args=$CMD_LINE_ARGUMENTS$
# LAX.DIR
# -------
# path to directory holding LaunchAnywhere's native launcher
lax.dir=./
# LAX.MAIN.CLASS
# --------------
# the class that contains the main method for the application
lax.main.class=IPMIView20.IPMIView20
# LAX.MAIN.METHOD
# ---------------
# the method in the main class that will be invoked
lax.main.method=main
# LAX.NL.CURRENT.VM
# -----------------
# the VM to use for the next launch
lax.nl.current.vm=jre/bin/java
# LAX.NL.JAVA.LAUNCHER.MAIN.CLASS
# -------------------------------
# main class of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.class=com.zerog.lax.LAX
# LAX.NL.JAVA.LAUNCHER.MAIN.METHOD
# --------------------------------
# main method of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.method=main
# LAX.NL.JAVA.OPTION.JAVA.HEAP.SIZE.MAX
# -------------------------------------
# Defines the maximum heap size in bytes for the installer that will be invoked.
lax.nl.java.option.java.heap.size.max=536870912
# LAX.NL.VALID.VM.LIST
# --------------------
# Defines which VMs are valid for your project.
# If the native launcher cannot find the current vm,
# it will search for ones in this list
lax.nl.valid.vm.list=1.7+
# LAX.NL.WIN32.MICROSOFTVM.MIN.VERSION
# ------------------------------------
# The minimum version of Microsoft's VM this application will run against
lax.nl.win32.microsoftvm.min.version=2750
# LAX.ROOT.INSTALL.DIR
# --------------------
# path to the installdir magic folder
lax.root.install.dir=./
# LAX.STDERR.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stderr.redirect=
# LAX.STDIN.REDIRECT
# ------------------
# leave blank for no input, "console" to read from the console window,
# and any path to a file to read from that file
lax.stdin.redirect=
# LAX.STDOUT.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stdout.redirect=
# LAX.USER.DIR
# ------------
# left blank, this property will cause the native launcher to not
# alter the platform default behavior for setting the user dir.
# To override this you may set this property to a relative or absolute path.
# Relative paths are relative to the launcher.
lax.user.dir=.
# LAX.VERSION
# -----------
# version of LaunchAnywhere that created this properties file
lax.version=17.0

Binary file not shown.

Binary file not shown.

Binary file not shown.

2828
.local/bin/IPMIView/JViewerX9 Executable file

File diff suppressed because it is too large Load diff

BIN
.local/bin/IPMIView/JViewerX9.jar Executable file

Binary file not shown.

137
.local/bin/IPMIView/JViewerX9.lax Executable file
View file

@ -0,0 +1,137 @@
# LaunchAnywhere (tm) Executable Properties File - Flexera Software LLC
# LAX.APPLICATION.NAME
# --------------------
# the default name of this executable -- do not edit
lax.application.name=JViewerX9
# LAX.CLASS.PATH
# --------------
# the Java classpath necessary to run this application
# Can be separated by colons (Mac OS/Unix) or semicolons (Windows)
lax.class.path=iKVM.jar:IPMIView20.jar:TrapView.jar:JViewerX9.jar:lax.jar
# LAX.COMMAND.LINE.ARGS
# ---------------------
# what will be passed to the main method -- be sure to quote arguments with spaces in them
lax.command.line.args=$CMD_LINE_ARGUMENTS$
# LAX.DIR
# -------
# path to directory holding LaunchAnywhere's native launcher
lax.dir=./
# LAX.MAIN.CLASS
# --------------
# the class that contains the main method for the application
lax.main.class=supermicro.jviewer.JViewerX9
# LAX.MAIN.METHOD
# ---------------
# the method in the main class that will be invoked
lax.main.method=main
# LAX.NL.CURRENT.VM
# -----------------
# the VM to use for the next launch
lax.nl.current.vm=jre/bin/java
# LAX.NL.JAVA.LAUNCHER.MAIN.CLASS
# -------------------------------
# main class of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.class=com.zerog.lax.LAX
# LAX.NL.JAVA.LAUNCHER.MAIN.METHOD
# --------------------------------
# main method of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.method=main
# LAX.NL.JAVA.OPTION.JAVA.HEAP.SIZE.MAX
# -------------------------------------
# Defines the maximum heap size in bytes for the installer that will be invoked.
lax.nl.java.option.java.heap.size.max=536870912
# LAX.NL.VALID.VM.LIST
# --------------------
# Defines which VMs are valid for your project.
# If the native launcher cannot find the current vm,
# it will search for ones in this list
lax.nl.valid.vm.list=1.7+
# LAX.NL.WIN32.MICROSOFTVM.MIN.VERSION
# ------------------------------------
# The minimum version of Microsoft's VM this application will run against
lax.nl.win32.microsoftvm.min.version=2750
# LAX.ROOT.INSTALL.DIR
# --------------------
# path to the installdir magic folder
lax.root.install.dir=./
# LAX.STDERR.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stderr.redirect=
# LAX.STDIN.REDIRECT
# ------------------
# leave blank for no input, "console" to read from the console window,
# and any path to a file to read from that file
lax.stdin.redirect=
# LAX.STDOUT.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stdout.redirect=
# LAX.USER.DIR
# ------------
# left blank, this property will cause the native launcher to not
# alter the platform default behavior for setting the user dir.
# To override this you may set this property to a relative or absolute path.
# Relative paths are relative to the launcher.
lax.user.dir=.
# LAX.VERSION
# -----------
# version of LaunchAnywhere that created this properties file
lax.version=17.0

