├── Makefile ├── Makefile.MinGW32 ├── Makefile.WinInLinux ├── vernam ├── Makefile ├── vernamtunnel.h └── vernamtunnel.c ├── Readme.md └── License.md /Makefile: -------------------------------------------------------------------------------- 1 | FLAGS=CC=gcc LD=gcc LDFLAGS=-lpthread NAME=vernamtunnel 2 | all: 3 | $(MAKE) -C vernam $(FLAGS) 4 | 5 | install: 6 | $(MAKE) -C vernam $(FLAGS) install 7 | 8 | uninstall: 9 | $(MAKE) -C vernam $(FLAGS) uninstall 10 | 11 | clean: 12 | $(MAKE) -C vernam $(FLAGS) clean 13 | 14 | -------------------------------------------------------------------------------- /Makefile.MinGW32: -------------------------------------------------------------------------------- 1 | FLAGS=CC=g++ LD=g++ LDFLAGS=-lws2_32 NAME=vernamtunnel.exe 2 | 3 | all: 4 | $(MAKE) -C vernam $(FLAGS) 5 | 6 | install: 7 | $(MAKE) -C vernam $(FLAGS) install 8 | 9 | uninstall: 10 | $(MAKE) -C vernam $(FLAGS) uninstall 11 | 12 | clean: 13 | $(MAKE) -C vernam $(FLAGS) clean 14 | 15 | -------------------------------------------------------------------------------- /Makefile.WinInLinux: -------------------------------------------------------------------------------- 1 | FLAGS=CC=i586-mingw32msvc-g++ LD=i586-mingw32msvc-g++ LDFLAGS=-lws2_32 NAME=vernamtunnel.exe 2 | 3 | all: 4 | $(MAKE) -C vernam $(FLAGS) 5 | 6 | install: 7 | $(MAKE) -C vernam $(FLAGS) install 8 | 9 | uninstall: 10 | $(MAKE) -C vernam $(FLAGS) uninstall 11 | 12 | clean: 13 | $(MAKE) -C vernam $(FLAGS) clean 14 | 15 | -------------------------------------------------------------------------------- /vernam/Makefile: -------------------------------------------------------------------------------- 1 | NAME = vernamtunnel 2 | 3 | CC = gcc 4 | LD = gcc 5 | CFLAGS = -Wall -I./ 6 | LDFLAGS = @LDFLAGS@ 7 | OBJS = vernamtunnel.o 8 | 9 | BINDIR = @PREFIX@ 10 | INSTALL = install 11 | STRIP = strip 12 | RM = /bin/rm -f 13 | CP = cp 14 | 15 | all: tcptunnel 16 | 17 | %.o: %.c 18 | $(CC) $(CFLAGS) -c -o $@ $< 19 | 20 | tcptunnel: $(OBJS) 21 | @echo $(CC) 22 | $(LD) -o $(NAME) $(OBJS) $(LDFLAGS) 23 | $(CP) $(NAME) .. 24 | 25 | install: 26 | $(INSTALL) -d $(BINDIR) 27 | $(INSTALL) -m 0755 $(NAME) $(BINDIR) 28 | $(STRIP) $(BINDIR)/$(NAME) 29 | 30 | uninstall: 31 | $(RM) $(BINDIR)/$(NAME) 32 | 33 | clean: 34 | $(RM) *.o *~ $(NAME) ../$(NAME) 35 | $(RM) $(NAME).exe ../$(NAME).exe 36 | -------------------------------------------------------------------------------- /vernam/vernamtunnel.h: -------------------------------------------------------------------------------- 1 | #ifndef VERNAMTUNNEL_H 2 | #define VERNAMTUNNEL_H 3 | 4 | #define VERSION "1.0" 5 | 6 | #if defined(__MINGW32__) || defined(__CYGWIN__) 7 | #include 8 | #include 9 | typedef int socklen_t; 10 | #else 11 | #include 12 | #include 13 | #include 14 | #include 15 | #include 16 | #include 17 | #include 18 | #include 19 | #include 20 | #include 21 | #include 22 | #include 23 | #include 24 | 25 | #endif 26 | 27 | #include 28 | #include 29 | #include 30 | #include 31 | #include 32 | 33 | typedef struct thread_shared_settings 34 | { 35 | long long int FilePosition; 36 | unsigned int buffer_size; 37 | unsigned int local_port; 38 | unsigned int remote_port; 39 | 40 | char *bind_address; 41 | char *remote_host; 42 | char *key_file; 43 | char *log_file; 44 | 45 | bool DoLogging; 46 | bool CustomBindAddress; 47 | bool KeyFileProvided; 48 | } SharedData; 49 | 50 | typedef struct str_thdata 51 | { 52 | unsigned int ClientSock; 53 | unsigned int TunnelSock; 54 | } thdata; 55 | 56 | void print_help(void); 57 | int StartListener(void); 58 | void LogIt(const char *Message); 59 | char *GetCurrentTimeStamp(); 60 | void ClientThread(void* str_thdata); 61 | void TunnelThread(void* str_thdata); 62 | void SocketClose(unsigned int TheSocket); 63 | 64 | #endif 65 | -------------------------------------------------------------------------------- /Readme.md: -------------------------------------------------------------------------------- 1 | ## Vernam-Tunnel 2 | 3 | Cross-platform multi-thread TCP tunnel with Vernam cipher encryption. You can use this software to enable remote access to your private services in your network. 4 | 5 | ## Compiling Example 6 | 7 | Compile in *nix OS for *nix: 8 | ``` 9 | $ make clean 10 | $ make 11 | 12 | ``` 13 | 14 | Compile in *nix OS for Windows: 15 | ``` 16 | $ apt-get install wine mingw32 mingw32-binutils mingw32-runtime 17 | $ make clean 18 | $ make -f Makefile.WinInLinux 19 | 20 | ``` 21 | 22 | Compile in Windows OS for Windows: 23 | ``` 24 | $ make clean 25 | $ make -f Makefile.MinGW32 26 | 27 | ``` 28 | 29 | 30 | ## Motivation 31 | 32 | Having paranoia free private encrypted access to my NAS. 33 | 34 | ## Running 35 | 36 | Listen on local port 443 and forward to NASServer:443, starting position of one time pad file: 6482691749 37 | 38 | **$ vernamtunnel --local-port=443 --remote-host=NASServer --remote-port=443 --key-file=/media/Encrypted --start-pos=6482691749** 39 | 40 | Listen on local host port 443, forward to MYINTERNETIP:18734, same starting position of one time pad file: 41 | 42 | **$ vernamtunnel.exe --local-port=443 --remote-host=MYINTERNETIP --remote-port=18734 --key-file=F:\Encrypted --start-pos=6482691749** 43 | 44 | Run without starting position parameter to start from beginning of file: 45 | 46 | **$ vernamtunnel.exe --local-port=443 --remote-host=MYINTERNETIP --remote-port=18734 --key-file=F:\Encrypted** 47 | 48 | ## Read More 49 | 50 | https://www.codeandsec.com/Poor-Mans-Unbreakable-Encrypted-TCP-Tunnel 51 | 52 | ## License 53 | 54 | GPL licensed. See License.md file. 55 | -------------------------------------------------------------------------------- /vernam/vernamtunnel.c: -------------------------------------------------------------------------------- 1 | #include "vernamtunnel.h" 2 | 3 | SharedData GlobalOptions; 4 | FILE *LogFileHandle; 5 | char NoTunnelMsg[] = "\nTunnel is not available\n"; 6 | void print_help(void) 7 | { 8 | fprintf(stderr, "Usage: vernamtunnel [options]\n\n\ 9 | Options: \n\ 10 | --local-port=PORT local port to listen\n\ 11 | --remote-port=PORT remote port to connect\n\ 12 | --remote-host=HOST remote host to connect\n\ 13 | --bind-address=IP local IP address to bind bind listening port\n\ 14 | --key-file=keyfile one-time-pad key file\n\ 15 | --start-pos=number starting position of one time pad file\n\ 16 | --log-file=LOGFILE file to log connection details\n\ 17 | --help\n\n"); 18 | } 19 | 20 | void SocketClose(unsigned int TheSocket) 21 | { 22 | #if defined(__MINGW32__) || defined(__CYGWIN__) 23 | closesocket(TheSocket); 24 | #else 25 | close(TheSocket); 26 | #endif 27 | 28 | } 29 | 30 | void LogIt(const char *Message) 31 | { 32 | printf("[Log] [%s]: %s\n", GetCurrentTimeStamp(), Message); 33 | if (GlobalOptions.DoLogging && LogFileHandle != NULL) 34 | fprintf(LogFileHandle, "[Log] [%s]: %s\n", GetCurrentTimeStamp(), Message); 35 | } 36 | 37 | char *GetCurrentTimeStamp(void) 38 | { 39 | static char date_str[32]; 40 | time_t date; 41 | 42 | time(&date); 43 | strftime(date_str, sizeof(date_str), "%Y-%m-%d %H:%M:%S", localtime(&date)); 44 | return date_str; 45 | } 46 | 47 | int main(int argc, char *argv[]) 48 | { 49 | int opt; 50 | int index; 51 | GlobalOptions.buffer_size = 131072; 52 | GlobalOptions.FilePosition = 0; 53 | static struct option long_options[] = { 54 | { "local-port", required_argument, NULL, 'a' }, 55 | { "remote-host", required_argument, NULL, 'b' }, 56 | { "remote-port", required_argument, NULL, 'c' }, 57 | { "bind-address", required_argument, NULL, 'd' }, 58 | { "key-file", required_argument, NULL, 'e' }, 59 | { "buffer-size", required_argument, NULL, 'f' }, 60 | { "log-file", required_argument, NULL, 'g' }, 61 | { "help", no_argument, NULL, 'h' }, 62 | { "start-pos", required_argument, NULL, 'i' }, 63 | { 0, 0, 0, 0 } 64 | }; 65 | 66 | 67 | do 68 | { 69 | opt = getopt_long(argc, argv, "", long_options, &index); 70 | switch (opt) 71 | { 72 | case 'a': 73 | GlobalOptions.local_port = atoi(optarg); 74 | break; 75 | 76 | case 'b': 77 | GlobalOptions.remote_host = optarg; 78 | break; 79 | 80 | case 'c': 81 | GlobalOptions.remote_port = atoi(optarg); 82 | break; 83 | 84 | case 'd': 85 | { 86 | GlobalOptions.bind_address = optarg; 87 | GlobalOptions.CustomBindAddress = true; 88 | break; 89 | } 90 | 91 | case 'e': 92 | { 93 | GlobalOptions.key_file = optarg; 94 | GlobalOptions.KeyFileProvided = true; 95 | break; 96 | } 97 | 98 | case 'f': 99 | GlobalOptions.buffer_size = atoi(optarg); 100 | break; 101 | 102 | case 'g': 103 | { 104 | GlobalOptions.log_file = optarg; 105 | LogFileHandle = fopen(GlobalOptions.log_file, "w"); 106 | if (!LogFileHandle) 107 | { 108 | printf("Unable to open log file\n"); 109 | exit(1); 110 | } 111 | GlobalOptions.DoLogging = true; 112 | break; 113 | } 114 | 115 | case 'h': 116 | case '?': 117 | { 118 | print_help(); 119 | exit(0); 120 | } 121 | 122 | case 'i': 123 | GlobalOptions.FilePosition = atoll(optarg); 124 | break; 125 | } 126 | 127 | } while (opt != -1); 128 | 129 | if (GlobalOptions.local_port < 1) 130 | { 131 | fprintf(stderr,"missing or invalid '--local-port=' option.\nTry --help option for more details\n"); 132 | exit(1); 133 | } 134 | 135 | if (GlobalOptions.remote_port < 1) 136 | { 137 | fprintf(stderr,"missing or invalid '--remote-port=' option.\nTry --help option for more details\n"); 138 | exit(1); 139 | } 140 | 141 | if (strlen(GlobalOptions.remote_host) < 2 || strlen(GlobalOptions.remote_host) > 63) 142 | { 143 | fprintf(stderr,"\nmissing or invalid '--remote-host=' option.\nTry --help option for more details\n"); 144 | exit(1); 145 | } 146 | 147 | if (!GlobalOptions.KeyFileProvided) 148 | { 149 | fprintf(stderr,"\nmissing or invalid '--key-file=' option.\nTry --help option for more details\n"); 150 | exit(1); 151 | } 152 | 153 | if (GlobalOptions.buffer_size <= 0) GlobalOptions.buffer_size = 131072; 154 | if (!StartListener()) 155 | { 156 | printf("\nUnable to start listener\n"); 157 | exit(0); 158 | } 159 | return 1; 160 | } 161 | 162 | void TunnelThread(void* str_thdata) 163 | { 164 | unsigned int MainSocket; 165 | unsigned int TunnelSocket; 166 | char buffer[GlobalOptions.buffer_size]; 167 | char XORKey[GlobalOptions.buffer_size]; 168 | struct str_thdata* params = (struct str_thdata*)str_thdata; 169 | char TheMessage[512]; 170 | long long int FileSize; 171 | long long int CurrentFP; 172 | int i; 173 | FILE *fp; 174 | #if defined(__MINGW32__) || defined(__CYGWIN__) 175 | int receiveResult; 176 | #endif 177 | MainSocket = params->ClientSock; 178 | TunnelSocket = params->TunnelSock; 179 | 180 | fp = fopen(GlobalOptions.key_file, "r"); 181 | if (fp == NULL) 182 | { 183 | SocketClose(TunnelSocket); 184 | SocketClose(MainSocket); 185 | LogIt("Unable to open key-file"); 186 | return; 187 | } 188 | fseek(fp, 0L, SEEK_END); 189 | FileSize = ftell(fp); 190 | if (FileSize < (GlobalOptions.FilePosition + GlobalOptions.buffer_size) ) 191 | fseek(fp, 0L, SEEK_SET); 192 | else 193 | fseek(fp, GlobalOptions.FilePosition, SEEK_SET); 194 | 195 | for (;;) 196 | { 197 | memset(buffer, 0, sizeof(GlobalOptions.buffer_size)); 198 | memset(XORKey, 0, sizeof(GlobalOptions.buffer_size)); 199 | int count = recv(TunnelSocket, buffer, sizeof(buffer), 0); 200 | #if defined(__MINGW32__) || defined(__CYGWIN__) 201 | receiveResult = WSAGetLastError(); 202 | if (receiveResult == WSAEWOULDBLOCK && count <= 0) 203 | continue; 204 | #endif 205 | if (count <= 0) 206 | { 207 | SocketClose(TunnelSocket); 208 | SocketClose(MainSocket); 209 | LogIt("Tunnel connection closed"); 210 | fclose(fp); 211 | LogIt(TheMessage); 212 | return; 213 | } 214 | if (count > 0) 215 | { 216 | CurrentFP = ftell(fp); 217 | 218 | if (CurrentFP + count > FileSize) 219 | fseek(fp, 0L, SEEK_SET); 220 | fread(XORKey, count, 1, fp); 221 | for (i=0;iClientSock; 248 | char TheMessage[512]; 249 | thdata ThreadParam; 250 | int flag; 251 | int sendbuff; 252 | long long int FileSize; 253 | long long int CurrentFP; 254 | int i; 255 | FILE *fp; 256 | 257 | #if defined(__MINGW32__) || defined(__CYGWIN__) 258 | DWORD threadID; 259 | u_long iMode; 260 | int receiveResult; 261 | #else 262 | pthread_t threadID; 263 | #endif 264 | 265 | fp = fopen(GlobalOptions.key_file, "r"); 266 | if (fp == NULL) 267 | { 268 | SocketClose(MainSocket); 269 | LogIt("Unable to open key-file"); 270 | return; 271 | } 272 | fseek(fp, 0L, SEEK_END); 273 | FileSize = ftell(fp); 274 | if (FileSize < (GlobalOptions.FilePosition + GlobalOptions.buffer_size) ) 275 | fseek(fp, 0L, SEEK_SET); 276 | else 277 | fseek(fp, GlobalOptions.FilePosition, SEEK_SET); 278 | 279 | RemoteHost = gethostbyname(GlobalOptions.remote_host); 280 | if (RemoteHost == NULL) 281 | { 282 | LogIt("Thread: Remote host gethostbyname() failed"); 283 | send(MainSocket, NoTunnelMsg, strlen(NoTunnelMsg), 0); 284 | fclose(fp); 285 | SocketClose(MainSocket); 286 | return; 287 | } 288 | 289 | memset(&RemoteAddr, 0, sizeof(RemoteAddr)); 290 | 291 | RemoteAddr.sin_family = AF_INET; 292 | RemoteAddr.sin_port = htons(GlobalOptions.remote_port); 293 | 294 | memcpy(&RemoteAddr.sin_addr.s_addr, RemoteHost->h_addr, RemoteHost->h_length); 295 | 296 | TunnelSocket = socket(AF_INET, SOCK_STREAM, 