Installing the AVM FRITZ!WLAN USB Stick in Linux
NOTE:
|
This driver can only be used with kernel version 2.6 or higher.
|
Contents
1 Prerequisites for Installing the Linux Package
2 Installing the FRITZ!WLAN USB Stick in SUSE Linux
2.1 Installation Advices
2.2 Installation
2.3 Establishing a Connection to WLAN Equipment (console)
2.4 Establishing a Connection to WLAN Equipment (openSUSE YaST)
2.5 Configuring an Ad-hoc Network (WEP-encrypted)
3 Installation Instructions for Integration in Other Linux Distributions
4 Uninstallation
5 Which AVM Devices Are Currently Supported by Linux?
6 AVM Support
7 Copyright Information
This document describes installation in Linux.
The INTEL i386 platform is supported and kernel version 2.6.
For more information on using AVM products with Linux, see the FAQs under "Service" on the AVM web site at www.avm.de/en.
Back to top
Information on the release version:
- The Stick & Surf function is not supported.
- Under some circumstances the Conqueror will load pages very slowly. Try using a different web browser like Firefox.
- openSUSE 10.2 (2.6.18.2-34-default)
- i386 (32 Bit)
- a FRITZ!WLAN USB Stick
- You have to perform the installation as "root", i.e. you must have write rights in the root directory as "Superuser".
- Minimum system requirement for the FRITZ!WLAN USB Stick is a PIII 500 MHz or compatible system
- USB 2.0 or USB 1.1 port (with reduced data throughput)
- installed kernel sources and GCC of version 3.3.5 or higher
- installed wpa_supplicant (tested with version 0.4.9) for WPA/WPA2 connections
Back to top
Tested operating systems:
|
openSUSE 10.2 (Kernel 2.6.18.2-34-default and Kernel 2.6.18.8-0.3-default)
Ubuntu FeistyFawn 7.04 (Kernel 2.6.20-16-generic)
Gentoo InstallCD 2007.0 (Kernel 2.6.20-gentoo-r8 and 2.6.21-gentoo-r3)
|
Version:
|
1.00.00
|
Build:
|
07.07.05
|
- System administration rights (root privileges) are necessary for the installation. You must log in to the console as "root" or "Superuser".
- Copy the archive "fwlanusb-x.yy.yy.tar.gz" from the Linux archive to your computer (e.g. from a diskette using the "mcopy" command from a console) and start the console (command prompt).
-
Extract the archive with the command
tar -xzvf fwlanusb-x.yy.zz.tar.gz
Example for SUSE 10.2:
tar -xzvf fwlanusb-1.00.00.tar.gz
A directory called "fritz" is created.
- Switch to the new directory "fritz" and enter the command "./install" to begin the installation.
- Connect the FRITZ!WLAN USB Stick with your USB port now.
- The WLAN driver is initialized automatically. The output to the /var/log/messages reads:
usbcore: registered new driver fwlanusb
fwlanusb: loaded
NOTE:
|
The FRITZ!WLAN USB Stick v.1.1 initially starts as a virtual CD-ROM drive. Switching automatically to the WLAN stick can take over one minute. If necessary, open "My Computer", go to the overview of drives, select the "FRITZ!WLAN USB Stick selfinstall" medium and choose the eject function (respectively the command eject /dev/sr0), to accelerate the process.
|
- Use the "lsmod" command to check wither the module was actually loaded. The output should contain the following entry:
-fwlanusb
- The module can also be loaded manually from the /src directory using the "insmod fwlanusb.ko" command.
This concludes the installation of the FRITZ!WLAN USB Stick in Linux. The following section describes how to establish a connection to an access point.
Back to top
For operation using WLAN in the Linux operating system, the section below explains how to search for WLAN access points and how to connect the FRITZ!WLAN USB Stick with an access point.
