home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World Komputer 2007 December
/
PCWKCD1207B.iso
/
WinXP - Poczatek konca
/
TrueCrypt 4.3a
/
Setup Files
/
TrueCrypt Format.exe
/
TEXT
/
516
Wrap
Text File
|
2007-05-03
|
25KB
|
475 lines
TrueCrypt Collective License Version 1.2
The TrueCrypt Collective License consists of several distinct licenses, which
are contained in this document (separated by lines consisting of underscores)
and which are, in this section, referred to as component licenses. Each of the
component licenses applies only to (portions of) the source code file(s) in
which the component license is contained or in which it is explicitly
referenced, and to compiled or otherwise processed forms of such source code.
None of the component licenses applies to this product as a whole, even when it
uses the phrase "this product" or any other equivalent term/phrase. Unless
otherwise stated, graphics and files that are not part of the source code are
covered solely by the TrueCrypt License.
Note: The TrueCrypt License is one of the component licenses of which the
TrueCrypt Collective License consists.
Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any
part(s) of work made available under this version of the TrueCrypt Collective
License, is, by such action(s), accepting in full the responsibilities and
obligations contained in the component licenses that apply to the corresponding
part(s) of such work.
If any term of this license is found to be invalid or unenforceable under
applicable law, it shall not affect the validity or enforceability of any other
terms of this license that are found to be valid and enforceable under
applicable law.
____________________________________________________________
TrueCrypt License Version 2.3
I. Definitions
1. "This Product" means the work (including, but not limited to, source code,
graphics, texts, and accompanying files) made available under and covered by
this version of this License, as may be indicated by, but is not limited to,
copyright notice(s) attached to or included in the work.
2. "You" means (and "Your" refers to) an individual or a legal entity (e.g.,
a non-profit organization, commercial organization, government agency, etc.)
exercising rights under this License.
3. "Modification" means (and "modify" refers to) any alteration of This
Product, including, but not limited to, addition to or deletion from the
substance or structure of This Product, and translation into another language.
4. "Your Product" means This Product modified by You, any work You derive from
(or base on) This Product, any work in which You include This Product, or any
respective part(s) thereof.
5. "Distribution" means (and "distribute" refers to), regardless of means or
methods, conveyance or transfer of This/Your Product or portions thereof to
third parties, or making This/Your Product or portions thereof available for
download to third parties, regardless of whether any third party downloads the
product (or a portion thereof) made available for download or not.
II. Terms and Conditions for Use, Reproduction, and Distribution
1. You may reproduce and/or distribute This Product, provided that You do not
modify any part of This Product (for terms and conditions for reproduction and
distribution of modified versions of This Product, see Section III) and
provided that You ensure that all the legal notices and documents (containing,
e.g., the text of this License, references to this License, etc.) included with
This Product are included with every copy of This Product that you make and
distribute, and provided that you comply with all applicable terms and
conditions of this License.
2. Provided that you comply with all applicable terms and conditions of this
License, You may use This Product freely (see also Section III) on any number
of computers/systems for non-commercial and/or commercial purposes.
III. Terms and Conditions for Modification and Derivation of New Products
1. If all conditions specified in the following paragraphs in this Section are
met (for exceptions, see Sections III.2 and III.3), You may modify This Product
(thus forming Your Product), derive new works from This Product or portions
thereof (thus forming Your Product), include This Product or portions thereof
in another product (thus forming Your Product), and You may copy and/or
distribute Your Product.
a. The name of Your Product (or of Your modified version of This Product)
must not contain the name TrueCrypt (for example, the following names are
not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
etc.) nor any of its variations that can be easily confused with the name
TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt
Foundation. The goal is not to monetize the name or the product, but to
protect the reputation of TrueCrypt, and to prevent support issues and
other kinds of issues that might arise from the existence of similar
products with the same or similar name. Even though TrueCrypt and the
TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source
and free software.
