adding GPL
authorVolker Birk <vb@pep-project.org>
Thu, 16 Apr 2015 21:03:44 +0200
changeset 2e902fd924d9b
parent 1 ba35633c2f5c
child 3 a81ac65b3f71
adding GPL
LICENSE.txt
pEpCOMServerAdapter.vcxproj.filters
pEpCOMServerAdapter_i.c
pEpCOMServerAdapter_i.h
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/LICENSE.txt	Thu Apr 16 21:03:44 2015 +0200
     1.3 @@ -0,0 +1,674 @@
     1.4 +                    GNU GENERAL PUBLIC LICENSE
     1.5 +                       Version 3, 29 June 2007
     1.6 +
     1.7 + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
     1.8 + Everyone is permitted to copy and distribute verbatim copies
     1.9 + of this license document, but changing it is not allowed.
    1.10 +
    1.11 +                            Preamble
    1.12 +
    1.13 +  The GNU General Public License is a free, copyleft license for
    1.14 +software and other kinds of works.
    1.15 +
    1.16 +  The licenses for most software and other practical works are designed
    1.17 +to take away your freedom to share and change the works.  By contrast,
    1.18 +the GNU General Public License is intended to guarantee your freedom to
    1.19 +share and change all versions of a program--to make sure it remains free
    1.20 +software for all its users.  We, the Free Software Foundation, use the
    1.21 +GNU General Public License for most of our software; it applies also to
    1.22 +any other work released this way by its authors.  You can apply it to
    1.23 +your programs, too.
    1.24 +
    1.25 +  When we speak of free software, we are referring to freedom, not
    1.26 +price.  Our General Public Licenses are designed to make sure that you
    1.27 +have the freedom to distribute copies of free software (and charge for
    1.28 +them if you wish), that you receive source code or can get it if you
    1.29 +want it, that you can change the software or use pieces of it in new
    1.30 +free programs, and that you know you can do these things.
    1.31 +
    1.32 +  To protect your rights, we need to prevent others from denying you
    1.33 +these rights or asking you to surrender the rights.  Therefore, you have
    1.34 +certain responsibilities if you distribute copies of the software, or if
    1.35 +you modify it: responsibilities to respect the freedom of others.
    1.36 +
    1.37 +  For example, if you distribute copies of such a program, whether
    1.38 +gratis or for a fee, you must pass on to the recipients the same
    1.39 +freedoms that you received.  You must make sure that they, too, receive
    1.40 +or can get the source code.  And you must show them these terms so they
    1.41 +know their rights.
    1.42 +
    1.43 +  Developers that use the GNU GPL protect your rights with two steps:
    1.44 +(1) assert copyright on the software, and (2) offer you this License
    1.45 +giving you legal permission to copy, distribute and/or modify it.
    1.46 +
    1.47 +  For the developers' and authors' protection, the GPL clearly explains
    1.48 +that there is no warranty for this free software.  For both users' and
    1.49 +authors' sake, the GPL requires that modified versions be marked as
    1.50 +changed, so that their problems will not be attributed erroneously to
    1.51 +authors of previous versions.
    1.52 +
    1.53 +  Some devices are designed to deny users access to install or run
    1.54 +modified versions of the software inside them, although the manufacturer
    1.55 +can do so.  This is fundamentally incompatible with the aim of
    1.56 +protecting users' freedom to change the software.  The systematic
    1.57 +pattern of such abuse occurs in the area of products for individuals to
    1.58 +use, which is precisely where it is most unacceptable.  Therefore, we
    1.59 +have designed this version of the GPL to prohibit the practice for those
    1.60 +products.  If such problems arise substantially in other domains, we
    1.61 +stand ready to extend this provision to those domains in future versions
    1.62 +of the GPL, as needed to protect the freedom of users.
    1.63 +
    1.64 +  Finally, every program is threatened constantly by software patents.
    1.65 +States should not allow patents to restrict development and use of
    1.66 +software on general-purpose computers, but in those that do, we wish to
    1.67 +avoid the special danger that patents applied to a free program could
    1.68 +make it effectively proprietary.  To prevent this, the GPL assures that
    1.69 +patents cannot be used to render the program non-free.
    1.70 +
    1.71 +  The precise terms and conditions for copying, distribution and
    1.72 +modification follow.
    1.73 +
    1.74 +                       TERMS AND CONDITIONS
    1.75 +
    1.76 +  0. Definitions.
    1.77 +
    1.78 +  "This License" refers to version 3 of the GNU General Public License.
    1.79 +
    1.80 +  "Copyright" also means copyright-like laws that apply to other kinds of
    1.81 +works, such as semiconductor masks.
    1.82 +
    1.83 +  "The Program" refers to any copyrightable work licensed under this
    1.84 +License.  Each licensee is addressed as "you".  "Licensees" and
    1.85 +"recipients" may be individuals or organizations.
    1.86 +
    1.87 +  To "modify" a work means to copy from or adapt all or part of the work
    1.88 +in a fashion requiring copyright permission, other than the making of an
    1.89 +exact copy.  The resulting work is called a "modified version" of the
    1.90 +earlier work or a work "based on" the earlier work.
    1.91 +
    1.92 +  A "covered work" means either the unmodified Program or a work based
    1.93 +on the Program.
    1.94 +
    1.95 +  To "propagate" a work means to do anything with it that, without
    1.96 +permission, would make you directly or secondarily liable for
    1.97 +infringement under applicable copyright law, except executing it on a
    1.98 +computer or modifying a private copy.  Propagation includes copying,
    1.99 +distribution (with or without modification), making available to the
   1.100 +public, and in some countries other activities as well.
   1.101 +
   1.102 +  To "convey" a work means any kind of propagation that enables other
   1.103 +parties to make or receive copies.  Mere interaction with a user through
   1.104 +a computer network, with no transfer of a copy, is not conveying.
   1.105 +
   1.106 +  An interactive user interface displays "Appropriate Legal Notices"
   1.107 +to the extent that it includes a convenient and prominently visible
   1.108 +feature that (1) displays an appropriate copyright notice, and (2)
   1.109 +tells the user that there is no warranty for the work (except to the
   1.110 +extent that warranties are provided), that licensees may convey the
   1.111 +work under this License, and how to view a copy of this License.  If
   1.112 +the interface presents a list of user commands or options, such as a
   1.113 +menu, a prominent item in the list meets this criterion.
   1.114 +
   1.115 +  1. Source Code.
   1.116 +
   1.117 +  The "source code" for a work means the preferred form of the work
   1.118 +for making modifications to it.  "Object code" means any non-source
   1.119 +form of a work.
   1.120 +
   1.121 +  A "Standard Interface" means an interface that either is an official
   1.122 +standard defined by a recognized standards body, or, in the case of
   1.123 +interfaces specified for a particular programming language, one that
   1.124 +is widely used among developers working in that language.
   1.125 +
   1.126 +  The "System Libraries" of an executable work include anything, other
   1.127 +than the work as a whole, that (a) is included in the normal form of
   1.128 +packaging a Major Component, but which is not part of that Major
   1.129 +Component, and (b) serves only to enable use of the work with that
   1.130 +Major Component, or to implement a Standard Interface for which an
   1.131 +implementation is available to the public in source code form.  A
   1.132 +"Major Component", in this context, means a major essential component
   1.133 +(kernel, window system, and so on) of the specific operating system
   1.134 +(if any) on which the executable work runs, or a compiler used to
   1.135 +produce the work, or an object code interpreter used to run it.
   1.136 +
   1.137 +  The "Corresponding Source" for a work in object code form means all
   1.138 +the source code needed to generate, install, and (for an executable
   1.139 +work) run the object code and to modify the work, including scripts to
   1.140 +control those activities.  However, it does not include the work's
   1.141 +System Libraries, or general-purpose tools or generally available free
   1.142 +programs which are used unmodified in performing those activities but
   1.143 +which are not part of the work.  For example, Corresponding Source
   1.144 +includes interface definition files associated with source files for
   1.145 +the work, and the source code for shared libraries and dynamically
   1.146 +linked subprograms that the work is specifically designed to require,
   1.147 +such as by intimate data communication or control flow between those
   1.148 +subprograms and other parts of the work.
   1.149 +
   1.150 +  The Corresponding Source need not include anything that users
   1.151 +can regenerate automatically from other parts of the Corresponding
   1.152 +Source.
   1.153 +
   1.154 +  The Corresponding Source for a work in source code form is that
   1.155 +same work.
   1.156 +
   1.157 +  2. Basic Permissions.
   1.158 +
   1.159 +  All rights granted under this License are granted for the term of
   1.160 +copyright on the Program, and are irrevocable provided the stated
   1.161 +conditions are met.  This License explicitly affirms your unlimited
   1.162 +permission to run the unmodified Program.  The output from running a
   1.163 +covered work is covered by this License only if the output, given its
   1.164 +content, constitutes a covered work.  This License acknowledges your
   1.165 +rights of fair use or other equivalent, as provided by copyright law.
   1.166 +
   1.167 +  You may make, run and propagate covered works that you do not
   1.168 +convey, without conditions so long as your license otherwise remains
   1.169 +in force.  You may convey covered works to others for the sole purpose
   1.170 +of having them make modifications exclusively for you, or provide you
   1.171 +with facilities for running those works, provided that you comply with
   1.172 +the terms of this License in conveying all material for which you do
   1.173 +not control copyright.  Those thus making or running the covered works
   1.174 +for you must do so exclusively on your behalf, under your direction
   1.175 +and control, on terms that prohibit them from making any copies of
   1.176 +your copyrighted material outside their relationship with you.
   1.177 +
   1.178 +  Conveying under any other circumstances is permitted solely under
   1.179 +the conditions stated below.  Sublicensing is not allowed; section 10
   1.180 +makes it unnecessary.
   1.181 +
   1.182 +  3. Protecting Users' Legal Rights From Anti-Circumvention Law.
