NEC Express Server Express5800 Series EXPRESSSCOPE Engine 3 User’s Guide 1. Overview 2. Configuring the Host System 3. Configuring a Management PC 4. Networking 5. Using Remote Management 6. Command Line Interface 7. WS-Management (Web Service for Management) 8.
TRADEMARKS AND PATENTS EXPRESSSCOPE is registered trademarks of NEC Corporation. EXPRESSBUILDER and ESMPRO are registered trademarks of NEC Corporation. Microsoft, Windows and Windows Vista are registered trademarks of Microsoft Corporation in the United States and other countries. Firefox is registered trademarks of the Mozilla Foundation. Java is registered trademarks of Oracle and/or its affiliates.
Table of Contents Trademarks and Patents..............................................................................................................................2 Notes ...........................................................................................................................................................2 About This User' s Guide .............................................................................................................................2 Symbols .....................
State Acquisition ...................................................................................................................................60 Power State acquisition ....................................................................................................................60 Lamp State acquisition .....................................................................................................................60 Interrupt Generation for OS Dump..........................................
SYMBOLS The following symbols are used throughout this manual. Items to be observed or points to be noted when using this product. Notice Items to be checked when using this product or software. Information useful or convenient for you. Example of troubles occurred.
PREFACE The EXPRESSSCOPE Engine 3 enables you to monitor the operating status of the host system (power supplies, fans, temperature and so forth), to operate the host system’s keyboard, video, and mouse (KVM) from a remote console* and to access to CD-ROM/Floppy disk drives on a remote site*. The EXPRESSSCOPE Engine 3 is enabled by a system management LSI called “BMC (Baseboard Management Controller)” and thus referred to as the “BMC” hereinafter in this User’s Guide.
1. Overview The host system comes standard with the BMC (system management LSI) and a management LAN port dedicated to the BMC. By connecting the management LAN port to your network, you can monitor and control the host system from a remote site via a Web browser and SSH client. With the optional N8115-04 Remote KVM and Media License, you can operate the host system’s KVM (keyboard, video, and mouse) from a remote console and access CD-ROM/DVD-ROM/floppy disk drives and USB memory in a remote site.
2. Configuring the Host System This chapter describes the settings necessary to configure the BMC in the host system. DEFAULT NETWORK SETTINGS The BMC’s default network settings are as follows: IP Address: 192.168.1.1 User Name: Administrator Password: Administrator • Connect the management LAN port to the private network on which the default IP address “192.168.1.1”is reachable.
MANAGEMENT LAN SETTINGS You can configure basic setting of management LAN settings of BMC for remote management using Web server function and command line interface of BMC by using some tools • Web Browser Please refer to Chapter 5 for details. • BMC Configuration (Off-line) Press the F4 key during POST(Power on Self test) or displaying logo immediately after power on or reset the host system to enter the BMC Configuration. • BMC Configuration (On-line Windows/Linux).
subnet mask of your management LAN. If DHCP has been used, an automatically obtained subnet mask IP address will appear. (Default setting is 255.255.255.0.) Default Gateway If DHCP is not used to automatically obtain a default gateway IP address, enter the default gateway of your management LAN. If DHCP has been used, an automatically obtained default gateway will appear. (Default setting is 0.0.0.0.) DHCP If you want to obtain an IP address, choose [Enabled].
The BMC Initialization also deletes the settings for ESMPRO/ ServerManager(a software application bundled for remote management). Be sure to perform a backup for the ESMPRO/ServerManager settings before you change the BMC settings. * In some systems, the default settings are different for DCHP, HTTP, HTTPS, and/or SSH.
3. Configuring a Management PC This chapter describes the settings necessary for the remote management PC that will be connected to the host system. SETTING YOUR BROWSER Configure the following settings: - Enable SSL. - Allow Java Script execution. - Allow Java execution. - Accept Cookies. - Allow Popup. - Enable Stylesheet. * If you use Microsoft Internet Explorer, the following configurations are required. - Add BMC’s address to Trusted Sites. - Set Trusted Site's security level to Medium.
Notice If the management PC runs Windows XP, remote media function may not work. You need to apply the latest Service Pack.