All graphics files showing any TrueCrypt logo (including the non-textual
logo consisting primarily of a key in stylized form) must be removed from
Your Product (or from Your modified version of This Product) and from any
associated materials. Logo(s) included in (or attached to) Your Product
(or in/to associated materials) must not incorporate and must not be
confusingly similar to any of the TrueCrypt logos or portion(s) thereof.
b. The following phrases must be removed from Your Product and from any
associated materials:
"A TrueCrypt Foundation Release"
"Released by TrueCrypt Foundation"
"This is a TrueCrypt Foundation release."
c. Phrase "Based on TrueCrypt, freely available at
http://www.truecrypt.org/" must be displayed by Your Product (if
technically feasible) and contained in its documentation. Alternatively, if
This Product or its portion You included in Your Product comprises only a
minor portion of Your Product, phrase "Portions of this product are based
in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
displayed instead. In each of the cases mentioned above in this paragraph,
"http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
pointing to http://www.truecrypt.org/ and you may freely choose the
location within the user interface (if there is any) of Your Product (e.g.,
an "About" window, etc.) and the way in which Your Product will display the
respective phrase.
Your Product (and any associated materials, e.g., the documentation, the
content of the official web site of Your Product, etc.) must not present
any Internet address containing the domain name truecrypt.org (or any
domain name that forwards to the domain name truecrypt.org) in a manner
that suggests that it is where information about Your Product may be
obtained or where bugs found in Your Product may be reported or where
support for Your Product may be available or otherwise attempt to indicate
that the domain name truecrypt.org is associated with Your Product.
d. The complete source code of Your Product must be freely and publicly
available (for exceptions, see Sections III.2 and III.3) at least until you
cease to distribute Your Product. To meet this condition, it is sufficient
that You merely include the source code with every copy of Your Product
that you make and distribute; it is also sufficient that You merely include
information (valid and correct at least until you cease to distribute Your
Product) about where the source code can be freely obtained (e.g., an
Internet address, etc.) with every copy of Your Product that you make and
distribute. The source code must be available under license(s) that are/is
compatible with this version of the TrueCrypt License (however, see also
Section III.1.e) and that allow(s) anyone to modify and derive new works
from Your Product (and portions thereof) and to use, reproduce, and
redistribute such modifications and/or derived works. The license(s) must
be non-exclusive, royalty-free, no-charge, perpetual, and world-wide. The
text of the license(s) must be included with every copy of Your Product
that you make and distribute. The source code must not be deliberately
obfuscated, and it must not be in an intermediate form (e.g., the output of
a preprocessor). Source code means the preferred form in which a programmer
would usually modify the program.
Note: If you cannot comply with the above requirements, we may grant an
exception under certain conditions. You may request an exception at:
licensing@truecrypt.org
e. You must not change the license and distribution terms of This Product
in any way (i.e., no part of This Product may be put under another
license). You must keep intact all the legal notices contained in the
source code files. You must include the following items with every copy of
Your Product that you make and distribute: a clear and conspicuous notice
stating that Your Product or portion(s) thereof is/are distributed under
this version of the TrueCrypt License, a verbatim copy of this version of
the TrueCrypt License (as contained herein), a clear and conspicuous notice
containing information about where the included copy of the License can be
found, and an appropriate copyright notice.
f. Without specific prior written permission from the authors of This
Product (or from their common representative), you must not use the name of
This Product, the names of the authors of This Product, or the names of the
legal entities (or informal groups) of which the authors were/are
members/employees, to endorse or promote Your Product, or in a way that
suggests that Your Product is endorsed by one or more authors of This
Product, or in a way that suggests that one or more authors of This Product
directly participated in the creation of Your Product.
2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and
III.1.d, if all conditions specified in one of the two following paragraphs are
met:
a. Your Product is an operating system distribution, or other aggregate
software distribution (such as a cover CD-ROM of a magazine) containing
products from different sources, in which You include either This Product
without any modifications or file(s) which You obtain by compiling the
unmodified source code of This Product.
b. You include This Product in its entirety and without any modifications
(You may omit the source code of This Product) as non-integral part of Your
Product (i.e., none of the main functionalities of Your Product will be
affected if such non-integral part is removed) and phrase "This product
utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
phrase "This product includes TrueCrypt, freely available at
http://www.truecrypt.org/" is displayed by Your Product (if technically
feasible) and contained in its documentation. In each of the cases
mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
and you may freely choose the location within the user interface (if there
is any) of Your Product (e.g., an "About" window, etc.) and the way in
which Your Product will display the respective phrase.
3. You are not obligated to comply with Section III.1.d if Your Product is not
distributed (i.e., Your Product is available only to You).