0); 297 | if (TunnelSocket < 0) 298 | { 299 | LogIt("Thread: socket() call failed"); 300 | fclose(fp); 301 | SocketClose(MainSocket); 302 | return; 303 | } 304 | 305 | if (connect(TunnelSocket, (struct sockaddr *) &RemoteAddr, sizeof(RemoteAddr)) < 0) 306 | { 307 | LogIt("Thread: connect() call failed"); 308 | fclose(fp); 309 | SocketClose(MainSocket); 310 | return; 311 | } 312 | 313 | 314 | flag =1; 315 | setsockopt(TunnelSocket, IPPROTO_TCP, TCP_NODELAY, (char *) &flag, sizeof(int)); 316 | 317 | flag =1; 318 | setsockopt(MainSocket, IPPROTO_TCP, TCP_NODELAY, (char *) &flag, sizeof(int)); 319 | 320 | sendbuff = 131072; 321 | setsockopt(MainSocket, SOL_SOCKET, SO_SNDBUF, (char *) &sendbuff, sizeof(int)); 322 | sendbuff = 131072; 323 | setsockopt(MainSocket, SOL_SOCKET, SO_RCVBUF, (char *) &sendbuff, sizeof(int)); 324 | 325 | 326 | sendbuff = 131072; 327 | setsockopt(TunnelSocket, SOL_SOCKET, SO_SNDBUF, (char *) &sendbuff, sizeof(int)); 328 | sendbuff = 131072; 329 | setsockopt(TunnelSocket, SOL_SOCKET, SO_RCVBUF, (char *) &sendbuff, sizeof(int)); 330 | 331 | 332 | #if defined(__MINGW32__) || defined(__CYGWIN__) 333 | iMode = 1; 334 | ioctlsocket(MainSocket,FIONBIO, &iMode); 335 | ioctlsocket(TunnelSocket,FIONBIO, &iMode); 336 | #endif 337 | 338 | ThreadParam.ClientSock = MainSocket; 339 | ThreadParam.TunnelSock = TunnelSocket; 340 | #if defined(__MINGW32__) || defined(__CYGWIN__) 341 | CreateThread(NULL,0, (LPTHREAD_START_ROUTINE)TunnelThread, (LPVOID)&ThreadParam, 0, &threadID); 342 | #else 343 | pthread_create (&threadID, NULL, (void *) &TunnelThread, (void *) &ThreadParam); 344 | #endif 345 | 346 | for (;;) 347 | { 348 | memset(buffer, 0, sizeof(GlobalOptions.buffer_size)); 349 | memset(XORKey, 0, sizeof(GlobalOptions.buffer_size)); 350 | 351 | int count = recv(MainSocket, buffer, sizeof(buffer), 0); 352 | #if defined(__MINGW32__) || defined(__CYGWIN__) 353 | receiveResult = WSAGetLastError(); 354 | if (receiveResult == WSAEWOULDBLOCK && count <= 0) 355 | 356 | continue; 357 | 358 | #endif 359 | if (count <= 0) 360 | { 361 | LogIt("Listener socket closed"); 362 | SocketClose(MainSocket); 363 | SocketClose(TunnelSocket); 364 | fclose(fp); 365 | LogIt(TheMessage); 366 | return; 367 | } 368 | if (count > 0) 369 | { 370 | CurrentFP = ftell(fp); 371 | if (CurrentFP + count > FileSize) 372 | fseek(fp, 0L, SEEK_SET); 373 | fread(XORKey, count, 1, fp); 374 | for (i=0;i> 7 | 8 | Everyone is permitted to copy and distribute verbatim copies of this license 9 | document, but changing it is not allowed. 10 | 11 | ## Preamble 12 | 13 | The GNU General Public License is a free, copyleft license for software and other 14 | kinds of works. 15 | 16 | The licenses for most software and other practical works are designed to take away 17 | your freedom to share and change the works. By contrast, the GNU General Public 18 | License is intended to guarantee your freedom to share and change all versions of a 19 | program--to make sure it remains free software for all its users. We, the Free 20 | Software Foundation, use the GNU General Public License for most of our software; it 21 | applies also to any other work released this way by its authors. You can apply it to 22 | your programs, too. 23 | 24 | When we speak of free software, we are referring to freedom, not price. Our General 25 | Public Licenses are designed to make sure that you have the freedom to distribute 26 | copies of free software (and charge for them if you wish), that you receive source 27 | code or can get it if you want it, that you can change the software or use pieces of 28 | it in new free programs, and that you know you can do these things. 29 | 30 | To protect your rights, we need to prevent others from denying you these rights or 31 | asking you to surrender the rights. Therefore, you have certain responsibilities if 32 | you distribute copies of the software, or if you modify it: responsibilities to 33 | respect the freedom of others. 34 | 35 | For example, if you distribute copies of such a program, whether gratis or for a fee, 36 | you must pass on to the recipients the same freedoms that you received. You must make 37 | sure that they, too, receive or can get the source code. And you must show them these 38 | terms so they know their rights. 39 | 40 | Developers that use the GNU GPL protect your rights with two steps: (1) assert 41 | copyright on the software, and (2) offer you this License giving you legal permission 42 | to copy, distribute and/or modify it. 43 | 44 | For the developers' and authors' protection, the GPL clearly explains that there is 45 | no warranty for this free software. For both users' and authors' sake, the GPL 46 | requires that modified versions be marked as changed, so that their problems will not 47 | be attributed erroneously to authors of previous versions. 48 | 49 | Some devices are designed to deny users access to install or run modified versions of 50 | the software inside them, although the manufacturer can do so. This is fundamentally 51 | incompatible with the aim of protecting users' freedom to change the software. The 52 | systematic pattern of such abuse occurs in the area of products for individuals to 53 | use, which is precisely where it is most unacceptable. Therefore, we have designed 54 | this version of the GPL to prohibit the practice for those products. If such problems 55 | arise substantially in other domains, we stand ready to extend this provision to 56 | those domains in future versions of the GPL, as needed to protect the freedom of 57 | users. 58 | 59 | Finally, every program is threatened constantly by software patents. States should 60 | not allow patents to restrict development and use of software on general-purpose 61 | computers, but in those that do, we wish to avoid the special danger that patents 62 | applied to a free program could make it effectively proprietary. To prevent this, the 63 | GPL assures that patents cannot be used to render the program non-free. 64 | 65 | The precise terms and conditions for copying, distribution and modification follow. 66 | 67 | ## TERMS AND CONDITIONS 68 | 69 | ### 0. Definitions. 70 | 71 | “This License” refers to version 3 of the GNU General Public License. 72 | 73 | “Copyright” also means copyright-like laws that apply to other kinds of 74 | works, such as semiconductor masks. 75 | 76 | “The Program” refers to any copyrightable work licensed under this 77 | License. Each licensee is addressed as “you”. “Licensees” and 78 | “recipients” may be individuals or organizations. 