User's Guide, contact the sales agent where you purchased this product. (5) NEC assumes no liability arising from the use of this product, nor any liability for incidental or consequential damages arising from the use of this User's Guide regardless of Item (4).
Table of Contents Trademarks and Patents..........................2 Notes ................................2 About This User' s Guide ..........................2 Symbols ...............................5 Preface ................................6 1. Overview............................. 7 2. Configuring the Host System ....................8 Default Network Settings ..........................8 Management LAN Settings ..........................9 3. Configuring a Management PC ....................12 Setting your browser ..........................12 Supported browsers...........................12 J2SE Runtime Environment ........................12...
Page 4
State Acquisition ...........................60 Power State acquisition ........................60 Lamp State acquisition ........................60 Interrupt Generation for OS Dump......................62 7. WS-Management (Web Service for Management)..............63 Overview..............................63 Power Control ............................63 Power ON .............................64 Forced Power OFF ..........................64 OS Shutdown............................66 System Reset ............................67 Interrupt Generation for OS Dump......................68 Sensor Information.............................69 Enumeration of All Sensors........................69 Retrieving Specified Sensor........................69...
SYMBOLS The following symbols are used throughout this manual. Items to be observed or points to be noted when using this product. Notice Items to be checked when using this product or software. Information useful or convenient for you. Example of troubles occurred.
PREFACE The EXPRESSSCOPE Engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to operate the host system’s keyboard, video, and mouse (KVM) from a remote console* and to access to CD-ROM/Floppy disk drives on a remote site*.
1. Overview The host system comes standard with the BMC (system management LSI) and a management LAN port dedicated to the BMC. By connecting the management LAN port to your network, you can monitor and control the host system from a remote site via a Web browser and SSH client.
2. Configuring the Host System This chapter describes the settings necessary to configure the BMC in the host system. DEFAULT NETWORK SETTINGS The BMC’s default network settings are as follows: IP Address: 192.168.1.1 User Name: Administrator Password: Administrator • Connect the management LAN port to the private network on which the default IP address “192.168.1.1”is reachable.
BMC Configuration. • BMC Configuration (On-line Windows/Linux). It is possible to install it from NEC EXPRESSBUILDER of the host system attachment. The item that can be set with each tool is different. Please refer to help of each tool for details of a set item.
Page 10
subnet mask of your management LAN. If DHCP has been used, an automatically obtained subnet mask IP address will appear. (Default setting is 255.255.255.0.) Default Gateway If DHCP is not used to automatically obtain a default gateway IP address, enter the default gateway of your management LAN.
Page 11
The BMC Initialization also deletes the settings for ESMPRO/ ServerManager(a software application bundled for remote management). Be sure to perform a backup for the ESMPRO/ServerManager settings before you change the BMC settings. * In some systems, the default settings are different for DCHP, HTTP, HTTPS, and/or SSH.
3. Configuring a Management PC This chapter describes the settings necessary for the remote management PC that will be connected to the host system. SETTING YOUR BROWSER Configure the following settings: - Enable SSL. - Allow Java Script execution. - Allow Java execution. - Accept Cookies.
Page 13
If the management PC runs Windows XP, remote media function may not work. You need to apply the latest Service Pack. Notice...
4. Networking TCP/IP PORTS The BMC uses the TCP/IP ports listed below. If you use the BMC in a firewall environment, you need to allocate the port numbers (shown in the right column) to the individual non-block ports. Module name Port # Protocol Direction...
5. Using Remote Management OVERVIEW The BMC Web Server function allows you to control the host system’s power and KVM from a remote console via a Web browser. Part of the above function is implemented by Java Applet. CONNECTING TO THE WEB SERVER Access the following URL from the Web browser on the remote management PC: http://BMC_HostPort or https://BMC_HostPort The “BMC_HostPort”...
Page 16
If you use Internet Explorer 7(or 8), the following page is displayed and HTTPS connection is blocked. In this case, select "Continue to this website" to continue.
LOGIN AND LOGOUT Login When the login page appears, input the user name and password, and then click [Login]. The display language can be selected to English or Japanese. The online help is displayed. Please input username and password. Secure Mode(HTTPS) or Non Secure Mode(HTTP) can be selected. Please push "Login"...
