1 /***************************************************************************
2 * nbase_winconfig.h -- Since the Windows port is currently eschewing *
3 * autoconf-style configure scripts, nbase_winconfig.h contains the *
4 * platform-specific definitions for Windows and is used as a replacement *
7 ***********************IMPORTANT NMAP LICENSE TERMS************************
9 * The Nmap Security Scanner is (C) 1996-2006 Insecure.Com LLC. Nmap is *
10 * also a registered trademark of Insecure.Com LLC. This program is free *
11 * software; you may redistribute and/or modify it under the terms of the *
12 * GNU General Public License as published by the Free Software *
13 * Foundation; Version 2 with the clarifications and exceptions described *
14 * below. This guarantees your right to use, modify, and redistribute *
15 * this software under certain conditions. If you wish to embed Nmap *
16 * technology into proprietary software, we sell alternative licenses *
17 * (contact sales@insecure.com). Dozens of software vendors already *
18 * license Nmap technology such as host discovery, port scanning, OS *
19 * detection, and version detection. *
21 * Note that the GPL places important restrictions on "derived works", yet *
22 * it does not provide a detailed definition of that term. To avoid *
23 * misunderstandings, we consider an application to constitute a *
24 * "derivative work" for the purpose of this license if it does any of the *
26 * o Integrates source code from Nmap *
27 * o Reads or includes Nmap copyrighted data files, such as *
28 * nmap-os-fingerprints or nmap-service-probes. *
29 * o Executes Nmap and parses the results (as opposed to typical shell or *
30 * execution-menu apps, which simply display raw Nmap output and so are *
31 * not derivative works.) *
32 * o Integrates/includes/aggregates Nmap into a proprietary executable *
33 * installer, such as those produced by InstallShield. *
34 * o Links to a library or executes a program that does any of the above *
36 * The term "Nmap" should be taken to also include any portions or derived *
37 * works of Nmap. This list is not exclusive, but is just meant to *
38 * clarify our interpretation of derived works with some common examples. *
39 * These restrictions only apply when you actually redistribute Nmap. For *
40 * example, nothing stops you from writing and selling a proprietary *
41 * front-end to Nmap. Just distribute it by itself, and point people to *
42 * http://insecure.org/nmap/ to download Nmap. *
44 * We don't consider these to be added restrictions on top of the GPL, but *
45 * just a clarification of how we interpret "derived works" as it applies *
46 * to our GPL-licensed Nmap product. This is similar to the way Linus *
47 * Torvalds has announced his interpretation of how "derived works" *
48 * applies to Linux kernel modules. Our interpretation refers only to *
49 * Nmap - we don't speak for any other GPL products. *
51 * If you have any questions about the GPL licensing restrictions on using *
52 * Nmap in non-GPL works, we would be happy to help. As mentioned above, *
53 * we also offer alternative license to integrate Nmap into proprietary *
54 * applications and appliances. These contracts have been sold to dozens *
55 * of software vendors, and generally include a perpetual license as well *
56 * as providing for priority support and updates as well as helping to *
57 * fund the continued development of Nmap technology. Please email *
58 * sales@insecure.com for further information. *
60 * As a special exception to the GPL terms, Insecure.Com LLC grants *
61 * permission to link the code of this program with any version of the *
62 * OpenSSL library which is distributed under a license identical to that *
63 * listed in the included Copying.OpenSSL file, and distribute linked *
64 * combinations including the two. You must obey the GNU GPL in all *
65 * respects for all of the code used other than OpenSSL. If you modify *
66 * this file, you may extend this exception to your version of the file, *
67 * but you are not obligated to do so. *
69 * If you received these files with a written license agreement or *
70 * contract stating terms other than the terms above, then that *
71 * alternative license agreement takes precedence over these comments. *
73 * Source is provided to this software because we believe users have a *
74 * right to know exactly what a program is going to do before they run it. *
75 * This also allows you to audit the software for security holes (none *
76 * have been found so far). *
78 * Source code also allows you to port Nmap to new platforms, fix bugs, *
79 * and add new features. You are highly encouraged to send your changes *
80 * to fyodor@insecure.org for possible incorporation into the main *
81 * distribution. By sending these changes to Fyodor or one the *
82 * Insecure.Org development mailing lists, it is assumed that you are *
83 * offering Fyodor and Insecure.Com LLC the unlimited, non-exclusive right *
84 * to reuse, modify, and relicense the code. Nmap will always be *
85 * available Open Source, but this is important because the inability to *
86 * relicense code has caused devastating problems for other Free Software *
87 * projects (such as KDE and NASM). We also occasionally relicense the *
88 * code to third parties as discussed above. If you wish to specify *
89 * special license conditions of your contributions, just say so when you *
92 * This program is distributed in the hope that it will be useful, but *
93 * WITHOUT ANY WARRANTY; without even the implied warranty of *
94 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU *
95 * General Public License for more details at *
96 * http://www.gnu.org/copyleft/gpl.html , or in the COPYING file included *
99 ***************************************************************************/
101 /* $Id: nbase_winconfig.h 3899 2006-08-29 05:42:35Z fyodor $ */
103 #ifndef NBASE_WINCONFIG_H
104 #define NBASE_WINCONFIG_H
106 /* It doesn't really have strucct IP, but we use a different one instead
107 of the one that comes with Nmap */
108 #define HAVE_STRUCT_IP 1
109 /* #define HAVE_STRUCT_ICMP 1 */
110 #define HAVE_STRNCASECMP 1
111 #define HAVE_IP_IP_SUM 1
112 #define STDC_HEADERS 1
113 #define HAVE_STRING_H 1
114 #define HAVE_MEMORY_H 1
115 #define HAVE_FCNTL_H 1
116 #define HAVE_ERRNO_H 1
117 #define HAVE_SYS_STAT_H 1
118 #define HAVE_MEMCPY 1
119 #define HAVE_STRERROR 1
120 #define HAVE_SYS_SOCKIO_H 1
121 /* #undef HAVE_TERMIOS_H */
122 #define HAVE_ERRNO_H 1
123 #define HAVE_GAI_STRERROR 1
124 /* #define HAVE_STRCASESTR 1 */
125 #define HAVE_STRCASECMP 1
126 #define HAVE_NETINET_IN_SYSTEM_H 1
127 #define HAVE_NETINET_IF_ETHER_H 1
128 #define HAVE_SYS_STAT_H 1
130 #define HAVE_GETADDRINFO 1
131 #define HAVE_GETNAMEINFO 1
133 #define HAVE_SNPRINTF 1
134 #define HAVE_VASPRINTF 1
135 #define HAVE_VSNPRINTF 1
137 #define SIZEOF_CHAR 1
138 #define SIZEOF_SHORT 2
140 #define SIZEOF_LONG 4
142 #define HAVE_AF_INET6 1
143 #define HAVE_SOCKADDR_STORAGE 1
145 /* Without this, Windows will give us all sorts of crap about using functions
146 like strcpy() even if they are done safely */
147 #define _CRT_SECURE_NO_DEPRECATE 1
150 #define bzero(addr, num) __builtin_memset (addr, '\0', num)
152 #define __attribute__(x)
155 #endif /* NBASE_WINCONFIG_H */