- Check whether the WLAN access point (for instance, the FRITZ!Box WLAN) is connected correctly and within range. For a WPA connection, also make sure that the wpa_supplicant is installed (YaST Control Center / Install/delete software). The WPA supplicant is located in the "/usr/sbin" directory after installation.
- Enter "iwconfig" to view a list of supported devices on the console. The outputs could look something like this:
eth0 no wireless extensions
wlan0 IEEE 802.11b/g ESSID:off/any
Mode:Managed Channel:0
Encryption key:off
Link Quality:0 Signal level:0 Noise level:0
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
In this example the FRITZ!WLAN USB Stick is the device wlan0.
- With the "iwlist wlan0 scan" command you can now search for WLAN equipment within range. With the string "essid" standing for the network name, the output could look something like this:
Cell 01 - Address: 00:11:22:33:44:55
ESSID: "FRITZ!Box"
WEP Encryption
- For WEP encryption you can use the "iwconfig essid" command to connect with one of the WLAN access points found. In this example the command would read:
iwconfig wlan0 essid 'FRITZ!Box'
- Use the command "iwconfig wlan0 key s: <ASCII string>" to specify the network key for the access point. In this example it is a 128-bit WEP key:
iwconfig wlan0 key s:1234567890123
- Please install the lightweight resolver daemon for the DHCP function (packet name: bind-chrootenv, it contains the required lwresd package).
To receive an IP address from the FRITZ!Box, enter the following command:
dhcpcd wlan0
- With this, the connection is established.
Start a web browser and enter "fritz.box" in the address field.
WPA/WPA2 Encryption
- For WPA encryption you can use the WPA supplicant to connect with any of the WLAN access points found. A configuration file suitable for the access point must be created first.
NOTE: | The installation package includes an example for each of the scripts, config-wpa and config-wpa2. |
Applied to the first example described above, the WPA configuration file would look like this:
network={
ssid="
enter here the ESSID, will be output during the initial scan"
key_mgmt=WPA-PSK
proto=WPA
pairwise=TKIP
group=TKIP
psk="here is the confidential key"
}
Save the file, for instance, as "config-wpa".
If you use WPA2 encryption, the entries in the file would change as follows:
network={
ssid="
enter here the ESSID, will be output during the initial scan"
key_mgmt=WPA-PSK
proto=WPA2
pairwise=CCMP
group=CCMP
psk="here is the confidential key"
}
Save the file, for instance, as "config-wpa2".
NOTE: |
For a FRITZ!Box in mixed mode operation (WPA+WPA2) the "group=TKIP" entry must be added to the Config script! |
- Applied to our example, the command for connecting would read:
wpa_supplicant -Dwext -i wlan0 -c config-wpa -dd
or
'wpa_supplicant - Dwext -i wlan0 -c config-wpa2 -dd'
ATTENTION: |
The files can be found only if they are located in the same directory as the example script (.../fritz), or if the exact path to the configuration file is specified. |
- Please install the lightweight resolver daemon for the DHCP function (packet name: bind-chrootenv, it contains the required lwresd package). To receive an IP address from the FRITZ!Box, enter the following command:
dhcpcd wlan0
- With this, the connection is established.
Start a web browser and enter "fritz.box" in the address field.
To end the DHCP daemon and delete the entry, enter the following commands:
killall -1 dhcpcd
rm /var/run/dhcpcd-wlan0.pid
A fixed IP address, a default gateway and the name server for the FRITZ!WLAN USB Stick can also be entered manually:
ifconfig wlan0 <desired IP address>
route add default gw <the IP address of the Box>
echo nameserver <IP address of the Box> >>
/etc/resolv.conf
Comprehensive information on the iwconfig command and on iwresd is presented on the corresponding manual pages:
man iwconfig
man lwresd
For more information on hardware configuration, see the SUSE documentation, including the directories:
/usr/share/doc/packages/wpa_supplicant
/usr/share/doc/packages/suselinux-userguide_de/
/usr/share/doc/packages/suselinux-adminguide_de/
Back to top
- Open the YaST Control Center.