   1.183 +
   1.184 +  No covered work shall be deemed part of an effective technological
   1.185 +measure under any applicable law fulfilling obligations under article
   1.186 +11 of the WIPO copyright treaty adopted on 20 December 1996, or
   1.187 +similar laws prohibiting or restricting circumvention of such
   1.188 +measures.
   1.189 +
   1.190 +  When you convey a covered work, you waive any legal power to forbid
   1.191 +circumvention of technological measures to the extent such circumvention
   1.192 +is effected by exercising rights under this License with respect to
   1.193 +the covered work, and you disclaim any intention to limit operation or
   1.194 +modification of the work as a means of enforcing, against the work's
   1.195 +users, your or third parties' legal rights to forbid circumvention of
   1.196 +technological measures.
   1.197 +
   1.198 +  4. Conveying Verbatim Copies.
   1.199 +
   1.200 +  You may convey verbatim copies of the Program's source code as you
   1.201 +receive it, in any medium, provided that you conspicuously and
   1.202 +appropriately publish on each copy an appropriate copyright notice;
   1.203 +keep intact all notices stating that this License and any
   1.204 +non-permissive terms added in accord with section 7 apply to the code;
   1.205 +keep intact all notices of the absence of any warranty; and give all
   1.206 +recipients a copy of this License along with the Program.
   1.207 +
   1.208 +  You may charge any price or no price for each copy that you convey,
   1.209 +and you may offer support or warranty protection for a fee.
   1.210 +
   1.211 +  5. Conveying Modified Source Versions.
   1.212 +
   1.213 +  You may convey a work based on the Program, or the modifications to
   1.214 +produce it from the Program, in the form of source code under the
   1.215 +terms of section 4, provided that you also meet all of these conditions:
   1.216 +
   1.217 +    a) The work must carry prominent notices stating that you modified
   1.218 +    it, and giving a relevant date.
   1.219 +
   1.220 +    b) The work must carry prominent notices stating that it is
   1.221 +    released under this License and any conditions added under section
   1.222 +    7.  This requirement modifies the requirement in section 4 to
   1.223 +    "keep intact all notices".
   1.224 +
   1.225 +    c) You must license the entire work, as a whole, under this
   1.226 +    License to anyone who comes into possession of a copy.  This
   1.227 +    License will therefore apply, along with any applicable section 7
   1.228 +    additional terms, to the whole of the work, and all its parts,
   1.229 +    regardless of how they are packaged.  This License gives no
   1.230 +    permission to license the work in any other way, but it does not
   1.231 +    invalidate such permission if you have separately received it.
   1.232 +
   1.233 +    d) If the work has interactive user interfaces, each must display
   1.234 +    Appropriate Legal Notices; however, if the Program has interactive
   1.235 +    interfaces that do not display Appropriate Legal Notices, your
   1.236 +    work need not make them do so.
   1.237 +
   1.238 +  A compilation of a covered work with other separate and independent
   1.239 +works, which are not by their nature extensions of the covered work,
   1.240 +and which are not combined with it such as to form a larger program,
   1.241 +in or on a volume of a storage or distribution medium, is called an
   1.242 +"aggregate" if the compilation and its resulting copyright are not
   1.243 +used to limit the access or legal rights of the compilation's users
   1.244 +beyond what the individual works permit.  Inclusion of a covered work
   1.245 +in an aggregate does not cause this License to apply to the other
   1.246 +parts of the aggregate.
   1.247 +
   1.248 +  6. Conveying Non-Source Forms.
   1.249 +
   1.250 +  You may convey a covered work in object code form under the terms
   1.251 +of sections 4 and 5, provided that you also convey the
   1.252 +machine-readable Corresponding Source under the terms of this License,
   1.253 +in one of these ways:
   1.254 +
   1.255 +    a) Convey the object code in, or embodied in, a physical product
   1.256 +    (including a physical distribution medium), accompanied by the
   1.257 +    Corresponding Source fixed on a durable physical medium
   1.258 +    customarily used for software interchange.
   1.259 +
   1.260 +    b) Convey the object code in, or embodied in, a physical product
   1.261 +    (including a physical distribution medium), accompanied by a
   1.262 +    written offer, valid for at least three years and valid for as
   1.263 +    long as you offer spare parts or customer support for that product
   1.264 +    model, to give anyone who possesses the object code either (1) a
   1.265 +    copy of the Corresponding Source for all the software in the
   1.266 +    product that is covered by this License, on a durable physical
   1.267 +    medium customarily used for software interchange, for a price no
   1.268 +    more than your reasonable cost of physically performing this
   1.269 +    conveying of source, or (2) access to copy the
   1.270 +    Corresponding Source from a network server at no charge.
   1.271 +
   1.272 +    c) Convey individual copies of the object code with a copy of the
   1.273 +    written offer to provide the Corresponding Source.  This
   1.274 +    alternative is allowed only occasionally and noncommercially, and
   1.275 +    only if you received the object code with such an offer, in accord
   1.276 +    with subsection 6b.
   1.277 +
   1.278 +    d) Convey the object code by offering access from a designated
   1.279 +    place (gratis or for a charge), and offer equivalent access to the
   1.280 +    Corresponding Source in the same way through the same place at no
   1.281 +    further charge.  You need not require recipients to copy the
   1.282 +    Corresponding Source along with the object code.  If the place to
   1.283 +    copy the object code is a network server, the Corresponding Source
   1.284 +    may be on a different server (operated by you or a third party)
   1.285 +    that supports equivalent copying facilities, provided you maintain
   1.286 +    clear directions next to the object code saying where to find the
   1.287 +    Corresponding Source.  Regardless of what server hosts the
   1.288 +    Corresponding Source, you remain obligated to ensure that it is
   1.289 +    available for as long as needed to satisfy these requirements.
   1.290 +
   1.291 +    e) Convey the object code using peer-to-peer transmission, provided
   1.292 +    you inform other peers where the object code and Corresponding
   1.293 +    Source of the work are being offered to the general public at no
   1.294 +    charge under subsection 6d.
   1.295 +
   1.296 +  A separable portion of the object code, whose source code is excluded
   1.297 +from the Corresponding Source as a System Library, need not be
   1.298 +included in conveying the object code work.
   1.299 +
   1.300 +  A "User Product" is either (1) a "consumer product", which means any
   1.301 +tangible personal property which is normally used for personal, family,
   1.302 +or household purposes, or (2) anything designed or sold for incorporation
   1.303 +into a dwelling.  In determining whether a product is a consumer product,
   1.304 +doubtful cases shall be resolved in favor of coverage.  For a particular
   1.305 +product received by a particular user, "normally used" refers to a
   1.306 +typical or common use of that class of product, regardless of the status
   1.307 +of the particular user or of the way in which the particular user
   1.308 +actually uses, or expects or is expected to use, the product.  A product
   1.309 +is a consumer product regardless of whether the product has substantial
   1.310 +commercial, industrial or non-consumer uses, unless such uses represent
   1.311 +the only significant mode of use of the product.
   1.312 +
   1.313 +  "Installation Information" for a User Product means any methods,
   1.314 +procedures, authorization keys, or other information required to install
   1.315 +and execute modified versions of a covered work in that User Product from
   1.316 +a modified version of its Corresponding Source.  The information must
   1.317 +suffice to ensure that the continued functioning of the modified object
   1.318 +code is in no case prevented or interfered with solely because
   1.319 +modification has been made.
   1.320 +
   1.321 +  If you convey an object code work under this section in, or with, or
   1.322 +specifically for use in, a User Product, and the conveying occurs as
   1.323 +part of a transaction in which the right of possession and use of the
   1.324 +User Product is transferred to the recipient in perpetuity or for a
   1.325 +fixed term (regardless of how the transaction is characterized), the
   1.326 +Corresponding Source conveyed under this section must be accompanied
   1.327 +by the Installation Information.  But this requirement does not apply
   1.328 +if neither you nor any third party retains the ability to install
   1.329 +modified object code on the User Product (for example, the work has
   1.330 +been installed in ROM).
   1.331 +
   1.332 +  The requirement to provide Installation Information does not include a
   1.333 +requirement to continue to provide support service, warranty, or updates
   1.334 +for a work that has been modified or installed by the recipient, or for
   1.335 +the User Product in which it has been modified or installed.  Access to a
   1.336 +network may be denied when the modification itself materially and
   1.337 +adversely affects the operation of the network or violates the rules and
   1.338 +protocols for communication across the network.
   1.339 +
   1.340 +  Corresponding Source conveyed, and Installation Information provided,
   1.341 +in accord with this section must be in a format that is publicly
   1.342 +documented (and with an implementation available to the public in
   1.343 +source code form), and must require no special password or key for
   1.344 +unpacking, reading or copying.
   1.345 +
   1.346 +  7. Additional Terms.
   1.347 +
   1.348 +  "Additional permissions" are terms that supplement the terms of this
   1.349 +License by making exceptions from one or more of its conditions.
   1.350 +Additional permissions that are applicable to the entire Program shall
   1.351 +be treated as though they were included in this License, to the extent
   1.352 +that they are valid under applicable law.  If additional permissions
   1.353 +apply only to part of the Program, that part may be used separately
   1.354 +under those permissions, but the entire Program remains governed by
   1.355 +this License without regard to the additional permissions.
   1.356 +
   1.357 +  When you convey a copy of a covered work, you may at your option
   1.358 +remove any additional permissions from that copy, or from any part of
   1.359 +it.  (Additional permissions may be written to require their own
   1.360 +removal in certain cases when you modify the work.)  You may place
   1.361 +additional permissions on material, added by you to a covered work,
   1.362 +for which you have or can give appropriate copyright permission.
