home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2005 May
/
PCWorld_2005-05_cd.bin
/
software
/
vyzkuste
/
truecrypt
/
truecrypt-3.1a.exe
/
Setup Files
/
License.txt
next >
Wrap
Text File
|
2005-02-07
|
14KB
|
271 lines
TRUECRYPT LICENSE
This product may be used free of charge by individuals, non-profit
organizations, commercial organizations, and government agencies, on single or
multiple computers/systems for non-commercial and/or commercial uses.
This product, including the source code and the documentation, may be copied
and/or distributed free of charge.
This product contains no mechanism or facility that would allow partial or
complete recovery of your encrypted data without knowing the correct password
or the key used to encrypt the data.
AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED BELOW, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
You may modify this product and its source code, and distribute such
modifications, and you may derive new works based on this product, provided
that the following conditions are met:
1. Any product which is simply derived from this product must not be called
E4M, or Encryption for the Masses (see also section 3.a.)
2. If you use any of the source code in your product, and your product is
distributed with source code, you must include this notice with those
portions of this source code that you use.
or
If your product is distributed in binary form only and you use any part of
the source code by Paul Le Roux in your product, you must display on any
packaging, and marketing materials which reference your product, a notice
which states: "This product uses components written by Paul Le Roux
<pleroux@swprofessionals.com>"
3. If you use any part of TrueCrypt (e.g., the source code, graphics, user
interface, texts, etc.) created by the TrueCrypt Foundation and/or by the
TrueCrypt Team (with or without modification) in your product or if you
modify any of these parts (including, but not limited to, translation into
another language, localization, porting to another platform, or adding a
new feature/functionality), then the following additional conditions must
be met:
a. The product or the modified version must not be called TrueCrypt and
its name must not contain the name TrueCrypt (for example, the
following names are not allowed: TrueCrypt+, TrueCrypt Professional,
etc.) nor any of its variations that can be easily confused with the
name TrueCrypt (e.g., Truecrypt, TrueKrypt, etc.)
b. Complete source code of the product or of the modified version must be
freely and publicly available.
c. Phrase "Based on TrueCrypt" must be displayed by the product (if
technically feasible) or by the modified version and contained in its
documentation. Alternatively, if the used parts represent only a minor
portion of your product, phrase "Portions of this software are based in
part on TrueCrypt" may be used instead.
d. TrueCrypt Foundation and TrueCrypt Team must be given attribution as
the authors of the parts used. This must be done in the way described
in section 3.c.
e. The licence and distribution terms of these modified or unmodified
parts must not be changed (i.e., none of these parts can be put under
another distribution licence). The legal notices attached to parts of
the source code must be retained in full.
4. If you use any part of the source code originally by Eric Young, you must
in addition follow his terms and conditions.
5. If you use any part of the source code by Dr. Brian Gladman in your
product, you must in addition follow his terms and conditions.
6. If you use any part of the source code by Markus Friedl in your product,
you must in addition follow his terms and conditions.
7. If you use any part of the source code by Dag Arne Osvik in your product,
you must in addition follow his terms and conditions.
Where applicable, the specific licenses attached to parts of the source code
might take precedence over this general license. Each of the specific licenses
applies only to the part of the source code it is attached to.
If any of these license terms is found to be to broad in scope, and/or declared
invalid by any court or legal process, you agree that all other terms shall not
be so affected, and shall remain valid and enforceable.
Nothing requires that you accept this license. However, nothing else grants you
permission to use, modify, or distribute the product or its derivative works.
These actions are prohibited by law if you do not accept this license.
Portions of this software are:
Copyright (c) 2004-2005 TrueCrypt Foundation. All Rights Reserved.
Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved.
Copyright (c) 2004 TrueCrypt Team. All Rights Reserved.
Copyright (c) 1995-1997 Eric Young. All Rights Reserved.
Copyright (c) 1999-2004 Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
Copyright (c) 2001 Markus Friedl. All Rights Reserved.
Copyright (c) 2000 Dag Arne Osvik. All Rights Reserved.
For more information, see the legal notices attached to parts of the source code.
This is a TrueCrypt Foundation release.
END OF GENERAL LICENSE
Component Legal Notices:
____________________________________________________________
Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
All rights reserved.
This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as
the following conditions are aheared to. The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documentation
included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
must display the following acknowledgement:
"This product includes cryptographic software written by
Eric Young (eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the rouines from the library
being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
The licence and distribution terms for any publically available version or
derivative of this code cannot be changed. i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
____________________________________________________________
Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:
1. distributions of this source code include the above copyright
notice, this list of conditions and the following disclaimer;
2. distributions in binary form include the above copyright
notice, this list of conditions and the following disclaimer
in the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products
built using this software without specific written permission.
ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
____________________________________________________________
This is an independent implementation of the encryption algorithm:
Twofish by Bruce Schneier and colleagues
which is a candidate algorithm in the Advanced Encryption Standard
programme of the US National Institute of Standards and Technology.
Copyright in this implementation is held by Dr B R Gladman but I
hereby give permission for its free direct or derivative use subject
to acknowledgment of its origin and compliance with any conditions
that the originators of the algorithm place on its exploitation.
My thanks to Doug Whiting and Niels Ferguson for comments that led
to improvements in this implementation.
Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
____________________________________________________________
Except as noted below copyright in this code is held by Dr B.R. Gladman
but free direct or derivative use is permitted subject to acknowledgement
of its origin and subject to any constraints placed on the use of the
algorithm by its designers (if such constraints may exist, this will be
indicated below).
Dr. B. R. Gladman ( ). 25th January 2000.
This is an implementation of Serpent, an encryption algorithm designed
by Anderson, Biham and Knudsen and submitted as a candidate for the
Advanced Encryption Standard programme of the US National Institute of
Standards and Technology.
The designers of Serpent have not placed any constraints on the use of
this algorithm.
The S box expressions used below are Copyright (C) 2000 Dag Arne Osvik.
____________________________________________________________
Copyright (c) 2001 Markus Friedl. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.