4. Networking TCP/IP PORTS The BMC uses the TCP/IP ports listed below. If you use the BMC in a firewall environment, you need to allocate the port numbers (shown in the right column) to the individual non-block ports.
5. Using Remote Management OVERVIEW The BMC Web Server function allows you to control the host system’s power and KVM from a remote console via a Web browser. Part of the above function is implemented by Java Applet. CONNECTING TO THE WEB SERVER Access the following URL from the Web browser on the remote management PC: http://BMC_HostPort or https://BMC_HostPort The “BMC_HostPort” URL includes the BMC’s IP address or host name and a colon followed by a port number for HTTP or HTTPS connection: e.g. 192.
If you use Internet Explorer 7(or 8), the following page is displayed and HTTPS connection is blocked. In this case, select "Continue to this website" to continue.
LOGIN AND LOGOUT Login When the login page appears, input the user name and password, and then click [Login]. 1 1 2 2 3 4 5 1. The display language can be selected to English or Japanese. 2. The online help is displayed. 3. Please input username and password. 4. Secure Mode(HTTPS) or Non Secure Mode(HTTP) can be selected. 5. Please push "Login" button. Notice You can select the display language only in the login page.
Logout Click “Logout” in the upper right corner of the window. When a confirmation dialog appears, click [OK] to log out. After you log out, you return to the login page. Besides, all the remote device windows that were opened during login will be closed. Notice Notice If the browser is slow during login procedure, please restart your brower or logout. If the BMC becomes high loaded, BMC will be restarted very rare for recovery.
SERVER PANEL The server panel is displayed under a browser after log in. The server panel has following functions. 2 1 4 5 6 3 7 1. The virtual LCD that displays the state of the host system. 2. The Button to start RemoteKVM/Media 3. The button that minimizes the server panel. 4. The power switch and a lamp of the host system. The state of the power supply of the host system is shown. 5. The UID(Unit ID) switch and a lamp of the host system. 6. The status lamp of the host system.
SYSTEM A B C 1 2 3 4 A. The system tab. BMC supported functions are displayed. B. The menu that can be selected in the system tab is displayed. C. Information selected by B is displayed. The screen of "Summary" is displayed in the above-mentioned example. Menu 1 Summary The state of information and BMC of the host system is displayed. 2 Component Only items supported with the host system are displayed for each item of composition information.
REMOTE ACCESS B C A 1 2 3 4 A. The remote access tab. BMC supported functions are displayed. B. The menu that can be selected in the remote access tab is displayed C. Information selected by B is displayed. The screen of "Power Control" is displayed in the above-mentioned example. Menu 1 Power Control Select Boot device of the host system, powering on/off and reset the system, shutdown the OS. 2 System Operation Start RemoteKVM/Media, turn on/off of UID lamp, press Dump switch and reset BMC.
The host system detects remote media as following devices: • AMI Remote FD • AMI Remote CD/DVD • AMI Remote USB Mem The access lamp comes to remain lighting after it connects it according to the kind of the floppy disk drive of management PC. Notice When the operation into which the resolution on the host system side frequently changes after remote KVM is started, the remote KVM connection might be disconnect. In that case, please start remote KVM again.
CONFIGURATION B C A 1 2 3 4 5 6 7 8 A. The configuration tab. BMC supported functions are displayed. B. The menu that can be selected in the configuration tab is displayed C. Information selected by B is displayed. The screen of "ECO" is displayed in the above-mentioned example. Menu 1 Network Set IP address and the service of the BMC and the SSL public key can be made. 2 User Management Maintain user and Active directory/LDAP setting, register the SSH public Key.
Power consumption and the throttling situation are displayed. Set to manage the electric power control. 6 Miscellaneous Set to manage from SEL, the access log, AC-LINK, PEF, and the management software. 7 Backup/Restore Backup and Restore each item that was set. 8 System BIOS Some functions of System BIOS can be set. For each BMC setting, the “Default” value of the setting from Web browser of BMC and the initial value of BMC Initialization are as the following table.
Alert System Operation Group Domain Privilege Blank Administrator Blank User LDAP Authentication IP address Port Search Base Bind Domain Name Bind Password Mail Alert Waiting time for SMTP server's response To:1 To:2 To:3 From Reply-To Subject SMTP Server Port Authentication Alert Level Disable 0.0.0.0 389 or 639 Blank Blank Blank Disable Disable Blank 389 Blank Blank Blank Disable 30 30 Enable Disable Disable Blank Blank Blank 0.0.0.