   1.363 +
   1.364 +  Notwithstanding any other provision of this License, for material you
   1.365 +add to a covered work, you may (if authorized by the copyright holders of
   1.366 +that material) supplement the terms of this License with terms:
   1.367 +
   1.368 +    a) Disclaiming warranty or limiting liability differently from the
   1.369 +    terms of sections 15 and 16 of this License; or
   1.370 +
   1.371 +    b) Requiring preservation of specified reasonable legal notices or
   1.372 +    author attributions in that material or in the Appropriate Legal
   1.373 +    Notices displayed by works containing it; or
   1.374 +
   1.375 +    c) Prohibiting misrepresentation of the origin of that material, or
   1.376 +    requiring that modified versions of such material be marked in
   1.377 +    reasonable ways as different from the original version; or
   1.378 +
   1.379 +    d) Limiting the use for publicity purposes of names of licensors or
   1.380 +    authors of the material; or
   1.381 +
   1.382 +    e) Declining to grant rights under trademark law for use of some
   1.383 +    trade names, trademarks, or service marks; or
   1.384 +
   1.385 +    f) Requiring indemnification of licensors and authors of that
   1.386 +    material by anyone who conveys the material (or modified versions of
   1.387 +    it) with contractual assumptions of liability to the recipient, for
   1.388 +    any liability that these contractual assumptions directly impose on
   1.389 +    those licensors and authors.
   1.390 +
   1.391 +  All other non-permissive additional terms are considered "further
   1.392 +restrictions" within the meaning of section 10.  If the Program as you
   1.393 +received it, or any part of it, contains a notice stating that it is
   1.394 +governed by this License along with a term that is a further
   1.395 +restriction, you may remove that term.  If a license document contains
   1.396 +a further restriction but permits relicensing or conveying under this
   1.397 +License, you may add to a covered work material governed by the terms
   1.398 +of that license document, provided that the further restriction does
   1.399 +not survive such relicensing or conveying.
   1.400 +
   1.401 +  If you add terms to a covered work in accord with this section, you
   1.402 +must place, in the relevant source files, a statement of the
   1.403 +additional terms that apply to those files, or a notice indicating
   1.404 +where to find the applicable terms.
   1.405 +
   1.406 +  Additional terms, permissive or non-permissive, may be stated in the
   1.407 +form of a separately written license, or stated as exceptions;
   1.408 +the above requirements apply either way.
   1.409 +
   1.410 +  8. Termination.
   1.411 +
   1.412 +  You may not propagate or modify a covered work except as expressly
   1.413 +provided under this License.  Any attempt otherwise to propagate or
   1.414 +modify it is void, and will automatically terminate your rights under
   1.415 +this License (including any patent licenses granted under the third
   1.416 +paragraph of section 11).
   1.417 +
   1.418 +  However, if you cease all violation of this License, then your
   1.419 +license from a particular copyright holder is reinstated (a)
   1.420 +provisionally, unless and until the copyright holder explicitly and
   1.421 +finally terminates your license, and (b) permanently, if the copyright
   1.422 +holder fails to notify you of the violation by some reasonable means
   1.423 +prior to 60 days after the cessation.
   1.424 +
   1.425 +  Moreover, your license from a particular copyright holder is
   1.426 +reinstated permanently if the copyright holder notifies you of the
   1.427 +violation by some reasonable means, this is the first time you have
   1.428 +received notice of violation of this License (for any work) from that
   1.429 +copyright holder, and you cure the violation prior to 30 days after
   1.430 +your receipt of the notice.
   1.431 +
   1.432 +  Termination of your rights under this section does not terminate the
   1.433 +licenses of parties who have received copies or rights from you under
   1.434 +this License.  If your rights have been terminated and not permanently
   1.435 +reinstated, you do not qualify to receive new licenses for the same
   1.436 +material under section 10.
   1.437 +
   1.438 +  9. Acceptance Not Required for Having Copies.
   1.439 +
   1.440 +  You are not required to accept this License in order to receive or
   1.441 +run a copy of the Program.  Ancillary propagation of a covered work
   1.442 +occurring solely as a consequence of using peer-to-peer transmission
   1.443 +to receive a copy likewise does not require acceptance.  However,
   1.444 +nothing other than this License grants you permission to propagate or
   1.445 +modify any covered work.  These actions infringe copyright if you do
   1.446 +not accept this License.  Therefore, by modifying or propagating a
   1.447 +covered work, you indicate your acceptance of this License to do so.
   1.448 +
   1.449 +  10. Automatic Licensing of Downstream Recipients.
   1.450 +
   1.451 +  Each time you convey a covered work, the recipient automatically
   1.452 +receives a license from the original licensors, to run, modify and
   1.453 +propagate that work, subject to this License.  You are not responsible
   1.454 +for enforcing compliance by third parties with this License.
   1.455 +
   1.456 +  An "entity transaction" is a transaction transferring control of an
   1.457 +organization, or substantially all assets of one, or subdividing an
   1.458 +organization, or merging organizations.  If propagation of a covered
   1.459 +work results from an entity transaction, each party to that
   1.460 +transaction who receives a copy of the work also receives whatever
   1.461 +licenses to the work the party's predecessor in interest had or could
   1.462 +give under the previous paragraph, plus a right to possession of the
   1.463 +Corresponding Source of the work from the predecessor in interest, if
   1.464 +the predecessor has it or can get it with reasonable efforts.
   1.465 +
   1.466 +  You may not impose any further restrictions on the exercise of the
   1.467 +rights granted or affirmed under this License.  For example, you may
   1.468 +not impose a license fee, royalty, or other charge for exercise of
   1.469 +rights granted under this License, and you may not initiate litigation
   1.470 +(including a cross-claim or counterclaim in a lawsuit) alleging that
   1.471 +any patent claim is infringed by making, using, selling, offering for
   1.472 +sale, or importing the Program or any portion of it.
   1.473 +
   1.474 +  11. Patents.
   1.475 +
   1.476 +  A "contributor" is a copyright holder who authorizes use under this
   1.477 +License of the Program or a work on which the Program is based.  The
   1.478 +work thus licensed is called the contributor's "contributor version".
   1.479 +
   1.480 +  A contributor's "essential patent claims" are all patent claims
   1.481 +owned or controlled by the contributor, whether already acquired or
   1.482 +hereafter acquired, that would be infringed by some manner, permitted
   1.483 +by this License, of making, using, or selling its contributor version,
   1.484 +but do not include claims that would be infringed only as a
   1.485 +consequence of further modification of the contributor version.  For
   1.486 +purposes of this definition, "control" includes the right to grant
   1.487 +patent sublicenses in a manner consistent with the requirements of
   1.488 +this License.
   1.489 +
   1.490 +  Each contributor grants you a non-exclusive, worldwide, royalty-free
   1.491 +patent license under the contributor's essential patent claims, to
   1.492 +make, use, sell, offer for sale, import and otherwise run, modify and
   1.493 +propagate the contents of its contributor version.
   1.494 +
   1.495 +  In the following three paragraphs, a "patent license" is any express
   1.496 +agreement or commitment, however denominated, not to enforce a patent
   1.497 +(such as an express permission to practice a patent or covenant not to
   1.498 +sue for patent infringement).  To "grant" such a patent license to a
   1.499 +party means to make such an agreement or commitment not to enforce a
   1.500 +patent against the party.
   1.501 +
   1.502 +  If you convey a covered work, knowingly relying on a patent license,
   1.503 +and the Corresponding Source of the work is not available for anyone
   1.504 +to copy, free of charge and under the terms of this License, through a
   1.505 +publicly available network server or other readily accessible means,
   1.506 +then you must either (1) cause the Corresponding Source to be so
   1.507 +available, or (2) arrange to deprive yourself of the benefit of the
   1.508 +patent license for this particular work, or (3) arrange, in a manner
   1.509 +consistent with the requirements of this License, to extend the patent
   1.510 +license to downstream recipients.  "Knowingly relying" means you have
   1.511 +actual knowledge that, but for the patent license, your conveying the
   1.512 +covered work in a country, or your recipient's use of the covered work
   1.513 +in a country, would infringe one or more identifiable patents in that
   1.514 +country that you have reason to believe are valid.
   1.515 +
   1.516 +  If, pursuant to or in connection with a single transaction or
   1.517 +arrangement, you convey, or propagate by procuring conveyance of, a
   1.518 +covered work, and grant a patent license to some of the parties
   1.519 +receiving the covered work authorizing them to use, propagate, modify
   1.520 +or convey a specific copy of the covered work, then the patent license
   1.521 +you grant is automatically extended to all recipients of the covered
   1.522 +work and works based on it.
   1.523 +
   1.524 +  A patent license is "discriminatory" if it does not include within
   1.525 +the scope of its coverage, prohibits the exercise of, or is
   1.526 +conditioned on the non-exercise of one or more of the rights that are
   1.527 +specifically granted under this License.  You may not convey a covered
   1.528 +work if you are a party to an arrangement with a third party that is
   1.529 +in the business of distributing software, under which you make payment
   1.530 +to the third party based on the extent of your activity of conveying
   1.531 +the work, and under which the third party grants, to any of the
   1.532 +parties who would receive the covered work from you, a discriminatory
   1.533 +patent license (a) in connection with copies of the covered work
   1.534 +conveyed by you (or copies made from those copies), or (b) primarily
   1.535 +for and in connection with specific products or compilations that
   1.536 +contain the covered work, unless you entered into that arrangement,
   1.537 +or that patent license was granted, prior to 28 March 2007.
   1.538 +
   1.539 +  Nothing in this License shall be construed as excluding or limiting
   1.540 +any implied license or other defenses to infringement that may
   1.541 +otherwise be available to you under applicable patent law.
   1.542 +
   1.543 +  12. No Surrender of Others' Freedom.
   1.544 +
   1.545 +  If conditions are imposed on you (whether by court order, agreement or
   1.546 +otherwise) that contradict the conditions of this License, they do not
   1.547 +excuse you from the conditions of this License.  If you cannot convey a
   1.548 +covered work so as to satisfy simultaneously your obligations under this
   1.549 +License and any other pertinent obligations, then as a consequence you may
   1.550 +not convey it at all.  For example, if you agree to terms that obligate you
   1.551 +to collect a royalty for further conveying from those to whom you convey
   1.552 +the Program, the only way you could satisfy both those terms and this
   1.553 +License would be to refrain entirely from conveying the Program.
   1.554 +
   1.555 +  13. Use with the GNU Affero General Public License.
