PHP client library for Let's Encrypt and other ACME v2 - RFC 8555 compatible Certificate Authorities.
Version: 3.4.0
ACMECert is designed to help you to setup an automated SSL/TLS-certificate/renewal process with a few lines of PHP.
It is self contained and contains a set of functions allowing you to:
- generate RSA / EC (Elliptic Curve) keys
- manage account: register/External Account Binding (EAB)/update/deactivate and account key roll-over
- get/revoke certificates (to renew a certificate just get a new one)
- parse certificates / get the remaining days or percentage a certificate is still valid
- get/use ACME Renewal Information (ARI)
- and more..
see Function Reference for a full list
It abstracts away the complexity of the ACME protocol to get a certificate (create order, fetch authorizations, compute challenge tokens, polling for status, generate CSR, finalize order, request certificate) into a single function getCertificateChain (or getCertificateChains to also get all alternate chains), where you specify a set of domains you want to get a certificate for and which challenge type to use (all challenge types are supported). This function takes as third argument a user-defined callback function which gets invoked every time a challenge needs to be fulfilled. It is up to you to set/remove the challenge tokens:
$handler=function($opts){
// Write code to setup the challenge token here.
// Return a function that gets called when the challenge token should be removed again:
return function($opts){
// Write code to remove previously setup challenge token.
};
};
$ac->getCertificateChain(..., ..., $handler);
see description of getCertificateChain for details about the callback function.
also see the Get Certificate examples below.
Instead of returning FALSE
on error, every function in ACMECert throws an Exception
if it fails or an ACME_Exception if the ACME-Server reponded with an error message.
- PHP 5.6 or higher (for EC keys PHP 7.1 or higher) (for ARI PHP 7.1.2 or higher)
- OpenSSL extension
- enabled fopen wrappers (allow_url_fopen=1) or cURL extension
manual download: https://github.com/skoerfgen/ACMECert/archive/master.zip
usage:
require 'ACMECert.php';
use skoerfgen\ACMECert\ACMECert;
or download it using git:
git clone https://github.com/skoerfgen/ACMECert
usage:
require 'ACMECert/ACMECert.php';
use skoerfgen\ACMECert\ACMECert;
or download it using composer:
composer require skoerfgen/acmecert
usage:
require 'vendor/autoload.php';
use skoerfgen\ACMECert\ACMECert;
Live CA
$ac=new ACMECert('https://acme-v02.api.letsencrypt.org/directory');
Staging CA
$ac=new ACMECert('https://acme-staging-v02.api.letsencrypt.org/directory');
Live CA
$ac=new ACMECert('https://api.buypass.com/acme/directory');
Staging CA
$ac=new ACMECert('https://api.test4.buypass.no/acme/directory');
Live CA
$ac=new ACMECert('https://dv.acme-v02.api.pki.goog/directory');
Staging CA
$ac=new ACMECert('https://dv.acme-v02.test-api.pki.goog/directory');
Live CA
$ac=new ACMECert('https://acme.ssl.com/sslcom-dv-rsa');
Live CA
$ac=new ACMECert('https://acme.zerossl.com/v2/DV90');
or any other (ACME v2 - RFC 8555) compatible CA
$ac=new ACMECert('INSERT_URL_TO_AMCE_CA_DIRECTORY_HERE');
$key=$ac->generateRSAKey(2048);
file_put_contents('account_key.pem',$key);
Equivalent to:
openssl genrsa -out account_key.pem 2048
$key=$ac->generateECKey('P-384');
file_put_contents('account_key.pem',$key);
Equivalent to:
openssl ecparam -name secp384r1 -genkey -noout -out account_key.pem
$ac->loadAccountKey('file://'.'account_key.pem');
$ret=$ac->register(true,'info@example.com');
print_r($ret);
$ac->loadAccountKey('file://'.'account_key.pem');
$ret=$ac->registerEAB(true,'INSERT_EAB_KEY_ID_HERE','INSERT_EAB_HMAC_HERE','info@example.com');
print_r($ret);
$ac->loadAccountKey('file://'.'account_key.pem');
$domain_config=array(
'test1.example.com'=>array('challenge'=>'http-01','docroot'=>'/var/www/vhosts/test1.example.com'),
'test2.example.com'=>array('challenge'=>'http-01','docroot'=>'/var/www/vhosts/test2.example.com')
);
$handler=function($opts){
$fn=$opts['config']['docroot'].$opts['key'];
@mkdir(dirname($fn),0777,true);
file_put_contents($fn,$opts['value']);
return function($opts){
unlink($opts['config']['docroot'].$opts['key']);
};
};
// Generate new certificate key
$private_key=$ac->generateRSAKey(2048);
$fullchain=$ac->getCertificateChain($private_key,$domain_config,$handler);
file_put_contents('fullchain.pem',$fullchain);
file_put_contents('private_key.pem',$private_key);
$ac->loadAccountKey('file://'.'account_key.pem');
$domain_config=array(
'example.com'=>array('challenge'=>'http-01','docroot'=>'/var/www/vhosts/example.com'),
'*.example.com'=>array('challenge'=>'dns-01'),
'test.example.org'=>array('challenge'=>'tls-alpn-01')
);
$handler=function($opts) use ($ac){
switch($opts['config']['challenge']){
case 'http-01': // automatic example: challenge directory/file is created..
