SONY의 LGPL위반으로 인한 소송 휘말림 사례 | |||
| |||
2005년 11월경에 인터넷을 크게 달구었던 내용으로 LGPL저작권자가 리버스엔지니어링을 통해 소니를 제소했던 사건으로 원 소스 저작권자가 승소한 큰 사례이다. 하기는 승소 사례 원문이다 Posted on 11/17/2005 8:33:09 AM PST by N3WBI3 Due to the importance of the latest discoveries, here's another update. For the first time I'm updating twice on one day. I'm sure you've already been waiting for some proof about the GPL infringement by F4I. This post contains it in the already well-known form of a comparison between the original C code and an annotated disassembly of the F4I binary. All C code is from the function DoShuffle from the file drms.c which is part of the VideoLAN project. I want to mention though that I'm not going to explain all code because the function is pretty long. I've picked two parts of the function where it's easily recognizable that the two functions are basically the same (there's one tiny difference explained later). Nevertheless I'm going to provide the other parts of the function too, I just won't comment them. Here's the full disassembly. First: I'm sure all the code is going to break the HTML formatting. I'm not going to fix it though. Let's start right at the beginning of the function where we can find the code the decrypts the ROT13-encrypted Apple copyright message. Here's the C code. static uint32_t i_secret = 0; static uint32_t p_secret1[] = { 0xAAAAAAAA, 0x01757700, 0x00554580, 0x01724500, 0x00424580, 0x01427700, 0x00000080, 0xC1D59D01, 0x80144981, 0x815C8901, 0x80544981, 0x81D45D01, 0x00000080, 0x81A3BB03, 0x00A2AA82, 0x01A3BB03, 0x0022A282, 0x813BA202, 0x00000080, 0x6D575737, 0x4A5275A5, 0x6D525725, 0x4A5254A5, 0x6B725437, 0x00000080, 0xD5DDB938, 0x5455A092, 0x5D95A013, 0x4415A192, 0xC5DD393A, 0x00000080, 0x55555555 }; static char p_secret2[] = "pbclevtug (p) Nccyr Pbzchgre, Vap. Nyy Evtugf Erfreirq."; if( i_secret == 0 ) { REVERSE( p_secret1, sizeof(p_secret1)/sizeof(p_secret1[ 0 ]) ); for( ; p_secret2[ i_secret ] != ' | |||
| |||
| |||
로그인을 하시면 댓글을 등록 할 수 있습니다. |