- Select the "Network Devices" option and click on the "Network Card" entry.
- The "Network Setup Method" dialog opens with the "Traditional Method with ifup" option preconfigured.
- Confirm your choice by clicking "Next".
- The "Network Card Configuration Overview" appears.
- Click "Add".
- Choose "Wireless" as the "Device Type" and check the "USB" checkbox.
- In the "Configuration Name" dialog, replace the "bus-usb" entry with the value "0" (zero, equals wlan0).
- Click "Next" twice.
- In the "Wireless Network Card Configuration" dialog, enter the SSID of the WLAN access point. Choose the corresponding "Authentication Method" and enter the matching WLAN "Encryption Key".
- Click "Next" and conclude the configuration with "Finish".
- The connection is established automatically.
Back to top
The following section explains how to configure an ad-hoc network in Linux. Participants in an ad-hoc network can connect with each other as described in section 2.3. Open a console and enter the command "iwlist scan" to find out the name of the WLAN adapter. The name "wlan0" is assumed in the following instructions.
- Enter the command "iwconfig essid" to specify the name of the WLAN ad-hoc netzwork. In this example, the name used is "ad-hoc":
iwconfig wlan0 essid 'ad-hoc'
- Determine the key for the ad-hoc network using the command "iwconfig wlan0 key s: <ASCII character string>".
All participants of the ad-hoc network have to enter this key later. A 128-bit WEP key is used in this example:
iwconfig wlan0 key s:1234567890123
- Set the ad-hoc mode for the WLAN adapter:
iwconfig wlan0 mode ad-hoc
- Define the channel for the ad-hoc network. In this example, channel 1 is used:
iwconfig wlan0 channel 1
- Enter an IP address and, if necessary, a subnet mask for the ad-hoc network:
iwconfig wlan0 <169.254.229.30> netmask <255.255.0.0> up
The ad-hoc network is now ready for operation.
For comprehensive information on the topic of network configuration in Linux, see
Back to top
Thanks to the open concept of Linux, all current distribution can be used with the software. The binary-only modules contained in the drivers are kernel-independent. They do not execute any direct kernel calls. This means that they can be integrated into any Linux kernel. However, the manual installation must be adjusted individually for each distribution (kernel configuration, etc.) and according to the components installed (e.g. any additional PCMCIA modules required). All driver components required to integrate the software, including source code and these instructions are supplied in the "fritz" driver directory.
One of the possible methods for translating the sources for other distributions and kernel versions is described here:
- After unzipping the driver archive enter the "make" command in the new "/fritz/src" directory.
This command executes the "makefile" located there.
- The .ko file this produces must then be copied to the /lib/modules/`uname -r `/extra folder.
For the operating Linux kernel this takes place automatically when the "make install" command is executed.
Two components are bound together during the translation:
- the source code for system integration included in the package
- a binary, kernel-independent module in the "/fritz/lib" directory.
Please note that the kernel must be configured using the wireless extensions (version 18 or higher) (CONFIG_NET_WIRELESS=y).
For additional helpful instructions and links, see the FAQs under the "Service" area on the AVM web site at www.avm.de/en.
Back to top
The FRITZ!WLAN USB Stick can be uninstalled by simply removing it from the USB port. If the module is not unloaded automatically, enter the command "rmmod fwlanusb".