Port (No Encryption) Port (Encryption) Aggressive Mode(*1) Power Threshold(Pa) Correction time limit Shutdown System Non-Aggressive Mode(*2) ECO Power Threshold(Pn) Correction time limit Safe Power Capping Boot Time Configuration(*3) Performance Mode Disable CPU Cores Behavior when SEL repository is full Access Log HTTP HTTPS SSH Operation Power Restore Delay AC-LINK 5120 5124 Disable Max Power Consumption 2 Disable Disable Max Power Consumption - 10 10 Disable Disable Performance Optimized 0 5120 5124 N
Example of an E-mail alert: Following contents are sent as E-mail alert. Virtual LCD Message: System Rear FAN4 Lower Non-Critical Event Information: Record ID: 0AA0h Timestamp: 10/13/2011 17:59:23 Severity: Non-critical Description: Fan(Speed) - Error Lower Non-critical - going low Dump: A0 0A 02 FB 26 97 4E 20 00 04 04 43 01 57 FF B6 URL: http://192.168.1.11:80 https://192.168.1.11:443 BMC Network Information: BMC IP Address: 192.168.1.
UPDATE B A C 1 2 A. The update tab. BMC supported functions are displayed. B. The menu that can be selected in the update tab is displayed C. Information selected by B is displayed. The screen of "BMC Firmware" is displayed in the above-mentioned example. Menu 1 BMC Firmware Update the BMC firmware regardless of power-off/on of the host system. 2 System BIOS Update the System BIOS regardless of power-off/on of the host system.
6. Command Line Interface OVERVIEW With the BMC Command Line Interface, you can control the host system from a remote SSH client. The BMC supports SSH (Version 2) protocol. CONNECTING TO BMC Access the BMC IP address or DNS host name from SSH client on the remote management PC.
LOGIN AND LOGOUT Login Enter your user name and password at login prompt. A command prompt will be displayed after login. Also you can login by using public key authentication. The user account is common to the one for a remote management function via web browser. The number of users who can log in the system using the command line interface at the same time is three users or less.
BASIC COMMANDS This section describes basic commands to use them as the command line interface. These basic commands manage the host system by using the concept of command (verb) and target (Managed Element) proposed by DMTF (Distributed Management Task Force). Each basic command functions to a specified target. The target points the managed element by address path much like the path to a file in a file system.
help Syntax: help [] [] Description: A basic command, , can be specified for the . The help command displays the help string for specified basic command when argument is specified. reset Syntax: reset [] [] Description: The reset command performs a hardware reset on the . /admin1/system1 and /admin1/sp1 are available for the of the reset command. For /admin1/system1, the host system is reset.
The show command is used to display information about the target specified by the argument. The command displays the target specified by the as the first line of the information. It displays the current default target in the first line if is not specified. The default behavior of the command for the target specified by the is as follows. The command display targets which are contained by the specified target after the "Targets" string.
version Syntax: version [] Description: The version command is used to display the version of the command line protocol specification which is supported.
REMOTE CONTROL You can perform remote control of the host system at the command prompt. Notice Performing remote control when the operating system is running may cause the loss of data in the host system. The user must have an account as operator or administrator for remote control. Power ON Enter the following command at the command prompt. start /admin1/system1 Forced Power OFF Enter the following command at the command prompt.
Remote Console To start a character-based remote console, enter the following command at the command prompt. start /admin1/system1/textredirectsvc1 To return from the character-based remote console to the command interface session, enter the stop keys (key, key, key, key and key) during the character-based remote console. Notice The standard serial port B (COM B) on the host system cannot be used for connecting another device in this cases because the BMC occupies the serial port B.
To stop the character-based remote console using by other user forcibly, enter the following command at the command prompt. set /admin1/system1/textredirectsvc1/textredirectsap1 EnabledState=6 Please confirm in advance whether it is OK to stop the character-based remote console using by other user forcibly. The user must have an account as administrator for stopping the character-based remote console forcibly.
