<ahref="#section-3.3">3.3</a>, <ahref="#section-3.4">3.4</a> and
<ahref="#section-3.5">3.5</a> have been met for that Covered Code, and if You include a
notice stating that the Source Code version of the Covered Code is available under the terms
of this License, including a description of how and where You have fulfilled the obligations
of Section <ahref="#section-3.2">3.2</a>. The notice must be conspicuously included in any
notice in an Executable version, related documentation or collateral in which You describe
recipients' rights relating to the Covered Code. You may distribute the Executable version of
Covered Code or ownership rights under a license of Your choice, which may contain terms
different from this License, provided that You are in compliance with the terms of this
License and that the license for the Executable version does not attempt to limit or alter the
recipient's rights in the Source Code version from the rights set forth in this License. If
You distribute the Executable version under a different license You must make it absolutely
clear that any terms which differ from this License are offered by You alone, not by the
Initial Developer or any Contributor. You hereby agree to indemnify the Initial Developer and
every Contributor for any liability incurred by the Initial Developer or such Contributor as
a result of any such terms You offer.
</p>
<h4id="section-3.7">3.7. Larger Works</h4>
<p>
You may create a Larger Work by combining Covered Code with other code not governed by the
terms of this License and distribute the Larger Work as a single product. In such a case,
You must make sure the requirements of this License are fulfilled for the Covered Code.
</p>
<h3id="section-4">4. Inability to Comply Due to Statute or Regulation.</h3>
<p>
If it is impossible for You to comply with any of the terms of this License with respect to
some or all of the Covered Code due to statute, judicial order, or regulation then You must:
(a) comply with the terms of this License to the maximum extent possible; and (b) describe
the limitations and the code they affect. Such description must be included in the
<b>legal</b> file described in Section
<ahref="#section-3.4">3.4</a> and must be included with all distributions of the Source Code.
Except to the extent prohibited by statute or regulation, such description must be
sufficiently detailed for a recipient of ordinary skill to be able to understand it.
</p>
<h3id="section-5">5. Application of this License.</h3>
<p>
This License applies to code to which the Initial Developer has attached the notice in
<ahref="#exhibit-a">Exhibit A</a> and to related Covered Code.
</p>
<h3id="section-6">6. Versions of the License.</h3>
<h4id="section-6.1">6.1. New Versions</h4>
<p>
The <emclass="u">H2 Group</em> may publish revised and/or new versions
of the License from time to time. Each version will be given a distinguishing version number.
</p>
<h4id="section-6.2">6.2. Effect of New Versions</h4>
<p>
Once Covered Code has been published under a particular version of the License, You may
always continue to use it under the terms of that version. You may also choose to use such
Covered Code under the terms of any subsequent version of the License published by the <emclass="u">H2 Group</em>.
No one other than the <emclass="u">H2 Group</em> has the right to modify the terms applicable to Covered Code
created under this License.
</p>
<h4id="section-6.3">6.3. Derivative Works</h4>
<p>
If You create or use a modified version of this License (which you may only do in order to
apply it to code which is not already Covered Code governed by this License), You must (a)
rename Your license so that the phrases <emclass="u">"H2 Group", "H2"</em>
or any confusingly similar phrase do not appear in your license (except to note that
your license differs from this License) and (b) otherwise make it clear that Your version of
the license contains terms which differ from the <emclass="u">H2 License</em>.
(Filling in the name of the Initial Developer, Original Code or Contributor in the
notice described in <ahref="#exhibit-a">Exhibit A</a> shall not of themselves be deemed to
be modifications of this License.)
</p>
<h3id="section-7">7. Disclaimer of Warranty</h3>
<p>
<p>
Covered code is provided under this license on an "as is"
Covered code is provided under this license on an "as is"
basis, without warranty of any kind, either expressed or implied, including, without
basis, without warranty of any kind, either expressed or implied, including, without
limitation, warranties that the covered code is free of defects, merchantable, fit for a
limitation, warranties that the covered code is free of defects, merchantable, fit for a
particular purpose or non-infringing. The entire risk as to the quality and performance of
particular purpose or non-infringing. The entire risk as to the quality and performance of
the covered code is with you. Should any covered code prove defective in any respect, you
the covered code is with you. Should any covered code prove defective in any respect, you
(not the initial developer or any other contributor) assume the cost of any necessary
(not the initial developer or any other contributor) assume the cost of any necessary
servicing, repair or correction. This disclaimer of warranty constitutes an essential part
servicing, repair or correction. This disclaimer of warranty constitutes an essential part
of this license. No use of any covered code is authorized hereunder except under this
of this license. No use of any covered code is authorized hereunder except under this
disclaimer.
disclaimer.