Back to top
The following DSL/ISDN/Box and Bluetooth products are supported by Linux:
- AVM ISDN Controller FRITZ!Card Classic (compatible with the AVM ISDN-Controller A1)*
- AVM ISDN-Controller FRITZ!Card PnP*
- AVM ISDN-Controller FRITZ!Card PCI / FRITZ!Card PCI v2.x *
- AVM ISDN Controller FRITZ!Card PCMCIA (compatible with the AVM ISDN-Controller A1 PCMCIA) *
- AVM ISDN-Controller FRITZ!Card USB / FRITZ!Card USB v2.x *
- AVM DSL/ISDN-Controller FRITZ!Card DSL v2.0 *
- AVM DSL/ISDN-Controller FRITZ!Card DSL USB *
- AVM DSL-Controller FRITZ!Card DSL USB analog *
- AVM DSL-Controller FRITZ!Card DSL SL *
- AVM DSL-Controller FRITZ!Card DSL SL USB *
- AVM ISDN-Controller B1 v1.4/v2.0/v3.0 (ISA) *
- AVM ISDN-Controller B1 PCI / B1 PCI v4.0
- AVM ISDN-Controller B1 PCMCIA
- AVM ISDN-Controller C2
- AVM ISDN-Controller C4
- AVM ISDN-Controller T1 *
- AVM ISDN-Controller T1-B *
- AVM FRITZ!WLAN USB Stick
- AVM FRITZ!X USB v2.0/ v3.0 (compatible with FRITZ!X ISDN) *
- AVM BlueFRITZ! USB (in the framework of an OpenSource project - see www.bluez.org for details) *
- AVM FRITZ!Box
* "End Of Maintenance" status (EOM): AVM will not continue development of the Linux driver for this equipment.
For information about new releases, see the AVM home page and the file "hist-eng.txt" in the root directory of ftp.avm.de.
Back to top
This driver can only be used with kernel version 2.6 or higher.
Because there are so many different kernels and distributions, e-mail support is limited to the operating systems and kernel versions described in section 2.1. This support is limited to the actual installation. For questions about network configuration, integrated functions of the operating system Linux and applications from other manufacturers, please contact the relevant manufacturer or the support desk of the distribution used.
The AVM web site offers detailed information and updates free of charge. Visit the site at: www.avm.de/en
- The "Products" category provides detailed information about all AVM products as well as announcements of new products and product versions.
All programs and drivers available on AVM's Internet site can also be downloaded from the AVM Data Call Center (ADC).
Please try all of the information sources described above before contacting AVM support.
If these instructions and the various information sources have not helped to resolve your problem, contact AVM Support for additional technical assistance.
You may send your support requests to AVM by e-mail. Support inquiries can be sent to AVM using the e-mail form provided at the Internet address www.avm.de/en
Fill out the form and mail it to AVM Support by clicking the "Send" button.
Back to top
© AVM GmbH 2007. Alle Rechte vorbehalten. www.avm.de
Diese Dokumentation und die zugehörigen Programme (beides wird nachfolgend als "Software" bezeichnet) sind urheberrechtlich geschützt.
Die Überlassung von Software erfolgt ausschließlich in maschinenlesbarer Form (Object Code Format). AVM räumt dem Lizenznehmer das nicht ausschließliche Recht ein, die Software zu nutzen. Das Nutzungsrecht ist auf den vereinbarten Zeitraum begrenzt, in Ermangelung einer solchen Vereinbarung ist das Nutzungsrecht zeitlich unbefristet. Der Lizenznehmer darf von der Software nur eine Vervielfältigung erstellen, die ausschließlich für Sicherungszwecke verwendet werden darf (Sicherungskopie). Der Lizenznehmer ist außer in den gesetzlich gestatteten Fällen (insbesondere nach § 69e deutsches Urheberrechtsgesetz, Dekompilierung) nicht berechtigt, die Software zu ändern, zurückzuentwickeln, zu disassemblieren, zu übersetzen oder Teile herauszulösen. AVM behält sich alle Rechte vor, die nicht ausdrücklich eingeräumt werden. Der Lizenznehmer darf alphanumerische und sonstige Kennungen von den Datenträgern nicht entfernen und hat sie auf jede Sicherungskopie unverändert zu übertragen. Eine Weitergabe der Ihnen hiermit überlassenen Informationen an Dritte ist nur mit schriftlicher Zustimmung von AVM erlaubt.