UID Switch Control You can turn on/off the UID (Unit ID) LED on the host system by the virtual UID switch through the command line interface. This function is available only in the host system with UID LED. Notice The user must have an account as administrator for UID Switch Control (turning on or turning off the UID LED) because of using the set command for the UID Switch Control. Turning on UID LED Enter the following command at the command prompt.
• The UID LED will blink (flash) when it is controlled by Chassis Identify function of management software such as ESMPRO/ ServerManager. The UID LED will turn on when it is controlled by pushing the UID switch of the host system or using UID switch control function of BMC's web server or command line interface. For actual display state of the UID LED, blinking (flashing) the UID LED is higher priority than turning on it when it is controlled at a same time (blinking state AND turning on state).
SYSTEM EVENT LOG You can display system event log and modify setting of the system event log through the command line interface. Viewing system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 Here, to confirm the total number of system event log records, enter the following command. The "Targets" section reported by the following command indicates the "record" target(s).
Setting of system event log To move the current default target to /admin1/system1/log1, enter the following command at the command prompt. cd /admin1/system1/log1 The "Properties" section reported by the following command indicates the current setting of system event log. show Enter the following command if you would like to modify a property of the setting of system event log .
ACCESS LOG You can display, clear, and set the access log for the management LAN. The user must have an account as administrator for clearing and setting the access log. The following are events supported by the Access Log function. • Login and logout events for HTTP, HTTPS, and SSH connections • System control (Power OFF/ON, system reset, etc…) via Web browser. • Modify the setting (Network setting, etc…) via Web browser.
You can display only access log that corresponded to the specified from following condition. • timestamp Specify the date by the following format: MM/DD/YYYY • user Specify the user name. • ipaddress Specify the IP address on the remote management PC by the following format: XXX.XXX.XXX.XXX • protocol Specify the following protocol: HTTP, HTTPS, SSH • event Specify the following event: normal, error “normal” means not error event. ”error” means error event.
Access log might not be correctly displayed with timestamp condition about the log of recorded from AC ON to DC ON on host system. Clearing access log To move the current default target to /admin1/sp1/log1/record1, enter the following command at the command prompt. cd /admin1/sp1/log1/record1 Enter the following command, if you would like to clear the access log. delete Setting access log To move the current default target to /admin1/sp1/log1, enter the following command at the command prompt.
means that the access log is disabled. This is the dynamic setting. • oemnec_httplog_enable This specifies whether access log for login/logout of HTTP is enabled. The valid values for this property are "2" and "3". "2" means that the access log is enabled. "3" means that the access log is disabled. This is the dynamic setting. For example, enter the following command when you would like to use the access log for login/logout of HTTPS.
USER SETTINGS This section describes how to confirm and modify the user account through the command line interface. To move the current default target to an user account target which you would like to confirm or (and) modify, enter the following command at the command prompt. means any value between 1 and 12: Therefore you can select a user account between account1 and account12.
NETWORK SETTINGS This section describes how to confirm and modify the network setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1, enter the following command at the command prompt: cd /admin1/sp1/enetport1 Enter the following command, if you would like to confirm properties of the Ethernet port target which is /admin1/sp1/enetport1.
The properties which the access limitation target contains are as follows: • oemnec_allowedaccessips This specifies the IP addresses that permit access to the management LAN. Divide IP address by "," (ex. 192.168.1.2, 192.168.1.2, …) or use asterisk (ex. 192.168.1.*), if you would like to set multiple permit IP address. Set "0.0.0.0" or no (*) to this property, if you would like to clear the value of this property, It becomes effective at next login if you change it.
Followings describe how to confirm and modify the DHCP setting for management LAN through the command line interface. To move the current default target to /admin1/sp1/enetport1/lanendpt1/ipendpt1, enter the following command at the command prompt: cd /admin1/sp1/enetport1/lanendpt1/ipendpt1 Enter the following command, if you would like to confirm properties of the DHCP target which is /admin1/sp1/enetport1/lanendpt1/ipendpt1.