   1.556 +
   1.557 +  Notwithstanding any other provision of this License, you have
   1.558 +permission to link or combine any covered work with a work licensed
   1.559 +under version 3 of the GNU Affero General Public License into a single
   1.560 +combined work, and to convey the resulting work.  The terms of this
   1.561 +License will continue to apply to the part which is the covered work,
   1.562 +but the special requirements of the GNU Affero General Public License,
   1.563 +section 13, concerning interaction through a network will apply to the
   1.564 +combination as such.
   1.565 +
   1.566 +  14. Revised Versions of this License.
   1.567 +
   1.568 +  The Free Software Foundation may publish revised and/or new versions of
   1.569 +the GNU General Public License from time to time.  Such new versions will
   1.570 +be similar in spirit to the present version, but may differ in detail to
   1.571 +address new problems or concerns.
   1.572 +
   1.573 +  Each version is given a distinguishing version number.  If the
   1.574 +Program specifies that a certain numbered version of the GNU General
   1.575 +Public License "or any later version" applies to it, you have the
   1.576 +option of following the terms and conditions either of that numbered
   1.577 +version or of any later version published by the Free Software
   1.578 +Foundation.  If the Program does not specify a version number of the
   1.579 +GNU General Public License, you may choose any version ever published
   1.580 +by the Free Software Foundation.
   1.581 +
   1.582 +  If the Program specifies that a proxy can decide which future
   1.583 +versions of the GNU General Public License can be used, that proxy's
   1.584 +public statement of acceptance of a version permanently authorizes you
   1.585 +to choose that version for the Program.
   1.586 +
   1.587 +  Later license versions may give you additional or different
   1.588 +permissions.  However, no additional obligations are imposed on any
   1.589 +author or copyright holder as a result of your choosing to follow a
   1.590 +later version.
   1.591 +
   1.592 +  15. Disclaimer of Warranty.
   1.593 +
   1.594 +  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
   1.595 +APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
   1.596 +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
   1.597 +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
   1.598 +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
   1.599 +PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
   1.600 +IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
   1.601 +ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
   1.602 +
   1.603 +  16. Limitation of Liability.
   1.604 +
   1.605 +  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
   1.606 +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
   1.607 +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
   1.608 +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
   1.609 +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
   1.610 +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
   1.611 +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
   1.612 +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
   1.613 +SUCH DAMAGES.
   1.614 +
   1.615 +  17. Interpretation of Sections 15 and 16.
   1.616 +
   1.617 +  If the disclaimer of warranty and limitation of liability provided
   1.618 +above cannot be given local legal effect according to their terms,
   1.619 +reviewing courts shall apply local law that most closely approximates
   1.620 +an absolute waiver of all civil liability in connection with the
   1.621 +Program, unless a warranty or assumption of liability accompanies a
   1.622 +copy of the Program in return for a fee.
   1.623 +
   1.624 +                     END OF TERMS AND CONDITIONS
   1.625 +
   1.626 +            How to Apply These Terms to Your New Programs
   1.627 +
   1.628 +  If you develop a new program, and you want it to be of the greatest
   1.629 +possible use to the public, the best way to achieve this is to make it
   1.630 +free software which everyone can redistribute and change under these terms.
   1.631 +
   1.632 +  To do so, attach the following notices to the program.  It is safest
   1.633 +to attach them to the start of each source file to most effectively
   1.634 +state the exclusion of warranty; and each file should have at least
   1.635 +the "copyright" line and a pointer to where the full notice is found.
   1.636 +
   1.637 +    <one line to give the program's name and a brief idea of what it does.>
   1.638 +    Copyright (C) <year>  <name of author>
   1.639 +
   1.640 +    This program is free software: you can redistribute it and/or modify
   1.641 +    it under the terms of the GNU General Public License as published by
   1.642 +    the Free Software Foundation, either version 3 of the License, or
   1.643 +    (at your option) any later version.
   1.644 +
   1.645 +    This program is distributed in the hope that it will be useful,
   1.646 +    but WITHOUT ANY WARRANTY; without even the implied warranty of
   1.647 +    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   1.648 +    GNU General Public License for more details.
   1.649 +
   1.650 +    You should have received a copy of the GNU General Public License
   1.651 +    along with this program.  If not, see <http://www.gnu.org/licenses/>.
   1.652 +
   1.653 +Also add information on how to contact you by electronic and paper mail.
   1.654 +
   1.655 +  If the program does terminal interaction, make it output a short
   1.656 +notice like this when it starts in an interactive mode:
   1.657 +
   1.658 +    <program>  Copyright (C) <year>  <name of author>
   1.659 +    This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
   1.660 +    This is free software, and you are welcome to redistribute it
   1.661 +    under certain conditions; type `show c' for details.
   1.662 +
   1.663 +The hypothetical commands `show w' and `show c' should show the appropriate
   1.664 +parts of the General Public License.  Of course, your program's commands
   1.665 +might be different; for a GUI interface, you would use an "about box".
   1.666 +
   1.667 +  You should also get your employer (if you work as a programmer) or school,
   1.668 +if any, to sign a "copyright disclaimer" for the program, if necessary.
   1.669 +For more information on this, and how to apply and follow the GNU GPL, see
   1.670 +<http://www.gnu.org/licenses/>.
   1.671 +
   1.672 +  The GNU General Public License does not permit incorporating your program
   1.673 +into proprietary programs.  If your program is a subroutine library, you
   1.674 +may consider it more useful to permit linking proprietary applications with
   1.675 +the library.  If this is what you want to do, use the GNU Lesser General
   1.676 +Public License instead of this License.  But first, please read
   1.677 +<http://www.gnu.org/philosophy/why-not-lgpl.html>.
     2.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     2.2 +++ b/pEpCOMServerAdapter.vcxproj.filters	Thu Apr 16 21:03:44 2015 +0200
     2.3 @@ -0,0 +1,91 @@
     2.4 +<?xml version="1.0" encoding="utf-8"?>
     2.5 +<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
     2.6 +  <ItemGroup>
     2.7 +    <Filter Include="Source Files">
     2.8 +      <UniqueIdentifier>{4FC737F1-C7A5-4376-A066-2A32D752A2FF}</UniqueIdentifier>
     2.9 +      <Extensions>cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx</Extensions>
    2.10 +    </Filter>
    2.11 +    <Filter Include="Header Files">
    2.12 +      <UniqueIdentifier>{93995380-89BD-4b04-88EB-625FBE52EBFB}</UniqueIdentifier>
    2.13 +      <Extensions>h;hh;hpp;hxx;hm;inl;inc;xsd</Extensions>
    2.14 +    </Filter>
    2.15 +    <Filter Include="Resource Files">
    2.16 +      <UniqueIdentifier>{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}</UniqueIdentifier>
    2.17 +      <Extensions>rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms</Extensions>
    2.18 +    </Filter>
    2.19 +    <Filter Include="Generated Files">
    2.20 +      <UniqueIdentifier>{22f48b58-6439-4b5e-8bf0-74644ba462ac}</UniqueIdentifier>
    2.21 +      <SourceControlFiles>False</SourceControlFiles>
    2.22 +    </Filter>
    2.23 +  </ItemGroup>
    2.24 +  <ItemGroup>
    2.25 +    <ClCompile Include="stdafx.cpp">