79 | 80 | To “modify” a work means to copy from or adapt all or part of the work in 81 | a fashion requiring copyright permission, other than the making of an exact copy. The 82 | resulting work is called a “modified version” of the earlier work or a 83 | work “based on” the earlier work. 84 | 85 | A “covered work” means either the unmodified Program or a work based on 86 | the Program. 87 | 88 | To “propagate” a work means to do anything with it that, without 89 | permission, would make you directly or secondarily liable for infringement under 90 | applicable copyright law, except executing it on a computer or modifying a private 91 | copy. Propagation includes copying, distribution (with or without modification), 92 | making available to the public, and in some countries other activities as well. 93 | 94 | To “convey” a work means any kind of propagation that enables other 95 | parties to make or receive copies. Mere interaction with a user through a computer 96 | network, with no transfer of a copy, is not conveying. 97 | 98 | An interactive user interface displays “Appropriate Legal Notices” to the 99 | extent that it includes a convenient and prominently visible feature that (1) 100 | displays an appropriate copyright notice, and (2) tells the user that there is no 101 | warranty for the work (except to the extent that warranties are provided), that 102 | licensees may convey the work under this License, and how to view a copy of this 103 | License. If the interface presents a list of user commands or options, such as a 104 | menu, a prominent item in the list meets this criterion. 105 | 106 | ### 1. Source Code. 107 | 108 | The “source code” for a work means the preferred form of the work for 109 | making modifications to it. “Object code” means any non-source form of a 110 | work. 111 | 112 | A “Standard Interface” means an interface that either is an official 113 | standard defined by a recognized standards body, or, in the case of interfaces 114 | specified for a particular programming language, one that is widely used among 115 | developers working in that language. 116 | 117 | The “System Libraries” of an executable work include anything, other than 118 | the work as a whole, that (a) is included in the normal form of packaging a Major 119 | Component, but which is not part of that Major Component, and (b) serves only to 120 | enable use of the work with that Major Component, or to implement a Standard 121 | Interface for which an implementation is available to the public in source code form. 122 | A “Major Component”, in this context, means a major essential component 123 | (kernel, window system, and so on) of the specific operating system (if any) on which 124 | the executable work runs, or a compiler used to produce the work, or an object code 125 | interpreter used to run it. 126 | 127 | The “Corresponding Source” for a work in object code form means all the 128 | source code needed to generate, install, and (for an executable work) run the object 129 | code and to modify the work, including scripts to control those activities. However, 130 | it does not include the work's System Libraries, or general-purpose tools or 131 | generally available free programs which are used unmodified in performing those 132 | activities but which are not part of the work. For example, Corresponding Source 133 | includes interface definition files associated with source files for the work, and 134 | the source code for shared libraries and dynamically linked subprograms that the work 135 | is specifically designed to require, such as by intimate data communication or 136 | control flow between those subprograms and other parts of the work. 137 | 138 | The Corresponding Source need not include anything that users can regenerate 139 | automatically from other parts of the Corresponding Source. 140 | 141 | The Corresponding Source for a work in source code form is that same work. 142 | 143 | ### 2. Basic Permissions. 144 | 145 | All rights granted under this License are granted for the term of copyright on the 146 | Program, and are irrevocable provided the stated conditions are met. This License 147 | explicitly affirms your unlimited permission to run the unmodified Program. The 148 | output from running a covered work is covered by this License only if the output, 149 | given its content, constitutes a covered work. This License acknowledges your rights 150 | of fair use or other equivalent, as provided by copyright law. 151 | 152 | You may make, run and propagate covered works that you do not convey, without 153 | conditions so long as your license otherwise remains in force. You may convey covered 154 | works to others for the sole purpose of having them make modifications exclusively 155 | for you, or provide you with facilities for running those works, provided that you 156 | comply with the terms of this License in conveying all material for which you do not 157 | control copyright. Those thus making or running the covered works for you must do so 158 | exclusively on your behalf, under your direction and control, on terms that prohibit 159 | them from making any copies of your copyrighted material outside their relationship 160 | with you. 161 | 162 | Conveying under any other circumstances is permitted solely under the conditions 163 | stated below. Sublicensing is not allowed; section 10 makes it unnecessary. 164 | 165 | ### 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 166 | 167 | No covered work shall be deemed part of an effective technological measure under any 168 | applicable law fulfilling obligations under article 11 of the WIPO copyright treaty 169 | adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention 170 | of such measures. 171 | 172 | When you convey a covered work, you waive any legal power to forbid circumvention of 173 | technological measures to the extent such circumvention is effected by exercising 174 | rights under this License with respect to the covered work, and you disclaim any 175 | intention to limit operation or modification of the work as a means of enforcing, 176 | against the work's users, your or third parties' legal rights to forbid circumvention 177 | of technological measures. 178 | 179 | ### 4. Conveying Verbatim Copies. 180 | 181 | You may convey verbatim copies of the Program's source code as you receive it, in any 182 | medium, provided that you conspicuously and appropriately publish on each copy an 183 | appropriate copyright notice; keep intact all notices stating that this License and 184 | any non-permissive terms added in accord with section 7 apply to the code; keep 185 | intact all notices of the absence of any warranty; and give all recipients a copy of 186 | this License along with the Program. 