IV. Disclaimer of Warranties and Liabilities; Indemnification
You expressly acknowledge and agree to the following:
1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE
COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY REPRODUCE AND/OR
(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE
LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED
TO, ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
THE USE, REPRODUCTION, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A
PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF),
INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, LOSSES SUSTAINED BY
YOU OR THIRD PARTIES, OR A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER
PRODUCT, EVEN IF SUCH (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, AND/OR ANY OTHER
PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU.
SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS
THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS
THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO
IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND THAT IT IS SOLELY YOUR
RESPONSIBILITY TO COMPLY WITH ANY SUCH REGULATIONS/RESTRICTIONS.
4. You shall indemnify, defend and hold all (co)authors of This Product, their
agents and associates, and applicable copyright/trademark owners, harmless
from/against any liability, loss, expense, damages, claims or causes of action,
arising out of Your use, inability to use, reproduction, (re)distribution,
import and/or (re)export of This Product (or portions thereof) and/or Your
breach of any term of this License.
V. Trademarks
This License does not grant permission to use trademarks associated with (or
applying to) This Product, except for fair use as defined by applicable law and
except for use expressly permitted or required by this License.
TrueCrypt and the TrueCrypt logos (including the non-textual logo consisting
primarily of a key in stylized form) are trademarks of the TrueCrypt
Foundation.
Note: The goal is not to monetize the name or the product, but to protect the
reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
software.
VI. General Terms
1. You may not use, modify, reproduce, derive from, (re)distribute, or
sublicense This Product, or portion(s) thereof, except as expressly provided
under this License. Any attempt (even if permitted by applicable law) otherwise
to use, modify, reproduce, derive from, (re)distribute, or sublicense This
Product, or portion(s) thereof, automatically and immediately terminates Your
rights under this License.
2. ANYONE WHO USES AND/OR REPRODUCES AND/OR MODIFIES AND/OR DERIVES FROM AND/OR
(RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S),
ACCEPTING ALL TERMS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS
CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT THEM, DO NOT USE, MODIFY,
REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S)
THEREOF.
3. IF ANY PROVISION OF SECTION IV OF THIS LICENSE IS UNENFORCEABLE, PROHIBITED,
OR INVALID UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU MAY NOT USE, MODIFY,
REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S)
THEREOF.
4. If any term of this License is found to be invalid or unenforceable under
applicable law, You agree that it shall not affect the validity or
enforceability of any other terms of this License that are found to be valid
and enforceable under applicable law.
____________________________________________________________
License agreement for Encryption for the Masses.
Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
This product can be copied and distributed free of charge, including
source code.
You may modify this product and source code, and distribute such modifications,
and you may derive new works based on this product, provided that:
1. Any product which is simply derived from this product cannot be
called E4M, or Encryption for the Masses.
2. If you use any of the source code in your product, and your product
is distributed with source code, you must include this notice with
those portions of this source code that you use.
Or,
If your product is distributed in binary form only, you must display
on any packaging, and marketing materials which reference
your product, a notice which states:
"This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
3. If you use any of the source code originally by Eric Young, you must
in addition follow his terms and conditions.
4. Nothing requires that you accept this License, as you have not
signed it. However, nothing else grants you permission to modify or
distribute the product or its derivative works.
These actions are prohibited by law if you do not accept this License.
5. If any of these license terms is found to be to broad in scope, and
declared invalid by any court or legal process, you agree that all other
terms shall not be so affected, and shall remain valid and enforceable.
6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES.
____________________________________________________________
Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
All rights reserved.
This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as
the following conditions are aheared to. The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation
included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgement:
"This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the rouines from the library
being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The licence and distribution terms for any publically available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
____________________________________________________________
Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:
1. distributions of this source code include the above copyright
notice, this list of conditions and the following disclaimer;
2. distributions in binary form include the above copyright
notice, this list of conditions and the following disclaimer
in the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products
built using this software without specific written permission.
ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
____________________________________________________________
This is an independent implementation of the encryption algorithm:
Twofish by Bruce Schneier and colleagues
which is a candidate algorithm in the Advanced Encryption Standard
programme of the US National Institute of Standards and Technology.
Copyright in this implementation is held by Dr B R Gladman but I
hereby give permission for its free direct or derivative use subject
to acknowledgment of its origin and compliance with any conditions
that the originators of the algorithm place on its exploitation.
My thanks to Doug Whiting and Niels Ferguson for comments that led
to improvements in this implementation.
Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
____________________________________________________________
Copyright (c) 2001 Markus Friedl. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.