$fn=$opts['config']['docroot'].$opts['key'];
@mkdir(dirname($fn),0777,true);
file_put_contents($fn,$opts['value']);
return function($opts) use ($fn){ // ..and removed after validation completed
unlink($fn);
};
break;
case 'dns-01': // manual example:
echo 'Create DNS-TXT-Record '.$opts['key'].' with value '.$opts['value']."\n";
readline('Ready?');
return function($opts){
echo 'Remove DNS-TXT-Record '.$opts['key'].' with value '.$opts['value']."\n";
};
break;
case 'tls-alpn-01':
$cert=$ac->generateALPNCertificate('file://'.'some_private_key.pem',$opts['domain'],$opts['value']);
// Use $cert and some_private_key.pem(<- does not have to be a specific key,
// just make sure you generated one) to serve the certificate for $opts['domain']
// This example uses an included ALPN Responder - a standalone https-server
// written in a few lines of node.js - which is able to complete this challenge.
// store the generated verification certificate to be used by the ALPN Responder.
file_put_contents('alpn_cert.pem',$cert);
// To keep this example simple, the included Example ALPN Responder listens on port 443,
// so - for the sake of this example - you have to stop the webserver here, like:
shell_exec('/etc/init.d/apache2 stop');
// Start ALPN Responder (requires node.js)
$resource=proc_open(
'node alpn_responder.js some_private_key.pem alpn_cert.pem',
array(
0=>array('pipe','r'),
1=>array('pipe','w')
),
$pipes
);
// wait until alpn responder is listening
fgets($pipes[1]);
return function($opts) use ($resource,$pipes){
// Stop ALPN Responder
fclose($pipes[0]);
fclose($pipes[1]);
proc_close($resource);
shell_exec('/etc/init.d/apache2 start');
};
break;
}
};
// Example for using a pre-generated CSR as input to getCertificateChain instead of a private key:
// $csr=$ac->generateCSR('file://'.'cert_private_key.pem',array_keys($domain_config));
// $fullchain=$ac->getCertificateChain($csr,$domain_config,$handler);
$fullchain=$ac->getCertificateChain('file://'.'cert_private_key.pem',$domain_config,$handler);
file_put_contents('fullchain.pem',$fullchain);
$chains=$ac->getCertificateChains('file://'.'cert_private_key.pem',$domain_config,$handler);
if (isset($chains['ISRG Root X1'])){ // use alternate chain 'ISRG Root X1'
$fullchain=$chains['ISRG Root X1'];
}else{ // use default chain if 'ISRG Root X1' is not present
$fullchain=reset($chains);
}
file_put_contents('fullchain.pem',$fullchain);
$ac->loadAccountKey('file://'.'account_key.pem');
$ac->revoke('file://'.'fullchain.pem');
$ac->loadAccountKey('file://'.'account_key.pem');
$ret=$ac->getAccount();
print_r($ret);
$ac->loadAccountKey('file://'.'account_key.pem');
$ret=$ac->keyChange('file://'.'new_account_key.pem');
print_r($ret);
$ac->loadAccountKey('file://'.'account_key.pem');
$ret=$ac->deactivateAccount();
print_r($ret);
$ret=$ac->getARI('file://'.'fullchain.pem',$ari_cert_id);
if ($ret['suggestedWindow']['start']-time()>0) {
die('Certificate still good, exiting..');
}
$settings=array(
'replaces'=>$ari_cert_id
);
$ac->getCertificateChain(..., ..., ..., $settings);
$percent=$ac->getRemainingPercent('file://'.'fullchain.pem'); // certificate or certificate-chain
if ($precent>33.333) { // certificate has still more than 1/3 (33.333%) of its lifetime left
die('Certificate still good, exiting..');
}
// get new certificate here..