187 | 188 | You may charge any price or no price for each copy that you convey, and you may offer 189 | support or warranty protection for a fee. 190 | 191 | ### 5. Conveying Modified Source Versions. 192 | 193 | You may convey a work based on the Program, or the modifications to produce it from 194 | the Program, in the form of source code under the terms of section 4, provided that 195 | you also meet all of these conditions: 196 | 197 | * **a)** The work must carry prominent notices stating that you modified it, and giving a 198 | relevant date. 199 | * **b)** The work must carry prominent notices stating that it is released under this 200 | License and any conditions added under section 7. This requirement modifies the 201 | requirement in section 4 to “keep intact all notices”. 202 | * **c)** You must license the entire work, as a whole, under this License to anyone who 203 | comes into possession of a copy. This License will therefore apply, along with any 204 | applicable section 7 additional terms, to the whole of the work, and all its parts, 205 | regardless of how they are packaged. This License gives no permission to license the 206 | work in any other way, but it does not invalidate such permission if you have 207 | separately received it. 208 | * **d)** If the work has interactive user interfaces, each must display Appropriate Legal 209 | Notices; however, if the Program has interactive interfaces that do not display 210 | Appropriate Legal Notices, your work need not make them do so. 211 | 212 | A compilation of a covered work with other separate and independent works, which are 213 | not by their nature extensions of the covered work, and which are not combined with 214 | it such as to form a larger program, in or on a volume of a storage or distribution 215 | medium, is called an “aggregate” if the compilation and its resulting 216 | copyright are not used to limit the access or legal rights of the compilation's users 217 | beyond what the individual works permit. Inclusion of a covered work in an aggregate 218 | does not cause this License to apply to the other parts of the aggregate. 219 | 220 | ### 6. Conveying Non-Source Forms. 221 | 222 | You may convey a covered work in object code form under the terms of sections 4 and 223 | 5, provided that you also convey the machine-readable Corresponding Source under the 224 | terms of this License, in one of these ways: 225 | 226 | * **a)** Convey the object code in, or embodied in, a physical product (including a 227 | physical distribution medium), accompanied by the Corresponding Source fixed on a 228 | durable physical medium customarily used for software interchange. 229 | * **b)** Convey the object code in, or embodied in, a physical product (including a 230 | physical distribution medium), accompanied by a written offer, valid for at least 231 | three years and valid for as long as you offer spare parts or customer support for 232 | that product model, to give anyone who possesses the object code either (1) a copy of 233 | the Corresponding Source for all the software in the product that is covered by this 234 | License, on a durable physical medium customarily used for software interchange, for 235 | a price no more than your reasonable cost of physically performing this conveying of 236 | source, or (2) access to copy the Corresponding Source from a network server at no 237 | charge. 238 | * **c)** Convey individual copies of the object code with a copy of the written offer to 239 | provide the Corresponding Source. This alternative is allowed only occasionally and 240 | noncommercially, and only if you received the object code with such an offer, in 241 | accord with subsection 6b. 242 | * **d)** Convey the object code by offering access from a designated place (gratis or for 243 | a charge), and offer equivalent access to the Corresponding Source in the same way 244 | through the same place at no further charge. You need not require recipients to copy 245 | the Corresponding Source along with the object code. If the place to copy the object 246 | code is a network server, the Corresponding Source may be on a different server 247 | (operated by you or a third party) that supports equivalent copying facilities, 248 | provided you maintain clear directions next to the object code saying where to find 249 | the Corresponding Source. Regardless of what server hosts the Corresponding Source, 250 | you remain obligated to ensure that it is available for as long as needed to satisfy 251 | these requirements. 252 | * **e)** Convey the object code using peer-to-peer transmission, provided you inform 253 | other peers where the object code and Corresponding Source of the work are being 254 | offered to the general public at no charge under subsection 6d. 255 | 256 | A separable portion of the object code, whose source code is excluded from the 257 | Corresponding Source as a System Library, need not be included in conveying the 258 | object code work. 259 | 260 | A “User Product” is either (1) a “consumer product”, which 261 | means any tangible personal property which is normally used for personal, family, or 262 | household purposes, or (2) anything designed or sold for incorporation into a 263 | dwelling. In determining whether a product is a consumer product, doubtful cases 264 | shall be resolved in favor of coverage. For a particular product received by a 265 | particular user, “normally used” refers to a typical or common use of 266 | that class of product, regardless of the status of the particular user or of the way 267 | in which the particular user actually uses, or expects or is expected to use, the 268 | product. A product is a consumer product regardless of whether the product has 269 | substantial commercial, industrial or non-consumer uses, unless such uses represent 270 | the only significant mode of use of the product. 