TRUECRYPT LICENSE This product may be used free of charge by individuals, non-profit organizations, commercial organizations, and government agencies, on single or multiple computers/systems for non-commercial and/or commercial uses. This product, including the source code and the documentation, may be copied and/or distributed free of charge. This product contains no mechanism or facility that would allow partial or complete recovery of your encrypted data without knowing the correct password or the key used to encrypt the data. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED BELOW, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. You may modify this product and its source code, and distribute such modifications, and you may derive new works based on this product, provided that the following conditions are met: 1. Any product which is simply derived from this product must not be called E4M, or Encryption for the Masses (see also section 3.a.) 2. If you use any of the source code in your product, and your product is distributed with source code, you must include this notice with those portions of this source code that you use. or If your product is distributed in binary form only and you use any part of the source code by Paul Le Roux in your product, you must display on any packaging, and marketing materials which reference your product, a notice which states: "This product uses components written by Paul Le Roux " 3. If you use any part of TrueCrypt (e.g., the source code, graphics, user interface, texts, etc.) created by the TrueCrypt Foundation and/or by the TrueCrypt Team (with or without modification) in your product or if you modify any of these parts (including, but not limited to, translation into another language, localization, porting to another platform, or adding a new feature/functionality), then the following additional conditions must be met: a. The product or the modified version must not be called TrueCrypt and its name must not contain the name TrueCrypt (for example, the following names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of its variations that can be easily confused with the name TrueCrypt (e.g., Truecrypt, TrueKrypt, etc.) b. Complete source code of the product or of the modified version must be freely and publicly available. c. Phrase "Based on TrueCrypt" must be displayed by the product (if technically feasible) or by the modified version and contained in its documentation. Alternatively, if the used parts represent only a minor portion of your product, phrase "Portions of this software are based in part on TrueCrypt" may be used instead. d. TrueCrypt Foundation and TrueCrypt Team must be given attribution as the authors of the parts used. This must be done in the way described in section 3.c. e. The licence and distribution terms of these modified or unmodified parts must not be changed (i.e., none of these parts can be put under another distribution licence). The legal notices attached to parts of the source code must be retained in full. 4. If you use any part of the source code originally by Eric Young, you must in addition follow his terms and conditions. 5. If you use any part of the source code by Dr. Brian Gladman in your product, you must in addition follow his terms and conditions. 6. If you use any part of the source code by Markus Friedl in your product, you must in addition follow his terms and conditions. 7. If you use any part of the source code by Dag Arne Osvik in your product, you must in addition follow his terms and conditions. Where applicable, the specific licenses attached to parts of the source code might take precedence over this general license. Each of the specific licenses applies only to the part of the source code it is attached to. If any of these license terms is found to be to broad in scope, and/or declared invalid by any court or legal process, you agree that all other terms shall not be so affected, and shall remain valid and enforceable. Nothing requires that you accept this license. However, nothing else grants you permission to use, modify, or distribute the product or its derivative works. These actions are prohibited by law if you do not accept this license. Portions of this software are: Copyright (c) 2004-2005 TrueCrypt Foundation. All Rights Reserved. Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved. Copyright (c) 2004 TrueCrypt Team. All Rights Reserved. Copyright (c) 1995-1997 Eric Young. All Rights Reserved. Copyright (c) 1999-2004 Dr. Brian Gladman, Worcester, UK. All Rights Reserved. Copyright (c) 2001 Markus Friedl. All Rights Reserved. Copyright (c) 2000 Dag Arne Osvik. All Rights Reserved. For more information, see the legal notices attached to parts of the source code. This is a TrueCrypt Foundation release. END OF GENERAL LICENSE Component Legal Notices: ____________________________________________________________ Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] ____________________________________________________________ Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that: 1. distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer; 2. distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials; 3. the copyright holder's name is not used to endorse products built using this software without specific written permission. ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above. DISCLAIMER This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. ____________________________________________________________ This is an independent implementation of the encryption algorithm: Twofish by Bruce Schneier and colleagues which is a candidate algorithm in the Advanced Encryption Standard programme of the US National Institute of Standards and Technology. Copyright in this implementation is held by Dr B R Gladman but I hereby give permission for its free direct or derivative use subject to acknowledgment of its origin and compliance with any conditions that the originators of the algorithm place on its exploitation. My thanks to Doug Whiting and Niels Ferguson for comments that led to improvements in this implementation. Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 ____________________________________________________________ Except as noted below copyright in this code is held by Dr B.R. Gladman but free direct or derivative use is permitted subject to acknowledgement of its origin and subject to any constraints placed on the use of the algorithm by its designers (if such constraints may exist, this will be indicated below). Dr. B. R. Gladman ( ). 25th January 2000. This is an implementation of Serpent, an encryption algorithm designed by Anderson, Biham and Knudsen and submitted as a candidate for the Advanced Encryption Standard programme of the US National Institute of Standards and Technology. The designers of Serpent have not placed any constraints on the use of this algorithm. The S box expressions used below are Copyright (C) 2000 Dag Arne Osvik. ____________________________________________________________ Copyright (c) 2001 Markus Friedl. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.