Logout Click “Logout” in the upper right corner of the window. When a confirmation dialog appears, click [OK] to log out. After you log out, you return to the login page. Besides, all the remote device windows that were opened during login will be closed. If the browser is slow during login procedure, please restart your brower or logout.
SERVER PANEL The server panel is displayed under a browser after log in. The server panel has following functions. The virtual LCD that displays the state of the host system. The Button to start RemoteKVM/Media The button that minimizes the server panel. The power switch and a lamp of the host system.
SYSTEM A. The system tab. BMC supported functions are displayed. B. The menu that can be selected in the system tab is displayed. C. Information selected by B is displayed. The screen of "Summary" is displayed in the above-mentioned example. Menu Summary The state of information and BMC of the host system is displayed.
REMOTE ACCESS A. The remote access tab. BMC supported functions are displayed. B. The menu that can be selected in the remote access tab is displayed C. Information selected by B is displayed. The screen of "Power Control" is displayed in the above-mentioned example.
Page 22
The host system detects remote media as following devices: • AMI Remote FD • AMI Remote CD/DVD • AMI Remote USB Mem The access lamp comes to remain lighting after it connects it according to the kind of the floppy disk drive of management PC. When the operation into which the resolution on the host system side frequently changes after remote KVM is started, the remote KVM Notice...
CONFIGURATION A. The configuration tab. BMC supported functions are displayed. B. The menu that can be selected in the configuration tab is displayed C. Information selected by B is displayed. The screen of "ECO" is displayed in the above-mentioned example. Menu Network Set IP address and the service of the BMC and the SSL public key can be made.
Page 24
Power consumption and the throttling situation are displayed. Set to manage the electric power control. Miscellaneous Set to manage from SEL, the access log, AC-LINK, PEF, and the management software. Backup/Restore Backup and Restore each item that was set. System BIOS Some functions of System BIOS can be set.
Page 25
Group Domain Blank Blank Privilege Administrator User LDAP Authentication Disable Disable IP address 0.0.0.0 Blank Port 389 or 639 Search Base Blank Blank Bind Domain Name Blank Blank Bind Password Blank Blank Mail Alert Disable Disable Waiting time for SMTP server's response To:1 Enable...
Page 26
Port (No Encryption) 5120 5120 Port (Encryption) 5124 5124 Aggressive Mode(*1) Disable No change Max Power No change Power Threshold(Pa) Consumption No change Correction time limit No change Shutdown System Disable Non-Aggressive Mode(*2) Disable No change Max Power No change Power Threshold(Pn) Consumption - 10 No change...
Page 27
Example of an E-mail alert: Following contents are sent as E-mail alert. Virtual LCD Message: System Rear FAN4 Lower Non-Critical Event Information: Record ID: 0AA0h Timestamp: 10/13/2011 17:59:23 Severity: Non-critical Description: Fan(Speed) - Error Lower Non-critical - going low Dump: A0 0A 02 FB 26 97 4E 20 00 04 04 43 01 57 FF B6 URL: http://192.168.1.11:80...
UPDATE A. The update tab. BMC supported functions are displayed. B. The menu that can be selected in the update tab is displayed C. Information selected by B is displayed. The screen of "BMC Firmware" is displayed in the above-mentioned example. Menu BMC Firmware Update the BMC firmware regardless of power-off/on of the host system.
6. Command Line Interface OVERVIEW With the BMC Command Line Interface, you can control the host system from a remote SSH client. The BMC supports SSH (Version 2) protocol. CONNECTING TO BMC Access the BMC IP address or DNS host name from SSH client on the remote management To use Command Line Interface, you need to change the configuration of the command line interface (SSH) to be enabled by any of the setting of the Off-line BMC Configuration Tool or On-line...
LOGIN AND LOGOUT Login Enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using public key authentication. The user account is common to the one for a remote management function via web browser.
BASIC COMMANDS This section describes basic commands to use them as the command line interface. These basic commands manage the host system by using the concept of command (verb) and target (Managed Element) proposed by DMTF (Distributed Management Task Force). Each basic command functions to a specified target.
Page 32
help Syntax: help [<options>] [<help topics>] Description: A basic command, <command>, can be specified for the <help topics>. The help command displays the help string for specified basic command when <command> argument is specified. reset Syntax: reset [<options>] [<target>] Description: The reset command performs a hardware reset on the <target>.