</p>
</p>
<h3id="section-8">8. Termination</h3>
<h3id="section-8">8. Termination</h3>
<pid="section-8.1">8.1. This License and the rights granted hereunder will terminate
<pid="section-8.1">8.1. This License and the rights granted hereunder will terminate
automatically if You fail to comply with terms herein and fail to cure such breach
automatically if You fail to comply with terms herein and fail to cure such breach
within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which
within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which
are properly granted shall survive any termination of this License. Provisions which, by
are properly granted shall survive any termination of this License. Provisions which, by
their nature, must remain in effect beyond the termination of this License shall survive.
their nature, must remain in effect beyond the termination of this License shall survive.
</p>
</p>
<pid="section-8.2">8.2. If You initiate litigation by asserting a patent infringement
<pid="section-8.2">8.2. If You initiate litigation by asserting a patent infringement
claim (excluding declaratory judgment actions) against Initial Developer or a Contributor
claim (excluding declaratory judgment actions) against Initial Developer or a Contributor
(the Initial Developer or Contributor against whom You file such action is referred to
(the Initial Developer or Contributor against whom You file such action is referred to
as "Participant") alleging that:
as "Participant") alleging that:
</p>
</p>
<pid="section-8.2-a">8.2.a. such Participant's Contributor Version directly or indirectly
<pid="section-8.2-a">8.2.a. such Participant's Contributor Version directly or indirectly
infringes any patent, then any and all rights granted by such Participant to You under
infringes any patent, then any and all rights granted by such Participant to You under
Sections <ahref="#section-2.1">2.1</a> and/or <ahref="#section-2.2">2.2</a> of this
Sections <ahref="#section-2.1">2.1</a> and/or <ahref="#section-2.2">2.2</a> of this
License shall, upon 60 days notice from Participant terminate prospectively, unless if
License shall, upon 60 days notice from Participant terminate prospectively, unless if
within 60 days after receipt of notice You either: (i) agree in writing to pay
within 60 days after receipt of notice You either: (i) agree in writing to pay
Participant a mutually agreeable reasonable royalty for Your past and future use of
Participant a mutually agreeable reasonable royalty for Your past and future use of
Modifications made by such Participant, or (ii) withdraw Your litigation claim with
Modifications made by such Participant, or (ii) withdraw Your litigation claim with
respect to the Contributor Version against such Participant. If within 60 days of
respect to the Contributor Version against such Participant. If within 60 days of
notice, a reasonable royalty and payment arrangement are not mutually agreed upon in
notice, a reasonable royalty and payment arrangement are not mutually agreed upon in
writing by the parties or the litigation claim is not withdrawn, the rights granted by
writing by the parties or the litigation claim is not withdrawn, the rights granted by
Participant to You under Sections <ahref="#section-2.1">2.1</a> and/or
Participant to You under Sections <ahref="#section-2.1">2.1</a> and/or
<ahref="#section-2.2">2.2</a> automatically terminate at the expiration of the 60 day
<ahref="#section-2.2">2.2</a> automatically terminate at the expiration of the 60 day
notice period specified above.
notice period specified above.
</p>
</p>
<pid="section-8.2-b">8.2.b. any software, hardware, or device, other than such Participant's
<pid="section-8.2-b">8.2.b. any software, hardware, or device, other than such Participant's
Contributor Version, directly or indirectly infringes any patent, then any rights
Contributor Version, directly or indirectly infringes any patent, then any rights
granted to You by such Participant under Sections 2.1(<ahref="#section-2.1-b">b</a>)
granted to You by such Participant under Sections 2.1(<ahref="#section-2.1-b">b</a>)
and 2.2(<ahref="#section-2.2-b">b</a>) are revoked effective as of the date You first
and 2.2(<ahref="#section-2.2-b">b</a>) are revoked effective as of the date You first
made, used, sold, distributed, or had made, Modifications made by that Participant.
made, used, sold, distributed, or had made, Modifications made by that Participant.