• AccessInfo This specifies the IP address of the default gateway for the management LAN. This property is read-only. Followings describe how to confirm and modify the network setting with disabling DHCP for management LAN through the command line interface.
set = The properties which the HTTP service target contains are as follows: • EnabledState This specifies whether HTTP port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the HTTP port is enabled. "3" means that the HTTP port is disabled. This is the dynamic setting. • oemnec_httpport This specifies the HTTP port for the management LAN. This is the dynamic setting.
Enter the following command if you would like to modify a property of the SSH service target. set = The properties which the SSH service target contains are as follows: • EnabledState This specifies whether SSH port is enabled for the management LAN. The valid values for this property are "2" and "3". "2" means that the SSH port is enabled. "3" means that the SSH port is disabled. This is the dynamic setting. • oemnec_sshport This specifies the SSH port for the management LAN.
POWER CONSUMPTION CONTROL You can control the power consumption of the host system through the command line interface. The user must have an account as administrator for controlling the power consumption. To move the current default target to /admin1/system1, enter the following command at the command prompt: cd /admin1/system1 State confirmation and modification of Power Consumption Control Enter the following command, if you would like to confirm properties related to the power consumption.
• oemnec_BootPerformanceOptimized This specifies whether Performance Optimized mode is enabled. This is the dynamic setting. This property is not displayed if oemnec_BootTimeConfig is disabled. • oemnec_BootTimeConfig This specifies whether BootingMode is enabled. This is the dynamic setting. Default value is “disabled”. This property supported by specific product.
This specifies the value of the power consumption starting he power consumption control. This is the dynamic setting. This property is not displayed if oemnec_AggressiveMode is disabled. • oemnec_AggressiveModeSetablePowerCapvalue (oemnec_setablePowerCapvalue) This specifies the value range of the settable oemnec_AggressiveModeCapvalue. This property is read-only. This property is not displayed if oemnec_AggressiveMode is disabled.
CONFIRMING SYSTEM INFORMATION This section describes how to confirm the system information (product, BIOS/BMC firmware revision, MAC address of System LAN, CPU, Memory) through the command line interface. The values of the properties for items not supported by the host system is not displayed for the system information.
Confirming System BIOS revision You can confirm the System BIOS revision through the command line interface by entering following the basic command at the command prompt. show /admin1/system1/swid1 In this case, the System BIOS revision is appeared at the right side of "VersionString=" string in the "Properties" section. Confirming BMC firmware revision You can confirm the BMC firmware revision through the command line interface by entering following the basic command at the command prompt.
For example, enter the following command when you would like to confirm the information of CPU1. show cpu1 The example of displaying information in this case is shown below.
Confirming Memory Information To move the current default target to /admin1/system1, enter the following command at the command prompt. cd /admin1/system1 Here, to confirm all the targets for memory (DIMM), enter the following command at the command prompt. All the memory (DIMM) targets are represented as memory strings at "Targets" section. means value of one-origin integer.
SPECIAL EXTENDED COMMANDS This section describes the special extended command which can do state acquisition (powerstate, lampstate) and interrupt generation for OS dump (nmidump). The special extended commands use the syntaxes different from the basic command's ones. State Acquisition You can acquire the state of the system at the command prompt: Commands to acquire the state are executable in all user levels.
Status LED state acquisition Enter the following command at the command prompt: lampstate -statuslamp One of the following responses is returned according to the STATUS LED state. off STATUS LED is turned off. green on STATUS LED lights in green. green blink STATUS LED is blinking in green. amber on STATUS LED lights in amber. amber blink STATUS LED is blinking in amber. red on STATUS LED lights in red. red blink STATUS LED is blinking in red.
Interrupt Generation for OS Dump You can execute OS dump by entering following command at the command prompt. nmidump /admin1/system1 Notice The user must have an account as administrator for executing the nmidump command. The above command behavior is equivalent to pressing the DUMP switch on the host system.
7. WS-Management (Web Service for Management) OVERVIEW With the WS-Management Protocol, you can control the host system and check the sensor of host system. EXPRESSSCOPE Engine 3 implementation of WS-Management complies with the specification, DTMF Web Services for Management 1.0.0. EXPRESSSCOPE Engine 3 is confirmed the WS-Management operation with the following tools that support the WS-Management protocol. • Windows Remote Management (WinRM) 2.