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,617 @@
-------------------------------------------------------------------------------
IPMIView release notes
Copyright(c) 2023 by Super Micro Computer, Inc. https://www.supermicro.com/
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
OS Compatibility list
-------------------------------------------------------------------------------
Red Hat Enterprise Linux (RHEL) 6.8 or later,
SUSE Linux Enterprise Server (SLES) 11 or later
Ubuntu Server 14.04 or later
Rocky Linux 8.8 and later
Windows 7 10 and 11
Windows Server 2008 R2 SP 1, 2012 R2 or later
-------------------------------------------------------------------------------
Blade Support list
-------------------------------------------------------------------------------
SuperBlade:
B10DRI, B10DRC, B9DR6, B9DRG, B9DRGX,
B9DRT, B9QR7, B8DT6, B8DTG, B8DTT,
B7DBE, B7DCL, BHDGT, BHDME, BHQG6,
BHQIE, BHQME, B11DPT, B10DRE, B11QPI,
B10KNM, B11DPE, B11SPE
MicroBlade:
B1DRI, B1SA4F, B1SD2, B1SL1, B2SS2, B2SS1, B2SD2
-------------------------------------------------------------------------------
OpenJDK version
-------------------------------------------------------------------------------
openjdk version "11.0.19" 2023-04-18 LTS
OpenJDK Runtime Environment (Red_Hat-11.0.19+7-1) (build 11.0.19+7-LTS)
-------------------------------------------------------------------------------
Stunnel version
-------------------------------------------------------------------------------
Windows: Stunnel 5.70 compiled with OpenSSL 3.0.9 30 May 2023
Linux: Stunnel 5.69 compiled with OpenSSL 3.1.0 14 Mar 2023
-------------------------------------------------------------------------------
Version 2.21.1 build 230720
-------------------------------------------------------------------------------
1. Fix Virtual media panel license issue
2. Support following GUID
B301MS (X12DPG-OA6)
1501MS (X13SCW-F)
2501MS (MBD-G1SMH)
D401MS (B4SA1)
F401MS (H13SRD-F)
E401MS (H13SSF)
0501MS (X13SCH-F/-LN4F/-SYS)
5501MS (X13DEG-OAD)
6501MS (H13 AST2600 Delta Next)
3. Support new blade type B4SA1, B4SC1, B13DEE and B13SEG
4. Update IPMI SEL format
5. Fix system NIC incorrect sensor type in SEL list
6. Add warm reset function
7. Add IPMIView Software Update function
8. Fix user account edit panel displaying issue
9. Fix failed link status of dedicated 1G full duplex
10. Fix operator and user privilege cannot access Event log, BMC setting/Network and
Sensor/Text view panel correctly issue
11. Add file save dialog to Trap frame
12. Fix not display illegal IP tips if the NTP is disabled
13. Fix privilege issue in KVM panel
14. Update bundle java to OpenJDK 11.0.19+7-LTS
15. Fix incomplete PSU info of graphic sensor panel issue
16. Fix event log abnormal displaying issue
17. Upgrade bundle Stunnel version to 5.69 for Linux
Upgrade bundle Stunnel version to 5.70 for Windows
18. Fix trap receiver version typo
19. Add maximum FAN speed string to graphic sensor view
-------------------------------------------------------------------------------
Version 2.21.0 build 221118
-------------------------------------------------------------------------------
1. Add following information in the IPMIDevice page:
- Firmware Build Time
- Bios Version
- Bios Build Time
- CPLD version (BMC dependent)
- Redfish version (BMC dependent)
- BMC MAC Address
2. Add "date and time setting" in the BMC setting tab page.
3. Support new blade type B13SEE, B13DET.
4. Add SMC RAKP connection function and configuration.
5. Improve IPMIDevice page for better UI/UX.
6. Support follwoing GUID:
-1401MS (H13SST-G)
-2401MS (X13OEI)
-3401MS (X13DEG-QT-P)
-4401MS (B13SEE)
-A401MS (X12DGU)
-B401MS (MicroBlade CMM AST2600)
7. Fix SNMPv3 trap format parsing issue in X11 platform.
8. Update Virtual media panel to support ASPEED AST2400 and later BMC.
9. Fix sensor text view display wrong status label issue
10. Update bundle java to OpenJDK 11.0.14+9-LTS.
-------------------------------------------------------------------------------
Version 2.20.0 build 220309
-------------------------------------------------------------------------------
1. Support SNMPv3 trap in trap receiver
2. Support follwoing GUID
1301MS (X12DGQ)
4301MS (H12DSG)
5301MS (HGIMEZZ)
6301MS (X12STW)
7301MS (MicroBladeCMM64MB)
8301MS (X12DSC)
9301MS (H12SSG)
A301MS (B3ST1)
C301MS (X13SSW)
D301MS (X13DEM)
3. Support new blade type B3ST1, B12DPE
4. Add account lockout setting panel in Users table.
5. Support html5 version of KVM
6. Improve Network configuration panel for better user-experience
7. Improve user account panel for better user-experience
8. Enhance backward compatibility for KVM
9. Fix compatibility issue of uninstaller on Windows Server 2019
10. Fix FW version displaying issue on B2SC2
11. Fix Firmware cannot update with IPv6
12. Update bundle java to OpenJDK 11.0.13+8-LTS
13. Fix MEL displaying issue when license is not activated on X11
14. Fix voltage sensor missing issue
15. Fix Cannot open supermicro web url through Supermicro icon on windows server 2019 issue
-------------------------------------------------------------------------------
Version 2.19.1 build 210831
-------------------------------------------------------------------------------
1. Support new blade type B3ST1, B12DPE
2. Support X12STW, X12DSC, H12SSG, B3ST1, X12DGQ and H12DSG GUID.
3. Enhance backward compatibility for KVM
4. Fix the compatibility issue of uninstaller on Windows Server 2019.
5. Support new BIOS preserve options on Tatlow platform
-------------------------------------------------------------------------------
Version 2.19.0 build 210401
-------------------------------------------------------------------------------
1. Pad leading zero to FW revision
2. Update bundle java to JDK11
3. Add severity field in sel list command for X12 and above
4. Add liquid cooling and smart speed fan mode
5. Add vulnerability alert window when running iKVM in CentOS 6.x
6. Support BIOS update in X12 series
7. Support X12DGO, H12SSFF, and H12SSFR GUID
8. Support next boot option in IPMI device panel.
9. Support IPv6 settings in BMC setting panel.
10. Add a sensor readings text view in sensor panel
11. Add vulnerability alert window when running iKVM in CentOS 6.x
12. Elevate KVM privilege when being launched in Windows System
13. Support search function in Group Management/Event Log and System Management/Event Log.
14. Add MEL function to Group Management/Event Log
15. Support 'Severity' column to Group Management/Event Log/Health event on X12 series
16. Disable the unsupported LAN interface mode
17. Add scrollbar to CMM/Node status panel to display full information when apply the
larger scale level font.
18. Fix bootoption issue of X12 and replace "UEFI USB PXE" with "UEFI PXE".
19. Fix network setting GUI display abnormal issue after VLAN setting changed.
20. Fix IPv6 router has wrong reference issue
21. Fix IPv4 Static IP mode and IPv4 DNS are abnormal issue
22. Fix SNMP receiver cannot work on X12 series issue
23. Fix "Device reset failed" after BMC FW flashing issue
-------------------------------------------------------------------------------
Version 2.18.0 build 201007
-------------------------------------------------------------------------------
1. Support X12-AST2600-ROT, X12-AST2500 and H12Rot GUID
2. Add new FW update panel to support X12 and later model
3. Improve event log stability
4. Fix switch and fan panels' title index in node status page of MicroBlade
5. Update X12 devices icon
6. Add MicroBlade UID icon status monitoring for CMM module
7. Fix CMM slot number and FAN index in MicroBlade management page
8. Fix the temperature panel display abnormally in sensor page
9. Fix temperature and voltage panels' inactive components even if hide setting is enabled
10. Update KVM to support X12
-------------------------------------------------------------------------------
Version 2.17.0 build 200505
-------------------------------------------------------------------------------
1. Support fully parsing maintenance event log
2. Rename "System Event Log" to "Health Event Log" in the Event Log tab
3. Improve the UX of SEL time setting in the Event Log tab
4. Add invalid date-time value pre-check when setting SEL time
5. Improve language description in drop-down list of Language
6. Update backward compatibility for ukvm and virtual medial mount
7. Support X12-AST2500 GUID
8. Update event log definition in IPMILib
9. Fix certain typo
10. Update MigLayout versoin from 4.2 to 5.2
11. Fix the font display incompletely issue on Linux OS
12. No sub-item pop-up to choose after checked the UTF-8 box of the Text Console on SLES12
13. Fix "open in browser" hanging issue on Linux platform
14. Fix SLES12 does not support Chinese font issue
15. Add fan info component/page in node status page
16. Add the model name of power supply in MicroBlade node status page
17. Add the model name of node in MicroBlade node status page
18. Click KVM screen can resize KVM resolution when KVM screen size is abnormal
19. Update microblade kvm function
20. Fix 0xDC sensor type can not be recognized issue in trap Viewer column in trap Viewer
21. Fix Discrete Sensors panel layout can not be saved issue
22. Add filter for domain name
23. Modify the column index sorting method of quick trap panel
24. Support sorting function with filter.
25. Fix filter function will cause group list abnormal.
26. Fix some component does not support traditional/simplified chinese and revise translation.
-------------------------------------------------------------------------------
Version 2.16.1 build 191104
-------------------------------------------------------------------------------
1. Support new blade type B11SCG
2. Update B11SPE structure to fix sensor reading issue
3. Fix IPMI Domain can't be sorted by online devices issue
4. Fix SuperBlade switch model SBM-XEM-X8SM 1.25V sensor reading issue
5. Add new H12 support
6. Update bundle java to OpenJDK 1.8.0_201
7. Support FW auxiliary version displaying
8. Support Nuvoton GUID
9. Enhance device list UI and action behavior
10. Fix trap receiver selection issue
11. Support multi-language for action message
12. Support X11Rot GUID
13. Support new blade type B2SD2
14. Update backward compatibility for KVM
-------------------------------------------------------------------------------
Version 2.15.0 build 190109
-------------------------------------------------------------------------------
1. Fix trap event displaying issue
2. Add FRU Product Asset Tag field
3. Add microblade switch power consumption data
4. Update main page image
5. Update bundle java to 1.8
6. Enhance KVM by implement stunnel multi-Instance to fix system administrator
privilege required issue.
7. Fix launch KVM of P8DTU fail on CentOS7 64bit issue
8. Fix launch KVM fail due to stunnel instance startup fail
9. Add blade type B2SC1 in microblade management
10. Fix two or more KVMs could not be launched in Windows Systems at the same
time
11. Keep keyboard layout setting for KVM function
12. Fix SOL Window could not works in SUSE system
13. Update MicroBlade node structure to support NVMe and Storage
14. Add new blade type B11SRE
15. Add workaround to avoid user privilege control issue on Windows platform
16. Fix tab focus issue after close a node session
17. Fix keyboard not work in SUSE system
18. Fix stunnel service will not close on Windows platform issue
-------------------------------------------------------------------------------
Version 2.14.0 build 180213
-------------------------------------------------------------------------------
1. Fix X10 FW update issue
2. Add blade type B11DPE, B11SPE, and B10KNM in microblade management
3. Add board model name information
4. Fix KVM launch fail when password contains double quote
5. Fix microblade psu dc current reading issue
-------------------------------------------------------------------------------
Version 2.13.1 build 171024
-------------------------------------------------------------------------------
1. Use Chassis power status instead of ACPI power status in Device panel
2. Fix discrete sensor did not display issue
3. Add new guid support
4. Fix fan2 display issue in PSU panel
5. Rename IPM device as IPMI device
6. Add blade type B10DRE in microblade management
7. Add blade type B2SS2_MTF in microblade management
8. Fix power consumption and other sensor reading issue
9. Adjust main window layout size
10. Add iKVM Auto-resize-window enable/disable property
-------------------------------------------------------------------------------
Version 2.13.0 build 170504
-------------------------------------------------------------------------------
1. Support P8DTU FW update
2. Update board ID to 20161014 (ipmilib)
3. Support multiple microblade backplane type
4. Update DIMM ecc location (OEM SEL) for X10OBI
5. Add watch dog sensor support for micro nodes
6. Support Purley platform firmware update
7. Support IPv6 platform firmware update
8. Support IPv6 (address and hostname) when adding new device
9. Support KVM with CA
10. Implement chassis power status instead of ACPI power status in SOL Panel
11. Update trap receiver to support acknowledge function
12. Fix SOL does not work well issue
-------------------------------------------------------------------------------
Version 2.12.0 build 160804
-------------------------------------------------------------------------------
1. Support ipv6 BMC connection
2. Update board ID
3. Fix KVM connection fail issue(IssueID=72378)
-------------------------------------------------------------------------------
Version 2.11.1 build 160525
-------------------------------------------------------------------------------
1. Remove VBAT sensor for B1SD2 and update watchdog sensor
2. Update kvm function to support stunnel
FW compatibility:
SMT_X10 v3.29, SMT_X11 v1.16
3. Update IB Temp and 10G Temp in B10DRG and B10DRT
4. Fix KVM console window title
5. Set all microblade VBAT high limit to N/A
6. Support CB3 deivce including FW update
7. Support blade type B2SS1
8. Fix VBAT sensor high limit displaying
9. Support dynamic kvm ssl port and change kvm library(iKVM.dll)
-------------------------------------------------------------------------------
Version 2.11.0 build 151223
-------------------------------------------------------------------------------
1. Add Microblade CMM informations
2. Add new Grantley MRC code definition
3. Add Microblade B2SS2 support
4. Update Microblade KVM to improve stability
-------------------------------------------------------------------------------
Version 2.10.2 build 150909
-------------------------------------------------------------------------------
1. Update microblade node sensor length (IPMILib)
2. Preserve option behavior is not same with web UI (IPMILib)
3. Update X11 devices icon
-------------------------------------------------------------------------------
Version 2.10.2 build 150819
-------------------------------------------------------------------------------
1. Update bundle jre to 1.7
2. Support FW update for X11 AST2400 devices
-------------------------------------------------------------------------------
Version 2.10.2 build 150713
-------------------------------------------------------------------------------
1. Update microblade nodeSensorInfo structure due to FW change
-------------------------------------------------------------------------------
Version 2.10.2 build 150622
-------------------------------------------------------------------------------
1. Update DIMM ecc location (OEM SEL) for X10QRH
2. Remove IPv6 information after pressing detect button
3. Add OK button in "About" dialog
4. Add scroll bar to "Sensor" frames
5. Adjust superblade blade data size due to FW version
-------------------------------------------------------------------------------
Version 2.10.2
-------------------------------------------------------------------------------
1. Fix invoke browser by clicking Supermicro logo issue
2. Fix User privilege error
3. Update sel oem sensor type
4. Update board ID
5. Fix SuperBlade CMM CPU ID and Memory Speed display error
6. Support SuperBlade type B10DRG
7. Support SuperBlade type B10DRT_IBF2, B10DRI_N and B10DRC_N
8. Add Power Consumption sensor display for X10DRT-P
9. Add new fan mode PUE3 for X10 platform
10. Add new blade type B1SA4F and B1SD2 for sensor readings
11. Add microblade midplane informations
12. Fix microblade node graceful shutdown function
13. Support microblade cmm firmware update function
14. Update sensor limits from non-critical to critical
15. Remove group management power graceful control functions
16. Fix Configuration Tip" dialog display error
17. Fix microblade cmm display error
-------------------------------------------------------------------------------
Version 2.10.1 build 141121
-------------------------------------------------------------------------------
1. Support Microblade CMM
2. Update Superblade gigabit switch structure
3. Show the "Configuration Tip" dialog
-------------------------------------------------------------------------------
Version 2.9.32.1 build 140722
-------------------------------------------------------------------------------
1.Update for HP IPMI discovery and connection
-------------------------------------------------------------------------------
Version 2.9.32 build 140624
-------------------------------------------------------------------------------
1.Fix UIDLED issue
2.Fix Session abnormal close issue
3.Update group management to load individual username/password
4.Add B10DRI and B9QR7
5.Set power cycle delaying time to 1 sec
-------------------------------------------------------------------------------
Version 2.9.31 build 140403
-------------------------------------------------------------------------------
1.Updated Supermicro new logo
-------------------------------------------------------------------------------
Version 2.9.30 build 140318
-------------------------------------------------------------------------------
1.Updated MicroBlade CMM and MicroBlade Node frimware version check
(IssueID=51309)
2.Added SDR Type 2 to support PS Status Compact SDR
3.Updated CPU Core Voltage high and low limit for BHQGE and BHDGT
-------------------------------------------------------------------------------
Version 2.9.29 build 140206
-------------------------------------------------------------------------------
1.Updated KVM support for B1SA4-F
1.Updated AMI X9,B9 firmware update and version check (Verify stage failure)
-------------------------------------------------------------------------------
Version 2.9.28 build 131220
-------------------------------------------------------------------------------
1.Updated for 920P check rule
2.Updated PMBus item names
3.Fixed a workaround for 1K62P power status
4.Updated input type (DC) for PMBus monitor
-------------------------------------------------------------------------------
Version 2.9.27 build 131122
-------------------------------------------------------------------------------
1.Updated iKVM native library (Linux 32bit)
2.Updated SOL initial commands for ATEN X9
3.Updated 10G structure for SuperBlade (CMM V2.2.53 or later)(IssueID=49183)
4.Update CPU number of memory ecc error (X8 MBs and Bromolow)
-------------------------------------------------------------------------------
Version 2.9.26 build 131104
-------------------------------------------------------------------------------
1.Updated BHQG6/E sensors high low limit
2.Updated PMbus reading for 920P
3.Updated SOL initial command for ATEN X10
4.Updated board ID list
-------------------------------------------------------------------------------
Version 2.9.25 build 130828
-------------------------------------------------------------------------------
1.Updated iKVM v1.69 r14 (Power control function enabled)
2.Updated OOB OEM SEL
3.Updated board ID list
4.Updated a workaround for unsigned linear data format for PMBus power
consumption
-------------------------------------------------------------------------------
Version 2.9.24 build 130725
-------------------------------------------------------------------------------
1.Fixed cannot open more then one KVM to multiple X9 Renesas BMC (AMI firmware)
-------------------------------------------------------------------------------
Version 2.9.23 build 130709
-------------------------------------------------------------------------------
1.Added UID control for X9DBS
-------------------------------------------------------------------------------
Version 2.9.22 build 130625
-------------------------------------------------------------------------------
1.Added B9DRG-E
2.Added PMBus(B0,B2,B4,B6) and FRU (A0,A2,A4,A6) addresses for 1K66P
3.Updated B9DR6, B9DRG and B9DRT sensor table for DIMM temp
4.Added SuperBlade OEM event (Shutdown the problematic blade after minutes of
CPU over heating)
-------------------------------------------------------------------------------
Version 2.9.21 build 130610
-------------------------------------------------------------------------------
1.Fixed ATEN X10,X9 firmware update bug for checking BMC version
-------------------------------------------------------------------------------
Version 2.9.20 build 130530
-------------------------------------------------------------------------------
1.Updated version format in X10 firmware update function
2.Updated X10 configuration for sensor (power failure issue), user and
BMCSetting.
3.Added Session Audit 02h and 03h event
-------------------------------------------------------------------------------
Version 2.9.19 build 130523
-------------------------------------------------------------------------------
1.Added X10 ASPEED firmware update preserve configure option
2.Updated memory ecc location on Trap receiver
3.Added Heavy IO fan mode
4.Updated SOL setting for X10 ASPEED
-------------------------------------------------------------------------------
Version 2.9.18 build 130410
-------------------------------------------------------------------------------
1.Added X10 ASPEED firmware update function
2.Updated parameters for ATEN X10 iKVM
3.Bug fixed for Linux path of properties file
4.Removed splash window to speed start up
-------------------------------------------------------------------------------
Version 2.9.17 build 130123
-------------------------------------------------------------------------------
1.Added B9DRGX DIMM temp
2.Added X10 ASPEED GUID
-------------------------------------------------------------------------------
Version 2.9.16 build 121221
-------------------------------------------------------------------------------
1.Updated GB 3 & 4 initialized and Error reading (SuperBlade)
2.Fixed BBP discharge setting dialog minor bugs
3.Added PUE Optimal fan mode
-------------------------------------------------------------------------------
Version 2.9.15 build 121211
-------------------------------------------------------------------------------
1.Added BBP (Battery Backup Power) management in sensors tab.
* FRU
* HW monitor
* Auto and User dishcarge setting
-------------------------------------------------------------------------------
Version 2.9.14 build 121115
-------------------------------------------------------------------------------
1.Fixed B9DRP wrong picture on BPN-SB-E202 system
2.Added 3rd auxiliary Firmware Revision for X9 and B9 (Renesas BMC) board
3.Modified GB 3¡B4 position. #3 at bottom, #4 at top
-------------------------------------------------------------------------------
Version 2.9.13 build 121026
-------------------------------------------------------------------------------
1.Updated DC current formula for power supply (SuperBlade)
2.Updated HDD trap message in TrapReceiver
3.Fixed OEM SEL wrong message in Group management
4.Added B9DR6, B9DR7 and B9DRP DIMM temperature sensors
-------------------------------------------------------------------------------
Version 2.9.12 build 121012
-------------------------------------------------------------------------------
1.Updated trap receiver email content and multiple email receiver
2.Added hostname and email password encryption in Trap Receiver
3.Added exception handling for internal receiver thread
4.Added B9DRP picture
5.Minor user management bug fixed
-------------------------------------------------------------------------------
Version 2.9.11 build 120914
-------------------------------------------------------------------------------
1. Added IBFDR
2. Added Fan Speed Mode
3. Fixed cannot connect issue for some particular Linux environment
4. Updated B9DRI VBAT & 1.1V sensors limit
5. Updated B9DRI CPU temp high limit
6. Added B9DRP
7. New release package with bundled JRE
-------------------------------------------------------------------------------
Version 2.9.10 build 120725
-------------------------------------------------------------------------------
1. Added B9DR7 and B9DRGX
2. Fixed AMI X9 KVM session token issue
3. Updated ATEN KVM session issue
-------------------------------------------------------------------------------
Version 2.9.9 build 120531
-------------------------------------------------------------------------------
1. Bug fixed for E103 mid-plane
-------------------------------------------------------------------------------
Version 2.9.8 build 120525
-------------------------------------------------------------------------------
1. Added B9DRT
2. Fixed user's password length issue on both IPMI and Blade system
3. Updated X9 OEM SEL (Mem Ecc for Romley EP,EX and EN)
4. Added E104 mid-plane
-------------------------------------------------------------------------------
Version 2.9.7 build 120427
-------------------------------------------------------------------------------
1. Added X9 OEM SEL
2. Updated iKVM 1.69 r13 shared library for VM issue (enable *.ima uploader)
3. Added X9 and B9 Renesas IPMI firmware update function
4. Improved stability of ATEN firmware update function
-------------------------------------------------------------------------------
Version 2.9.6 build 120316
-------------------------------------------------------------------------------
1. Fixed incorrect CPU Vcore voltage of B8DTT in v2.9.5
-------------------------------------------------------------------------------
Version 2.9.5 build 120308
-------------------------------------------------------------------------------
1. Added B9DRE and B9DRG blades
2. Added KVM panel for B9* and BH* blades
3. Updated CPU sensor color when CPU temperature is high (in Group Management)
4. Updated format for firmware version
5. Fixed bug in calculating blade memory size
-------------------------------------------------------------------------------
Version 2.9.4 build 111230
-------------------------------------------------------------------------------
1. Updated PMBus information for reduntant charaters
2. Fixed SOL screen scroll fresh issue
-------------------------------------------------------------------------------
Version 2.9.3 build 111215
-------------------------------------------------------------------------------
1. Updated SOL minor issue for text color
2. Updated iKVM to v1.69 r13
-------------------------------------------------------------------------------
Version 2.9.2 build 111110
-------------------------------------------------------------------------------
1. Added 4*Gigabit Switches for ZTE SuperBlade customization
-------------------------------------------------------------------------------
Version 2.9.1 build 111027
-------------------------------------------------------------------------------
1. Fixed X9 AMI Virtual Media "cdrom service disabled" issue
2. Updated Power supply PMBus/FRU status icon and description (on/off)
-------------------------------------------------------------------------------
Version 2.9.0 build 111025
-------------------------------------------------------------------------------
1. Added PSU PMBus/FRU health monitoring (in Sensors tab)
2. Fixed reduntant event description in SEL exporting log

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

2828
.local/bin/IPMIView/TrapReceiver Executable file

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,137 @@
# LaunchAnywhere (tm) Executable Properties File - Flexera Software LLC
# LAX.APPLICATION.NAME
# --------------------
# the default name of this executable -- do not edit
lax.application.name=TrapReceiver
# LAX.CLASS.PATH
# --------------
# the Java classpath necessary to run this application
# Can be separated by colons (Mac OS/Unix) or semicolons (Windows)
lax.class.path=iKVM.jar:IPMIView20.jar:TrapView.jar:JViewerX9.jar:lax.jar
# LAX.COMMAND.LINE.ARGS
# ---------------------
# what will be passed to the main method -- be sure to quote arguments with spaces in them
lax.command.line.args=$CMD_LINE_ARGUMENTS$
# LAX.DIR
# -------
# path to directory holding LaunchAnywhere's native launcher
lax.dir=./
# LAX.MAIN.CLASS
# --------------
# the class that contains the main method for the application
lax.main.class=IPMIView20.trap.TrapView
# LAX.MAIN.METHOD
# ---------------
# the method in the main class that will be invoked
lax.main.method=main
# LAX.NL.CURRENT.VM
# -----------------
# the VM to use for the next launch
lax.nl.current.vm=jre/bin/java
# LAX.NL.JAVA.LAUNCHER.MAIN.CLASS
# -------------------------------
# main class of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.class=com.zerog.lax.LAX
# LAX.NL.JAVA.LAUNCHER.MAIN.METHOD
# --------------------------------
# main method of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.method=main
# LAX.NL.JAVA.OPTION.JAVA.HEAP.SIZE.MAX
# -------------------------------------
# Defines the maximum heap size in bytes for the installer that will be invoked.
lax.nl.java.option.java.heap.size.max=536870912
# LAX.NL.VALID.VM.LIST
# --------------------
# Defines which VMs are valid for your project.
# If the native launcher cannot find the current vm,
# it will search for ones in this list
lax.nl.valid.vm.list=1.7+
# LAX.NL.WIN32.MICROSOFTVM.MIN.VERSION
# ------------------------------------
# The minimum version of Microsoft's VM this application will run against
lax.nl.win32.microsoftvm.min.version=2750
# LAX.ROOT.INSTALL.DIR
# --------------------
# path to the installdir magic folder
lax.root.install.dir=./
# LAX.STDERR.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stderr.redirect=
# LAX.STDIN.REDIRECT
# ------------------
# leave blank for no input, "console" to read from the console window,
# and any path to a file to read from that file
lax.stdin.redirect=
# LAX.STDOUT.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stdout.redirect=
# LAX.USER.DIR
# ------------
# left blank, this property will cause the native launcher to not
# alter the platform default behavior for setting the user dir.
# To override this you may set this property to a relative or absolute path.
# Relative paths are relative to the launcher.
lax.user.dir=.
# LAX.VERSION
# -----------
# version of LaunchAnywhere that created this properties file
lax.version=17.0

BIN
.local/bin/IPMIView/TrapView.jar Executable file

Binary file not shown.