</p>
</p>
<pid="section-8.3">8.3. If You assert a patent infringement claim against Participant
<pid="section-8.3">8.3. If You assert a patent infringement claim against Participant
alleging that such Participant's Contributor Version directly or indirectly infringes
alleging that such Participant's Contributor Version directly or indirectly infringes
any patent where such claim is resolved (such as by license or settlement) prior to the
any patent where such claim is resolved (such as by license or settlement) prior to the
initiation of patent infringement litigation, then the reasonable value of the licenses
initiation of patent infringement litigation, then the reasonable value of the licenses
granted by such Participant under Sections <ahref="#section-2.1">2.1</a> or
granted by such Participant under Sections <ahref="#section-2.1">2.1</a> or
<ahref="#section-2.2">2.2</a> shall be taken into account in determining the amount or
<ahref="#section-2.2">2.2</a> shall be taken into account in determining the amount or
value of any payment or license.
value of any payment or license.
</p>
</p>
<pid="section-8.4">8.4. In the event of termination under Sections
<pid="section-8.4">8.4. In the event of termination under Sections
<ahref="#section-8.1">8.1</a> or <ahref="#section-8.2">8.2</a> above, all end user
<ahref="#section-8.1">8.1</a> or <ahref="#section-8.2">8.2</a> above, all end user
license agreements (excluding distributors and resellers) which have been validly
license agreements (excluding distributors and resellers) which have been validly
granted by You or any distributor hereunder prior to termination shall survive
granted by You or any distributor hereunder prior to termination shall survive
termination.
termination.
</p>
</p>
<h3id="section-9">9. Limitation of Liability</h3>
<h3id="section-9">9. Limitation of Liability</h3>
<p>
<p>
Under no circumstances and under no legal theory, whether
Under no circumstances and under no legal theory, whether
tort (including negligence), contract, or otherwise, shall you, the initial developer,
tort (including negligence), contract, or otherwise, shall you, the initial developer,
any other contributor, or any distributor of covered code, or any supplier of any of
any other contributor, or any distributor of covered code, or any supplier of any of
such parties, be liable to any person for any indirect, special, incidental, or
such parties, be liable to any person for any indirect, special, incidental, or
consequential damages of any character including, without limitation, damages for loss
consequential damages of any character including, without limitation, damages for loss
of goodwill, work stoppage, computer failure or malfunction, or any and all other
of goodwill, work stoppage, computer failure or malfunction, or any and all other
commercial damages or losses, even if such party shall have been informed of the
commercial damages or losses, even if such party shall have been informed of the
possibility of such damages. This limitation of liability shall not apply to liability
possibility of such damages. This limitation of liability shall not apply to liability
for death or personal injury resulting from such party's negligence to the extent
for death or personal injury resulting from such party's negligence to the extent
applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion
applicable law prohibits such limitation. Some jurisdictions do not allow the exclusion
or limitation of incidental or consequential damages, so this exclusion and limitation
or limitation of incidental or consequential damages, so this exclusion and limitation
may not apply to you.
may not apply to you.
</p>
</p>
<h3id="section-10">10. United States Government End Users</h3>
<h3id="section-10">10. United States Government End Users</h3>
<p>
<p>
The Covered Code is a "commercial item", as that term is defined in 48
The Covered Code is a "commercial item", as that term is defined in 48
C.F.R. 2.101 (October 1995), consisting of
C.F.R. 2.101 (October 1995), consisting of
"commercial computer software" and "commercial computer software documentation", as such
"commercial computer software" and "commercial computer software documentation", as such
terms are used in 48 C.F.R. 12.212 (September 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R.
terms are used in 48 C.F.R. 12.212 (September 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R.
227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users
227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users
acquire Covered Code with only those rights set forth herein.
acquire Covered Code with only those rights set forth herein.
</p>
</p>
<h3id="section-11">11. Miscellaneous</h3>
<h3id="section-11">11. Miscellaneous</h3>
<p>
<p>
This License represents the complete agreement concerning subject matter hereof. If
This License represents the complete agreement concerning subject matter hereof. If
any provision of this License is held to be unenforceable, such provision shall be
any provision of this License is held to be unenforceable, such provision shall be
reformed only to the extent necessary to make it enforceable. This License shall be
reformed only to the extent necessary to make it enforceable. This License shall be
governed by California law provisions (except to the extent applicable law, if any,
governed by California law provisions (except to the extent applicable law, if any,
provides otherwise), excluding its conflict-of-law provisions. With respect to
provides otherwise), excluding its conflict-of-law provisions. With respect to
disputes in which at least one party is a citizen of, or an entity chartered or
disputes in which at least one party is a citizen of, or an entity chartered or
registered to do business in United States of America, any litigation relating to
registered to do business in United States of America, any litigation relating to
this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California,
this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California,
with the losing party responsible for costs, including without limitation, court
with the losing party responsible for costs, including without limitation, court
costs and reasonable attorneys' fees and expenses. The application of the United
costs and reasonable attorneys' fees and expenses. The application of the United
Nations Convention on Contracts for the International Sale of Goods is expressly
Nations Convention on Contracts for the International Sale of Goods is expressly
excluded. Any law or regulation which provides that the language of a contract
excluded. Any law or regulation which provides that the language of a contract
shall be construed against the drafter shall not apply to this License.
shall be construed against the drafter shall not apply to this License.