This allows you to run your renewal script without the need to time it exactly, just run it often enough. (cronjob)
$days=$ac->getRemainingDays('file://'.'fullchain.pem'); // certificate or certificate-chain
if ($days>30) { // renew 30 days before expiry
die('Certificate still good, exiting..');
}
// get new certificate here..
By default ACMECert logs its actions using error_log
which logs messages to stderr in PHP CLI so it is easy to log to a file instead:
error_reporting(E_ALL);
ini_set('log_errors',1);
ini_set('error_log',dirname(__FILE__).'/ACMECert.log');
To disable the default logging, you can use
setLogger
, Exceptions are nevertheless thrown:
$ac->setLogger(false);
Or you can you set it to a custom callback function:
$ac->setLogger(function($txt){
echo 'Log Message: '.$txt."\n";
});
If the ACME-Server responded with an error message an \skoerfgen\ACMECert\ACME_Exception
is thrown. (ACME_Exception extends Exception)
ACME_Exception
has two additional functions:
getType()
to get the ACME error code:
use skoerfgen\ACMECert\ACME_Exception;
try {
echo $ac->getAccountID().PHP_EOL;
}catch(ACME_Exception $e){
if ($e->getType()=='urn:ietf:params:acme:error:accountDoesNotExist'){
echo 'Account does not exist'.PHP_EOL;
}else{
throw $e; // another error occured
}
}
getSubproblems()
to get an array ofACME_Exception
s if there is more than one error returned from the ACME-Server:
try {
$cert=$ac->getCertificateChain('file://'.'cert_private_key.pem',$domain_config,$handler);
} catch (\skoerfgen\ACMECert\ACME_Exception $e){
$ac->log($e->getMessage()); // log original error
foreach($e->getSubproblems() as $subproblem){
$ac->log($subproblem->getMessage()); // log sub errors
}
}
Creates a new ACMECert instance.
public ACMECert::__construct ( string $ca_url = 'https://acme-v02.api.letsencrypt.org/directory' )
ca_url
A string containing the URL to an ACME CA directory endpoint.
Returns a new ACMECert instance.
Generate RSA private key (used as account key or private key for a certificate).
public string ACMECert::generateRSAKey ( int $bits = 2048 )
bits
RSA key size in bits.
Returns the generated RSA private key as PEM encoded string.
Throws an
Exception
if the RSA key could not be generated.
Generate Elliptic Curve (EC) private key (used as account key or private key for a certificate).
public string ACMECert::generateECKey ( string $curve_name = 'P-384' )
curve_name
Supported Curves by Let’s Encrypt:
P-256
(prime256v1)P-384
(secp384r1)P-521
(secp521r1)
Returns the generated EC private key as PEM encoded string.
Throws an
Exception
if the EC key could not be generated.
Load account key.
public void ACMECert::loadAccountKey ( mixed $account_key_pem )
account_key_pem
can be one of the following:
- a string containing a PEM formatted private key.
- a string beginning with
file://
containing the filename to read a PEM formatted private key from.
No value is returned.
Throws an
Exception
if the account key could not be loaded.
Associate the loaded account key with the CA account and optionally specify contacts.
public array ACMECert::register ( bool $termsOfServiceAgreed = FALSE [, mixed $contacts = array() ] )
termsOfServiceAgreed
By passing
TRUE
, you agree to the Terms Of Service of the selected CA. (Must be set toTRUE
in order to successully register an account.)Hint: Use getTermsURL() to get the link to the current Terms Of Service.
contacts
can be one of the following:
- A string containing an e-mail address
- Array of e-mail adresses
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other registration error occured.
Associate the loaded account key with the CA account using External Account Binding (EAB) credentials and optionally specify contacts.
public array ACMECert::registerEAB ( bool $termsOfServiceAgreed, string $eab_kid, string $eab_hmac [, mixed $contacts = array() ] )
termsOfServiceAgreed
By passing
TRUE
, you agree to the Terms Of Service of the selected CA. (Must be set toTRUE
in order to successully register an account.)Hint: Use getTermsURL() to get the link to the current Terms Of Service.
eab_kid
a string specifying the
EAB Key Identifier
eab_hmac
a string specifying the
EAB HMAC Key
contacts
can be one of the following:
- A string containing an e-mail address
- Array of e-mail adresses
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other registration error occured.