View file

@ -0,0 +1,5 @@
#MyTitle
#Sat May 31 22:29:03 PDT 2025
Backup\ Server=d_mcknight,20910561cbbef2e88188aedf1f073c0d3f7c11647d737553e2d2d761cb091480
Router=d_mcknight,72f799e88babfebe1d8700dd9156cdc3668f63d892dc71874af8f106dfc4a75f
Backup\ IPMI=d_mcknight,b192b43d5829ffedaaa62b6f3806c82fad27752c443ed30a987f59d8fb9cdb6f

View file

2828
.local/bin/IPMIView/iKVM Executable file

File diff suppressed because it is too large Load diff

BIN
.local/bin/IPMIView/iKVM.jar Executable file

Binary file not shown.

137
.local/bin/IPMIView/iKVM.lax Executable file
View file

@ -0,0 +1,137 @@
# LaunchAnywhere (tm) Executable Properties File - Flexera Software LLC
# LAX.APPLICATION.NAME
# --------------------
# the default name of this executable -- do not edit
lax.application.name=iKVM
# LAX.CLASS.PATH
# --------------
# the Java classpath necessary to run this application
# Can be separated by colons (Mac OS/Unix) or semicolons (Windows)
lax.class.path=iKVM.jar:IPMIView20.jar:TrapView.jar:JViewerX9.jar:lax.jar
# LAX.COMMAND.LINE.ARGS
# ---------------------
# what will be passed to the main method -- be sure to quote arguments with spaces in them
lax.command.line.args=$CMD_LINE_ARGUMENTS$
# LAX.DIR
# -------
# path to directory holding LaunchAnywhere's native launcher
lax.dir=./
# LAX.MAIN.CLASS
# --------------
# the class that contains the main method for the application
lax.main.class=tw.com.aten.ikvm.KVMMain
# LAX.MAIN.METHOD
# ---------------
# the method in the main class that will be invoked
lax.main.method=main
# LAX.NL.CURRENT.VM
# -----------------
# the VM to use for the next launch
lax.nl.current.vm=jre/bin/java
# LAX.NL.JAVA.LAUNCHER.MAIN.CLASS
# -------------------------------
# main class of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.class=com.zerog.lax.LAX
# LAX.NL.JAVA.LAUNCHER.MAIN.METHOD
# --------------------------------
# main method of LaunchAnywhere's java launcher -- do not adjust
lax.nl.java.launcher.main.method=main
# LAX.NL.JAVA.OPTION.JAVA.HEAP.SIZE.MAX
# -------------------------------------
# Defines the maximum heap size in bytes for the installer that will be invoked.
lax.nl.java.option.java.heap.size.max=536870912
# LAX.NL.VALID.VM.LIST
# --------------------
# Defines which VMs are valid for your project.
# If the native launcher cannot find the current vm,
# it will search for ones in this list
lax.nl.valid.vm.list=1.7+
# LAX.NL.WIN32.MICROSOFTVM.MIN.VERSION
# ------------------------------------
# The minimum version of Microsoft's VM this application will run against
lax.nl.win32.microsoftvm.min.version=2750
# LAX.ROOT.INSTALL.DIR
# --------------------
# path to the installdir magic folder
lax.root.install.dir=./
# LAX.STDERR.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stderr.redirect=
# LAX.STDIN.REDIRECT
# ------------------
# leave blank for no input, "console" to read from the console window,
# and any path to a file to read from that file
lax.stdin.redirect=
# LAX.STDOUT.REDIRECT
# -------------------
# leave blank for no output, "console" to send to a console window,
# and any path to a file to save to the file
lax.stdout.redirect=
# LAX.USER.DIR
# ------------
# left blank, this property will cause the native launcher to not
# alter the platform default behavior for setting the user dir.
# To override this you may set this property to a relative or absolute path.
# Relative paths are relative to the launcher.
lax.user.dir=.
# LAX.VERSION
# -----------
# version of LaunchAnywhere that created this properties file
lax.version=17.0

View file

@ -0,0 +1,3 @@
#MyTitle
#Wed May 29 21:46:05 PDT 2024
default_AutoResize_iKVM_Window=true

BIN
.local/bin/IPMIView/iKVM32.dll Executable file

Binary file not shown.

BIN
.local/bin/IPMIView/iKVM64.dll Executable file

Binary file not shown.

Binary file not shown.

BIN
.local/bin/IPMIView/iKVM_ssl.jar Executable file

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,4 @@
#MyTitle
#Wed May 29 21:45:59 PDT 2024
https_port=443
http_port=80

4584
.local/bin/IPMIView/jre/NEWS Executable file

File diff suppressed because it is too large Load diff

Binary file not shown.

BIN
.local/bin/IPMIView/jre/bin/jaotc Executable file

Binary file not shown.

BIN
.local/bin/IPMIView/jre/bin/java Executable file

Binary file not shown.

BIN
.local/bin/IPMIView/jre/bin/jfr Executable file

Binary file not shown.

BIN
.local/bin/IPMIView/jre/bin/jjs Executable file

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

BIN
.local/bin/IPMIView/jre/bin/rmid Executable file

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1,63 @@
############################################################
# Default Logging Configuration File
#
# You can use a different file by specifying a filename
# with the java.util.logging.config.file system property.
# For example java -Djava.util.logging.config.file=myfile
############################################################
############################################################
# Global properties
############################################################
# "handlers" specifies a comma separated list of log Handler
# classes. These handlers will be installed during VM startup.
# Note that these classes must be on the system classpath.
# By default we only configure a ConsoleHandler, which will only
# show messages at the INFO and above levels.
handlers= java.util.logging.ConsoleHandler
# To also add the FileHandler, use the following line instead.
#handlers= java.util.logging.FileHandler, java.util.logging.ConsoleHandler
# Default global logging level.
# This specifies which kinds of events are logged across
# all loggers. For any given facility this global level
# can be overriden by a facility specific level
# Note that the ConsoleHandler also has a separate level
# setting to limit messages printed to the console.
.level= INFO
############################################################
# Handler specific properties.
# Describes specific configuration info for Handlers.
############################################################
# default file output is in user's home directory.
java.util.logging.FileHandler.pattern = %h/java%u.log
java.util.logging.FileHandler.limit = 50000
java.util.logging.FileHandler.count = 1
# Default number of locks FileHandler can obtain synchronously.
# This specifies maximum number of attempts to obtain lock file by FileHandler
# implemented by incrementing the unique field %u as per FileHandler API documentation.
java.util.logging.FileHandler.maxLocks = 100
java.util.logging.FileHandler.formatter = java.util.logging.XMLFormatter
# Limit the message that are printed on the console to INFO and above.
java.util.logging.ConsoleHandler.level = INFO
java.util.logging.ConsoleHandler.formatter = java.util.logging.SimpleFormatter
# Example to customize the SimpleFormatter output format
# to print one-line log message like this:
# <level>: <log message> [<date/time>]
#
# java.util.logging.SimpleFormatter.format=%4$s: %5$s [%1$tc]%n
############################################################
# Facility specific properties.
# Provides extra control for each logger.
############################################################
# For example, set the com.xyz.foo logger to only log SEVERE
# messages:
com.xyz.foo.level = SEVERE

View file

@ -0,0 +1,79 @@
######################################################################
# Default Access Control File for Remote JMX(TM) Monitoring
######################################################################
#
# Access control file for Remote JMX API access to monitoring.
# This file defines the allowed access for different roles. The
# password file (jmxremote.password by default) defines the roles and their
# passwords. To be functional, a role must have an entry in
# both the password and the access files.
#
# The default location of this file is $JRE/conf/management/jmxremote.access
# You can specify an alternate location by specifying a property in
# the management config file $JRE/conf/management/management.properties
# (See that file for details)
#
# The file format for password and access files is syntactically the same
# as the Properties file format. The syntax is described in the Javadoc
# for java.util.Properties.load.
# A typical access file has multiple lines, where each line is blank,
# a comment (like this one), or an access control entry.
#
# An access control entry consists of a role name, and an
# associated access level. The role name is any string that does not
# itself contain spaces or tabs. It corresponds to an entry in the
# password file (jmxremote.password). The access level is one of the
# following:
# "readonly" grants access to read attributes of MBeans.
# For monitoring, this means that a remote client in this
# role can read measurements but cannot perform any action
# that changes the environment of the running program.
# "readwrite" grants access to read and write attributes of MBeans,
# to invoke operations on them, and optionally
# to create or remove them. This access should be granted
# only to trusted clients, since they can potentially
# interfere with the smooth operation of a running program.
#
# The "readwrite" access level can optionally be followed by the "create" and/or
# "unregister" keywords. The "unregister" keyword grants access to unregister
# (delete) MBeans. The "create" keyword grants access to create MBeans of a
# particular class or of any class matching a particular pattern. Access
# should only be granted to create MBeans of known and trusted classes.
#
# For example, the following entry would grant readwrite access
# to "controlRole", as well as access to create MBeans of the class
# javax.management.monitor.CounterMonitor and to unregister any MBean:
# controlRole readwrite \
# create javax.management.monitor.CounterMonitorMBean \
# unregister
# or equivalently:
# controlRole readwrite unregister create javax.management.monitor.CounterMBean
#
# The following entry would grant readwrite access as well as access to create
# MBeans of any class in the packages javax.management.monitor and
# javax.management.timer:
# controlRole readwrite \
# create javax.management.monitor.*,javax.management.timer.* \
# unregister
#
# The \ character is defined in the Properties file syntax to allow continuation
# lines as shown here. A * in a class pattern matches a sequence of characters
# other than dot (.), so javax.management.monitor.* matches
# javax.management.monitor.CounterMonitor but not
# javax.management.monitor.foo.Bar.
#
# A given role should have at most one entry in this file. If a role
# has no entry, it has no access.
# If multiple entries are found for the same role name, then the last
# access entry is used.
#
#
# Default access control entries:
# o The "monitorRole" role has readonly access.
# o The "controlRole" role has readwrite access and can create the standard
# Timer and Monitor MBeans defined by the JMX API.
monitorRole readonly
controlRole readwrite \
create javax.management.monitor.*,javax.management.timer.* \
unregister

View file

@ -0,0 +1,115 @@
# ----------------------------------------------------------------------
# Template for jmxremote.password
#
# o Copy this template to jmxremote.password
# o Set the user/password entries in jmxremote.password
# o Change the permission of jmxremote.password to be accessible
# only by the owner.
# o The jmxremote.passwords file will be re-written by the server
# to replace all plain text passwords with hashed passwords when
# the file is read by the server.
#
##############################################################
# Password File for Remote JMX Monitoring
##############################################################
#
# Password file for Remote JMX API access to monitoring. This
# file defines the different roles and their passwords. The access
# control file (jmxremote.access by default) defines the allowed
# access for each role. To be functional, a role must have an entry
# in both the password and the access files.
#
# Default location of this file is $JRE/conf/management/jmxremote.password
# You can specify an alternate location by specifying a property in
# the management config file $JRE/conf/management/management.properties
# or by specifying a system property (See that file for details).
##############################################################
# File format of the jmxremote.password file
##############################################################
#
# The file contains multiple lines where each line is blank,
# a comment (like this one), or a password entry.
#
# password entry follows the below syntax
# role_name W [clearPassword|hashedPassword]
#
# role_name is any string that does not itself contain spaces or tabs.
# W = spaces or tabs
#
# Passwords can be specified via clear text or via a hash. Clear text password
# is any string that does not contain spaces or tabs. Hashed passwords must
# follow the below format.
# hashedPassword = base64_encoded_64_byte_salt W base64_encoded_hash W hash_algorithm
# where,
# base64_encoded_64_byte_salt = 64 byte random salt
# base64_encoded_hash = Hash_algorithm(password + salt)
# W = spaces or tabs
# hash_algorithm = Algorithm string specified using the format below
# https://docs.oracle.com/javase/9/docs/specs/security/standard-names.html#messagedigest-algorithms
# This is an optional field. If not specified, SHA3-512 will be assumed.
#
# If passwords are in clear, they will be overwritten by their hash if all of
# the below criteria are met.
# * com.sun.management.jmxremote.password.toHashes property is set to true in
# management.properties file
# * the password file is writable
# * the system security policy allows writing into the password file, if a
# security manager is configured
#
# In order to change the password for a role, replace the hashed password entry
# with a new clear text password or a new hashed password. If the new password
# is in clear, it will be replaced with its hash when a new login attempt is made.
#
# A given role should have at most one entry in this file. If a role
# has no entry, it has no access.
# If multiple entries are found for the same role name, then the last one
# is used.
#
# A user generated hashed password file can also be used instead of clear-text
# password file. If generated by the user, hashed passwords must follow the
# format specified above.
#
# Caution: It is recommended not to edit the password file while the
# agent is running, as edits could be lost if a client connection triggers the
# hashing of the password file at the same time that the file is externally modified.
# The integrity of the file is guaranteed, but any external edits made to the
# file during the short period between the time that the agent reads the file
# and the time that it writes it back might get lost
##############################################################
# File permissions of the jmxremote.password file
##############################################################
# This file must be made accessible by ONLY the owner,
# otherwise the program will exit with an error.
#
# In a typical installation, this file can be accessed by anybody on the
# local machine, and possibly by people on other machines.
# For security, you should either restrict the access to this file except for owner,
# or specify another, less accessible file in the management config file
# as described above.
#
# In order to prevent inadverent edits to the password file in the
# production environment, it is recommended to deploy a read-only
# hashed password file. The hashed entries for clear passwords can be generated
# in advance by running the JMX agent.
#
##############################################################
# Sample of the jmxremote.password file
##############################################################
# Following are two commented-out entries. The "monitorRole" role has
# password "QED". The "controlRole" role has password "R&D". This is an example
# of specifying passwords in the clear
#
# monitorRole QED
# controlRole R&D
#
# Once a login attempt is made, passwords will be hashed and the file will have
# below entries with clear passwords overwritten by their respective
# SHA3-512 hash
#
# monitorRole trilby APzBTt34rV2l+OMbuvbnOQ4si8UZmfRCVbIY1+fAofV5CkQzXS/FDMGteQQk/R3q1wtt104qImzJEA7gCwl6dw== 4EeTdSJ7X6Imu0Mb+dWqIns7a7QPIBoM3NB/XlpMQSPSicE7PnlALVWn2pBY3Q3pGDHyAb32Hd8GUToQbUhAjA== SHA3-512
# controlRole roHEJSbRqSSTII4Z4+NOCV2OJaZVQ/dw153Fy2u4ILDP9XiZ426GwzCzc3RtpoqNMwqYIcfdd74xWXSMrWtGaA== w9qDsekgKn0WOVJycDyU0kLBa081zbStcCjUAVEqlfon5Sgx7XHtaodbmzpLegA1jT7Ag36T0zHaEWRHJe2fdA== SHA3-512
#