    2.26 +      <Filter>Source Files</Filter>
    2.27 +    </ClCompile>
    2.28 +    <ClCompile Include="pEpCOMServerAdapter.cpp">
    2.29 +      <Filter>Source Files</Filter>
    2.30 +    </ClCompile>
    2.31 +    <ClCompile Include="xdlldata.c">
    2.32 +      <Filter>Source Files</Filter>
    2.33 +    </ClCompile>
    2.34 +    <ClCompile Include="pEpCOMServerAdapter_i.c">
    2.35 +      <Filter>Generated Files</Filter>
    2.36 +    </ClCompile>
    2.37 +    <ClCompile Include="CpEpEngine.cpp">
    2.38 +      <Filter>Source Files</Filter>
    2.39 +    </ClCompile>
    2.40 +    <ClCompile Include="utf8_helper.cpp">
    2.41 +      <Filter>Source Files</Filter>
    2.42 +    </ClCompile>
    2.43 +  </ItemGroup>
    2.44 +  <ItemGroup>
    2.45 +    <ClInclude Include="stdafx.h">
    2.46 +      <Filter>Header Files</Filter>
    2.47 +    </ClInclude>
    2.48 +    <ClInclude Include="targetver.h">
    2.49 +      <Filter>Header Files</Filter>
    2.50 +    </ClInclude>
    2.51 +    <ClInclude Include="Resource.h">
    2.52 +      <Filter>Header Files</Filter>
    2.53 +    </ClInclude>
    2.54 +    <ClInclude Include="xdlldata.h">
    2.55 +      <Filter>Header Files</Filter>
    2.56 +    </ClInclude>
    2.57 +    <ClInclude Include="pEpCOMServerAdapter_i.h">
    2.58 +      <Filter>Generated Files</Filter>
    2.59 +    </ClInclude>
    2.60 +    <ClInclude Include="CpEpEngine.h">
    2.61 +      <Filter>Header Files</Filter>
    2.62 +    </ClInclude>
    2.63 +    <ClInclude Include="locked_queue.hh">
    2.64 +      <Filter>Header Files</Filter>
    2.65 +    </ClInclude>
    2.66 +    <ClInclude Include="utf8_helper.h">
    2.67 +      <Filter>Header Files</Filter>
    2.68 +    </ClInclude>
    2.69 +    <ClInclude Include="_IpEpEngineEvents_CP.h">
    2.70 +      <Filter>Header Files</Filter>
    2.71 +    </ClInclude>
    2.72 +  </ItemGroup>
    2.73 +  <ItemGroup>
    2.74 +    <ResourceCompile Include="pEpCOMServerAdapter.rc">
    2.75 +      <Filter>Resource Files</Filter>
    2.76 +    </ResourceCompile>
    2.77 +  </ItemGroup>
    2.78 +  <ItemGroup>
    2.79 +    <Text Include="ReadMe.txt" />
    2.80 +  </ItemGroup>
    2.81 +  <ItemGroup>
    2.82 +    <None Include="pEpCOMServerAdapter.rgs">
    2.83 +      <Filter>Resource Files</Filter>
    2.84 +    </None>
    2.85 +    <None Include="pEpEngine.rgs">
    2.86 +      <Filter>Resource Files</Filter>
    2.87 +    </None>
    2.88 +  </ItemGroup>
    2.89 +  <ItemGroup>
    2.90 +    <Midl Include="pEpCOMServerAdapter.idl">
    2.91 +      <Filter>Source Files</Filter>
    2.92 +    </Midl>
    2.93 +  </ItemGroup>
    2.94 +</Project>
    2.95 \ No newline at end of file
     3.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     3.2 +++ b/pEpCOMServerAdapter_i.c	Thu Apr 16 21:03:44 2015 +0200
     3.3 @@ -0,0 +1,88 @@
     3.4 +
     3.5 +
     3.6 +/* this ALWAYS GENERATED file contains the IIDs and CLSIDs */
     3.7 +
     3.8 +/* link this file in with the server and any clients */
     3.9 +
    3.10 +
    3.11 + /* File created by MIDL compiler version 8.00.0603 */
    3.12 +/* at Thu Apr 16 16:43:32 2015
    3.13 + */
    3.14 +/* Compiler settings for pEpCOMServerAdapter.idl:
    3.15 +    Oicf, W1, Zp8, env=Win32 (32b run), target_arch=X86 8.00.0603 
    3.16 +    protocol : dce , ms_ext, c_ext, robust
    3.17 +    error checks: allocation ref bounds_check enum stub_data 
    3.18 +    VC __declspec() decoration level: 
    3.19 +         __declspec(uuid()), __declspec(selectany), __declspec(novtable)
    3.20 +         DECLSPEC_UUID(), MIDL_INTERFACE()
    3.21 +*/
    3.22 +/* @@MIDL_FILE_HEADING(  ) */
    3.23 +
    3.24 +#pragma warning( disable: 4049 )  /* more than 64k source lines */
    3.25 +
    3.26 +
    3.27 +#ifdef __cplusplus
    3.28 +extern "C"{
    3.29 +#endif 
    3.30 +
    3.31 +
    3.32 +#include <rpc.h>
    3.33 +#include <rpcndr.h>
    3.34 +
    3.35 +#ifdef _MIDL_USE_GUIDDEF_
    3.36 +
    3.37 +#ifndef INITGUID
    3.38 +#define INITGUID
    3.39 +#include <guiddef.h>
    3.40 +#undef INITGUID
    3.41 +#else
    3.42 +#include <guiddef.h>
    3.43 +#endif
    3.44 +
    3.45 +#define MIDL_DEFINE_GUID(type,name,l,w1,w2,b1,b2,b3,b4,b5,b6,b7,b8) \
    3.46 +        DEFINE_GUID(name,l,w1,w2,b1,b2,b3,b4,b5,b6,b7,b8)
    3.47 +
    3.48 +#else // !_MIDL_USE_GUIDDEF_
    3.49 +
    3.50 +#ifndef __IID_DEFINED__
    3.51 +#define __IID_DEFINED__
    3.52 +
    3.53 +typedef struct _IID
    3.54 +{
    3.55 +    unsigned long x;
    3.56 +    unsigned short s1;
    3.57 +    unsigned short s2;
    3.58 +    unsigned char  c[8];
    3.59 +} IID;
    3.60 +
    3.61 +#endif // __IID_DEFINED__
    3.62 +
    3.63 +#ifndef CLSID_DEFINED
    3.64 +#define CLSID_DEFINED
    3.65 +typedef IID CLSID;
    3.66 +#endif // CLSID_DEFINED
    3.67 +
    3.68 +#define MIDL_DEFINE_GUID(type,name,l,w1,w2,b1,b2,b3,b4,b5,b6,b7,b8) \
    3.69 +        const type name = {l,w1,w2,{b1,b2,b3,b4,b5,b6,b7,b8}}
    3.70 +
    3.71 +#endif !_MIDL_USE_GUIDDEF_
    3.72 +
    3.73 +MIDL_DEFINE_GUID(IID, IID_IpEpEngine,0x9A9F4422,0xCF0A,0x45D7,0x90,0xCD,0x1D,0x1B,0x7B,0x2A,0x45,0x40);
    3.74 +
    3.75 +
    3.76 +MIDL_DEFINE_GUID(IID, LIBID_pEpCOMServerAdapterLib,0x3EC2E1A4,0x40E8,0x48E4,0xA7,0xB0,0x18,0x76,0xD3,0x4F,0x94,0x62);
    3.77 +
    3.78 +
    3.79 +MIDL_DEFINE_GUID(IID, DIID__IpEpEngineEvents,0xB6BC9B8E,0xD9E2,0x4419,0xA3,0xA4,0x7B,0x4B,0x58,0x17,0x55,0x49);
    3.80 +
    3.81 +
    3.82 +MIDL_DEFINE_GUID(CLSID, CLSID_pEpEngine,0xEF1B073D,0x5058,0x4E0E,0x82,0x9E,0xB4,0xD2,0x2C,0xA2,0x1E,0xA2);
    3.83 +
    3.84 +#undef MIDL_DEFINE_GUID
    3.85 +
    3.86 +#ifdef __cplusplus
    3.87 +}
    3.88 +#endif
    3.89 +
    3.90 +
    3.91 +
     4.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     4.2 +++ b/pEpCOMServerAdapter_i.h	Thu Apr 16 21:03:44 2015 +0200
     4.3 @@ -0,0 +1,644 @@
     4.4 +
     4.5 +
     4.6 +/* this ALWAYS GENERATED file contains the definitions for the interfaces */
     4.7 +
     4.8 +
     4.9 + /* File created by MIDL compiler version 8.00.0603 */
    4.10 +/* at Thu Apr 16 16:43:32 2015
    4.11 + */
    4.12 +/* Compiler settings for pEpCOMServerAdapter.idl:
    4.13 +    Oicf, W1, Zp8, env=Win32 (32b run), target_arch=X86 8.00.0603 
    4.14 +    protocol : dce , ms_ext, c_ext, robust
    4.15 +    error checks: allocation ref bounds_check enum stub_data 
    4.16 +    VC __declspec() decoration level: 
    4.17 +         __declspec(uuid()), __declspec(selectany), __declspec(novtable)
    4.18 +         DECLSPEC_UUID(), MIDL_INTERFACE()
    4.19 +*/
    4.20 +/* @@MIDL_FILE_HEADING(  ) */
    4.21 +
    4.22 +#pragma warning( disable: 4049 )  /* more than 64k source lines */
    4.23 +
    4.24 +
    4.25 +/* verify that the <rpcndr.h> version is high enough to compile this file*/
    4.26 +#ifndef __REQUIRED_RPCNDR_H_VERSION__
    4.27 +#define __REQUIRED_RPCNDR_H_VERSION__ 475
    4.28 +#endif
    4.29 +
    4.30 +#include "rpc.h"
    4.31 +#include "rpcndr.h"
    4.32 +
    4.33 +#ifndef __RPCNDR_H_VERSION__
    4.34 +#error this stub requires an updated version of <rpcndr.h>
    4.35 +#endif // __RPCNDR_H_VERSION__
    4.36 +
    4.37 +#ifndef COM_NO_WINDOWS_H
    4.38 +#include "windows.h"
    4.39 +#include "ole2.h"
    4.40 +#endif /*COM_NO_WINDOWS_H*/
    4.41 +
    4.42 +#ifndef __pEpCOMServerAdapter_i_h__
    4.43 +#define __pEpCOMServerAdapter_i_h__
    4.44 +
    4.45 +#if defined(_MSC_VER) && (_MSC_VER >= 1020)
    4.46 +#pragma once
    4.47 +#endif
    4.48 +
    4.49 +/* Forward Declarations */ 
    4.50 +
    4.51 +#ifndef __IpEpEngine_FWD_DEFINED__
    4.52 +#define __IpEpEngine_FWD_DEFINED__
    4.53 +typedef interface IpEpEngine IpEpEngine;
    4.54 +
    4.55 +#endif 	/* __IpEpEngine_FWD_DEFINED__ */
    4.56 +
    4.57 +
    4.58 +#ifndef ___IpEpEngineEvents_FWD_DEFINED__
    4.59 +#define ___IpEpEngineEvents_FWD_DEFINED__
    4.60 +typedef interface _IpEpEngineEvents _IpEpEngineEvents;
    4.61 +
    4.62 +#endif 	/* ___IpEpEngineEvents_FWD_DEFINED__ */
    4.63 +
    4.64 +
    4.65 +#ifndef __pEpEngine_FWD_DEFINED__
    4.66 +#define __pEpEngine_FWD_DEFINED__
    4.67 +
    4.68 +#ifdef __cplusplus
    4.69 +typedef class pEpEngine pEpEngine;
    4.70 +#else
    4.71 +typedef struct pEpEngine pEpEngine;
    4.72 +#endif /* __cplusplus */
    4.73 +
    4.74 +#endif 	/* __pEpEngine_FWD_DEFINED__ */