Power ON Create the file input-RequestPowerStateChange2.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
D.32+SystemCreationClassName=Host_ComputerSystem -r:https://IP_ADDRESS/wsman -username:USERNAME -password:PASSWORD -auth:basic -encoding:utf-8 -format:xml -file:input-RequestPowerStateChange6.xml -skipCNcheck -skipCAcheck -skipRevocationcheck input-RequestPowerStateChange6.xml PAGE 66OS Shutdown Create the file input-RequestPowerStateChange8.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
System Reset Create the file input-RequestPowerStateChange10.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
Interrupt Generation for OS Dump Create the file input-RequestPowerStateChange11.xml and enter the following command, if you use WinRM. winrm invoke RequestPowerStateChange http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_PowerManagementServ ice?__cimnamespace=root/cimv2+Name=IPMI¥_Power¥_Service+CreationClassNa me=CIM_PowerManagementService+SystemName=Unknown.IPMI¥_BMC¥_DeviceI D.
SENSOR INFORMATION You can get sensor information either by enumeration of all sensors or by retrieving specified sensor. Enumeration of All Sensors Enter the following command, if you enumerate numeric sensors (e.g.: temperature, voltage) with WinRM. winrm enumerate http://schemas.dmtf.
8. Troubleshooting ERROR MESSAGES Abnormality occurs while using remote management, and the error dialog might be displayed in management PC. Please refer to the list of the message of the online help for the main message and the coping process. ABOUT ECO SETTING The electric power value may not be reached to Power Cap Value. ; The electric power value might not necessarily reach even the value of Power Cap value.
License Notes This product includes open source software programs described below. GNU General Public License • • • • Busybox Linux Kernel U-Boot stunnel GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8.
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. GNU Lesser General Public Licsense • glibc GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library.
linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4.
this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License.
permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8.
generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Libraries If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change.
LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
* OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com). This product includes software written by Tim * Hudson (tjh@cryptsoft.com). * */ Original SSLeay License ----------------------/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com).
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.
* * * * * * * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland All rights reserved As far as I am concerned, the code I have written for this software can be used freely for any purpose. Any derived versions of this software must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be called by a name other than "ssh" or "Secure Shell".
* * * * * * * * * * * * * * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that this copyright notice is retained. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A.
* * * * * * * * * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
a) md5crypt.c, md5crypt.h * * * * * "THE BEER-WARE LICENSE" (Revision 42): wrote this file. As long as you retain this notice you can do whatever you want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp b) snprintf replacement * * * * Copyright Patrick Powell 1995 This code is based on code written by Patrick Powell (papowell@astart.
Some code is licensed under a MIT-style license to the following copyright holders: Free Software Foundation, Inc.
All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License. A copy of this license is available in the file LICENSE in the top-level directory of the distribution or, alternatively, at . OpenLDAP is a registered trademark of the OpenLDAP Foundation.
* copies. * * This software is provided "as is" and without any expressed or implied * warranties, including, without limitation, the implied warranties of * merchantibility and fitness for any particular purpose. ************************************************************************/ /* * Copyright (c) 1987 Regents of the University of California. * All rights reserved.
SQLite SQLite is in the Public Domain All of the deliverable code in SQLite has been dedicated to the public domain by the authors. All code authors, and representatives of the companies they work for, have signed affidavits dedicating their contributions to the public domain and originals of those signed affidavits are stored in a firesafe at the main offices of Hwaci.
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.
* may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity.
use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted.
Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability.
1. “Digital Font Program” shall mean a computer program containing, or used to render or display fonts. 2. “Licensed Program” shall mean a Digital Font Program licensed by the Licensor under this Agreement. 3.
6. The Recipient may reproduce the Licensed Program as is without modification and transfer such copies, publicly transmit or otherwise redistribute the Licensed Program to a third party for commercial or non-commercial purposes (“Redistribute”), in accordance with the provisions set forth in Article 3 Paragraph 2. 7.
OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4. The Licensor is under no obligation to respond to any technical questions or inquiries, or provide any other user support in connection with the installation, use or the Reproduction and Other Exploitation of the Licensed Program or Derived Programs thereof. Article 4 (Termination of Agreement) 1.
EXPRESSSCOPE Engine 3 User’s Guide ©NEC Corporation 2011-2012 - 105-