View file

@ -0,0 +1,302 @@
#####################################################################
# Default Configuration File for Java Platform Management
#####################################################################
#
# The Management Configuration file (in java.util.Properties format)
# will be read if one of the following system properties is set:
# -Dcom.sun.management.jmxremote.port=<port-number>
# or -Dcom.sun.management.config.file=<this-file>
#
# The default Management Configuration file is:
#
# $JRE/conf/management/management.properties
#
# Another location for the Management Configuration File can be specified
# by the following property on the Java command line:
#
# -Dcom.sun.management.config.file=<this-file>
#
# If -Dcom.sun.management.config.file=<this-file> is set, the port
# number for the management agent can be specified in the config file
# using the following lines:
#
# ################ Management Agent Port #########################
#
# For setting the JMX RMI agent port use the following line
# com.sun.management.jmxremote.port=<port-number>
#
#####################################################################
# Optional Instrumentation
#####################################################################
#
# By default only the basic instrumentation with low overhead is on.
# The following properties allow to selectively turn on optional
# instrumentation which are off by default and may have some
# additional overhead.
#
# com.sun.management.enableThreadContentionMonitoring
#
# This option enables thread contention monitoring if the
# Java virtual machine supports such instrumentation.
# Refer to the specification for the java.lang.management.ThreadMBean
# interface - see isThreadContentionMonitoringSupported() method.
#
# To enable thread contention monitoring, uncomment the following line
# com.sun.management.enableThreadContentionMonitoring
#####################################################################
# RMI Management Properties
#####################################################################
#
# If system property -Dcom.sun.management.jmxremote.port=<port-number>
# is set then
# - A MBean server is started
# - JRE Platform MBeans are registered in the MBean server
# - RMI connector is published in a private readonly registry at
# specified port using a well known name, "jmxrmi"
# - the following properties are read for JMX remote management.
#
# The configuration can be specified only at startup time.
# Later changes to above system property (e.g. via setProperty method),
# this config file, the password file, or the access file have no effect to the
# running MBean server, the connector, or the registry.
#
#
# ########## RMI connector settings for local management ##########
#
# com.sun.management.jmxremote.local.only=true|false
# Default for this property is true. (Case for true/false ignored)
# If this property is specified as true then the local JMX RMI connector
# server will only accept connection requests from clients running on
# the host where the out-of-the-box JMX management agent is running.
# In order to ensure backwards compatibility this property could be
# set to false. However, deploying the local management agent in this
# way is discouraged because the local JMX RMI connector server will
# accept connection requests from any client either local or remote.
# For remote management the remote JMX RMI connector server should
# be used instead with authentication and SSL/TLS encryption enabled.
#
# For allowing the local management agent accept local
# and remote connection requests use the following line
# com.sun.management.jmxremote.local.only=false
#
# ###################### RMI SSL #############################
#
# com.sun.management.jmxremote.ssl=true|false
# Default for this property is true. (Case for true/false ignored)
# If this property is specified as false then SSL is not used.
#
# For RMI monitoring without SSL use the following line
# com.sun.management.jmxremote.ssl=false
# com.sun.management.jmxremote.ssl.config.file=filepath
# Specifies the location of the SSL configuration file. A properties
# file can be used to supply the keystore and truststore location and
# password settings thus avoiding to pass them as cleartext in the
# command-line.
#
# The current implementation of the out-of-the-box management agent will
# look up and use the properties specified below to configure the SSL
# keystore and truststore, if present:
# javax.net.ssl.keyStore=<keystore-location>
# javax.net.ssl.keyStorePassword=<keystore-password>
# javax.net.ssl.trustStore=<truststore-location>
# javax.net.ssl.trustStorePassword=<truststore-password>
# Any other properties in the file will be ignored. This will allow us
# to extend the property set in the future if required by the default
# SSL implementation.
#
# If the property "com.sun.management.jmxremote.ssl" is set to false,
# then this property is ignored.
#
# For supplying the keystore settings in a file use the following line
# com.sun.management.jmxremote.ssl.config.file=filepath
# com.sun.management.jmxremote.ssl.enabled.cipher.suites=<cipher-suites>
# The value of this property is a string that is a comma-separated list
# of SSL/TLS cipher suites to enable. This property can be specified in
# conjunction with the previous property "com.sun.management.jmxremote.ssl"
# in order to control which particular SSL/TLS cipher suites are enabled
# for use by accepted connections. If this property is not specified then
# the SSL/TLS RMI Server Socket Factory uses the SSL/TLS cipher suites that
# are enabled by default.
#
# com.sun.management.jmxremote.ssl.enabled.protocols=<protocol-versions>
# The value of this property is a string that is a comma-separated list
# of SSL/TLS protocol versions to enable. This property can be specified in
# conjunction with the previous property "com.sun.management.jmxremote.ssl"
# in order to control which particular SSL/TLS protocol versions are
# enabled for use by accepted connections. If this property is not
# specified then the SSL/TLS RMI Server Socket Factory uses the SSL/TLS
# protocol versions that are enabled by default.
#
# com.sun.management.jmxremote.ssl.need.client.auth=true|false
# Default for this property is false. (Case for true/false ignored)
# If this property is specified as true in conjunction with the previous
# property "com.sun.management.jmxremote.ssl" then the SSL/TLS RMI Server
# Socket Factory will require client authentication.
#
# For RMI monitoring with SSL client authentication use the following line
# com.sun.management.jmxremote.ssl.need.client.auth=true
# com.sun.management.jmxremote.registry.ssl=true|false
# Default for this property is false. (Case for true/false ignored)
# If this property is specified as true then the RMI registry used
# to bind the RMIServer remote object is protected with SSL/TLS
# RMI Socket Factories that can be configured with the properties:
# com.sun.management.jmxremote.ssl.config.file
# com.sun.management.jmxremote.ssl.enabled.cipher.suites
# com.sun.management.jmxremote.ssl.enabled.protocols
# com.sun.management.jmxremote.ssl.need.client.auth
# If the two properties below are true at the same time, i.e.
# com.sun.management.jmxremote.ssl=true
# com.sun.management.jmxremote.registry.ssl=true
# then the RMIServer remote object and the RMI registry are
# both exported with the same SSL/TLS RMI Socket Factories.
#
# For using an SSL/TLS protected RMI registry use the following line
# com.sun.management.jmxremote.registry.ssl=true
#
# ################ RMI User authentication ################
#
# com.sun.management.jmxremote.authenticate=true|false
# Default for this property is true. (Case for true/false ignored)
# If this property is specified as false then no authentication is
# performed and all users are allowed all access.
#
# For RMI monitoring without any checking use the following line
# com.sun.management.jmxremote.authenticate=false
#
# ################ RMI Login configuration ###################
#
# com.sun.management.jmxremote.login.config=<config-name>
# Specifies the name of a JAAS login configuration entry to use when
# authenticating users of RMI monitoring.
#
# Setting this property is optional - the default login configuration
# specifies a file-based authentication that uses the password file.
#
# When using this property to override the default login configuration
# then the named configuration entry must be in a file that gets loaded
# by JAAS. In addition, the login module(s) specified in the configuration
# should use the name and/or password callbacks to acquire the user's
# credentials. See the NameCallback and PasswordCallback classes in the
# javax.security.auth.callback package for more details.
#
# If the property "com.sun.management.jmxremote.authenticate" is set to
# false, then this property and the password & access files are ignored.
#
# For a non-default login configuration use the following line
# com.sun.management.jmxremote.login.config=<config-name>
#
# ################ RMI Password file location ##################
#
# com.sun.management.jmxremote.password.file=filepath
# Specifies location for password file
# This is optional - default location is
# $JRE/conf/management/jmxremote.password
#
# If the property "com.sun.management.jmxremote.authenticate" is set to
# false, then this property and the password & access files are ignored.
# Otherwise the password file must exist and be in the valid format.
# If the password file is empty or non-existent then no access is allowed.
#
# For a non-default password file location use the following line
# com.sun.management.jmxremote.password.file=filepath
#
# ################# Hash passwords in password file ##############
# com.sun.management.jmxremote.password.toHashes = true|false
# Default for this property is true.
# Specifies if passwords in the password file should be hashed or not.
# If this property is true, and if the password file is writable, and if the
# system security policy allows writing into the password file,
# all the clear passwords in the password file will be replaced by
# their SHA3-512 hash when the file is read by the server
#
#
# ################ RMI Access file location #####################
#
# com.sun.management.jmxremote.access.file=filepath
# Specifies location for access file
# This is optional - default location is
# $JRE/conf/management/jmxremote.access
#
# If the property "com.sun.management.jmxremote.authenticate" is set to
# false, then this property and the password & access files are ignored.
# Otherwise, the access file must exist and be in the valid format.
# If the access file is empty or non-existent then no access is allowed.
#
# For a non-default password file location use the following line
# com.sun.management.jmxremote.access.file=filepath
#
# ################ Management agent listen interface #########################
#
# com.sun.management.jmxremote.host=<host-or-interface-name>
# Specifies the local interface on which the JMX RMI agent will bind.
# This is useful when running on machines which have several
# interfaces defined. It makes it possible to listen to a specific
# subnet accessible through that interface.
#
# The format of the value for that property is any string accepted
# by java.net.InetAddress.getByName(String).
#
# ################ Filter for ObjectInputStream #############################
# com.sun.management.jmxremote.serial.filter.pattern=<filter-string>
# A filter, if configured, is used by java.io.ObjectInputStream during
# deserialization of parameters sent to the JMX default agent to validate the
# contents of the stream.
# A filter is configured as a sequence of patterns, each pattern is either
# matched against the name of a class in the stream or defines a limit.
# Patterns are separated by ";" (semicolon).
# Whitespace is significant and is considered part of the pattern.
#
# If a pattern includes a "=", it sets a limit.
# If a limit appears more than once the last value is used.
# Limits are checked before classes regardless of the order in the sequence of patterns.
# If any of the limits are exceeded, the filter status is REJECTED.
#
# maxdepth=value - the maximum depth of a graph
# maxrefs=value - the maximum number of internal references
# maxbytes=value - the maximum number of bytes in the input stream
# maxarray=value - the maximum array length allowed
#
# Other patterns, from left to right, match the class or package name as
# returned from Class.getName.
# If the class is an array type, the class or package to be matched is the element type.
# Arrays of any number of dimensions are treated the same as the element type.
# For example, a pattern of "!example.Foo", rejects creation of any instance or
# array of example.Foo.
#
# If the pattern starts with "!", the status is REJECTED if the remaining pattern
# is matched; otherwise the status is ALLOWED if the pattern matches.
# If the pattern contains "/", the non-empty prefix up to the "/" is the module name;
# if the module name matches the module name of the class then
# the remaining pattern is matched with the class name.
# If there is no "/", the module name is not compared.
# If the pattern ends with ".**" it matches any class in the package and all subpackages.
# If the pattern ends with ".*" it matches any class in the package.
# If the pattern ends with "*", it matches any class with the pattern as a prefix.
# If the pattern is equal to the class name, it matches.
# Otherwise, the status is UNDECIDED.

View file

@ -0,0 +1,139 @@
############################################################
# Default Networking Configuration File
#
# This file may contain default values for the networking system properties.
# These values are only used when the system properties are not specified
# on the command line or set programmatically.
# For now, only the various proxy settings can be configured here.
############################################################
# Whether or not the DefaultProxySelector will default to System Proxy
# settings when they do exist.
# Set it to 'true' to enable this feature and check for platform
# specific proxy settings
# Note that the system properties that do explicitly set proxies
# (like http.proxyHost) do take precedence over the system settings
# even if java.net.useSystemProxies is set to true.
java.net.useSystemProxies=false
#------------------------------------------------------------------------
# Proxy configuration for the various protocol handlers.
# DO NOT uncomment these lines if you have set java.net.useSystemProxies
# to true as the protocol specific properties will take precedence over
# system settings.
#------------------------------------------------------------------------
# HTTP Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80) and nonProxyHosts is a '|' separated list of hostnames which
# should be accessed directly, ignoring the proxy server (default value is
# localhost & 127.0.0.1).
#
# http.proxyHost=
# http.proxyPort=80
http.nonProxyHosts=localhost|127.*|[::1]
#
# HTTPS Proxy Settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 443). The HTTPS protocol handlers uses the http nonProxyHosts list.
#
# https.proxyHost=
# https.proxyPort=443
#
# FTP Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80) and nonProxyHosts is a '|' separated list of hostnames which
# should be accessed directly, ignoring the proxy server (default value is
# localhost & 127.0.0.1).
#
# ftp.proxyHost=
# ftp.proxyPort=80
ftp.nonProxyHosts=localhost|127.*|[::1]
#
# Gopher Proxy settings. proxyHost is the name of the proxy server
# (e.g. proxy.mydomain.com), proxyPort is the port number to use (default
# value is 80)
#
# gopher.proxyHost=
# gopher.proxyPort=80
#
# Socks proxy settings. socksProxyHost is the name of the proxy server
# (e.g. socks.domain.com), socksProxyPort is the port number to use
# (default value is 1080)
#
# socksProxyHost=
# socksProxyPort=1080
#
# HTTP Keep Alive settings. remainingData is the maximum amount of data
# in kilobytes that will be cleaned off the underlying socket so that it
# can be reused (default value is 512K), queuedConnections is the maximum
# number of Keep Alive connections to be on the queue for clean up (default
# value is 10).
# http.KeepAlive.remainingData=512
# http.KeepAlive.queuedConnections=10
# Authentication Scheme restrictions for HTTP and HTTPS.
#
# In some environments certain authentication schemes may be undesirable
# when proxying HTTP or HTTPS. For example, "Basic" results in effectively the
# cleartext transmission of the user's password over the physical network.
# This section describes the mechanism for disabling authentication schemes
# based on the scheme name. Disabled schemes will be treated as if they are not
# supported by the implementation.
#
# The 'jdk.http.auth.tunneling.disabledSchemes' property lists the authentication
# schemes that will be disabled when tunneling HTTPS over a proxy, HTTP CONNECT.
# The 'jdk.http.auth.proxying.disabledSchemes' property lists the authentication
# schemes that will be disabled when proxying HTTP.
#
# In both cases the property is a comma-separated list of, case-insensitive,
# authentication scheme names, as defined by their relevant RFCs. An
# implementation may, but is not required to, support common schemes whose names
# include: 'Basic', 'Digest', 'NTLM', 'Kerberos', 'Negotiate'. A scheme that
# is not known, or not supported, by the implementation is ignored.
#
# Note: This property is currently used by the JDK Reference implementation. It
# is not guaranteed to be examined and used by other implementations.
#
#jdk.http.auth.proxying.disabledSchemes=
jdk.http.auth.tunneling.disabledSchemes=Basic
#
# Allow restricted HTTP request headers
#
# By default, the following request headers are not allowed to be set by user code
# in HttpRequests: "connection", "content-length", "expect", "host" and "upgrade".
# The 'jdk.httpclient.allowRestrictedHeaders' property allows one or more of these
# headers to be specified as a comma separated list to override the default restriction.
# The names are case-insensitive and white-space is ignored (removed before processing
# the list). Note, this capability is mostly intended for testing and isn't expected
# to be used in real deployments. Protocol errors or other undefined behavior is likely
# to occur when using them. The property is not set by default.
# Note also, that there may be other headers that are restricted from being set
# depending on the context. This includes the "Authorization" header when the
# relevant HttpClient has an authenticator set. These restrictions cannot be
# overridden by this property.
#
# jdk.httpclient.allowRestrictedHeaders=host
#
#
# Transparent NTLM HTTP authentication mode on Windows. Transparent authentication
# can be used for the NTLM scheme, where the security credentials based on the
# currently logged in user's name and password can be obtained directly from the
# operating system, without prompting the user. This property has three possible
# values which regulate the behavior as shown below. Other unrecognized values
# are handled the same as 'disabled'. Note, that NTLM is not considered to be a
# strongly secure authentication scheme and care should be taken before enabling
# this mechanism.
#
# Transparent authentication never used.
#jdk.http.ntlm.transparentAuth=disabled
#
# Enabled for all hosts.
#jdk.http.ntlm.transparentAuth=allHosts
#
# Enabled for hosts that are trusted in Windows Internet settings
#jdk.http.ntlm.transparentAuth=trustedHosts
#
jdk.http.ntlm.transparentAuth=disabled

View file

@ -0,0 +1,44 @@
//
// This system policy file grants a set of default permissions to all domains
// and can be configured to grant additional permissions to modules and other
// code sources. The code source URL scheme for modules linked into a
// run-time image is "jrt".
//
// For example, to grant permission to read the "foo" property to the module
// "com.greetings", the grant entry is:
//
// grant codeBase "jrt:/com.greetings" {
// permission java.util.PropertyPermission "foo", "read";
// };
//
// default permissions granted to all domains
grant {
// allows anyone to listen on dynamic ports
permission java.net.SocketPermission "localhost:0", "listen";
// "standard" properies that can be read by anyone
permission java.util.PropertyPermission "java.version", "read";
permission java.util.PropertyPermission "java.vendor", "read";
permission java.util.PropertyPermission "java.vendor.url", "read";
permission java.util.PropertyPermission "java.class.version", "read";
permission java.util.PropertyPermission "os.name", "read";
permission java.util.PropertyPermission "os.version", "read";
permission java.util.PropertyPermission "os.arch", "read";
permission java.util.PropertyPermission "file.separator", "read";
permission java.util.PropertyPermission "path.separator", "read";
permission java.util.PropertyPermission "line.separator", "read";
permission java.util.PropertyPermission
"java.specification.version", "read";
permission java.util.PropertyPermission "java.specification.vendor", "read";
permission java.util.PropertyPermission "java.specification.name", "read";
permission java.util.PropertyPermission
"java.vm.specification.version", "read";
permission java.util.PropertyPermission
"java.vm.specification.vendor", "read";
permission java.util.PropertyPermission
"java.vm.specification.name", "read";
permission java.util.PropertyPermission "java.vm.version", "read";
permission java.util.PropertyPermission "java.vm.vendor", "read";
permission java.util.PropertyPermission "java.vm.name", "read";
};