271 | 272 | “Installation Information” for a User Product means any methods, 273 | procedures, authorization keys, or other information required to install and execute 274 | modified versions of a covered work in that User Product from a modified version of 275 | its Corresponding Source. The information must suffice to ensure that the continued 276 | functioning of the modified object code is in no case prevented or interfered with 277 | solely because modification has been made. 278 | 279 | If you convey an object code work under this section in, or with, or specifically for 280 | use in, a User Product, and the conveying occurs as part of a transaction in which 281 | the right of possession and use of the User Product is transferred to the recipient 282 | in perpetuity or for a fixed term (regardless of how the transaction is 283 | characterized), the Corresponding Source conveyed under this section must be 284 | accompanied by the Installation Information. But this requirement does not apply if 285 | neither you nor any third party retains the ability to install modified object code 286 | on the User Product (for example, the work has been installed in ROM). 287 | 288 | The requirement to provide Installation Information does not include a requirement to 289 | continue to provide support service, warranty, or updates for a work that has been 290 | modified or installed by the recipient, or for the User Product in which it has been 291 | modified or installed. Access to a network may be denied when the modification itself 292 | materially and adversely affects the operation of the network or violates the rules 293 | and protocols for communication across the network. 294 | 295 | Corresponding Source conveyed, and Installation Information provided, in accord with 296 | this section must be in a format that is publicly documented (and with an 297 | implementation available to the public in source code form), and must require no 298 | special password or key for unpacking, reading or copying. 299 | 300 | ### 7. Additional Terms. 301 | 302 | “Additional permissions” are terms that supplement the terms of this 303 | License by making exceptions from one or more of its conditions. Additional 304 | permissions that are applicable to the entire Program shall be treated as though they 305 | were included in this License, to the extent that they are valid under applicable 306 | law. If additional permissions apply only to part of the Program, that part may be 307 | used separately under those permissions, but the entire Program remains governed by 308 | this License without regard to the additional permissions. 309 | 310 | When you convey a copy of a covered work, you may at your option remove any 311 | additional permissions from that copy, or from any part of it. (Additional 312 | permissions may be written to require their own removal in certain cases when you 313 | modify the work.) You may place additional permissions on material, added by you to a 314 | covered work, for which you have or can give appropriate copyright permission. 315 | 316 | Notwithstanding any other provision of this License, for material you add to a 317 | covered work, you may (if authorized by the copyright holders of that material) 318 | supplement the terms of this License with terms: 319 | 320 | * **a)** Disclaiming warranty or limiting liability differently from the terms of 321 | sections 15 and 16 of this License; or 322 | * **b)** Requiring preservation of specified reasonable legal notices or author 323 | attributions in that material or in the Appropriate Legal Notices displayed by works 324 | containing it; or 325 | * **c)** Prohibiting misrepresentation of the origin of that material, or requiring that 326 | modified versions of such material be marked in reasonable ways as different from the 327 | original version; or 328 | * **d)** Limiting the use for publicity purposes of names of licensors or authors of the 329 | material; or 330 | * **e)** Declining to grant rights under trademark law for use of some trade names, 331 | trademarks, or service marks; or 332 | * **f)** Requiring indemnification of licensors and authors of that material by anyone 333 | who conveys the material (or modified versions of it) with contractual assumptions of 334 | liability to the recipient, for any liability that these contractual assumptions 335 | directly impose on those licensors and authors. 336 | 337 | All other non-permissive additional terms are considered “further 338 | restrictions” within the meaning of section 10. If the Program as you received 339 | it, or any part of it, contains a notice stating that it is governed by this License 340 | along with a term that is a further restriction, you may remove that term. If a 341 | license document contains a further restriction but permits relicensing or conveying 342 | under this License, you may add to a covered work material governed by the terms of 343 | that license document, provided that the further restriction does not survive such 344 | relicensing or conveying. 345 | 346 | If you add terms to a covered work in accord with this section, you must place, in 347 | the relevant source files, a statement of the additional terms that apply to those 348 | files, or a notice indicating where to find the applicable terms. 349 | 350 | Additional terms, permissive or non-permissive, may be stated in the form of a 351 | separately written license, or stated as exceptions; the above requirements apply 352 | either way. 353 | 354 | ### 8. Termination. 355 | 356 | You may not propagate or modify a covered work except as expressly provided under 357 | this License. Any attempt otherwise to propagate or modify it is void, and will 358 | automatically terminate your rights under this License (including any patent licenses 359 | granted under the third paragraph of section 11). 360 | 361 | However, if you cease all violation of this License, then your license from a 362 | particular copyright holder is reinstated (a) provisionally, unless and until the 363 | copyright holder explicitly and finally terminates your license, and (b) permanently, 364 | if the copyright holder fails to notify you of the violation by some reasonable means 365 | prior to 60 days after the cessation. 366 | 367 | Moreover, your license from a particular copyright holder is reinstated permanently 368 | if the copyright holder notifies you of the violation by some reasonable means, this 369 | is the first time you have received notice of violation of this License (for any 370 | work) from that copyright holder, and you cure the violation prior to 30 days after 371 | your receipt of the notice. 372 | 373 | Termination of your rights under this section does not terminate the licenses of 374 | parties who have received copies or rights from you under this License. If your 375 | rights have been terminated and not permanently reinstated, you do not qualify to 376 | receive new licenses for the same material under section 10. 377 | 378 | ### 9. Acceptance Not Required for Having Copies. 