    4.75 +
    4.76 +
    4.77 +/* header files for imported files */
    4.78 +#include "oaidl.h"
    4.79 +#include "ocidl.h"
    4.80 +
    4.81 +#ifdef __cplusplus
    4.82 +extern "C"{
    4.83 +#endif 
    4.84 +
    4.85 +
    4.86 +#ifndef __IpEpEngine_INTERFACE_DEFINED__
    4.87 +#define __IpEpEngine_INTERFACE_DEFINED__
    4.88 +
    4.89 +/* interface IpEpEngine */
    4.90 +/* [unique][nonextensible][oleautomation][uuid][object] */ 
    4.91 +
    4.92 +typedef 
    4.93 +enum _pEp_STATUS
    4.94 +    {
    4.95 +        pEp_STATUS_OK	= 0,
    4.96 +        pEp_KEY_NOT_FOUND	= 0x201,
    4.97 +        pEp_KEY_HAS_AMBIG_NAME	= 0x202,
    4.98 +        pEp_GET_KEY_FAILED	= 0x203,
    4.99 +        pEp_UNENCRYPTED	= 0x400,
   4.100 +        pEp_VERIFIED	= 0x401,
   4.101 +        pEp_DECRYPTED	= 0x402,
   4.102 +        pEp_DECRYPTED_AND_VERIFIED	= 0x403,
   4.103 +        pEp_DECRYPT_WRONG_FORMAT	= 0x404,
   4.104 +        pEp_DECRYPT_NO_KEY	= 0x405,
   4.105 +        pEp_DECRYPT_SIGNATURE_DOES_NOT_MATCH	= 0x406,
   4.106 +        pEp_VERIFY_NO_KEY	= 0x407,
   4.107 +        pEp_VERIFIED_AND_TRUSTED	= 0x408,
   4.108 +        pEp_ILLEGAL_VALUE	= -4,
   4.109 +        pEp_BUFFER_TOO_SMALL	= -3,
   4.110 +        pEp_OUT_OF_MEMORY	= -2,
   4.111 +        pEp_UNKNOWN_ERROR	= -1
   4.112 +    } 	pEp_STATUS;
   4.113 +
   4.114 +typedef 
   4.115 +enum _pEp_comm_type
   4.116 +    {
   4.117 +        pEp_ct_unknown	= 0,
   4.118 +        pEp_ct_no_encryption	= 0x1,
   4.119 +        pEp_ct_no_encrypted_channel	= 0x2,
   4.120 +        pEp_ct_key_not_found	= 0x3,
   4.121 +        pEp_ct_key_expired	= 0x4,
   4.122 +        pEp_ct_key_revoked	= 0x5,
   4.123 +        pEp_ct_key_b0rken	= 0x6,
   4.124 +        pEp_ct_my_key_not_included	= 0x9,
   4.125 +        pEp_ct_security_by_obscurity	= 0xa,
   4.126 +        pEp_ct_b0rken_crypto	= 0xb,
   4.127 +        pEp_ct_key_too_short	= 0xe,
   4.128 +        pEp_ct_compromized	= 0xf,
   4.129 +        pEp_ct_unconfirmed_encryption	= 0x10,
   4.130 +        pEp_ct_OpenPGP_1024_RSA_unconfirmed	= 0x11,
   4.131 +        pEp_ct_OpenPGP_unconfirmed	= 0x3f,
   4.132 +        pEp_ct_unconfirmed_enc_anon	= 0x40,
   4.133 +        pEp_ct_pEp_unconfirmed	= 0x7f,
   4.134 +        pEp_ct_confirmed	= 0x80,
   4.135 +        pEp_ct_confirmed_encryption	= 0x90,
   4.136 +        pEp_ct_OpenPGP_1024_RSA	= 0x91,
   4.137 +        pEp_ct_OpenPGP	= 0xbf,
   4.138 +        pEp_ct_confirmed_enc_anon	= 0xc0,
   4.139 +        pEp_ct_pEp	= 0xff
   4.140 +    } 	pEp_comm_type;
   4.141 +
   4.142 +struct pEp_identity_s
   4.143 +    {
   4.144 +    BSTR address;
   4.145 +    BSTR fpr;
   4.146 +    BSTR user_id;
   4.147 +    BSTR username;
   4.148 +    pEp_comm_type comm_type;
   4.149 +    BSTR lang;
   4.150 +    } ;
   4.151 +
   4.152 +EXTERN_C const IID IID_IpEpEngine;
   4.153 +
   4.154 +#if defined(__cplusplus) && !defined(CINTERFACE)
   4.155 +    
   4.156 +    MIDL_INTERFACE("9A9F4422-CF0A-45D7-90CD-1D1B7B2A4540")
   4.157 +    IpEpEngine : public IUnknown
   4.158 +    {
   4.159 +    public:
   4.160 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE log( 
   4.161 +            /* [in] */ BSTR title,
   4.162 +            /* [in] */ BSTR entity,
   4.163 +            /* [defaultvalue][in] */ BSTR description = L"",
   4.164 +            /* [defaultvalue][in] */ BSTR comment = L"") = 0;
   4.165 +        
   4.166 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE decrypt( 
   4.167 +            /* [in] */ BSTR ctext,
   4.168 +            /* [out] */ BSTR *ptext,
   4.169 +            /* [out] */ SAFEARRAY * *key_list,
   4.170 +            /* [retval][out] */ pEp_STATUS *decrypt_status) = 0;
   4.171 +        
   4.172 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE decrypt_b( 
   4.173 +            /* [in] */ BSTR ctext,
   4.174 +            /* [out] */ SAFEARRAY * *ptext,
   4.175 +            /* [out] */ SAFEARRAY * *key_list,
   4.176 +            /* [retval][out] */ pEp_STATUS *decrypt_status) = 0;
   4.177 +        
   4.178 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE encrypt( 
   4.179 +            /* [in] */ SAFEARRAY * key_list,
   4.180 +            /* [in] */ BSTR ptext,
   4.181 +            /* [out] */ BSTR *ctext,
   4.182 +            /* [retval][out] */ pEp_STATUS *status) = 0;
   4.183 +        
   4.184 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE encrypt_b( 
   4.185 +            /* [in] */ SAFEARRAY * key_list,
   4.186 +            /* [in] */ SAFEARRAY * ptext,
   4.187 +            /* [out] */ BSTR *ctext,
   4.188 +            /* [retval][out] */ pEp_STATUS *status) = 0;
   4.189 +        
   4.190 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE verify( 
   4.191 +            /* [in] */ BSTR text,
   4.192 +            /* [in] */ BSTR signature,
   4.193 +            /* [out] */ SAFEARRAY * *key_list,
   4.194 +            /* [retval][out] */ pEp_STATUS *verify_status) = 0;
   4.195 +        
   4.196 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE safeword( 
   4.197 +            /* [in] */ LONG value,
   4.198 +            /* [defaultvalue][in] */ BSTR lang,
   4.199 +            /* [retval][out] */ BSTR *word) = 0;
   4.200 +        
   4.201 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE safewords( 
   4.202 +            /* [in] */ BSTR fpr,
   4.203 +            /* [defaultvalue][in] */ BSTR lang,
   4.204 +            /* [defaultvalue][in] */ LONG max_words,
   4.205 +            /* [retval][out] */ BSTR *words) = 0;
   4.206 +        
   4.207 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE get_identity( 
   4.208 +            /* [in] */ BSTR address,
   4.209 +            /* [retval][out] */ struct pEp_identity_s *ident) = 0;
   4.210 +        
   4.211 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE set_identity( 
   4.212 +            /* [in] */ struct pEp_identity_s *ident) = 0;
   4.213 +        
   4.214 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE generate_keypair( 
   4.215 +            /* [in] */ struct pEp_identity_s *ident,
   4.216 +            /* [retval][out] */ BSTR *fpr) = 0;
   4.217 +        
   4.218 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE delete_keypair( 
   4.219 +            /* [in] */ BSTR fpr) = 0;
   4.220 +        
   4.221 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE import_key( 
   4.222 +            /* [in] */ BSTR key_data) = 0;
   4.223 +        
   4.224 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE import_key_b( 
   4.225 +            /* [in] */ SAFEARRAY * key_data) = 0;
   4.226 +        
   4.227 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE export_key( 
   4.228 +            /* [in] */ BSTR fpr,
   4.229 +            /* [retval][out] */ BSTR *key_data) = 0;
   4.230 +        
   4.231 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE recv_key( 
   4.232 +            /* [in] */ BSTR pattern) = 0;
   4.233 +        
   4.234 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE find_keys( 
   4.235 +            /* [in] */ BSTR pattern,
   4.236 +            /* [retval][out] */ SAFEARRAY * *key_list) = 0;
   4.237 +        
   4.238 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE send_key( 
   4.239 +            /* [in] */ BSTR pattern) = 0;
   4.240 +        
   4.241 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE examine_identity( 
   4.242 +            /* [in] */ struct pEp_identity_s *ident) = 0;
   4.243 +        
   4.244 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE examine_myself( 
   4.245 +            /* [in] */ struct pEp_identity_s *myself) = 0;
   4.246 +        
   4.247 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE myself( 
   4.248 +            /* [in] */ struct pEp_identity_s *ident,
   4.249 +            /* [retval][out] */ struct pEp_identity_s *result) = 0;
   4.250 +        
   4.251 +        virtual /* [id] */ HRESULT STDMETHODCALLTYPE update_identity( 
   4.252 +            /* [in] */ struct pEp_identity_s *ident,
   4.253 +            /* [retval][out] */ struct pEp_identity_s *result) = 0;
   4.254 +        
   4.255 +    };
   4.256 +    
   4.257 +    
   4.258 +#else 	/* C style interface */
   4.259 +
   4.260 +    typedef struct IpEpEngineVtbl
   4.261 +    {
   4.262 +        BEGIN_INTERFACE
   4.263 +        
   4.264 +        HRESULT ( STDMETHODCALLTYPE *QueryInterface )( 