File diff suppressed because it is too large Load diff

View file

@ -0,0 +1,5 @@
name = NSS
nssLibraryDirectory = /usr/lib64
nssDbMode = noDb
attributes = compatibility
handleStartupErrors = ignoreMultipleInitialisation

View file

@ -0,0 +1,8 @@
name = NSS-FIPS
nssLibraryDirectory = /usr/lib64
nssSecmodDirectory = sql:/etc/pki/nssdb
nssDbMode = readOnly
nssModule = fips
attributes(*,CKO_SECRET_KEY,CKK_GENERIC_SECRET)={ CKA_SIGN=true }

View file

@ -0,0 +1,54 @@
Java(TM) Cryptography Extension Policy Files
for the Java(TM) Platform, Standard Edition Runtime Environment
README
------------------------------------------------------------------------
Import and export control rules on cryptographic software vary from
country to country. The Java Cryptography Extension (JCE) architecture
allows flexible cryptographic key strength to be configured via the
jurisdiction policy files which are referenced by the "crypto.policy"
security property in the <java-home>/conf/security/java.security file.
By default, Java provides two different sets of cryptographic policy
files:
unlimited: These policy files contain no restrictions on cryptographic
strengths or algorithms
limited: These policy files contain more restricted cryptographic
strengths
These files reside in <java-home>/conf/security/policy in the "unlimited"
or "limited" subdirectories respectively.
Each subdirectory contains a complete policy configuration,
and subdirectories can be added/edited/removed to reflect your
import or export control product requirements.
Within a subdirectory, the effective policy is the combined minimum
permissions of the grant statements in the file(s) matching the filename
pattern "default_*.policy". At least one grant is required. For example:
limited = Export (all) + Import (limited) = Limited
unlimited = Export (all) + Import (all) = Unlimited
The effective exemption policy is the combined minimum permissions
of the grant statements in the file(s) matching the filename pattern
"exempt_*.policy". Exemption grants are optional. For example:
limited = grants exemption permissions, by which the
effective policy can be circumvented.
e.g. KeyRecovery/KeyEscrow/KeyWeakening.
Please see the Java Cryptography Architecture (JCA) documentation for
additional information on these files and formats.
YOU ARE ADVISED TO CONSULT YOUR EXPORT/IMPORT CONTROL COUNSEL OR ATTORNEY
TO DETERMINE THE EXACT REQUIREMENTS.
Please note that the JCE for Java SE, including the JCE framework,
cryptographic policy files, and standard JCE providers provided with
the Java SE, have been reviewed and approved for export as mass market
encryption item by the US Bureau of Industry and Security.

View file

@ -0,0 +1,6 @@
// Default US Export policy file.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};

View file

@ -0,0 +1,14 @@
// Some countries have import limits on crypto strength. This policy file
// is worldwide importable.
grant {
permission javax.crypto.CryptoPermission "DES", 64;
permission javax.crypto.CryptoPermission "DESede", *;
permission javax.crypto.CryptoPermission "RC2", 128,
"javax.crypto.spec.RC2ParameterSpec", 128;
permission javax.crypto.CryptoPermission "RC4", 128;
permission javax.crypto.CryptoPermission "RC5", 128,
"javax.crypto.spec.RC5ParameterSpec", *, 12, *;
permission javax.crypto.CryptoPermission "RSA", *;
permission javax.crypto.CryptoPermission *, 128;
};

View file

@ -0,0 +1,13 @@
// Some countries have import limits on crypto strength, but may allow for
// these exemptions if the exemption mechanism is used.
grant {
// There is no restriction to any algorithms if KeyRecovery is enforced.
permission javax.crypto.CryptoPermission *, "KeyRecovery";
// There is no restriction to any algorithms if KeyEscrow is enforced.
permission javax.crypto.CryptoPermission *, "KeyEscrow";
// There is no restriction to any algorithms if KeyWeakening is enforced.
permission javax.crypto.CryptoPermission *, "KeyWeakening";
};

View file

@ -0,0 +1,6 @@
// Default US Export policy file.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};

View file

@ -0,0 +1,6 @@
// Country-specific policy file for countries with no limits on crypto strength.
grant {
// There is no restriction to any algorithms.
permission javax.crypto.CryptoAllPermission;
};

View file

@ -0,0 +1,39 @@
############################################################
# Sound Configuration File
############################################################
#
# This properties file is used to specify default service
# providers for javax.sound.midi.MidiSystem and
# javax.sound.sampled.AudioSystem.
#
# The following keys are recognized by MidiSystem methods:
#
# javax.sound.midi.Receiver
# javax.sound.midi.Sequencer
# javax.sound.midi.Synthesizer
# javax.sound.midi.Transmitter
#
# The following keys are recognized by AudioSystem methods:
#
# javax.sound.sampled.Clip
# javax.sound.sampled.Port
# javax.sound.sampled.SourceDataLine
# javax.sound.sampled.TargetDataLine
#
# The values specify the full class name of the service
# provider, or the device name.
#
# See the class descriptions for details.
#
# Example 1:
# Use MyDeviceProvider as default for SourceDataLines:
# javax.sound.sampled.SourceDataLine=com.xyz.MyDeviceProvider
#
# Example 2:
# Specify the default Synthesizer by its name "InternalSynth".
# javax.sound.midi.Synthesizer=#InternalSynth
#
# Example 3:
# Specify the default Receiver by provider and name:
# javax.sound.midi.Receiver=com.sun.media.sound.MidiProvider#SunMIDI1
#

View file

@ -0,0 +1,37 @@
ADDITIONAL INFORMATION ABOUT LICENSING
Certain files distributed by Oracle America, Inc. and/or its affiliates are
subject to the following clarification and special exception to the GPLv2,
based on the GNU Project exception for its Classpath libraries, known as the
GNU Classpath Exception.
Note that Oracle includes multiple, independent programs in this software
package. Some of those programs are provided under licenses deemed
incompatible with the GPLv2 by the Free Software Foundation and others.
For example, the package includes programs licensed under the Apache
License, Version 2.0 and may include FreeType. Such programs are licensed
to you under their original licenses.
Oracle facilitates your further distribution of this package by adding the
Classpath Exception to the necessary parts of its GPLv2 code, which permits
you to use that code in combination with other independent modules not
licensed under the GPLv2. However, note that this would not permit you to
commingle code under an incompatible license with Oracle's GPLv2 licensed
code by, for example, cutting and pasting such code into a file also
containing Oracle's GPLv2 licensed code and then distributing the result.
Additionally, if you were to remove the Classpath Exception from any of the
files to which it applies and distribute the result, you would likely be
required to license some or all of the other code in that distribution under
the GPLv2 as well, and since the GPLv2 is incompatible with the license terms
of some items included in the distribution by Oracle, removing the Classpath
Exception could therefore effectively compromise your ability to further
distribute the package.
Failing to distribute notices associated with some files may also create
unexpected legal consequences.
Proceed with caution and we recommend that you obtain the advice of a lawyer
skilled in open source matters before removing the Classpath Exception or
making modifications to this package which may subsequently be redistributed
and/or involve the use of third party software.

View file

@ -0,0 +1,27 @@
OPENJDK ASSEMBLY EXCEPTION
The OpenJDK source code made available by Oracle America, Inc. (Oracle) at
openjdk.java.net ("OpenJDK Code") is distributed under the terms of the GNU
General Public License <http://www.gnu.org/copyleft/gpl.html> version 2
only ("GPL2"), with the following clarification and special exception.
Linking this OpenJDK Code statically or dynamically with other code
is making a combined work based on this library. Thus, the terms
and conditions of GPL2 cover the whole combination.
As a special exception, Oracle gives you permission to link this
OpenJDK Code with certain code licensed by Oracle as indicated at
http://openjdk.java.net/legal/exception-modules-2007-05-08.html
("Designated Exception Modules") to produce an executable,
regardless of the license terms of the Designated Exception Modules,
and to copy and distribute the resulting executable under GPL2,
provided that the Designated Exception Modules continue to be
governed by the licenses under which they were offered by Oracle.
As such, it allows licensees and sublicensees of Oracle's GPL2 OpenJDK Code
to build an executable that includes those portions of necessary code that
Oracle could not provide under GPL2 (or that Oracle has provided under GPL2
with the Classpath exception). If you modify or add to the OpenJDK code,
that new GPL2 code may still be combined with Designated Exception Modules
if the new code is made subject to this exception by its copyright holder.

View file

@ -0,0 +1,347 @@
The GNU General Public License (GPL)
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share
and change it. By contrast, the GNU General Public License is intended to
guarantee your freedom to share and change free software--to make sure the
software is free for all its users. This General Public License applies to
most of the Free Software Foundation's software and to any other program whose
authors commit to using it. (Some other Free Software Foundation software is
covered by the GNU Library General Public License instead.) You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not price. Our
General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish),
that you receive source code or can get it if you want it, that you can change
the software or use pieces of it in new free programs; and that you know you
can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny
you these rights or to ask you to surrender the rights. These restrictions
translate to certain responsibilities for you if you distribute copies of the
software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for
a fee, you must give the recipients all the rights that you have. You must
make sure that they, too, receive or can get the source code. And you must
show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2)
offer you this license which gives you legal permission to copy, distribute
and/or modify the software.
Also, for each author's protection and ours, we want to make certain that
everyone understands that there is no warranty for this free software. If the
software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We
wish to avoid the danger that redistributors of a free program will
individually obtain patent licenses, in effect making the program proprietary.
To prevent this, we have made it clear that any patent must be licensed for
everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification
follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice
placed by the copyright holder saying it may be distributed under the terms of
this General Public License. The "Program", below, refers to any such program
or work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the
Program or a portion of it, either verbatim or with modifications and/or
translated into another language. (Hereinafter, translation is included
without limitation in the term "modification".) Each licensee is addressed as
"you".
Activities other than copying, distribution and modification are not covered by
this License; they are outside its scope. The act of running the Program is
not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by
running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as
you receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this License
and to the absence of any warranty; and give any other recipients of the
Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may
at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus
forming a work based on the Program, and copy and distribute such modifications
or work under the terms of Section 1 above, provided that you also meet all of
these conditions:
a) You must cause the modified files to carry prominent notices stating
that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or
in part contains or is derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third parties under the terms of
this License.
c) If the modified program normally reads commands interactively when run,
you must cause it, when started running for such interactive use in the
most ordinary way, to print or display an announcement including an
appropriate copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may redistribute
the program under these conditions, and telling the user how to view a copy
of this License. (Exception: if the Program itself is interactive but does
not normally print such an announcement, your work based on the Program is
not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Program, and can be reasonably
considered independent and separate works in themselves, then this License, and
its terms, do not apply to those sections when you distribute them as separate
works. But when you distribute the same sections as part of a whole which is a
work based on the Program, the distribution of the whole must be on the terms
of this License, whose permissions for other licensees extend to the entire
whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your
rights to work written entirely by you; rather, the intent is to exercise the
right to control the distribution of derivative or collective works based on
the Program.
In addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage or
distribution medium does not bring the other work under the scope of this
License.
3. You may copy and distribute the Program (or a work based on it, under
Section 2) in object code or executable form under the terms of Sections 1 and
2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source
code, which must be distributed under the terms of Sections 1 and 2 above
on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to
give any third party, for a charge no more than your cost of physically
performing source distribution, a complete machine-readable copy of the
corresponding source code, to be distributed under the terms of Sections 1
and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to
distribute corresponding source code. (This alternative is allowed only
for noncommercial distribution and only if you received the program in
object code or executable form with such an offer, in accord with
Subsection b above.)
The source code for a work means the preferred form of the work for making
modifications to it. For an executable work, complete source code means all
the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation
of the executable. However, as a special exception, the source code
distributed need not include anything that is normally distributed (in either
source or binary form) with the major components (compiler, kernel, and so on)
of the operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy
from a designated place, then offering equivalent access to copy the source
code from the same place counts as distribution of the source code, even though
third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as
expressly provided under this License. Any attempt otherwise to copy, modify,
sublicense or distribute the Program is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so
long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it.
However, nothing else grants you permission to modify or distribute the Program
or its derivative works. These actions are prohibited by law if you do not
accept this License. Therefore, by modifying or distributing the Program (or
any work based on the Program), you indicate your acceptance of this License to
do so, and all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program),
the recipient automatically receives a license from the original licensor to
copy, distribute or modify the Program subject to these terms and conditions.
You may not impose any further restrictions on the recipients' exercise of the
rights granted herein. You are not responsible for enforcing compliance by
third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues), conditions
are imposed on you (whether by court order, agreement or otherwise) that
contradict the conditions of this License, they do not excuse you from the
conditions of this License. If you cannot distribute so as to satisfy
simultaneously your obligations under this License and any other pertinent
obligations, then as a consequence you may not distribute the Program at all.
For example, if a patent license would not permit royalty-free redistribution
of the Program by all those who receive copies directly or indirectly through
you, then the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any
particular circumstance, the balance of the section is intended to apply and
the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or
other property right claims or to contest validity of any such claims; this
section has the sole purpose of protecting the integrity of the free software
distribution system, which is implemented by public license practices. Many
people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that
choice.
This section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain
countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Program under this License may add an explicit
geographical distribution limitation excluding those countries, so that
distribution is permitted only in or among countries not thus excluded. In
such case, this License incorporates the limitation as if written in the body
of this License.
9. The Free Software Foundation may publish revised and/or new versions of the
General Public License from time to time. Such new versions will be similar in
spirit to the present version, but may differ in detail to address new problems
or concerns.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any later
version", you have the option of following the terms and conditions either of
that version or of any later version published by the Free Software Foundation.
If the Program does not specify a version number of this License, you may
choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs
whose distribution conditions are different, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation,
write to the Free Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of
all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER
OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible
use to the public, the best way to achieve this is to make it free software
which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach
them to the start of each source file to most effectively convey the exclusion
of warranty; and each file should have at least the "copyright" line and a
pointer to where the full notice is found.
One line to give the program's name and a brief idea of what it does.
Copyright (C) <year> <name of author>
This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the Free
Software Foundation; either version 2 of the License, or (at your option)
any later version.
This program is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
more details.
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it
starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes
with ABSOLUTELY NO WARRANTY; for details type 'show w'. This is free
software, and you are welcome to redistribute it under certain conditions;
type 'show c' for details.
The hypothetical commands 'show w' and 'show c' should show the appropriate
parts of the General Public License. Of course, the commands you use may be
called something other than 'show w' and 'show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school,
if any, to sign a "copyright disclaimer" for the program, if necessary. Here
is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
'Gnomovision' (which makes passes at compilers) written by James Hacker.
signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Library General Public
License instead of this License.
"CLASSPATH" EXCEPTION TO THE GPL
Certain source files distributed by Oracle America and/or its affiliates are
subject to the following clarification and special exception to the GPL, but
only where Oracle has expressly included in the particular source file's header
the words "Oracle designates this particular file as subject to the "Classpath"
exception as provided by Oracle in the LICENSE file that accompanied this code."
Linking this library statically or dynamically with other modules is making
a combined work based on this library. Thus, the terms and conditions of
the GNU General Public License cover the whole combination.
As a special exception, the copyright holders of this library give you
permission to link this library with independent modules to produce an
executable, regardless of the license terms of these independent modules,
and to copy and distribute the resulting executable under terms of your
choice, provided that you also meet, for each linked independent module,
the terms and conditions of the license of that module. An independent
module is a module which is not derived from or based on this library. If
you modify this library, you may extend this exception to your version of
the library, but you are not obligated to do so. If you do not wish to do
so, delete this exception statement from your version.