379 | 380 | You are not required to accept this License in order to receive or run a copy of the 381 | Program. Ancillary propagation of a covered work occurring solely as a consequence of 382 | using peer-to-peer transmission to receive a copy likewise does not require 383 | acceptance. However, nothing other than this License grants you permission to 384 | propagate or modify any covered work. These actions infringe copyright if you do not 385 | accept this License. Therefore, by modifying or propagating a covered work, you 386 | indicate your acceptance of this License to do so. 387 | 388 | ### 10. Automatic Licensing of Downstream Recipients. 389 | 390 | Each time you convey a covered work, the recipient automatically receives a license 391 | from the original licensors, to run, modify and propagate that work, subject to this 392 | License. You are not responsible for enforcing compliance by third parties with this 393 | License. 394 | 395 | An “entity transaction” is a transaction transferring control of an 396 | organization, or substantially all assets of one, or subdividing an organization, or 397 | merging organizations. If propagation of a covered work results from an entity 398 | transaction, each party to that transaction who receives a copy of the work also 399 | receives whatever licenses to the work the party's predecessor in interest had or 400 | could give under the previous paragraph, plus a right to possession of the 401 | Corresponding Source of the work from the predecessor in interest, if the predecessor 402 | has it or can get it with reasonable efforts. 403 | 404 | You may not impose any further restrictions on the exercise of the rights granted or 405 | affirmed under this License. For example, you may not impose a license fee, royalty, 406 | or other charge for exercise of rights granted under this License, and you may not 407 | initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging 408 | that any patent claim is infringed by making, using, selling, offering for sale, or 409 | importing the Program or any portion of it. 410 | 411 | ### 11. Patents. 412 | 413 | A “contributor” is a copyright holder who authorizes use under this 414 | License of the Program or a work on which the Program is based. The work thus 415 | licensed is called the contributor's “contributor version”. 416 | 417 | A contributor's “essential patent claims” are all patent claims owned or 418 | controlled by the contributor, whether already acquired or hereafter acquired, that 419 | would be infringed by some manner, permitted by this License, of making, using, or 420 | selling its contributor version, but do not include claims that would be infringed 421 | only as a consequence of further modification of the contributor version. For 422 | purposes of this definition, “control” includes the right to grant patent 423 | sublicenses in a manner consistent with the requirements of this License. 424 | 425 | Each contributor grants you a non-exclusive, worldwide, royalty-free patent license 426 | under the contributor's essential patent claims, to make, use, sell, offer for sale, 427 | import and otherwise run, modify and propagate the contents of its contributor 428 | version. 429 | 430 | In the following three paragraphs, a “patent license” is any express 431 | agreement or commitment, however denominated, not to enforce a patent (such as an 432 | express permission to practice a patent or covenant not to sue for patent 433 | infringement). To “grant” such a patent license to a party means to make 434 | such an agreement or commitment not to enforce a patent against the party. 435 | 436 | If you convey a covered work, knowingly relying on a patent license, and the 437 | Corresponding Source of the work is not available for anyone to copy, free of charge 438 | and under the terms of this License, through a publicly available network server or 439 | other readily accessible means, then you must either (1) cause the Corresponding 440 | Source to be so available, or (2) arrange to deprive yourself of the benefit of the 441 | patent license for this particular work, or (3) arrange, in a manner consistent with 442 | the requirements of this License, to extend the patent license to downstream 443 | recipients. “Knowingly relying” means you have actual knowledge that, but 444 | for the patent license, your conveying the covered work in a country, or your 445 | recipient's use of the covered work in a country, would infringe one or more 446 | identifiable patents in that country that you have reason to believe are valid. 447 | 448 | If, pursuant to or in connection with a single transaction or arrangement, you 449 | convey, or propagate by procuring conveyance of, a covered work, and grant a patent 450 | license to some of the parties receiving the covered work authorizing them to use, 451 | propagate, modify or convey a specific copy of the covered work, then the patent 452 | license you grant is automatically extended to all recipients of the covered work and 453 | works based on it. 454 | 455 | A patent license is “discriminatory” if it does not include within the 456 | scope of its coverage, prohibits the exercise of, or is conditioned on the 457 | non-exercise of one or more of the rights that are specifically granted under this 458 | License. You may not convey a covered work if you are a party to an arrangement with 459 | a third party that is in the business of distributing software, under which you make 460 | payment to the third party based on the extent of your activity of conveying the 461 | work, and under which the third party grants, to any of the parties who would receive 462 | the covered work from you, a discriminatory patent license (a) in connection with 463 | copies of the covered work conveyed by you (or copies made from those copies), or (b) 464 | primarily for and in connection with specific products or compilations that contain 465 | the covered work, unless you entered into that arrangement, or that patent license 466 | was granted, prior to 28 March 2007. 467 | 468 | Nothing in this License shall be construed as excluding or limiting any implied 469 | license or other defenses to infringement that may otherwise be available to you 470 | under applicable patent law. 471 | 472 | ### 12. No Surrender of Others' Freedom. 