Page 33
The show command is used to display information about the target specified by the <target> argument. The command displays the target specified by the <target> as the first line of the information. It displays the current default target in the first line if <target> is not specified.
Page 34
version Syntax: version [<options>] Description: The version command is used to display the version of the command line protocol specification which is supported.
REMOTE CONTROL You can perform remote control of the host system at the command prompt. Performing remote control when the operating system is running may cause the loss of data in the host system. Notice The user must have an account as operator or administrator for remote control.
Remote Console To start a character-based remote console, enter the following command at the command prompt. start /admin1/system1/textredirectsvc1 To return from the character-based remote console to the command interface session, enter the <ESC>stop keys (<ESC>key, <s>key, <t>key, <o>key and <p>key) during the character-based remote console.
Page 37
To stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. set /admin1/system1/textredirectsvc1/textredirectsap1 EnabledState=6 Please confirm in advance whether it is OK to stop the character-based remote console using by other user forcibly. The user must have an account as administrator for stopping the character-based remote console forcibly.
UID Switch Control You can turn on/off the UID (Unit ID) LED on the host system by the virtual UID switch through the command line interface. This function is available only in the host system with UID LED. The user must have an account as administrator for UID Switch Control (turning on or turning off the UID LED) because of using the Notice set command for the UID Switch Control.
Page 39
• The UID LED will blink (flash) when it is controlled by Chassis Identify function of management software such as ESMPRO/ ServerManager. The UID LED will turn on when it is controlled by pushing the UID switch of the host system or using UID switch control function of BMC's web server or command line interface.
SYSTEM EVENT LOG You can display system event log and modify setting of the system event log through the command line interface. Viewing system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 Here, to confirm the total number of system event log records, enter the following command.
Setting of system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 The "Properties" section reported by the following command indicates the current setting of system event log. show Enter the following command if you would like to modify a property of the setting of system event log .
ACCESS LOG You can display, clear, and set the access log for the management LAN. The user must have an account as administrator for clearing and setting the access log. The following are events supported by the Access Log function. •...
Page 43
You can display only access log that corresponded to the specified from following condition. • timestamp Specify the date by the following format: MM/DD/YYYY • user Specify the user name. • ipaddress Specify the IP address on the remote management PC by the following format: XXX.XXX.XXX.XXX •...
Access log might not be correctly displayed with timestamp condition about the log of recorded from AC ON to DC ON on host system. Clearing access log To move the current default target to /admin1/sp1/log1/record1, enter the following command at the command prompt. cd /admin1/sp1/log1/record1 Enter the following command, if you would like to clear the access log.
Page 45
means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable This specifies whether access log for login/logout of HTTP is enabled. The valid values for this property are "2" and "3". "2" means that the access log is enabled. "3" means that the access log is disabled.
USER SETTINGS This section describes how to confirm and modify the user account through the command line interface. To move the current default target to an user account target which you would like to confirm or (and) modify, enter the following command at the command prompt. <N> means any value between 1 and 12: Therefore you can select a user account between account1 and account12.
NETWORK SETTINGS This section describes how to confirm and modify the network setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1, enter the following command at the command prompt: cd /admin1/sp1/enetport1 Enter the following command, if you would like to confirm properties of the Ethernet port target which is /admin1/sp1/enetport1.
Page 48
The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips This specifies the IP addresses that permit access to the management LAN. Divide IP address by "," (ex. 192.168.1.2, 192.168.1.2, …) or use asterisk (ex. 192.168.1.*), if you would like to set multiple permit IP address.
Page 49
Followings describe how to confirm and modify the DHCP setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1 Enter the following command, if you would like to confirm properties of the DHCP target which is /admin1/sp1/enetport1/lanendpt1/ipendpt1.
Page 50
• AccessInfo This specifies the IP address of the default gateway for the management LAN. This property is read-only. Followings describe how to confirm and modify the network setting with disabling DHCP for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1/staticipsettings1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1/staticipsettings1...
Page 51
set <Property>=<New value> The properties which the HTTP service target contains are as follows: • EnabledState This specifies whether HTTP port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the HTTP port is enabled. "3" means that the HTTP port is disabled.
Page 52
Enter the following command if you would like to modify a property of the SSH service target. set <Property>=<New value> The properties which the SSH service target contains are as follows: • EnabledState This specifies whether SSH port is enabled for the management LAN. The valid values for this property are "2"...