View file

@ -0,0 +1,36 @@
## Cryptix AES v3.2.0
### Cryptix General License
<pre>
Cryptix General License
Copyright (c) 1995-2005 The Cryptix Foundation Limited.
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
1. Redistributions of source code must retain the copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the
distribution.
THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED AND
CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE CRYPTIX FOUNDATION LIMITED OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</pre>

View file

@ -0,0 +1,36 @@
## ASM Bytecode Manipulation Framework v6.0
### ASM License
<pre>
Copyright (c) 2000-2011 France Télécom
All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holders nor the names of its
contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
</pre>

View file

@ -0,0 +1,35 @@
## c-libutl 20160225
### c-libutl License
```
This software is distributed under the terms of the BSD license.
== BSD LICENSE ===============================================================
(C) 2009 by Remo Dentato (rdentato@gmail.com)
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
http://opensource.org/licenses/bsd-license.php
```

View file

@ -0,0 +1,66 @@
## Unicode Common Local Data Repository (CLDR) v33
### CLDR License
```
UNICODE, INC. LICENSE AGREEMENT - DATA FILES AND SOFTWARE
Unicode Data Files include all data files under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
Unicode Data Files do not include PDF online code charts under the
directory http://www.unicode.org/Public/.
Software includes any source code published in the Unicode Standard
or under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
NOTICE TO USER: Carefully read the following legal agreement.
BY DOWNLOADING, INSTALLING, COPYING OR OTHERWISE USING UNICODE INC.'S
DATA FILES ("DATA FILES"), AND/OR SOFTWARE ("SOFTWARE"),
YOU UNEQUIVOCALLY ACCEPT, AND AGREE TO BE BOUND BY, ALL OF THE
TERMS AND CONDITIONS OF THIS AGREEMENT.
IF YOU DO NOT AGREE, DO NOT DOWNLOAD, INSTALL, COPY, DISTRIBUTE OR USE
THE DATA FILES OR SOFTWARE.
COPYRIGHT AND PERMISSION NOTICE
Copyright © 1991-2018 Unicode, Inc. All rights reserved.
Distributed under the Terms of Use in http://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining
a copy of the Unicode data files and any associated documentation
(the "Data Files") or Unicode software and any associated documentation
(the "Software") to deal in the Data Files or Software
without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, and/or sell copies of
the Data Files or Software, and to permit persons to whom the Data Files
or Software are furnished to do so, provided that either
(a) this copyright and permission notice appear with all copies
of the Data Files or Software, or
(b) this copyright and permission notice appear in associated
Documentation.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS
NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL
DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THE DATA FILES OR SOFTWARE.
Except as contained in this notice, the name of a copyright holder
shall not be used in advertising or otherwise to promote the sale,
use or other dealings in these Data Files or Software without prior
written authorization of the copyright holder.
```

View file

@ -0,0 +1,66 @@
## International Components for Unicode (ICU4J) v60.2
### ICU4J License
```
UNICODE, INC. LICENSE AGREEMENT - DATA FILES AND SOFTWARE
Unicode Data Files include all data files under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
Unicode Data Files do not include PDF online code charts under the
directory http://www.unicode.org/Public/.
Software includes any source code published in the Unicode Standard
or under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
NOTICE TO USER: Carefully read the following legal agreement.
BY DOWNLOADING, INSTALLING, COPYING OR OTHERWISE USING UNICODE INC.'S
DATA FILES ("DATA FILES"), AND/OR SOFTWARE ("SOFTWARE"),
YOU UNEQUIVOCALLY ACCEPT, AND AGREE TO BE BOUND BY, ALL OF THE
TERMS AND CONDITIONS OF THIS AGREEMENT.
IF YOU DO NOT AGREE, DO NOT DOWNLOAD, INSTALL, COPY, DISTRIBUTE OR USE
THE DATA FILES OR SOFTWARE.
COPYRIGHT AND PERMISSION NOTICE
Copyright © 1991-2018 Unicode, Inc. All rights reserved.
Distributed under the Terms of Use in http://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining
a copy of the Unicode data files and any associated documentation
(the "Data Files") or Unicode software and any associated documentation
(the "Software") to deal in the Data Files or Software
without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, and/or sell copies of
the Data Files or Software, and to permit persons to whom the Data Files
or Software are furnished to do so, provided that either
(a) this copyright and permission notice appear with all copies
of the Data Files or Software, or
(b) this copyright and permission notice appear in associated
Documentation.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS
NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL
DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THE DATA FILES OR SOFTWARE.
Except as contained in this notice, the name of a copyright holder
shall not be used in advertising or otherwise to promote the sale,
use or other dealings in these Data Files or Software without prior
written authorization of the copyright holder.
```

View file

@ -0,0 +1,399 @@
## Mozilla Public Suffix List
### Public Suffix Notice
```
You are receiving a copy of the Mozilla Public Suffix List in the following
file: <java-home>/lib/security/public_suffix_list.dat. The terms of the
Oracle license do NOT apply to this file; it is licensed under the
Mozilla Public License 2.0, separately from the Oracle programs you receive.
If you do not wish to use the Public Suffix List, you may remove the
<java-home>/lib/security/public_suffix_list.dat file.
The Source Code of this file is available under the
Mozilla Public License, v. 2.0 and is located at
https://raw.githubusercontent.com/publicsuffix/list/3c213aab32b3c014f171b1673d4ce9b5cd72bf1c/public_suffix_list.dat.
If a copy of the MPL was not distributed with this file, you can obtain one
at https://mozilla.org/MPL/2.0/.
Software distributed under the License is distributed on an "AS IS" basis,
WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
for the specific language governing rights and limitations under the License.
```
### MPL v2.0
```
Mozilla Public License Version 2.0
==================================
1. Definitions
--------------
1.1. "Contributor"
means each individual or legal entity that creates, contributes to
the creation of, or owns Covered Software.
1.2. "Contributor Version"
means the combination of the Contributions of others (if any) used
by a Contributor and that particular Contributor's Contribution.
1.3. "Contribution"
means Covered Software of a particular Contributor.
1.4. "Covered Software"
means Source Code Form to which the initial Contributor has attached
the notice in Exhibit A, the Executable Form of such Source Code
Form, and Modifications of such Source Code Form, in each case
including portions thereof.
1.5. "Incompatible With Secondary Licenses"
means
(a) that the initial Contributor has attached the notice described
in Exhibit B to the Covered Software; or
(b) that the Covered Software was made available under the terms of
version 1.1 or earlier of the License, but not also under the
terms of a Secondary License.
1.6. "Executable Form"
means any form of the work other than Source Code Form.
1.7. "Larger Work"
means a work that combines Covered Software with other material, in
a separate file or files, that is not Covered Software.
1.8. "License"
means this document.
1.9. "Licensable"
means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently, any and
all of the rights conveyed by this License.
1.10. "Modifications"
means any of the following:
(a) any file in Source Code Form that results from an addition to,
deletion from, or modification of the contents of Covered
Software; or
(b) any new file in Source Code Form that contains any Covered
Software.
1.11. "Patent Claims" of a Contributor
means any patent claim(s), including without limitation, method,
process, and apparatus claims, in any patent Licensable by such
Contributor that would be infringed, but for the grant of the
License, by the making, using, selling, offering for sale, having
made, import, or transfer of either its Contributions or its
Contributor Version.
1.12. "Secondary License"
means either the GNU General Public License, Version 2.0, the GNU
Lesser General Public License, Version 2.1, the GNU Affero General
Public License, Version 3.0, or any later versions of those
licenses.
1.13. "Source Code Form"
means the form of the work preferred for making modifications.
1.14. "You" (or "Your")
means an individual or a legal entity exercising rights under this
License. For legal entities, "You" includes any entity that
controls, is controlled by, or is under common control with You. For
purposes of this definition, "control" means (a) the power, direct
or indirect, to cause the direction or management of such entity,
whether by contract or otherwise, or (b) ownership of more than
fifty percent (50%) of the outstanding shares or beneficial
ownership of such entity.
2. License Grants and Conditions
--------------------------------
2.1. Grants
Each Contributor hereby grants You a world-wide, royalty-free,
non-exclusive license:
(a) under intellectual property rights (other than patent or trademark)
Licensable by such Contributor to use, reproduce, make available,
modify, display, perform, distribute, and otherwise exploit its
Contributions, either on an unmodified basis, with Modifications, or
as part of a Larger Work; and
(b) under Patent Claims of such Contributor to make, use, sell, offer
for sale, have made, import, and otherwise transfer either its
Contributions or its Contributor Version.
2.2. Effective Date
The licenses granted in Section 2.1 with respect to any Contribution
become effective for each Contribution on the date the Contributor first
distributes such Contribution.
2.3. Limitations on Grant Scope
The licenses granted in this Section 2 are the only rights granted under
this License. No additional rights or licenses will be implied from the
distribution or licensing of Covered Software under this License.
Notwithstanding Section 2.1(b) above, no patent license is granted by a
Contributor:
(a) for any code that a Contributor has removed from Covered Software;
or
(b) for infringements caused by: (i) Your and any other third party's
modifications of Covered Software, or (ii) the combination of its
Contributions with other software (except as part of its Contributor
Version); or
(c) under Patent Claims infringed by Covered Software in the absence of
its Contributions.
This License does not grant any rights in the trademarks, service marks,
or logos of any Contributor (except as may be necessary to comply with
the notice requirements in Section 3.4).
2.4. Subsequent Licenses
No Contributor makes additional grants as a result of Your choice to
distribute the Covered Software under a subsequent version of this
License (see Section 10.2) or under the terms of a Secondary License (if
permitted under the terms of Section 3.3).
2.5. Representation
Each Contributor represents that the Contributor believes its
Contributions are its original creation(s) or it has sufficient rights
to grant the rights to its Contributions conveyed by this License.
2.6. Fair Use
This License is not intended to limit any rights You have under
applicable copyright doctrines of fair use, fair dealing, or other
equivalents.
2.7. Conditions
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
in Section 2.1.
3. Responsibilities
-------------------
3.1. Distribution of Source Form
All distribution of Covered Software in Source Code Form, including any
Modifications that You create or to which You contribute, must be under
the terms of this License. You must inform recipients that the Source
Code Form of the Covered Software is governed by the terms of this
License, and how they can obtain a copy of this License. You may not
attempt to alter or restrict the recipients' rights in the Source Code
Form.
3.2. Distribution of Executable Form
If You distribute Covered Software in Executable Form then:
(a) such Covered Software must also be made available in Source Code
Form, as described in Section 3.1, and You must inform recipients of
the Executable Form how they can obtain a copy of such Source Code
Form by reasonable means in a timely manner, at a charge no more
than the cost of distribution to the recipient; and
(b) You may distribute such Executable Form under the terms of this
License, or sublicense it under different terms, provided that the
license for the Executable Form does not attempt to limit or alter
the recipients' rights in the Source Code Form under this License.
3.3. Distribution of a Larger Work
You may create and distribute a Larger Work under terms of Your choice,
provided that You also comply with the requirements of this License for
the Covered Software. If the Larger Work is a combination of Covered
Software with a work governed by one or more Secondary Licenses, and the
Covered Software is not Incompatible With Secondary Licenses, this
License permits You to additionally distribute such Covered Software
under the terms of such Secondary License(s), so that the recipient of
the Larger Work may, at their option, further distribute the Covered
Software under the terms of either this License or such Secondary
License(s).
3.4. Notices
You may not remove or alter the substance of any license notices
(including copyright notices, patent notices, disclaimers of warranty,
or limitations of liability) contained within the Source Code Form of
the Covered Software, except that You may alter any license notices to
the extent required to remedy known factual inaccuracies.
3.5. Application of Additional Terms
You may choose to offer, and to charge a fee for, warranty, support,
indemnity or liability obligations to one or more recipients of Covered
Software. However, You may do so only on Your own behalf, and not on
behalf of any Contributor. You must make it absolutely clear that any
such warranty, support, indemnity, or liability obligation is offered by
You alone, and You hereby agree to indemnify every Contributor for any
liability incurred by such Contributor as a result of warranty, support,
indemnity or liability terms You offer. You may include additional
disclaimers of warranty and limitations of liability specific to any
jurisdiction.
4. Inability to Comply Due to Statute or Regulation
---------------------------------------------------
If it is impossible for You to comply with any of the terms of this
License with respect to some or all of the Covered Software due to
statute, judicial order, or regulation then You must: (a) comply with
the terms of this License to the maximum extent possible; and (b)
describe the limitations and the code they affect. Such description must
be placed in a text file included with all distributions of the Covered
Software under this License. Except to the extent prohibited by statute
or regulation, such description must be sufficiently detailed for a
recipient of ordinary skill to be able to understand it.
5. Termination
--------------
5.1. The rights granted under this License will terminate automatically
if You fail to comply with any of its terms. However, if You become
compliant, then the rights granted under this License from a particular
Contributor are reinstated (a) provisionally, unless and until such
Contributor explicitly and finally terminates Your grants, and (b) on an
ongoing basis, if such Contributor fails to notify You of the
non-compliance by some reasonable means prior to 60 days after You have
come back into compliance. Moreover, Your grants from a particular
Contributor are reinstated on an ongoing basis if such Contributor
notifies You of the non-compliance by some reasonable means, this is the
first time You have received notice of non-compliance with this License
from such Contributor, and You become compliant prior to 30 days after
Your receipt of the notice.
5.2. If You initiate litigation against any entity by asserting a patent
infringement claim (excluding declaratory judgment actions,
counter-claims, and cross-claims) alleging that a Contributor Version
directly or indirectly infringes any patent, then the rights granted to
You by any and all Contributors for the Covered Software under Section
2.1 of this License shall terminate.
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
end user license agreements (excluding distributors and resellers) which
have been validly granted by You or Your distributors under this License
prior to termination shall survive termination.
************************************************************************
* *
* 6. Disclaimer of Warranty *
* ------------------------- *
* *
* Covered Software is provided under this License on an "as is" *
* basis, without warranty of any kind, either expressed, implied, or *
* statutory, including, without limitation, warranties that the *
* Covered Software is free of defects, merchantable, fit for a *
* particular purpose or non-infringing. The entire risk as to the *
* quality and performance of the Covered Software is with You. *
* Should any Covered Software prove defective in any respect, You *
* (not any Contributor) assume the cost of any necessary servicing, *
* repair, or correction. This disclaimer of warranty constitutes an *
* essential part of this License. No use of any Covered Software is *
* authorized under this License except under this disclaimer. *
* *
************************************************************************
************************************************************************
* *
* 7. Limitation of Liability *
* -------------------------- *
* *
* Under no circumstances and under no legal theory, whether tort *
* (including negligence), contract, or otherwise, shall any *
* Contributor, or anyone who distributes Covered Software as *
* permitted above, be liable to You for any direct, indirect, *
* special, incidental, or consequential damages of any character *
* including, without limitation, damages for lost profits, loss of *
* goodwill, work stoppage, computer failure or malfunction, or any *
* and all other commercial damages or losses, even if such party *
* shall have been informed of the possibility of such damages. This *
* limitation of liability shall not apply to liability for death or *
* personal injury resulting from such party's negligence to the *
* extent applicable law prohibits such limitation. Some *
* jurisdictions do not allow the exclusion or limitation of *
* incidental or consequential damages, so this exclusion and *
* limitation may not apply to You. *
* *
************************************************************************
8. Litigation
-------------
Any litigation relating to this License may be brought only in the
courts of a jurisdiction where the defendant maintains its principal
place of business and such litigation shall be governed by laws of that
jurisdiction, without reference to its conflict-of-law provisions.
Nothing in this Section shall prevent a party's ability to bring
cross-claims or counter-claims.
9. Miscellaneous
----------------
This License represents the complete agreement concerning the subject
matter hereof. If any provision of this License is held to be
unenforceable, such provision shall be reformed only to the extent
necessary to make it enforceable. Any law or regulation which provides
that the language of a contract shall be construed against the drafter
shall not be used to construe this License against a Contributor.
10. Versions of the License
---------------------------
10.1. New Versions
Mozilla Foundation is the license steward. Except as provided in Section
10.3, no one other than the license steward has the right to modify or
publish new versions of this License. Each version will be given a
distinguishing version number.
10.2. Effect of New Versions
You may distribute the Covered Software under the terms of the version
of the License under which You originally received the Covered Software,
or under the terms of any subsequent version published by the license
steward.
10.3. Modified Versions
If you create software not governed by this License, and you want to
create a new license for such software, you may create and use a
modified version of this License if you rename the license and remove
any references to the name of the license steward (except to note that
such modified license differs from this License).
10.4. Distributing Source Code Form that is Incompatible With Secondary
Licenses
If You choose to distribute Source Code Form that is Incompatible With
Secondary Licenses under the terms of this version of the License, the
notice described in Exhibit B of this License must be attached.
Exhibit A - Source Code Form License Notice
-------------------------------------------
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0. If a copy of the MPL was not distributed with this
file, You can obtain one at https://mozilla.org/MPL/2.0/.
If it is not possible or desirable to put the notice in a particular
file, then You may include the notice in a location (such as a LICENSE
file in a relevant directory) where a recipient would be likely to look
for such a notice.
You may add additional accurate notices of copyright ownership.
Exhibit B - "Incompatible With Secondary Licenses" Notice
---------------------------------------------------------
This Source Code Form is "Incompatible With Secondary Licenses", as
defined by the Mozilla Public License, v. 2.0.
```