473 | 474 | If conditions are imposed on you (whether by court order, agreement or otherwise) 475 | that contradict the conditions of this License, they do not excuse you from the 476 | conditions of this License. If you cannot convey a covered work so as to satisfy 477 | simultaneously your obligations under this License and any other pertinent 478 | obligations, then as a consequence you may not convey it at all. For example, if you 479 | agree to terms that obligate you to collect a royalty for further conveying from 480 | those to whom you convey the Program, the only way you could satisfy both those terms 481 | and this License would be to refrain entirely from conveying the Program. 482 | 483 | ### 13. Use with the GNU Affero General Public License. 484 | 485 | Notwithstanding any other provision of this License, you have permission to link or 486 | combine any covered work with a work licensed under version 3 of the GNU Affero 487 | General Public License into a single combined work, and to convey the resulting work. 488 | The terms of this License will continue to apply to the part which is the covered 489 | work, but the special requirements of the GNU Affero General Public License, section 490 | 13, concerning interaction through a network will apply to the combination as such. 491 | 492 | ### 14. Revised Versions of this License. 493 | 494 | The Free Software Foundation may publish revised and/or new versions of the GNU 495 | General Public License from time to time. Such new versions will be similar in spirit 496 | to the present version, but may differ in detail to address new problems or concerns. 497 | 498 | Each version is given a distinguishing version number. If the Program specifies that 499 | a certain numbered version of the GNU General Public License “or any later 500 | version” applies to it, you have the option of following the terms and 501 | conditions either of that numbered version or of any later version published by the 502 | Free Software Foundation. If the Program does not specify a version number of the GNU 503 | General Public License, you may choose any version ever published by the Free 504 | Software Foundation. 505 | 506 | If the Program specifies that a proxy can decide which future versions of the GNU 507 | General Public License can be used, that proxy's public statement of acceptance of a 508 | version permanently authorizes you to choose that version for the Program. 509 | 510 | Later license versions may give you additional or different permissions. However, no 511 | additional obligations are imposed on any author or copyright holder as a result of 512 | your choosing to follow a later version. 513 | 514 | ### 15. Disclaimer of Warranty. 515 | 516 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. 517 | EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES 518 | PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER 519 | EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 520 | MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE 521 | QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE 522 | DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 523 | 524 | ### 16. Limitation of Liability. 525 | 526 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY 527 | COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS 528 | PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, 529 | INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE 530 | PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE 531 | OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE 532 | WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE 533 | POSSIBILITY OF SUCH DAMAGES. 534 | 535 | ### 17. Interpretation of Sections 15 and 16. 536 | 537 | If the disclaimer of warranty and limitation of liability provided above cannot be 538 | given local legal effect according to their terms, reviewing courts shall apply local 539 | law that most closely approximates an absolute waiver of all civil liability in 540 | connection with the Program, unless a warranty or assumption of liability accompanies 541 | a copy of the Program in return for a fee. 542 | 543 | END OF TERMS AND CONDITIONS 544 | 545 | ## How to Apply These Terms to Your New Programs 546 | 547 | If you develop a new program, and you want it to be of the greatest possible use to 548 | the public, the best way to achieve this is to make it free software which everyone 549 | can redistribute and change under these terms. 550 | 551 | To do so, attach the following notices to the program. It is safest to attach them 552 | to the start of each source file to most effectively state the exclusion of warranty; 553 | and each file should have at least the “copyright” line and a pointer to 554 | where the full notice is found. 555 | 556 | 557 | Copyright (C) 558 | 559 | This program is free software: you can redistribute it and/or modify 560 | it under the terms of the GNU General Public License as published by 561 | the Free Software Foundation, either version 3 of the License, or 562 | (at your option) any later version. 563 | 564 | This program is distributed in the hope that it will be useful, 565 | but WITHOUT ANY WARRANTY; without even the implied warranty of 566 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 567 | GNU General Public License for more details. 568 | 569 | You should have received a copy of the GNU General Public License 570 | along with this program. If not, see . 571 | 572 | Also add information on how to contact you by electronic and paper mail. 573 | 574 | If the program does terminal interaction, make it output a short notice like this 575 | when it starts in an interactive mode: 576 | 577 | Copyright (C) 578 | This program comes with ABSOLUTELY NO WARRANTY; for details type 'show w'. 579 | This is free software, and you are welcome to redistribute it 580 | under certain conditions; type 'show c' for details. 581 | 582 | The hypothetical commands 'show w' and 'show c' should show the appropriate parts of 583 | the General Public License. Of course, your program's commands might be different; 584 | for a GUI interface, you would use an “about box”. 585 | 586 | You should also get your employer (if you work as a programmer) or school, if any, to 587 | sign a “copyright disclaimer” for the program, if necessary. For more 588 | information on this, and how to apply and follow the GNU GPL, see 589 | <>. 590 | 591 | The GNU General Public License does not permit incorporating your program into 592 | proprietary programs. If your program is a subroutine library, you may consider it 593 | more useful to permit linking proprietary applications with the library. If this is 594 | what you want to do, use the GNU Lesser General Public License instead of this 595 | License. But first, please read 596 | <>. --------------------------------------------------------------------------------