Der Lizenznehmer, dem die Software nicht zu Zwecken der gewerblichen Weiterveräußerung überlassen wird (Endkunde), darf das Nutzungsrecht nur zusammen mit dem Produkt, das er zusammen mit der Software von AVM erworben hat, an Dritte weiter geben.
Im Falle einer Übertragung des Nutzungsrechts an Dritte hat der Lizenznehmer sicherzustellen, dass dem Dritten keine weitergehenden Rechte eingeräumt werden, als AVM nach den vorliegenden Bestimmungen zustehen, und dem Dritten mindestens die bezüglich der Software bestehenden Verpflichtungen aus den vorliegenden Bestimmungen auferlegt werden. Hierbei darf der Lizenznehmer keine Kopien der Software zurückbehalten. Der Lizenznehmer ist zur Einräumung von Unterlizenzen nicht berechtigt. Überlässt der Lizenznehmer die Software einem Dritten, so ist der Lizenznehmer für die Beachtung etwaiger Ausfuhrerfordernisse verantwortlich und hat AVM insoweit von Verpflichtungen freizustellen.
Soweit AVM Software zur Verfügung stellt, für die AVM nur ein abgeleitetes Nutzungsrecht besitzt (Fremdsoftware), gelten zusätzlich und vorrangig vor den vorliegenden Bestimmungen die für die Fremdsoftware vereinbarten Nutzungsbedingungen. Der Lizenznehmer darf etwaige, mit dieser Software im Object Code Format überlassene Fremdsoftware von Texas Instruments („TI Software“) nur mit der Maßgabe verbreiten, dass er die Nutzung der TI Software im Wege einer schriftlichen Lizenzvereinbarung auf das AVM-Produkt beschränkt, das er zusammen mit der AVM-Software erworben hat, und dabei (außer in den gesetzlich gestatteten Fällen) Vervielfältigung, Reverse Engineering, Dekompilierung oder Disassemblierung der TI Software verboten sind. Falls und soweit Open Source Software überlassen wird, gelten zusätzlich und vorrangig vor den vorliegenden Bestimmungen die Nutzungsbedingungen, denen die Open Source Software unterliegt. AVM überlässt auf Verlangen den Quellcode relevanter Open Source Software, soweit die Nutzungsbedingungen solcher Open Source Software eine Herausgabe des Quellcodes vorsehen. AVM wird in den Vertragsunterlagen auf das Vorhandensein und die Nutzungsbedingungen überlassener Fremdsoftware bzw. Open Source Software hinweisen sowie die entsprechenden Nutzungsbedingungen auf Verlangen zugänglich machen.
Diese Software wurde mit größter Sorgfalt erstellt und nach dem Stand der Technik auf Korrektheit überprüft. Für die Qualität, Leistungsfähigkeit sowie Marktgängigkeit der Software für einen bestimmten Zweck, der von dem durch die Softwarebeschreibung abgedeckten Leistungsumfang abweicht, übernimmt AVM weder ausdrücklich noch implizit die Gewähr oder Verantwortung. Für Schäden, die sich direkt oder indirekt aus dem Gebrauch der Dokumentation oder der übrigen Programme ergeben, sowie für beiläufige Schäden oder Folgeschäden haftet AVM nur im Falle des Vorsatzes oder der groben Fahrlässigkeit. Für den Verlust oder die Beschädigung von Hardware oder Software oder Daten infolge direkter oder indirekter Fehler oder Zerstörungen, sowie für Kosten, einschließlich der Kosten für ISDN-, GSM- und ADSL-Verbindungen, die im Zusammenhang mit den gelieferten Programmen und der Dokumentation stehen und auf fehlerhafte Installationen, die von AVM nicht vorgenommen wurden, zurückzuführen sind, sind alle Haftungsansprüche ausdrücklich ausgeschlossen.