View file

@ -0,0 +1,66 @@
## The Unicode Standard, Unicode Character Database, Version 10.0.0
### Unicode Character Database
```
UNICODE, INC. LICENSE AGREEMENT - DATA FILES AND SOFTWARE
Unicode Data Files include all data files under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
Unicode Data Files do not include PDF online code charts under the
directory http://www.unicode.org/Public/.
Software includes any source code published in the Unicode Standard
or under the directories
http://www.unicode.org/Public/, http://www.unicode.org/reports/,
http://www.unicode.org/cldr/data/,
http://source.icu-project.org/repos/icu/, and
http://www.unicode.org/utility/trac/browser/.
NOTICE TO USER: Carefully read the following legal agreement.
BY DOWNLOADING, INSTALLING, COPYING OR OTHERWISE USING UNICODE INC.'S
DATA FILES ("DATA FILES"), AND/OR SOFTWARE ("SOFTWARE"),
YOU UNEQUIVOCALLY ACCEPT, AND AGREE TO BE BOUND BY, ALL OF THE
TERMS AND CONDITIONS OF THIS AGREEMENT.
IF YOU DO NOT AGREE, DO NOT DOWNLOAD, INSTALL, COPY, DISTRIBUTE OR USE
THE DATA FILES OR SOFTWARE.
COPYRIGHT AND PERMISSION NOTICE
Copyright © 1991-2018 Unicode, Inc. All rights reserved.
Distributed under the Terms of Use in http://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining
a copy of the Unicode data files and any associated documentation
(the "Data Files") or Unicode software and any associated documentation
(the "Software") to deal in the Data Files or Software
without restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, and/or sell copies of
the Data Files or Software, and to permit persons to whom the Data Files
or Software are furnished to do so, provided that either
(a) this copyright and permission notice appear with all copies
of the Data Files or Software, or
(b) this copyright and permission notice appear in associated
Documentation.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS.
IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS
NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL
DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THE DATA FILES OR SOFTWARE.
Except as contained in this notice, the name of a copyright holder
shall not be used in advertising or otherwise to promote the sale,
use or other dealings in these Data Files or Software without prior
written authorization of the copyright holder.
```

View file

@ -0,0 +1,27 @@
## zlib v1.2.13
### zlib License
<pre>
Copyright (C) 1995-2022 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any damages
arising from the use of this software.
Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute it
freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software
in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
jloup@gzip.org madler@alumni.caltech.edu
</pre>

View file

@ -0,0 +1,7 @@
## Eastman Kodak Company: Portions of color management and imaging software
### Eastman Kodak Notice
<pre>
Portions Copyright Eastman Kodak Company 1991-2003
</pre>

View file

@ -0,0 +1,650 @@
## The FreeType Project: Freetype v2.12.1
### FreeType Notice
```
FreeType comes with two licenses from which you can choose the one
which fits your needs best.
The FreeType License (FTL) is the most commonly used one. It is
a BSD-style license with a credit clause and thus compatible with
the GNU Public License (GPL) version 3, but not with the
GPL version 2.
The GNU General Public License (GPL), version 2. Use it for all
projects which use the GPLv2 also, or which need a license
compatible to the GPLv2.
```
### FreeType License
```
Copyright (C) 1996-2022 by David Turner, Robert Wilhelm, and Werner Lemberg.
Copyright (C) 2007-2022 by Dereg Clegg and Michael Toftdal.
Copyright (C) 1996-2022 by Just van Rossum, David Turner, Robert Wilhelm, and Werner Lemberg.
Copyright (C) 2004-2022 by Masatake YAMATO and Redhat K.K.
Copyright (C) 2007-2022 by Derek Clegg and Michael Toftdal.
Copyright (C) 2007-2022 by David Turner.
Copyright (C) 2022 by David Turner, Robert Wilhelm, Werner Lemberg, and Moazin Khatti.
Copyright (C) 2007-2022 by Rahul Bhalerao <rahul.bhalerao@redhat.com>, <b.rahul.pm@gmail.com>.
Copyright (C) 2008-2022 by David Turner, Robert Wilhelm, Werner Lemberg, and suzuki toshiya.
Copyright (C) 2019-2022 by Nikhil Ramakrishnan, David Turner, Robert Wilhelm, and Werner Lemberg.
Copyright (C) 2009-2022 by Oran Agra and Mickey Gabel.
Copyright (C) 2004-2022 by David Turner, Robert Wilhelm, Werner Lemberg, and George Williams.
Copyright (C) 2004-2022 by Masatake YAMATO, Red Hat K.K.,
Copyright (C) 2003-2022 by Masatake YAMATO, Redhat K.K.,
Copyright (C) 2013-2022 by Google, Inc.
Copyright (C) 2018-2022 by David Turner, Robert Wilhelm, Dominik Röttsches, and Werner Lemberg.
Copyright (C) 2005-2022 by David Turner, Robert Wilhelm, and Werner Lemberg.
Copyright 2013 by Google, Inc.
The FreeType Project LICENSE
----------------------------
2006-Jan-27
Copyright 1996-2002, 2006 by
David Turner, Robert Wilhelm, and Werner Lemberg
Introduction
============
The FreeType Project is distributed in several archive packages;
some of them may contain, in addition to the FreeType font engine,
various tools and contributions which rely on, or relate to, the
FreeType Project.
This license applies to all files found in such packages, and
which do not fall under their own explicit license. The license
affects thus the FreeType font engine, the test programs,
documentation and makefiles, at the very least.
This license was inspired by the BSD, Artistic, and IJG
(Independent JPEG Group) licenses, which all encourage inclusion
and use of free software in commercial and freeware products
alike. As a consequence, its main points are that:
o We don't promise that this software works. However, we will be
interested in any kind of bug reports. (`as is' distribution)
o You can use this software for whatever you want, in parts or
full form, without having to pay us. (`royalty-free' usage)
o You may not pretend that you wrote this software. If you use
it, or only parts of it, in a program, you must acknowledge
somewhere in your documentation that you have used the
FreeType code. (`credits')
We specifically permit and encourage the inclusion of this
software, with or without modifications, in commercial products.
We disclaim all warranties covering The FreeType Project and
assume no liability related to The FreeType Project.
Finally, many people asked us for a preferred form for a
credit/disclaimer to use in compliance with this license. We thus
encourage you to use the following text:
"""
Portions of this software are copyright © <year> The FreeType
Project (www.freetype.org). All rights reserved.
"""
Please replace <year> with the value from the FreeType version you
actually use.
Legal Terms
===========
0. Definitions
--------------
Throughout this license, the terms `package', `FreeType Project',
and `FreeType archive' refer to the set of files originally
distributed by the authors (David Turner, Robert Wilhelm, and
Werner Lemberg) as the `FreeType Project', be they named as alpha,
beta or final release.
`You' refers to the licensee, or person using the project, where
`using' is a generic term including compiling the project's source
code as well as linking it to form a `program' or `executable'.
This program is referred to as `a program using the FreeType
engine'.
This license applies to all files distributed in the original
FreeType Project, including all source code, binaries and
documentation, unless otherwise stated in the file in its
original, unmodified form as distributed in the original archive.
If you are unsure whether or not a particular file is covered by
this license, you must contact us to verify this.
The FreeType Project is copyright (C) 1996-2000 by David Turner,
Robert Wilhelm, and Werner Lemberg. All rights reserved except as
specified below.
1. No Warranty
--------------
THE FREETYPE PROJECT IS PROVIDED `AS IS' WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. IN NO EVENT WILL ANY OF THE AUTHORS OR COPYRIGHT HOLDERS
BE LIABLE FOR ANY DAMAGES CAUSED BY THE USE OR THE INABILITY TO
USE, OF THE FREETYPE PROJECT.
2. Redistribution
-----------------
This license grants a worldwide, royalty-free, perpetual and
irrevocable right and license to use, execute, perform, compile,
display, copy, create derivative works of, distribute and
sublicense the FreeType Project (in both source and object code
forms) and derivative works thereof for any purpose; and to
authorize others to exercise some or all of the rights granted
herein, subject to the following conditions:
o Redistribution of source code must retain this license file
(`FTL.TXT') unaltered; any additions, deletions or changes to
the original files must be clearly indicated in accompanying
documentation. The copyright notices of the unaltered,
original files must be preserved in all copies of source
files.
o Redistribution in binary form must provide a disclaimer that
states that the software is based in part of the work of the
FreeType Team, in the distribution documentation. We also
encourage you to put an URL to the FreeType web page in your
documentation, though this isn't mandatory.
These conditions apply to any software derived from or based on
the FreeType Project, not just the unmodified files. If you use
our work, you must acknowledge us. However, no fee need be paid
to us.
3. Advertising
--------------
Neither the FreeType authors and contributors nor you shall use
the name of the other for commercial, advertising, or promotional
purposes without specific prior written permission.
We suggest, but do not require, that you use one or more of the
following phrases to refer to this software in your documentation
or advertising materials: `FreeType Project', `FreeType Engine',
`FreeType library', or `FreeType Distribution'.
As you have not signed this license, you are not required to
accept it. However, as the FreeType Project is copyrighted
material, only this license, or another one contracted with the
authors, grants you the right to use, distribute, and modify it.
Therefore, by using, distributing, or modifying the FreeType
Project, you indicate that you understand and accept all the terms
of this license.
4. Contacts
-----------
There are two mailing lists related to FreeType:
o freetype@nongnu.org
Discusses general use and applications of FreeType, as well as
future and wanted additions to the library and distribution.
If you are looking for support, start in this list if you
haven't found anything to help you in the documentation.
o freetype-devel@nongnu.org
Discusses bugs, as well as engine internals, design issues,
specific licenses, porting, etc.
Our home page can be found at
http://www.freetype.org
```
### GPL v2
```
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your
freedom to share and change it. By contrast, the GNU General Public
License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This
General Public License applies to most of the Free Software
Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it
if you want it, that you can change the software or use pieces of it
in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid
anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must give the recipients all the rights that
you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their
rights.
We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software
patents. We wish to avoid the danger that redistributors of a free
program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and
modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains
a notice placed by the copyright holder saying it may be distributed
under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it,
either verbatim or with modifications and/or translated into another
language. (Hereinafter, translation is included without limitation in
the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of
running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the
Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty;
and give any other recipients of the Program a copy of this License
along with the Program.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices
stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively
when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a
notice that there is no warranty (or else, saying that you provide
a warranty) and that users may redistribute the program under
these conditions, and telling the user how to view a copy of this
License. (Exception: if the Program itself is interactive but
does not normally print such an announcement, your work based on
the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If
identifiable sections of that work are not derived from the Program,
and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you
distribute the same sections as part of a whole which is a work based
on the Program, the distribution of the whole must be on the terms of
this License, whose permissions for other licensees extend to the
entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program
with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under
the scope of this License.
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three
years, to give any third party, for a charge no more than your
cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to be
distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer
to distribute corresponding source code. (This alternative is
allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such
an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to
control compilation and installation of the executable. However, as a
special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering
access to copy from a designated place, then offering equivalent
access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not
compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense or distribute the Program is
void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
this License will not have their licenses terminated so long as such
parties remain in full compliance.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to
these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent
license would not permit royalty-free redistribution of the Program by
all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under
any particular circumstance, the balance of the section is intended to
apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any
patents or other property right claims or to contest validity of any
such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is
implemented by public license practices. Many people have made
generous contributions to the wide range of software distributed
through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing
to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to
be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in
certain countries either by patents or by copyrighted interfaces, the
original copyright holder who places the Program under this License
may add an explicit geographical distribution limitation excluding
those countries, so that distribution is permitted only in or among
countries not thus excluded. In such case, this License incorporates
the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software
Foundation.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this. Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software and
of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this
when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, the commands you use may
be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
`Gnomovision' (which makes passes at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Library General
Public License instead of this License.
```
### Additional Freetype Attributions
```
---------------------------------
The below license applies to the following files:
libfreetype/src/psaux/psarrst.c
libfreetype/src/psaux/psarrst.h
libfreetype/src/psaux/psblues.c
libfreetype/src/psaux/psblues.h
libfreetype/src/psaux/pserror.c
libfreetype/src/psaux/pserror.h
libfreetype/src/psaux/psfixed.h
libfreetype/src/psaux/psfont.c
libfreetype/src/psaux/psfont.h
libfreetype/src/psaux/psft.c
libfreetype/src/psaux/psft.h
libfreetype/src/psaux/psglue.h
libfreetype/src/psaux/pshints.c
libfreetype/src/psaux/pshints.h
libfreetype/src/psaux/psintrp.c
libfreetype/src/psaux/psintrp.h
libfreetype/src/psaux/psread.c
libfreetype/src/psaux/psread.h
libfreetype/src/psaux/psstack.c
libfreetype/src/psaux/psstack.h
libfreetype/src/psaux/pstypes.h
Copyright 2006-2014 Adobe Systems Incorporated.
This software, and all works of authorship, whether in source or
object code form as indicated by the copyright notice(s) included
herein (collectively, the "Work") is made available, and may only be
used, modified, and distributed under the FreeType Project License,
LICENSE.TXT. Additionally, subject to the terms and conditions of the
FreeType Project License, each contributor to the Work hereby grants
to any individual or legal entity exercising permissions granted by
the FreeType Project License and this section (hereafter, "You" or
"Your") a perpetual, worldwide, non-exclusive, no-charge,
royalty-free, irrevocable (except as stated in this section) patent
license to make, have made, use, offer to sell, sell, import, and
otherwise transfer the Work, where such license applies only to those
patent claims licensable by such contributor that are necessarily
infringed by their contribution(s) alone or by combination of their
contribution(s) with the Work to which such contribution(s) was
submitted. If You institute patent litigation against any entity
(including a cross-claim or counterclaim in a lawsuit) alleging that
the Work or a contribution incorporated within the Work constitutes
direct or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate as of
the date such litigation is filed.
By using, modifying, or distributing the Work you indicate that you
have read and understood the terms and conditions of the
FreeType Project License as well as those provided in this section,
and you accept them fully.
```
### MIT License
```
---------------------------------
The below license applies to the following files:
libfreetype/include/freetype/internal/fthash.h
libfreetype/src/base/fthash.c
Copyright 2000 Computing Research Labs, New Mexico State University
Copyright 2001-2015
Francesco Zappa Nardelli
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"),
to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
THE COMPUTING RESEARCH LAB OR NEW MEXICO STATE UNIVERSITY BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
```