</p>
</p>
<h3id="section-12">12. Responsibility for Claims</h3>
<h3id="section-12">12. Responsibility for Claims</h3>
Describes the higher than expected probability that two persons in a room have the same birthday. Also valid for randomly generated UUIDs. See also: <a href="http://en.wikipedia.org/wiki/Birthday_paradox">Wikipedia: Birthday Paradox</a>
Describes the higher than expected probability that two persons in a room have the same birthday. Also valid for randomly generated UUIDs. See also: <a
@@ -896,7 +898,8 @@ Protocol to protect a password (but not to protect data). See also: <a href="htt
...
@@ -896,7 +898,8 @@ Protocol to protect a password (but not to protect data). See also: <a href="htt
GCJ
GCJ
@advanced_1299_td
@advanced_1299_td
Compiler for Java. <a href="http://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a href="http://www.dobysoft.com/products/nativej">NativeJ (commercial)</a>
Compiler for Java. <a href="http://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a
A security vulnerability where an application generates SQL statements with embedded user input. See also: <a href="http://en.wikipedia.org/wiki/SQL_injection">Wikipedia: SQL Injection</a>
A security vulnerability where an application generates SQL statements with embedded user input. See also: <a
#Describes the higher than expected probability that two persons in a room have the same birthday. Also valid for randomly generated UUIDs. See also: <a
#Protocol to protect a password (but not to protect data). See also: <a href="http://www.faqs.org/rfcs/rfc2617.html">RFC 2617: HTTP Digest Access Authentication</a>
@advanced_1298_td
@advanced_1298_td
GCJ
GCJ
@advanced_1299_td
@advanced_1299_td
#Compiler for Java. <a href="http://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a href="http://www.dobysoft.com/products/nativej">NativeJ (commercial)</a>
#Compiler for Java. <a href="http://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a
#Random number to increase the security of passwords. See also: <a href="http://en.wikipedia.org/wiki/Key_derivation_function">Wikipedia: Key derivation function</a>
#Security problem of certain encryption programs where the existence of certain data can be proven without decrypting. For more information, search in the internet for 'watermark attack cryptoloop'
#Instead of passing the user name as a separate parameter as in <code>Connection conn = DriverManager. getConnection("jdbc:h2:~/test", "sa", "123");</code> the user name (and/or password) can be supplied in the URL itself: <code>Connection conn = DriverManager. getConnection("jdbc:h2:~/test;USER=sa;PASSWORD=123");</code> The settings in the URL override the settings passed as a separate parameter.
@@ -291,13 +291,13 @@ advanced_1289_h2=Glossary and Links
...