Update account contacts.
public array ACMECert::update ( mixed $contacts = array() )
contacts
can be one of the following:
- A string containing an e-mail address
- Array of e-mail adresses
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured updating the account.
Get Account Information.
public array ACMECert::getAccount()
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured getting the account information.
Get Account ID.
public string ACMECert::getAccountID()
Returns the Account ID
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured getting the account id.
Account Key Roll-over (exchange the current account key with another one).
If the Account Key Roll-over succeeded, the new account key is automatically loaded via
loadAccountKey
public array ACMECert::keyChange ( mixed $new_account_key_pem )
new_account_key_pem
can be one of the following:
- a string containing a PEM formatted private key.
- a string beginning with
file://
containing the filename to read a PEM formatted private key from.
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured during key change.
Deactivate account.
public array ACMECert::deactivateAccount()
Returns an array containing the account information.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured during account deactivation.
Get certificate-chain (certificate + the intermediate certificate(s)).
This is what Apache >= 2.4.8 needs for SSLCertificateFile
, and what Nginx needs for ssl_certificate
.
public string ACMECert::getCertificateChain ( mixed $pem, array $domain_config, callable $callback, array $settings = array() )
pem
A Private Key used for the certificate (the needed CSR is generated automatically using the given key in this case) or an already existing CSR in one of the following formats:
- a string containing a PEM formatted private key.
- a string beginning with
file://
containing the filename to read a PEM encoded private key from.
or- a string beginning with
file://
containing the filename to read a PEM encoded CSR from.- a string containing the content of a CSR, PEM encoded, may start with
-----BEGIN CERTIFICATE REQUEST-----
domain_config
An Array defining the domains and the corresponding challenge types to get a certificate for.
The first domain name in the array is used as
Common Name
for the certificate if it does not exceed 64 characters, otherwise theCommon Name
field will be empty.Here is an example structure:
$domain_config=array( '*.example.com'=>array('challenge'=>'dns-01'), 'test.example.org'=>array('challenge'=>'tls-alpn-01') 'test.example.net'=>array('challenge'=>'http-01','docroot'=>'/var/www/vhosts/test1.example.com'), );Hint: Wildcard certificates (
*.example.com
) are only supported with thedns-01
challenge type.
challenge
is mandatory and has to be one ofhttp-01
,dns-01
ortls-alpn-01
. All other keys are optional and up to you to be used and are later available in the callback function as$opts['config']
(see the http-01 example wheredocroot
is used this way)
callback
Callback function which gets invoked every time a challenge needs to be fulfilled.
callable callback ( array $opts )Inside a callback function you can return another callback function, which gets invoked after the verification completed and the challenge tokens can be removed again.
Hint: To get access to variables of the parent scope inside the callback function use the
use
languange construct:$handler=function($opts) use ($variable_from_parent_scope){}; ^^^The
$opts
array passed to the callback function contains the following keys:
$opts['domain']
Domain name to be validated.
$opts['config']
Corresponding element of the
domain_config
array.
$opts['key']
and$opts['value']
Contain the following, depending on the chosen challenge type:
Challenge Type $opts['key']
$opts['value']
http-01 path + filename file contents dns-01 TXT Resource Record Name TXT Resource Record Value tls-alpn-01 unused token used in the acmeIdentifier extension of the verification certificate; use generateALPNCertificate to generate the verification certificate from that token. (see the tls-alpn-01 example)
settings
(optional)This array can have the following keys:
authz_reuse
(boolean / default:TRUE
)If
FALSE
the callback function is always called for each domain and does not get skipped due to possibly already valid authorizations (authz) that are reused. This is achieved by deactivating already valid authorizations before getting new ones.Hint: Under normal circumstances this is only needed when testing the callback function, not in production!
notBefore
/notAfter
(mixed)can be one of the following:
- a string containing a RFC 3339 formated date
- a timestamp (integer)
Example: Certificate valid for 3 days:
array( 'notAfter' => time() + (60*60*24) * 3 )or
array( 'notAfter' => '1970-01-01T01:22:17+01:00' )
replaces
(string)The ARI CertID uniquely identifying a previously-issued certificate which this order is intended to replace.
Use: getARI to get the ARI CertID for a certificate.
Example: Get/Use ACME Renewal Information
Returns a PEM encoded certificate chain.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured obtaining the certificate.
Get all (default and alternate) certificate-chains. This function takes the same arguments as the getCertificateChain function above, but it returns an array of certificate chains instead of a single chain.
public string ACMECert::getCertificateChains ( mixed $pem, array $domain_config, callable $callback, array $settings = array() )
Returns an array of PEM encoded certificate chains.
