mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Update an email address, fix a typo, and slightly reword a sentence.
This commit is contained in:
14
COPYING
14
COPYING
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
FPEngine.cc
14
FPEngine.cc
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
FPEngine.h
14
FPEngine.h
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
MACLookup.cc
14
MACLookup.cc
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
MACLookup.h
14
MACLookup.h
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
NmapOps.cc
14
NmapOps.cc
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
NmapOps.h
14
NmapOps.h
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
Target.cc
14
Target.cc
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
Target.h
14
Target.h
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
charpool.cc
14
charpool.cc
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
charpool.h
14
charpool.h
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
idle_scan.cc
14
idle_scan.cc
@@ -17,7 +17,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -73,7 +73,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -91,12 +91,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
idle_scan.h
14
idle_scan.h
@@ -17,7 +17,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -73,7 +73,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -91,12 +91,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -16,7 +16,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -72,7 +72,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -90,12 +90,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -16,7 +16,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -72,7 +72,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -90,12 +90,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
main.cc
14
main.cc
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -17,7 +17,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -73,7 +73,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -91,12 +91,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -71,7 +71,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -89,12 +89,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -16,7 +16,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -72,7 +72,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -90,12 +90,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -19,7 +19,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -75,7 +75,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -93,12 +93,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -14,7 +14,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -70,7 +70,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -88,12 +88,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -12,7 +12,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -86,12 +86,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -13,7 +13,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -69,7 +69,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -87,12 +87,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
ncat/http.c
14
ncat/http.c
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
ncat/http.h
14
ncat/http.h
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
14
ncat/ncat.h
14
ncat/ncat.h
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
@@ -10,7 +10,7 @@
|
|||||||
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
* AND EXCEPTIONS DESCRIBED HEREIN. This guarantees your right to use, *
|
||||||
* modify, and redistribute this software under certain conditions. If *
|
* modify, and redistribute this software under certain conditions. If *
|
||||||
* you wish to embed Nmap technology into proprietary software, we sell *
|
* you wish to embed Nmap technology into proprietary software, we sell *
|
||||||
* alternative licenses (contact sales@insecure.com). Dozens of software *
|
* alternative licenses (contact sales@nmap.com). Dozens of software *
|
||||||
* vendors already license Nmap technology such as host discovery, port *
|
* vendors already license Nmap technology such as host discovery, port *
|
||||||
* scanning, OS detection, version detection, and the Nmap Scripting *
|
* scanning, OS detection, version detection, and the Nmap Scripting *
|
||||||
* Engine. *
|
* Engine. *
|
||||||
@@ -66,7 +66,7 @@
|
|||||||
* obeying all GPL rules and restrictions. For example, source code of *
|
* obeying all GPL rules and restrictions. For example, source code of *
|
||||||
* the whole work must be provided and free redistribution must be *
|
* the whole work must be provided and free redistribution must be *
|
||||||
* allowed. All GPL references to "this License", are to be treated as *
|
* allowed. All GPL references to "this License", are to be treated as *
|
||||||
* including the special and conditions of the license text as well. *
|
* including the terms and conditions of this license text as well. *
|
||||||
* *
|
* *
|
||||||
* Because this license imposes special exceptions to the GPL, Covered *
|
* Because this license imposes special exceptions to the GPL, Covered *
|
||||||
* Work may not be combined (even as part of a larger work) with plain GPL *
|
* Work may not be combined (even as part of a larger work) with plain GPL *
|
||||||
@@ -84,12 +84,12 @@
|
|||||||
* applications and appliances. These contracts have been sold to dozens *
|
* applications and appliances. These contracts have been sold to dozens *
|
||||||
* of software vendors, and generally include a perpetual license as well *
|
* of software vendors, and generally include a perpetual license as well *
|
||||||
* as providing for priority support and updates. They also fund the *
|
* as providing for priority support and updates. They also fund the *
|
||||||
* continued development of Nmap. Please email sales@insecure.com for *
|
* continued development of Nmap. Please email sales@nmap.com for further *
|
||||||
* further information. *
|
* information. *
|
||||||
* *
|
* *
|
||||||
* If you received these files with a written license agreement or *
|
* If you have received a written license agreement or contract for *
|
||||||
* contract stating terms other than the terms above, then that *
|
* Covered Software stating terms other than these, you may choose to use *
|
||||||
* alternative license agreement takes precedence over these comments. *
|
* and redistribute Covered Software under those terms instead of these. *
|
||||||
* *
|
* *
|
||||||
* Source is provided to this software because we believe users have a *
|
* Source is provided to this software because we believe users have a *
|
||||||
* right to know exactly what a program is going to do before they run it. *
|
* right to know exactly what a program is going to do before they run it. *
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user