AVM übernimmt keine Verpflichtungen zur Erbringung von Software-Service-Leistungen. Diese bedürfen einer gesonderten Vereinbarung. Die in dieser Dokumentation enthaltenen Informationen und die zugehörigen Programme können ohne besondere Ankündigung zum Zwecke des technischen Fortschritts geändert werden.
AVM bietet als Hersteller dieses Originalprodukts eine Herstellergarantie. Die Garantiebedingungen sind auf der beiliegenden Produkt-CD in der Datei GARANTIE.PDF im Ordner SOFTWARE/INFO/DEUTSCH zu finden.
Markenzeichen: Soweit nicht anders angegeben, sind alle genannten Markenzeichen gesetzlich geschützte Marken der AVM GmbH. Dies gilt insbesondere für Produktnamen und Logos. Microsoft, Windows und das Windows Logo sind Marken der Microsoft Corporation in den USA und/oder anderen Ländern. Alle anderen Produkt- und Firmennamen sind Marken der jeweiligen Inhaber.
---------------------------------------------------------------------------------
© AVM GmbH 2007. All rights reserved. www.avm.de
This documentation and the relevant programs (both herein referred to as "Software") are protected by copyright.
Software is delivered in machine-readable format only (object code format). Under all AVM intellectual property rights, AVM hereby grants licensee the non-exclusive right to use the Software. Unless agreed for a limited time period, the right to use the Software is for an unlimited time period. Licensee shall be entitled to make a copy exclusively reserved for personal backup purposes (backup copy). Unless granted by mandatory law (including but not limited to Art. 69 German Copyright Act for decompiling), licensee shall not be entitled to modify, disassemble, reverse engineer, decompile, disassemble or otherwise alter the Software in whole or in part. AVM reserves all intellectual property rights except as expressly granted herein. Licensee shall not be entitled to modify or delete alpha-numerical or other identification codes on data median and shall transfer such identification codes onto any legal backup copy. Without the prior written approval of AVM, licensee shall not be entitled to transmit any infomation made available herein.
If licensee has received the Software not for commercial purposes of resale (end user), licensee shall be obliged to transmit the right to use the Software to a third party only in connection with the product licensee acquired together with the Software. In the event that licensee transfers the right to use the Software to a third party, licensee shall ensure not to grant further rights to this third party than originally granted to AVM, and licensee shall ensure to impose this third party the obligations of the present license terms. In such case, licensee shall not withhold any backup copy. Licensee shall not be entitled to grant sublicenses. In the event licensee transmits the Software to a third party, licensee shall be responsible for and shall release AVM insofar from the compliance of export control laws and obligations.
If and insofar AVM provides Software for which AVM is only granted a derived right to use (Third Party Software), the license terms for such Third Party Software shall additionally apply and prevail. If and insofar certain Third Party Software in object code format by Texas Instrument („TI Software“) is provided together with this Software, licensee may only distribute such TI Software pursuant to a written license agreement which restricts use to TI Software embedded in the AVM hardware product licensee acquired together with the Software and prohibits (unless granted by mandatory law) copying, reverse engineering, decompiling or disassembling of TI Software. If Open Source Software is provided, the license terms for such Open Source Software shall additionally apply and prevail. AVM shall provide licensee with the corresponding source code of relevant Open Source Software, if the respective license terms of the Open Source Software include such obligation. AVM shall inform if the Software contains Third Party Software and/or Open Source Software and make available the corresponding license terms on request.
This Software has been produced with all due care and checked for correctness in accordance with state of the art. AVM hereby disclaims all liability and warranties, whether express or implied, relating to this Software’s quality, performance or suitability for any specific purpose which deviates from the performance specifications contained in the Software description. AVM shall not be liable for damages arising directly or indirectly from the use of the manual or related software, nor for incidental or consequential damages, except in case of intent or gross negligence. AVM expressly disclaims all liability for loss of or damage to hardware, software or data as a result of direct or indirect errors or destruction and for any costs, including ISDN, GSM and DSL connection charges, related to the Software supplied and due to incorrect installations not performed by AVM itself.