The keys of the returned array correspond to the issuer
Common Name
(CN) of the topmost (closest to the root certificate) intermediate certificate.The first element of the returned array is the default chain.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured obtaining the certificate chains.
Revoke certificate.
public void ACMECert::revoke ( mixed $pem )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
No value is returned.
If the function completes without Exception, the certificate was successully revoked.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured revoking the certificate.
Generate CSR for a set of domains.
public string ACMECert::generateCSR ( mixed $private_key, array $domains )
private_key
can be one of the following:
- a string containing a PEM formatted private key.
- a string beginning with
file://
containing the filename to read a PEM formatted private key from.
domains
Array of domains
Returns the generated CSR as string.
Throws an
Exception
if the CSR could not be generated.
Generate a self signed verification certificate containing the acmeIdentifier extension used in tls-alpn-01
challenge.
public string ACMECert::generateALPNCertificate ( mixed $private_key, string $domain, string $token )
private_key
private key used for the certificate.
can be one of the following:
- a string containing a PEM formatted private key.
- a string beginning with
file://
containing the filename to read a PEM formatted private key from.
domain
domain name to be validated.
token
verification token.
Returns a PEM encoded verification certificate.
Throws an
Exception
if the certificate could not be generated.
Get information about a certificate.
public array ACMECert::parseCertificate ( mixed $pem )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
Returns an array containing information about the certificate.
Throws an
Exception
if the certificate could not be parsed.
Get the percentage the certificate is still valid.
public float ACMECert::getRemainingPercent( mixed $pem )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
A float value containing the percentage the certificate is still valid.
Throws an
Exception
if the certificate could not be parsed.
Get the number of days the certificate is still valid.
public float ACMECert::getRemainingDays ( mixed $pem )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
Returns how many days the certificate is still valid.
Throws an
Exception
if the certificate could not be parsed.
Split a string containing a PEM encoded certificate chain into an array of individual certificates.
public array ACMECert::splitChain ( string $pem )
pem
- a certificate-chain as string, PEM encoded.
Returns an array of PEM encoded individual certificates.
None
Get a list of all CAA Identities for the selected CA. (Useful for setting up CAA DNS Records)
public array ACMECert::getCAAIdentities()
Returns an array containing all CAA Identities for the selected CA.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured getting the CAA Identities.
Get all Subject Alternative Names of given certificate.
public array ACMECert::getSAN( mixed $pem )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
Returns an array containing all Subject Alternative Names of given certificate.
Throws an
Exception
if an error occured getting the Subject Alternative Names.
Get URL to Terms Of Service for the selected CA.
public array ACMECert::getTermsURL()
Returns a string containing a URL to the Terms Of Service for the selected CA.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured getting the Terms Of Service.
Turn on/off logging to stderr using error_log
or provide a custom callback function.
public void ACMECert::setLogger( bool|callable $value = TRUE )
value
- If
TRUE
, logging to stderr usingerror_log
is enabled. (default)- If
FALSE
, logging is disabled.- If a callback function is provided, the function gets called with the log message as first argument:
void callback( string $txt )see Logging
No value is returned.
Throws an
Exception
if the value provided is not boolean or a callable function.
Get ACME Renewal Information (ARI) for a given certificate.
public array ACMECert::getARI( mixed $pem, string &$ari_cert_id = null )
pem
can be one of the following:
- a string beginning with
file://
containing the filename to read a PEM encoded certificate or certificate-chain from.- a string containing the content of a certificate or certificate-chain, PEM encoded, may start with
-----BEGIN CERTIFICATE-----
ari_cert_id
If this parameter is present, it will be set to the ARI CertID of the given certificate.
See the documentation of getCertificateChain where the ARI CertID can be used to replace an existing certificate.
Example: Get/Use ACME Renewal Information
Returns an Array with the following keys:
suggestedWindow
(array)An Array with two keys,
start
andend
, whose values are unix timestamps, which bound the window of time in which the CA recommends renewing the certificate.
explanationURL
(string, optional)A URL pointing to a page which may explain why the suggested renewal window is what it is. For example, it may be a page explaining the CA's dynamic load-balancing strategy, or a page documenting which certificates are affected by a mass revocation event.
Throws an
ACME_Exception
if the server responded with an error message or anException
if an other error occured getting the ACME Renewal Information.
MIT License
Copyright (c) 2018 Stefan Körfgen
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.