   4.265 +            IpEpEngine * This,
   4.266 +            /* [in] */ REFIID riid,
   4.267 +            /* [annotation][iid_is][out] */ 
   4.268 +            _COM_Outptr_  void **ppvObject);
   4.269 +        
   4.270 +        ULONG ( STDMETHODCALLTYPE *AddRef )( 
   4.271 +            IpEpEngine * This);
   4.272 +        
   4.273 +        ULONG ( STDMETHODCALLTYPE *Release )( 
   4.274 +            IpEpEngine * This);
   4.275 +        
   4.276 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *log )( 
   4.277 +            IpEpEngine * This,
   4.278 +            /* [in] */ BSTR title,
   4.279 +            /* [in] */ BSTR entity,
   4.280 +            /* [defaultvalue][in] */ BSTR description,
   4.281 +            /* [defaultvalue][in] */ BSTR comment);
   4.282 +        
   4.283 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *decrypt )( 
   4.284 +            IpEpEngine * This,
   4.285 +            /* [in] */ BSTR ctext,
   4.286 +            /* [out] */ BSTR *ptext,
   4.287 +            /* [out] */ SAFEARRAY * *key_list,
   4.288 +            /* [retval][out] */ pEp_STATUS *decrypt_status);
   4.289 +        
   4.290 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *decrypt_b )( 
   4.291 +            IpEpEngine * This,
   4.292 +            /* [in] */ BSTR ctext,
   4.293 +            /* [out] */ SAFEARRAY * *ptext,
   4.294 +            /* [out] */ SAFEARRAY * *key_list,
   4.295 +            /* [retval][out] */ pEp_STATUS *decrypt_status);
   4.296 +        
   4.297 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *encrypt )( 
   4.298 +            IpEpEngine * This,
   4.299 +            /* [in] */ SAFEARRAY * key_list,
   4.300 +            /* [in] */ BSTR ptext,
   4.301 +            /* [out] */ BSTR *ctext,
   4.302 +            /* [retval][out] */ pEp_STATUS *status);
   4.303 +        
   4.304 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *encrypt_b )( 
   4.305 +            IpEpEngine * This,
   4.306 +            /* [in] */ SAFEARRAY * key_list,
   4.307 +            /* [in] */ SAFEARRAY * ptext,
   4.308 +            /* [out] */ BSTR *ctext,
   4.309 +            /* [retval][out] */ pEp_STATUS *status);
   4.310 +        
   4.311 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *verify )( 
   4.312 +            IpEpEngine * This,
   4.313 +            /* [in] */ BSTR text,
   4.314 +            /* [in] */ BSTR signature,
   4.315 +            /* [out] */ SAFEARRAY * *key_list,
   4.316 +            /* [retval][out] */ pEp_STATUS *verify_status);
   4.317 +        
   4.318 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *safeword )( 
   4.319 +            IpEpEngine * This,
   4.320 +            /* [in] */ LONG value,
   4.321 +            /* [defaultvalue][in] */ BSTR lang,
   4.322 +            /* [retval][out] */ BSTR *word);
   4.323 +        
   4.324 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *safewords )( 
   4.325 +            IpEpEngine * This,
   4.326 +            /* [in] */ BSTR fpr,
   4.327 +            /* [defaultvalue][in] */ BSTR lang,
   4.328 +            /* [defaultvalue][in] */ LONG max_words,
   4.329 +            /* [retval][out] */ BSTR *words);
   4.330 +        
   4.331 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *get_identity )( 
   4.332 +            IpEpEngine * This,
   4.333 +            /* [in] */ BSTR address,
   4.334 +            /* [retval][out] */ struct pEp_identity_s *ident);
   4.335 +        
   4.336 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *set_identity )( 
   4.337 +            IpEpEngine * This,
   4.338 +            /* [in] */ struct pEp_identity_s *ident);
   4.339 +        
   4.340 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *generate_keypair )( 
   4.341 +            IpEpEngine * This,
   4.342 +            /* [in] */ struct pEp_identity_s *ident,
   4.343 +            /* [retval][out] */ BSTR *fpr);
   4.344 +        
   4.345 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *delete_keypair )( 
   4.346 +            IpEpEngine * This,
   4.347 +            /* [in] */ BSTR fpr);
   4.348 +        
   4.349 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *import_key )( 
   4.350 +            IpEpEngine * This,
   4.351 +            /* [in] */ BSTR key_data);
   4.352 +        
   4.353 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *import_key_b )( 
   4.354 +            IpEpEngine * This,
   4.355 +            /* [in] */ SAFEARRAY * key_data);
   4.356 +        
   4.357 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *export_key )( 
   4.358 +            IpEpEngine * This,
   4.359 +            /* [in] */ BSTR fpr,
   4.360 +            /* [retval][out] */ BSTR *key_data);
   4.361 +        
   4.362 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *recv_key )( 
   4.363 +            IpEpEngine * This,
   4.364 +            /* [in] */ BSTR pattern);
   4.365 +        
   4.366 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *find_keys )( 
   4.367 +            IpEpEngine * This,
   4.368 +            /* [in] */ BSTR pattern,
   4.369 +            /* [retval][out] */ SAFEARRAY * *key_list);
   4.370 +        
   4.371 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *send_key )( 
   4.372 +            IpEpEngine * This,
   4.373 +            /* [in] */ BSTR pattern);
   4.374 +        
   4.375 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *examine_identity )( 
   4.376 +            IpEpEngine * This,
   4.377 +            /* [in] */ struct pEp_identity_s *ident);
   4.378 +        
   4.379 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *examine_myself )( 
   4.380 +            IpEpEngine * This,
   4.381 +            /* [in] */ struct pEp_identity_s *myself);
   4.382 +        
   4.383 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *myself )( 
   4.384 +            IpEpEngine * This,
   4.385 +            /* [in] */ struct pEp_identity_s *ident,
   4.386 +            /* [retval][out] */ struct pEp_identity_s *result);
   4.387 +        
   4.388 +        /* [id] */ HRESULT ( STDMETHODCALLTYPE *update_identity )( 
   4.389 +            IpEpEngine * This,
   4.390 +            /* [in] */ struct pEp_identity_s *ident,
   4.391 +            /* [retval][out] */ struct pEp_identity_s *result);
   4.392 +        
   4.393 +        END_INTERFACE
   4.394 +    } IpEpEngineVtbl;
   4.395 +
   4.396 +    interface IpEpEngine
   4.397 +    {
   4.398 +        CONST_VTBL struct IpEpEngineVtbl *lpVtbl;
   4.399 +    };
   4.400 +
   4.401 +    
   4.402 +
   4.403 +#ifdef COBJMACROS
   4.404 +
   4.405 +
   4.406 +#define IpEpEngine_QueryInterface(This,riid,ppvObject)	\
   4.407 +    ( (This)->lpVtbl -> QueryInterface(This,riid,ppvObject) ) 
   4.408 +
   4.409 +#define IpEpEngine_AddRef(This)	\
   4.410 +    ( (This)->lpVtbl -> AddRef(This) ) 
   4.411 +
   4.412 +#define IpEpEngine_Release(This)	\
   4.413 +    ( (This)->lpVtbl -> Release(This) ) 
   4.414 +
   4.415 +
   4.416 +#define IpEpEngine_log(This,title,entity,description,comment)	\
   4.417 +    ( (This)->lpVtbl -> log(This,title,entity,description,comment) ) 
   4.418 +
   4.419 +#define IpEpEngine_decrypt(This,ctext,ptext,key_list,decrypt_status)	\
   4.420 +    ( (This)->lpVtbl -> decrypt(This,ctext,ptext,key_list,decrypt_status) ) 
   4.421 +
   4.422 +#define IpEpEngine_decrypt_b(This,ctext,ptext,key_list,decrypt_status)	\
   4.423 +    ( (This)->lpVtbl -> decrypt_b(This,ctext,ptext,key_list,decrypt_status) ) 
   4.424 +
   4.425 +#define IpEpEngine_encrypt(This,key_list,ptext,ctext,status)	\
   4.426 +    ( (This)->lpVtbl -> encrypt(This,key_list,ptext,ctext,status) ) 
   4.427 +
   4.428 +#define IpEpEngine_encrypt_b(This,key_list,ptext,ctext,status)	\
   4.429 +    ( (This)->lpVtbl -> encrypt_b(This,key_list,ptext,ctext,status) ) 
   4.430 +
   4.431 +#define IpEpEngine_verify(This,text,signature,key_list,verify_status)	\
   4.432 +    ( (This)->lpVtbl -> verify(This,text,signature,key_list,verify_status) ) 
   4.433 +
   4.434 +#define IpEpEngine_safeword(This,value,lang,word)	\
   4.435 +    ( (This)->lpVtbl -> safeword(This,value,lang,word) ) 
   4.436 +
   4.437 +#define IpEpEngine_safewords(This,fpr,lang,max_words,words)	\
   4.438 +    ( (This)->lpVtbl -> safewords(This,fpr,lang,max_words,words) ) 
   4.439 +
   4.440 +#define IpEpEngine_get_identity(This,address,ident)	\
   4.441 +    ( (This)->lpVtbl -> get_identity(This,address,ident) ) 