View file

@ -0,0 +1,30 @@
## GIFLIB v5.2.1
### GIFLIB License
```
The GIFLIB distribution is Copyright (c) 1997 Eric S. Raymond
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
https://sourceforge.net/p/giflib/code/ci/master/tree/openbsd-reallocarray.c
Copyright (c) 2008 Otto Moerbeek <otto@drijf.net>
SPDX-License-Identifier: MIT

View file

@ -0,0 +1,74 @@
## Harfbuzz v4.4.1
### Harfbuzz License
https://github.com/harfbuzz/harfbuzz/blob/4.4.1/COPYING
<pre>
HarfBuzz is licensed under the so-called "Old MIT" license. Details follow.
For parts of HarfBuzz that are licensed under different licenses see individual
files names COPYING in subdirectories where applicable.
Copyright © 2010-2022 Google, Inc.
Copyright © 2018-2020 Ebrahim Byagowi
Copyright © 2019-2020 Facebook, Inc.
Copyright © 2012-2015 Mozilla Foundation.
Copyright © 2011 Codethink Limited
Copyright © 2008-2010 Nokia Corporation and/or its subsidiary(-ies)
Copyright © 2009 Keith Stribley
Copyright © 2009 Martin Hosken and SIL International
Copyright © 2007 Chris Wilson
Copyright © 2005-2022 Behdad Esfahbod
Copyright © 2005 David Turner
Copyright © 2004-2013 Red Hat, Inc.
Copyright © 1998-2004 David Turner and Werner Lemberg
Copyright © 2016 Elie Roux <elie.roux@telecom-bretagne.eu>
Copyright © 2018-2019 Adobe Inc.
Copyright © 2018 Khaled Hosny
Copyright © 2016 Igalia S.L.
For full copyright notices consult the individual files in the package.
Permission is hereby granted, without written agreement and without
license or royalty fees, to use, copy, modify, and distribute this
software and its documentation for any purpose, provided that the
above copyright notice and the following two paragraphs appear in
all copies of this software.
IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE TO ANY PARTY FOR
DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN
IF THE COPYRIGHT HOLDER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
THE COPYRIGHT HOLDER SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS
ON AN "AS IS" BASIS, AND THE COPYRIGHT HOLDER HAS NO OBLIGATION TO
PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS.
All source code, except for one section, is licensed as above. The one
exception is licensed with a slightly different MIT variant:
The contents of this directory are licensed under the following terms:
---------------------------------
The below license applies to the following files:
libharfbuzz/hb-ucd.cc
Copyright (C) 2012 Grigori Goronzy <greg@kinoho.net>
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
</pre>

View file

@ -0,0 +1,83 @@
## Independent JPEG Group: JPEG release 6b
### JPEG License
<pre>
Must reproduce following license in documentation and/or other materials
provided with distribution:
The authors make NO WARRANTY or representation, either express or implied,
with respect to this software, its quality, accuracy, merchantability, or
fitness for a particular purpose. This software is provided "AS IS",
and you, its user, assume the entire risk as to its quality and accuracy.
This software is copyright (C) 1991-1998, Thomas G. Lane.
All Rights Reserved except as specified below.
Permission is hereby granted to use, copy, modify, and distribute
this software (or portions thereof) for any purpose, without fee,
subject to these conditions:
(1) If any part of the source code for this software is distributed,
then this README file must be included, with this copyright and no-warranty
notice unaltered; and any additions, deletions, or changes to the original
files must be clearly indicated in accompanying documentation.
(2) If only executable code is distributed, then the accompanying documentation
must state that "this software is based in part on the work of the
Independent JPEG Group".
(3) Permission for use of this software is granted only if the user accepts
full responsibility for any undesirable consequences; the authors accept
NO LIABILITY for damages of any kind.
These conditions apply to any software derived from or based on the IJG code,
not just to the unmodified library. If you use our work, you ought to
acknowledge us.
Permission is NOT granted for the use of any IJG author's name or company name
in advertising or publicity relating to this software or products derived
from it. This software may be referred to only as "the Independent JPEG
Group's software".
We specifically permit and encourage the use of this software as the basis
of commercial products, provided that all warranty or liability claims are
assumed by the product vendor.
ansi2knr.c is included in this distribution by permission of L. Peter Deutsch,
sole proprietor of its copyright holder, Aladdin Enterprises of Menlo Park, CA.
ansi2knr.c is NOT covered by the above copyright and conditions, but instead
by the usual distribution terms of the Free Software Foundation; principally,
that you must include source code if you redistribute it.
(See the file ansi2knr.c for full details.) However, since ansi2knr.c is
not needed as part of any program generated from the IJG code, this does not
limit you more than the foregoing paragraphs do.
The Unix configuration script "configure" was produced with GNU Autoconf.
It is copyright by the Free Software Foundation but is freely distributable.
The same holds for its supporting scripts (config.guess, config.sub,
ltconfig, ltmain.sh). Another support script, install-sh, is copyright
by M.I.T. but is also freely distributable.
It appears that the arithmetic coding option of the JPEG spec is covered
by patents owned by IBM, AT&T, and Mitsubishi. Hence arithmetic coding
cannot legally be used without obtaining one or more licenses. For this
reason, support for arithmetic coding has been removed from the free
JPEG software. (Since arithmetic coding provides only a marginal gain
over the unpatented Huffman mode, it is unlikely that very many
implementations will support it.) So far as we are aware, there are
no patent restrictions on the remaining code.
The IJG distribution formerly included code to read and write GIF files.
To avoid entanglement with the Unisys LZW patent, GIF reading support
has been removed altogether, and the GIF writer has been simplified to
produce "uncompressed GIFs". This technique does not use the LZW algorithm;
the resulting GIF files are larger than usual, but are readable by all
standard GIF decoders.
We are required to state that "The Graphics Interchange Format(c) is
the Copyright property of CompuServe Incorporated. GIF(sm) is a
Service Mark property of CompuServe Incorporated."
</pre>

View file

@ -0,0 +1,107 @@
## Little Color Management System (LCMS) v2.14
### LCMS License
<pre>
README.1ST file information
LittleCMS core is released under MIT License
---------------------------------
Little CMS
Copyright (c) 1998-2022 Marti Maria Saguer
Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject
to the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
---------------------------------
The below license applies to the following files:
liblcms/cmssm.c
Copyright 2001, softSurfer (www.softsurfer.com)
This code may be freely used and modified for any purpose
providing that this copyright notice is included with it.
SoftSurfer makes no warranty for this code, and cannot be held
liable for any real or imagined damage resulting from its use.
Users of this code must verify correctness for their application.
</pre>
### AUTHORS File Information
```
Main Author
------------
Marti Maria
Contributors
------------
Bob Friesenhahn
Kai-Uwe Behrmann
Stuart Nixon
Jordi Vilar
Richard Hughes
Auke Nauta
Chris Evans (Google)
Lorenzo Ridolfi
Robin Watts (Artifex)
Shawn Pedersen
Andrew Brygin
Samuli Suominen
Florian Hˆch
Aurelien Jarno
Claudiu Cebuc
Michael Vhrel (Artifex)
Michal Cihar
Daniel Kaneider
Mateusz Jurczyk (Google)
Paul Miller
SÈbastien LÈon
Christian Schmitz
XhmikosR
Stanislav Brabec (SuSe)
Leonhard Gruenschloss (Google)
Patrick Noffke
Christopher James Halse Rogers
John Hein
Thomas Weber (Debian)
Mark Allen
Noel Carboni
Sergei Trofimovic
Philipp Knechtges
Special Thanks
--------------
Artifex software
AlienSkin software
Jan Morovic
Jos Vernon (WebSupergoo)
Harald Schneider (Maxon)
Christian Albrecht
Dimitrios Anastassakis
Lemke Software
Tim Zaman
```

View file

@ -0,0 +1,203 @@
## libpng v1.6.38
### libpng License
<pre>
COPYRIGHT NOTICE, DISCLAIMER, and LICENSE
=========================================
PNG Reference Library License version 2
---------------------------------------
Copyright (c) 1995-2022 The PNG Reference Library Authors.
Copyright (c) 2018-2022 Cosmin Truta
Copyright (c) 1998-2018 Glenn Randers-Pehrson
Copyright (c) 1996-1997 Andreas Dilger
Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.
The software is supplied "as is", without warranty of any kind,
express or implied, including, without limitation, the warranties
of merchantability, fitness for a particular purpose, title, and
non-infringement. In no event shall the Copyright owners, or
anyone distributing the software, be liable for any damages or
other liability, whether in contract, tort or otherwise, arising
from, out of, or in connection with the software, or the use or
other dealings in the software, even if advised of the possibility
of such damage.
Permission is hereby granted to use, copy, modify, and distribute
this software, or portions hereof, for any purpose, without fee,
subject to the following restrictions:
1. The origin of this software must not be misrepresented; you
must not claim that you wrote the original software. If you
use this software in a product, an acknowledgment in the product
documentation would be appreciated, but is not required.
2. Altered source versions must be plainly marked as such, and must
not be misrepresented as being the original software.
3. This Copyright notice may not be removed or altered from any
source or altered source distribution.
PNG Reference Library License version 1 (for libpng 0.5 through 1.6.35)
-----------------------------------------------------------------------
libpng versions 1.0.7, July 1, 2000, through 1.6.35, July 15, 2018 are
Copyright (c) 2000-2002, 2004, 2006-2018 Glenn Randers-Pehrson, are
derived from libpng-1.0.6, and are distributed according to the same
disclaimer and license as libpng-1.0.6 with the following individuals
added to the list of Contributing Authors:
Simon-Pierre Cadieux
Eric S. Raymond
Mans Rullgard
Cosmin Truta
Gilles Vollant
James Yu
Mandar Sahastrabuddhe
Google Inc.
Vadim Barkov
and with the following additions to the disclaimer:
There is no warranty against interference with your enjoyment of
the library or against infringement. There is no warranty that our
efforts or the library will fulfill any of your particular purposes
or needs. This library is provided with all faults, and the entire
risk of satisfactory quality, performance, accuracy, and effort is
with the user.
Some files in the "contrib" directory and some configure-generated
files that are distributed with libpng have other copyright owners, and
are released under other open source licenses.
libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are
Copyright (c) 1998-2000 Glenn Randers-Pehrson, are derived from
libpng-0.96, and are distributed according to the same disclaimer and
license as libpng-0.96, with the following individuals added to the
list of Contributing Authors:
Tom Lane
Glenn Randers-Pehrson
Willem van Schaik
libpng versions 0.89, June 1996, through 0.96, May 1997, are
Copyright (c) 1996-1997 Andreas Dilger, are derived from libpng-0.88,
and are distributed according to the same disclaimer and license as
libpng-0.88, with the following individuals added to the list of
Contributing Authors:
John Bowler
Kevin Bracey
Sam Bushell
Magnus Holmgren
Greg Roelofs
Tom Tanner
Some files in the "scripts" directory have other copyright owners,
but are released under this license.
libpng versions 0.5, May 1995, through 0.88, January 1996, are
Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.
For the purposes of this copyright and license, "Contributing Authors"
is defined as the following set of individuals:
Andreas Dilger
Dave Martindale
Guy Eric Schalnat
Paul Schmidt
Tim Wegner
The PNG Reference Library is supplied "AS IS". The Contributing
Authors and Group 42, Inc. disclaim all warranties, expressed or
implied, including, without limitation, the warranties of
merchantability and of fitness for any purpose. The Contributing
Authors and Group 42, Inc. assume no liability for direct, indirect,
incidental, special, exemplary, or consequential damages, which may
result from the use of the PNG Reference Library, even if advised of
the possibility of such damage.
Permission is hereby granted to use, copy, modify, and distribute this
source code, or portions hereof, for any purpose, without fee, subject
to the following restrictions:
1. The origin of this source code must not be misrepresented.
2. Altered versions must be plainly marked as such and must not
be misrepresented as being the original source.
3. This Copyright notice may not be removed or altered from any
source or altered source distribution.
The Contributing Authors and Group 42, Inc. specifically permit,
without fee, and encourage the use of this source code as a component
to supporting the PNG file format in commercial products. If you use
this source code in a product, acknowledgment is not required but would
be appreciated.
TRADEMARK
=========
The name "libpng" has not been registered by the Copyright owners
as a trademark in any jurisdiction. However, because libpng has
been distributed and maintained world-wide, continually since 1995,
the Copyright owners claim "common-law trademark protection" in any
jurisdiction where common-law trademark is recognized.
</pre>
### AUTHORS File Information
```
PNG REFERENCE LIBRARY AUTHORS
=============================
This is the list of PNG Reference Library ("libpng") Contributing
Authors, for copyright and licensing purposes.
* Andreas Dilger
* Cosmin Truta
* Dave Martindale
* Eric S. Raymond
* Gilles Vollant
* Glenn Randers-Pehrson
* Greg Roelofs
* Guy Eric Schalnat
* James Yu
* John Bowler
* Kevin Bracey
* Magnus Holmgren
* Mandar Sahastrabuddhe
* Mans Rullgard
* Matt Sarett
* Mike Klein
* Pascal Massimino
* Paul Schmidt
* Qiang Zhou
* Sam Bushell
* Samuel Williams
* Simon-Pierre Cadieux
* Tim Wegner
* Tom Lane
* Tom Tanner
* Vadim Barkov
* Willem van Schaik
* Zhijie Liang
* Arm Holdings
- Richard Townsend
* Google Inc.
- Matt Sarett
- Mike Klein
- Dan Field
- Sami Boukortt
The build projects, the build scripts, the test scripts, and other
files in the "ci", "projects", "scripts" and "tests" directories, have
other copyright owners, but are released under the libpng license.
Some files in the "contrib" directory, and some tools-generated files
that are distributed with libpng, have other copyright owners, and are
released under other open source licenses.
```

View file

@ -0,0 +1,134 @@
## Mesa 3-D Graphics Library v21.0.3
### Mesa License
```
Copyright (C) 1999-2007 Brian Paul All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"),
to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Attention, Contributors
When contributing to the Mesa project you must agree to the licensing terms
of the component to which you're contributing.
The following section lists the primary components of the Mesa distribution
and their respective licenses.
Mesa Component Licenses
Component Location License
------------------------------------------------------------------
Main Mesa code src/mesa/ MIT
Device drivers src/mesa/drivers/* MIT, generally
Gallium code src/gallium/ MIT
Ext headers GL/glext.h Khronos
GL/glxext.h Khronos
GL/wglext.h Khronos
KHR/khrplatform.h Khronos
*****************************************************************************
----
include/GL/gl.h :
Mesa 3-D graphics library
Copyright (C) 1999-2006 Brian Paul All Rights Reserved.
Copyright (C) 2009 VMware, Inc. All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the "Software"),
to deal in the Software without restriction, including without limitation
the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
*****************************************************************************
----
include/GL/glext.h
include/GL/glxext.h
include/GL/wglxext.h :
Copyright (c) 2013 - 2018 The Khronos Group Inc.
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and/or associated documentation files (the
"Materials"), to deal in the Materials without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Materials, and to
permit persons to whom the Materials are furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Materials.
THE MATERIALS ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
MATERIALS OR THE USE OR OTHER DEALINGS IN THE MATERIALS.
*****************************************************************************
----
include/KHR/khrplatform.h :
Copyright (c) 2008 - 2018 The Khronos Group Inc.
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and/or associated documentation files (the
"Materials"), to deal in the Materials without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Materials, and to
permit persons to whom the Materials are furnished to do so, subject to
the following conditions:
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Materials.
THE MATERIALS ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
MATERIALS OR THE USE OR OTHER DEALINGS IN THE MATERIALS.
*****************************************************************************
```

View file

@ -0,0 +1,34 @@
## xwd v1.0.7
### xwd utility
<pre>
This is the copyright for the files in src/java.desktop/unix/native/libawt_xawt:
list.h, multiVis.h, wsutils.h, list.c, multiVis.c
Copyright 1994 Hewlett-Packard Co.
Copyright 1996, 1998 The Open Group
Permission to use, copy, modify, distribute, and sell this software and its
documentation for any purpose is hereby granted without fee, provided that
the above copyright notice appear in all copies and that both that
copyright notice and this permission notice appear in supporting
documentation.
The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of The Open Group shall
not be used in advertising or otherwise to promote the sale, use or
other dealings in this Software without prior written authorization
from The Open Group.
</pre>

View file

@ -0,0 +1,24 @@
## PC/SC Lite v1.9.5
### PC/SC Lite License
<pre>
The main parts of the code are using the BSD-like licence bellow:
Copyright (c) 1999-2003 David Corcoran <corcoran@linuxnet.com>
Copyright (c) 2001-2011 Ludovic Rousseau <ludovic.rousseau@free.fr>
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
Changes to this license can be made only by the copyright author with explicit written consent.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Some source code files are using other licences. See the [COPYING](https://salsa.debian.org/rousseau/PCSC/-/blob/master/COPYING) file for details.
</pre>

Some files were not shown because too many files have changed in this diff Show more