AVM shall not be obliged to offer any software services. The information in this Software is subject to change without notice for the purpose of technical improvement.
AVM offers a manufacturer's warranty for this original product. The conditions of this warranty are contained in the WARRANTY.PDF file in the SOFTWARE/INFO folder on the product CD included with delivery.
Trademarks: Unless otherwise indicated, all trademarks mentioned are legally protected trademarks owned by AVM GmbH. This is especially true for product names and logos. Microsoft, Windows and the Windows logo are trademarks owned by Microsoft Corporation in the USA and/or other countries. All other product and company names are trademarks of their respective owners.
-----------------------------------------------------------------------------------------
GNU LGPL Copyright Notice and Warranty Disclaimer
This product´s firmware contains library software that is free software; you can redistribute the library software and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation (version 2.1 of the license). The library software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. All copyrights are identified in more detail in the library source code. The library source code and a copy of the GNU Lesser General Public License can at least for a period of three years be requested by email fritzbox_info@avm.de or by AVM GmbH, Alt-Moabit 95, 10559 Berlin, Germany.
GNU LESSER GENERAL PUBLIC LICENSE
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL. It also counts
as the successor of the GNU Library Public License, version 2, hence
the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.
For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
-----------------------------------------------------------------
© 1998-2001 des OpenSSL Project. Alle Rechte vorbehalten.
Dieses Produkt enthält Software entwickelt vom OpenSSL Project für die Nutzung im OpenSSL Toolkit (http://www.openssl.org/).
Dieses Produkt enthält kryptografische Software von Eric Young (eay@cryptsoft.com).
Dieses Produkt enthält Software von Tim Hudson (tjh@cryptsoft.com).
Bitte unbedingt die Details der zugrunde liegenden Lizenzbestimmungen unter http://www.openssl.org/ beachten.
---------------------------------------------------------------------------------------------
* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
* rights reserved.
*
* License to copy and use this software is granted provided that it
* is identified as the "RSA Data Security, Inc. MD5 Message-Digest
* Algorithm" in all material mentioning or referencing this software
* or this function.
*
* License is also granted to make and use derivative works provided
* that such works are identified as "derived from the RSA Data
* Security, Inc. MD5 Message-Digest Algorithm" in all material
* mentioning or referencing the derived work.
*
* RSA Data Security, Inc. makes no representations concerning either
* the merchantability of this software or the suitability of this
* software for any particular purpose. It is provided "as is"
* without express or implied warranty of any kind.
*
* These notices must be retained in any copies of any part of this
* documentation and/or software.
------------------------------------------------------------------------------------------------------
Sämtliche Software der vorgenannten Dritten wird im vorhandenen Zustand "wie sie ist" zur Verfügung gestellt. Jede Gewährleistung, weder ausdrücklich noch implizit, insbesondere eine konkludente Gewährleistung der Marktreife oder der Verwendbarkeit für einen bestimmten Zweck, wird ausgeschlossen.
In keinem Fall ist ein Urheber oder dessen Mitarbeiter haftbar für irgendwelche direkten, indirekten, zufälligen, besonderen, exemplarischen Schäden oder Folgeschäden (dies betrifft insbesondere die Beschaffung von Ersatzgütern oder -dienstleistungen; den Verlust der Verwendbarkeit, von Daten oder Gewinn; oder betriebliche Störungen), unabhängig davon, wie diese Schäden verursacht worden sind oder auf welche Haftungstheorie sie gestützt werden, gleichgültig ob Vertragshaftung, verschuldensunabhängige Haftung oder Deliktshaftung (einschließlich Fahrlässigkeit oder Sonstiges) vorliegt. Dies schließt auch Schäden aus, die in irgendeiner Art und Weise aus dem Gebrauch der Software resultieren, selbst wenn auf die Möglichkeit solcher Schäden hingewiesen wurde.
EOF
SAS; FS; 06/2007