   4.442 +
   4.443 +#define IpEpEngine_set_identity(This,ident)	\
   4.444 +    ( (This)->lpVtbl -> set_identity(This,ident) ) 
   4.445 +
   4.446 +#define IpEpEngine_generate_keypair(This,ident,fpr)	\
   4.447 +    ( (This)->lpVtbl -> generate_keypair(This,ident,fpr) ) 
   4.448 +
   4.449 +#define IpEpEngine_delete_keypair(This,fpr)	\
   4.450 +    ( (This)->lpVtbl -> delete_keypair(This,fpr) ) 
   4.451 +
   4.452 +#define IpEpEngine_import_key(This,key_data)	\
   4.453 +    ( (This)->lpVtbl -> import_key(This,key_data) ) 
   4.454 +
   4.455 +#define IpEpEngine_import_key_b(This,key_data)	\
   4.456 +    ( (This)->lpVtbl -> import_key_b(This,key_data) ) 
   4.457 +
   4.458 +#define IpEpEngine_export_key(This,fpr,key_data)	\
   4.459 +    ( (This)->lpVtbl -> export_key(This,fpr,key_data) ) 
   4.460 +
   4.461 +#define IpEpEngine_recv_key(This,pattern)	\
   4.462 +    ( (This)->lpVtbl -> recv_key(This,pattern) ) 
   4.463 +
   4.464 +#define IpEpEngine_find_keys(This,pattern,key_list)	\
   4.465 +    ( (This)->lpVtbl -> find_keys(This,pattern,key_list) ) 
   4.466 +
   4.467 +#define IpEpEngine_send_key(This,pattern)	\
   4.468 +    ( (This)->lpVtbl -> send_key(This,pattern) ) 
   4.469 +
   4.470 +#define IpEpEngine_examine_identity(This,ident)	\
   4.471 +    ( (This)->lpVtbl -> examine_identity(This,ident) ) 
   4.472 +
   4.473 +#define IpEpEngine_examine_myself(This,myself)	\
   4.474 +    ( (This)->lpVtbl -> examine_myself(This,myself) ) 
   4.475 +
   4.476 +#define IpEpEngine_myself(This,ident,result)	\
   4.477 +    ( (This)->lpVtbl -> myself(This,ident,result) ) 
   4.478 +
   4.479 +#define IpEpEngine_update_identity(This,ident,result)	\
   4.480 +    ( (This)->lpVtbl -> update_identity(This,ident,result) ) 
   4.481 +
   4.482 +#endif /* COBJMACROS */
   4.483 +
   4.484 +
   4.485 +#endif 	/* C style interface */
   4.486 +
   4.487 +
   4.488 +
   4.489 +
   4.490 +#endif 	/* __IpEpEngine_INTERFACE_DEFINED__ */
   4.491 +
   4.492 +
   4.493 +
   4.494 +#ifndef __pEpCOMServerAdapterLib_LIBRARY_DEFINED__
   4.495 +#define __pEpCOMServerAdapterLib_LIBRARY_DEFINED__
   4.496 +
   4.497 +/* library pEpCOMServerAdapterLib */
   4.498 +/* [version][uuid] */ 
   4.499 +
   4.500 +
   4.501 +EXTERN_C const IID LIBID_pEpCOMServerAdapterLib;
   4.502 +
   4.503 +#ifndef ___IpEpEngineEvents_DISPINTERFACE_DEFINED__
   4.504 +#define ___IpEpEngineEvents_DISPINTERFACE_DEFINED__
   4.505 +
   4.506 +/* dispinterface _IpEpEngineEvents */
   4.507 +/* [uuid] */ 
   4.508 +
   4.509 +
   4.510 +EXTERN_C const IID DIID__IpEpEngineEvents;
   4.511 +
   4.512 +#if defined(__cplusplus) && !defined(CINTERFACE)
   4.513 +
   4.514 +    MIDL_INTERFACE("B6BC9B8E-D9E2-4419-A3A4-7B4B58175549")
   4.515 +    _IpEpEngineEvents : public IDispatch
   4.516 +    {
   4.517 +    };
   4.518 +    
   4.519 +#else 	/* C style interface */
   4.520 +
   4.521 +    typedef struct _IpEpEngineEventsVtbl
   4.522 +    {
   4.523 +        BEGIN_INTERFACE
   4.524 +        
   4.525 +        HRESULT ( STDMETHODCALLTYPE *QueryInterface )( 
   4.526 +            _IpEpEngineEvents * This,
   4.527 +            /* [in] */ REFIID riid,
   4.528 +            /* [annotation][iid_is][out] */ 
   4.529 +            _COM_Outptr_  void **ppvObject);
   4.530 +        
   4.531 +        ULONG ( STDMETHODCALLTYPE *AddRef )( 
   4.532 +            _IpEpEngineEvents * This);
   4.533 +        
   4.534 +        ULONG ( STDMETHODCALLTYPE *Release )( 
   4.535 +            _IpEpEngineEvents * This);
   4.536 +        
   4.537 +        HRESULT ( STDMETHODCALLTYPE *GetTypeInfoCount )( 
   4.538 +            _IpEpEngineEvents * This,
   4.539 +            /* [out] */ UINT *pctinfo);
   4.540 +        
   4.541 +        HRESULT ( STDMETHODCALLTYPE *GetTypeInfo )( 
   4.542 +            _IpEpEngineEvents * This,
   4.543 +            /* [in] */ UINT iTInfo,
   4.544 +            /* [in] */ LCID lcid,
   4.545 +            /* [out] */ ITypeInfo **ppTInfo);
   4.546 +        
   4.547 +        HRESULT ( STDMETHODCALLTYPE *GetIDsOfNames )( 
   4.548 +            _IpEpEngineEvents * This,
   4.549 +            /* [in] */ REFIID riid,
   4.550 +            /* [size_is][in] */ LPOLESTR *rgszNames,
   4.551 +            /* [range][in] */ UINT cNames,
   4.552 +            /* [in] */ LCID lcid,
   4.553 +            /* [size_is][out] */ DISPID *rgDispId);
   4.554 +        
   4.555 +        /* [local] */ HRESULT ( STDMETHODCALLTYPE *Invoke )( 
   4.556 +            _IpEpEngineEvents * This,
   4.557 +            /* [annotation][in] */ 
   4.558 +            _In_  DISPID dispIdMember,
   4.559 +            /* [annotation][in] */ 
   4.560 +            _In_  REFIID riid,
   4.561 +            /* [annotation][in] */ 
   4.562 +            _In_  LCID lcid,
   4.563 +            /* [annotation][in] */ 
   4.564 +            _In_  WORD wFlags,
   4.565 +            /* [annotation][out][in] */ 
   4.566 +            _In_  DISPPARAMS *pDispParams,
   4.567 +            /* [annotation][out] */ 
   4.568 +            _Out_opt_  VARIANT *pVarResult,
   4.569 +            /* [annotation][out] */ 
   4.570 +            _Out_opt_  EXCEPINFO *pExcepInfo,
   4.571 +            /* [annotation][out] */ 
   4.572 +            _Out_opt_  UINT *puArgErr);
   4.573 +        
   4.574 +        END_INTERFACE
   4.575 +    } _IpEpEngineEventsVtbl;
   4.576 +
   4.577 +    interface _IpEpEngineEvents
   4.578 +    {
   4.579 +        CONST_VTBL struct _IpEpEngineEventsVtbl *lpVtbl;
   4.580 +    };
   4.581 +
   4.582 +    
   4.583 +
   4.584 +#ifdef COBJMACROS
   4.585 +
   4.586 +
   4.587 +#define _IpEpEngineEvents_QueryInterface(This,riid,ppvObject)	\
   4.588 +    ( (This)->lpVtbl -> QueryInterface(This,riid,ppvObject) ) 
   4.589 +
   4.590 +#define _IpEpEngineEvents_AddRef(This)	\
   4.591 +    ( (This)->lpVtbl -> AddRef(This) ) 
   4.592 +
   4.593 +#define _IpEpEngineEvents_Release(This)	\
   4.594 +    ( (This)->lpVtbl -> Release(This) ) 
   4.595 +
   4.596 +
   4.597 +#define _IpEpEngineEvents_GetTypeInfoCount(This,pctinfo)	\
   4.598 +    ( (This)->lpVtbl -> GetTypeInfoCount(This,pctinfo) ) 
   4.599 +
   4.600 +#define _IpEpEngineEvents_GetTypeInfo(This,iTInfo,lcid,ppTInfo)	\
   4.601 +    ( (This)->lpVtbl -> GetTypeInfo(This,iTInfo,lcid,ppTInfo) ) 
   4.602 +
   4.603 +#define _IpEpEngineEvents_GetIDsOfNames(This,riid,rgszNames,cNames,lcid,rgDispId)	\
   4.604 +    ( (This)->lpVtbl -> GetIDsOfNames(This,riid,rgszNames,cNames,lcid,rgDispId) ) 
   4.605 +
   4.606 +#define _IpEpEngineEvents_Invoke(This,dispIdMember,riid,lcid,wFlags,pDispParams,pVarResult,pExcepInfo,puArgErr)	\
   4.607 +    ( (This)->lpVtbl -> Invoke(This,dispIdMember,riid,lcid,wFlags,pDispParams,pVarResult,pExcepInfo,puArgErr) ) 
   4.608 +
   4.609 +#endif /* COBJMACROS */
   4.610 +
   4.611 +
   4.612 +#endif 	/* C style interface */
   4.613 +
   4.614 +
   4.615 +#endif 	/* ___IpEpEngineEvents_DISPINTERFACE_DEFINED__ */
   4.616 +
   4.617 +
   4.618 +EXTERN_C const CLSID CLSID_pEpEngine;
   4.619 +
   4.620 +#ifdef __cplusplus
   4.621 +
   4.622 +class DECLSPEC_UUID("EF1B073D-5058-4E0E-829E-B4D22CA21EA2")
   4.623 +pEpEngine;
   4.624 +#endif
   4.625 +#endif /* __pEpCOMServerAdapterLib_LIBRARY_DEFINED__ */
   4.626 +
   4.627 +/* Additional Prototypes for ALL interfaces */
   4.628 +
   4.629 +unsigned long             __RPC_USER  BSTR_UserSize(     unsigned long *, unsigned long            , BSTR * ); 
   4.630 +unsigned char * __RPC_USER  BSTR_UserMarshal(  unsigned long *, unsigned char *, BSTR * ); 
   4.631 +unsigned char * __RPC_USER  BSTR_UserUnmarshal(unsigned long *, unsigned char *, BSTR * ); 
   4.632 +void                      __RPC_USER  BSTR_UserFree(     unsigned long *, BSTR * ); 
   4.633 +
   4.634 +unsigned long             __RPC_USER  LPSAFEARRAY_UserSize(     unsigned long *, unsigned long            , LPSAFEARRAY * ); 
   4.635 +unsigned char * __RPC_USER  LPSAFEARRAY_UserMarshal(  unsigned long *, unsigned char *, LPSAFEARRAY * ); 
   4.636 +unsigned char * __RPC_USER  LPSAFEARRAY_UserUnmarshal(unsigned long *, unsigned char *, LPSAFEARRAY * ); 
   4.637 +void                      __RPC_USER  LPSAFEARRAY_UserFree(     unsigned long *, LPSAFEARRAY * ); 
   4.638 +
   4.639 +/* end of Additional Prototypes */
   4.640 +
   4.641 +#ifdef __cplusplus
   4.642 +}
   4.643 +#endif
   4.644 +
   4.645 +#endif
   4.646 +
   4.647 +