@@ -291,13 +291,13 @@ advanced_1289_h2=Glossary and Links
advanced_1290_th=Term
advanced_1290_th=Term
advanced_1291_th=Description
advanced_1291_th=Description
advanced_1292_td=AES-128
advanced_1292_td=AES-128
advanced_1293_td=A block encryption algorithm. See also\:<a href\="http\://en.wikipedia.org/wiki/Advanced_Encryption_Standard">Wikipedia\:AES</a>
advanced_1293_td=A block encryption algorithm. See also\:<a\nhref\="http\://en.wikipedia.org/wiki/Advanced_Encryption_Standard">Wikipedia\:AES</a>
advanced_1294_td=Birthday Paradox
advanced_1294_td=Birthday Paradox
advanced_1295_td=Describes the higher than expected probability that two persons in a room have the same birthday. Also valid for randomly generated UUIDs. See also\:<a href\="http\://en.wikipedia.org/wiki/Birthday_paradox">Wikipedia\:Birthday Paradox</a>
advanced_1295_td=Describes the higher than expected probability that two persons in a room have the same birthday. Also valid for randomly generated UUIDs. See also\:<a\nhref\="http\://en.wikipedia.org/wiki/Birthday_paradox">Wikipedia\:Birthday Paradox</a>
advanced_1296_td=Digest
advanced_1296_td=Digest
advanced_1297_td=Protocol to protect a password (but not to protect data). See also\:<a href\="http\://www.faqs.org/rfcs/rfc2617.html">RFC 2617\:HTTP Digest Access Authentication</a>
advanced_1297_td=Protocol to protect a password (but not to protect data). See also\:<a href\="http\://www.faqs.org/rfcs/rfc2617.html">RFC 2617\:HTTP Digest Access Authentication</a>
advanced_1298_td=GCJ
advanced_1298_td=GCJ
advanced_1299_td=Compiler for Java. <a href\="http\://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a href\="http\://www.dobysoft.com/products/nativej">NativeJ (commercial)</a>
advanced_1299_td=Compiler for Java. <a href\="http\://gcc.gnu.org/java">GNU Compiler for the Java</a> and <a\nhref\="http\://www.dobysoft.com/products/nativej">NativeJ (commercial)</a>
advanced_1300_td=HTTPS
advanced_1300_td=HTTPS
advanced_1301_td=A protocol to provide security to HTTP connections. See also\:<a href\="http\://www.ietf.org/rfc/rfc2818.txt">RFC 2818\:HTTP Over TLS</a>
advanced_1301_td=A protocol to provide security to HTTP connections. See also\:<a href\="http\://www.ietf.org/rfc/rfc2818.txt">RFC 2818\:HTTP Over TLS</a>
advanced_1302_td=Modes of Operation
advanced_1302_td=Modes of Operation
...
@@ -305,15 +305,15 @@ advanced_1303_a=Wikipedia\: Block cipher modes of operation
...
@@ -305,15 +305,15 @@ advanced_1303_a=Wikipedia\: Block cipher modes of operation
advanced_1304_td=Salt
advanced_1304_td=Salt
advanced_1305_td=Random number to increase the security of passwords. See also\:<a href\="http\://en.wikipedia.org/wiki/Key_derivation_function">Wikipedia\:Key derivation function</a>
advanced_1305_td=Random number to increase the security of passwords. See also\:<a href\="http\://en.wikipedia.org/wiki/Key_derivation_function">Wikipedia\:Key derivation function</a>
advanced_1306_td=SHA-256
advanced_1306_td=SHA-256
advanced_1307_td=A cryptographic one-way hash function. See also\:<a href\="http\://en.wikipedia.org/wiki/SHA_family">Wikipedia\:SHA hash functions</a>
advanced_1307_td=A cryptographic one-way hash function. See also\:<a\nhref\="http\://en.wikipedia.org/wiki/SHA_family">Wikipedia\:SHA hash functions</a>
advanced_1308_td=SQL Injection
advanced_1308_td=SQL Injection
advanced_1309_td=A security vulnerability where an application generates SQL statements with embedded user input. See also\:<a href\="http\://en.wikipedia.org/wiki/SQL_injection">Wikipedia\:SQL Injection</a>
advanced_1309_td=A security vulnerability where an application generates SQL statements with embedded user input. See also\:<a\nhref\="http\://en.wikipedia.org/wiki/SQL_injection">Wikipedia\:SQL Injection</a>
advanced_1310_td=Watermark Attack
advanced_1310_td=Watermark Attack
advanced_1311_td=Security problem of certain encryption programs where the existence of certain data can be proven without decrypting. For more information, search in the internet for 'watermark attack cryptoloop'
advanced_1311_td=Security problem of certain encryption programs where the existence of certain data can be proven without decrypting. For more information, search in the internet for 'watermark attack cryptoloop'
advanced_1312_td=SSL/TLS
advanced_1312_td=SSL/TLS
advanced_1313_td=Secure Sockets Layer / Transport Layer Security. See also\:<a href\="http\://java.sun.com/products/jsse/">Java Secure Socket Extension (JSSE)</a>
advanced_1313_td=Secure Sockets Layer / Transport Layer Security. See also\:<a href\="http\://java.sun.com/products/jsse/">Java Secure Socket Extension (JSSE)</a>
advanced_1314_td=XTEA
advanced_1314_td=XTEA
advanced_1315_td=A block encryption algorithm. See also\:<a href\="http\://en.wikipedia.org/wiki/XTEA">Wikipedia\:XTEA</a>
advanced_1315_td=A block encryption algorithm. See also\:<a\nhref\="http\://en.wikipedia.org/wiki/XTEA">Wikipedia\:XTEA</a>