POWER CONSUMPTION CONTROL You can control the power consumption of the host system through the command line interface. The user must have an account as administrator for controlling the power consumption. To move the current default target to /admin1/system1, enter the following command at the command prompt: cd /admin1/system1 State confirmation and modification of Power Consumption Control...
Page 54
• oemnec_BootPerformanceOptimized This specifies whether Performance Optimized mode is enabled. This is the dynamic setting. This property is not displayed if oemnec_BootTimeConfig is disabled. • oemnec_BootTimeConfig This specifies whether BootingMode is enabled. This is the dynamic setting. Default value is “disabled”. This property supported by specific product. •...
Page 55
This specifies the value of the power consumption starting he power consumption control. This is the dynamic setting. This property is not displayed if oemnec_AggressiveMode is disabled. • oemnec_AggressiveModeSetablePowerCapvalue (oemnec_setablePowerCapvalue) This specifies the value range of the settable oemnec_AggressiveModeCapvalue. This property is read-only. This property is not displayed if oemnec_AggressiveMode is disabled.
CONFIRMING SYSTEM INFORMATION This section describes how to confirm the system information (product, BIOS/BMC firmware revision, MAC address of System LAN, CPU, Memory) through the command line interface. The values of the properties for items not supported by the host system is not displayed for the system information.
Page 57
Confirming System BIOS revision You can confirm the System BIOS revision through the command line interface by entering following the basic command at the command prompt. show /admin1/system1/swid1 In this case, the System BIOS revision is appeared at the right side of "VersionString=" string in the "Properties"...
Page 58
For example, enter the following command when you would like to confirm the information of CPU1. show cpu1 The example of displaying information in this case is shown below. ufip=/admin1/system1/cpu1 Properties: EnabledState=enabled oemnec_clock=2660MHz oemnec_validcore=4 oemnec_maxcore=4 oemnec_validthread=8 oemnec_maxthread=8 oemnec_l1cache=256KB oemnec_l2cache=1024KB oemnec_l3cache=8192KB Verbs: exit help...
Page 59
Confirming Memory Information To move the current default target to /admin1/system1, enter the following command at the command prompt. cd /admin1/system1 Here, to confirm all the targets for memory (DIMM), enter the following command at the command prompt. All the memory (DIMM) targets are represented as memory<N> strings at "Targets"...
SPECIAL EXTENDED COMMANDS This section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt generation for OS dump (nmidump). The special extended commands use the syntaxes different from the basic command's ones. State Acquisition You can acquire the state of the system at the command prompt: Commands to acquire the state are executable in all user levels.
Page 61
Status LED state acquisition Enter the following command at the command prompt: lampstate -statuslamp One of the following responses is returned according to the STATUS LED state. STATUS LED is turned off. green on STATUS LED lights in green. green blink STATUS LED is blinking in green.
Interrupt Generation for OS Dump You can execute OS dump by entering following command at the command prompt. nmidump /admin1/system1 The user must have an account as administrator for executing the nmidump command. Notice The above command behavior is equivalent to pressing the DUMP switch on the host system.
EXPRESSSCOPE Engine 3 implementation of WS-Management complies with the specification, DTMF Web Services for Management 1.0.0. EXPRESSSCOPE Engine 3 is confirmed the WS-Management operation with the following tools that support the WS-Management protocol. • Windows Remote Management (WinRM) 2.0 To use WS-Management, you need to configure HTTPS connection to be enabled.
</wsman:SelectorSet> </wsa:ReferenceParameters> </n1:ManagedElement> </n1:RequestPowerStateChange_INPUT> Please change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3. Forced Power OFF Create the file input-RequestPowerStateChange6.xml and enter the following command, if you use WinRM.
Page 65
<n1:PowerState>6</n1:PowerState> <n1:ManagedElement> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/ Host_ComputerSystem</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name='__cimnamespace'>root/cimv2</wsman:Selector> <wsman:Selector Name='CreationClassName'>Host_ComputerSystem</wsman:Selector> <wsman:Selector Name='Name'>Unknown.IPMI BMC DeviceID.32</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:ManagedElement> </n1:RequestPowerStateChange_INPUT> Please change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3.
Your operating system must be set to shut down when you power off the system. Please change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3.
The above command behavior is equivalent to pressing the DUMP switch on the host system. Change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3. Performing interrupt generation for OS dump when the operating system is running may cause the loss of data in the host system.
-username:USERNAME -password:PASSWORD -r:https://IP_ADDRESS/wsman -auth:basic -encoding:utf-8 -skipCAcheck -skipCNcheck -skipRevocationcheck Change according to your environment. “IP_ADDRESS” : IP address of EXPRESSSCOPE Engine 3. “USERNAME/PASSWORD”: username/password of EXPRESSSCOPE Engine 3. Retrieving Specified Sensor You can retrieve the sensor by specifying sensor number.
In this case, please execute again after shutdown process is finished. For more detail about the Power Monitoring and Power Control Function, please reference the following site. http://www.58support.nec.co.jp/global/download/index.html [Others] - [Technology papers] OTHERS TIPS Should you have troubles while using the BMC for remote control, monitoring, and management of the host system, please first check the system according to the online help to troubleshoot your issue prior to sending it for repair.
License Notes This product includes open source software programs described below. GNU General Public License • Busybox • Linux Kernel • U-Boot • stunnel GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 72
software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents.
Page 73
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this...
Page 74
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not...
Page 75
implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
Page 76
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
Page 78
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
Page 79
linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library"...
Page 80
distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
Page 81
subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which...
Page 82
this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever...
Page 83
permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.
Page 84
generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change.
Page 86
LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses.
Page 87
* OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved.
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE.
Page 89
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland All rights reserved * As far as I am concerned, the code I have written for this software * can be used freely for any purpose. Any derived versions of this * software must be clearly marked as such, and if the derived work is * incompatible with the protocol description in the RFC file, it must be * called by a name other than "ssh"...
Page 90
* Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. * All rights reserved. Redistribution and use in source and binary * forms, with or without modification, are permitted provided that * this copyright notice is retained. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES ARE DISCLAIMED.
Page 91
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES;...
Page 92
a) md5crypt.c, md5crypt.h * "THE BEER-WARE LICENSE" (Revision 42): * <phk@login.dknet.dk> wrote this file. As long as you retain this * notice you can do whatever you want with this stuff. If we meet * some day, and you think this stuff is worth it, you can buy me a * beer in return.
Some code is licensed under a MIT-style license to the following copyright holders: Free Software Foundation, Inc. * Permission is hereby granted, free of charge, to any person obtaining a * * copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, distribute with modifications, sublicense, and/or sell...
All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License. A copy of this license is available in the file LICENSE in the top-level directory of the distribution or, alternatively, at <http://www.OpenLDAP.org/license.html>.
* copies. * This software is provided "as is" and without any expressed or implied * warranties, including, without limitation, the implied warranties of * merchantibility and fitness for any particular purpose. ************************************************************************/ * Copyright (c) 1987 Regents of the University of California. * All rights reserved.
SQLite SQLite is in the Public Domain All of the deliverable code in SQLite has been dedicated to the public domain by the authors. All code authors, and representatives of the companies they work for, have signed affidavits dedicating their contributions to the public domain and originals of those signed affidavits are stored in a firesafe at the main offices of Hwaci.
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES;...
may be used to endorse or promote products derived from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.
Page 99
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity.
Page 100
use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct...
Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.
Page 102
1. “Digital Font Program” shall mean a computer program containing, or used to render or display fonts. 2. “Licensed Program” shall mean a Digital Font Program licensed by the Licensor under this Agreement. 3. “Derived Program” shall mean a Digital Font Program created as a result of a modification, addition, deletion, replacement or any other adaptation to or of a part or all of the Licensed Program, and includes a case where a Digital Font Program newly created by retrieving font information from a part or all...
Page 103
6. The Recipient may reproduce the Licensed Program as is without modification and transfer such copies, publicly transmit or otherwise redistribute the Licensed Program to a third party for commercial or non-commercial purposes (“Redistribute”), in accordance with the provisions set forth in Article 3 Paragraph 2. 7.
OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4. The Licensor is under no obligation to respond to any technical questions or inquiries, or provide any other user support in connection with the installation, use or the Reproduction and Other Exploitation of the Licensed Program or Derived Programs thereof.