home *** CD-ROM | disk | FTP | other *** search
- TrueCrypt Collective License Version 1.0
-
-
- The TrueCrypt Collective License consists of several distinct licenses, which
- are contained in this document (separated by lines consisting of underscores)
- and which are, in this section, referred to as component licenses. Each of the
- component licenses applies only to (portions of) the source code file(s) in
- which the component license is contained or in which it is explicitly
- referenced, and to compiled or otherwise processed forms of such source code.
- None of the component licenses applies to this product as a whole, even when it
- uses the phrase "this product" or any other equivalent term/phrase. Unless
- otherwise stated, graphics and files that are not part of the source code are
- covered solely by the TrueCrypt License.
- Note: The TrueCrypt License is one of the component licenses of which the
- TrueCrypt Collective License consists.
-
- Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any
- part(s) of work made available under this version of the TrueCrypt Collective
- License, is, by such action(s), accepting in full the responsibilities and
- obligations contained in the component licenses that apply to the corresponding
- part(s) of such work.
-
- If any term of this license is found to be invalid or unenforceable under
- applicable law, it shall not affect the validity or enforceability of any other
- terms of this license that are found to be valid and enforceable under
- applicable law.
-
- ____________________________________________________________
-
- TrueCrypt License Version 2.1
-
-
- I. Definitions
-
- 1. "This Product" means the work (including, but not limited to, source code,
- graphics, texts, and accompanying files) made available under and covered by
- this version of this License, as indicated by a copyright notice attached to or
- included in the work.
-
- 2. "You" (or "Your") means an individual or a legal entity (e.g., a non-profit
- organization, commercial organization, government agency, etc.) exercising
- rights under this License.
-
- 3. "Modification" means any alteration of This Product, including, but not
- limited to, addition to or deletion from the substance or structure of This
- Product, and translation into another language.
-
- 4. "Your Product" means This Product modified by You, any work You derive from
- (or base on) This Product, any work in which You include This Product, or any
- respective part(s) thereof.
-
-
-
- II. Terms and Conditions for Use, Reproduction, and Distribution
-
- 1. You may copy and/or distribute This Product, provided that You do not modify
- any part of This Product (for terms and conditions for reproduction and
- distribution of modified versions of This Product, see Section III) and
- provided that You ensure that all the legal notices and documents (containing,
- e.g., the text of this License, references to this License, etc.) included with
- This Product are included with every copy of This Product that you make and
- distribute.
-
- 2. You may use This Product freely (see also Section III) on any number of
- computers/systems for non-commercial and/or commercial purposes.
-
-
-
- III. Terms and Conditions for Modification and Derivation of New Products
-
- 1. You may modify This Product (thus forming Your Product), derive new works
- from This Product or portions thereof (thus forming Your Product), include This
- Product or portions thereof in another product (thus forming Your Product), and
- You may copy and/or distribute Your Product, only if the following conditions
- are met (for exceptions, see Sections III.2 and III.3):
-
- a. The name of Your Product (or of Your modified version of This Product)
- must not contain the name TrueCrypt (for example, the following names are
- not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
- etc.) nor any of its variations that can be easily confused with the name
- TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
-
- Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
- to monetize the name or the product, but to protect the reputation of
- TrueCrypt, and to prevent support issues and other kinds of issues that
- might arise from the existence of similar products with the same or similar
- name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
- open-source and free software.
-
- b. The following phrases must be removed from Your Product:
- "A TrueCrypt Foundation Release"
- "Released by TrueCrypt Foundation"
- "This is a TrueCrypt Foundation release."
-
- c. Phrase "Based on TrueCrypt, freely available at
- http://www.truecrypt.org/" must be displayed by Your Product (if
- technically feasible) and contained in its documentation. Alternatively, if
- This Product or its portion You included in Your Product comprises only a
- minor portion of Your Product, phrase "Portions of this product are based
- in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
- displayed instead. In each of the cases mentioned above in this paragraph,
- "http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
- pointing to http://www.truecrypt.org/ and you may freely choose the
- location within the user interface (if there is any) of Your Product (e.g.,
- an "About" window, etc.) and the way in which Your Product will display the
- respective phrase.
-
- d. The complete source code of Your Product must be freely and publicly
- available (for exceptions, see Section III.3) at least until you cease to
- distribute Your Product. To meet this condition, it is sufficient that You
- merely include the source code with every copy of Your Product that you
- make and distribute; it is also sufficient that You merely include
- information (valid and correct at least until you cease to distribute Your
- Product) about where the source code can be freely obtained (e.g., an
- Internet URL, etc.) with every copy of Your Product that you make and
- distribute. The source code must not be deliberately obfuscated, and it
- must not be in an intermediate form (e.g., the output of a preprocessor).
- Source code means the preferred form in which a programmer would usually
- modify the program.
-
- e. You must not change the license and distribution terms of This Product
- (i.e., no part of This Product may be put under another license), except as
- expressly permitted or required by this License. You must keep intact all
- the legal notices contained in the source code files. You must include the
- following items with every copy of Your Product that you make and
- distribute: a clear and conspicuous notice stating that Your Product or
- portion(s) thereof is/are distributed under this version of the TrueCrypt
- License, a verbatim copy of this version of the TrueCrypt License (as
- contained herein), a clear and conspicuous notice containing information
- about where the included copy of the License can be found, and an
- appropriate copyright notice.
-
- f. You must not use the name of This Product, names of its authors, or the
- names of the legal entities (or informal groups) of which the authors
- were/are members/employees, to endorse or promote Your Product without
- specific prior written permission from the authors of This Product.
-
-
- 2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c,
- III.1.d, and III.1.f, if all conditions specified in one of the two following
- paragraphs are met:
-
- a. Your Product is an operating system distribution, or other aggregate
- software distribution (such as a cover CD-ROM of a magazine) containing
- products from different sources, in which You include either This Product
- without any modifications or file(s) which You obtain by compiling the
- unmodified source code of This Product.
-
- b. You include This Product in its entirety and without any modifications
- (You may omit the source code of This Product) as non-integral part of Your
- Product (i.e., none of the main functionalities of Your Product will be
- affected if such non-integral part is removed) and phrase "This product
- utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
- phrase "This product includes TrueCrypt, freely available at
- http://www.truecrypt.org/" is displayed by Your Product (if technically
- feasible) and contained in its documentation. In each of the cases
- mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
- hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
- and you may freely choose the location within the user interface (if there
- is any) of Your Product (e.g., an "About" window, etc.) and the way in
- which Your Product will display the respective phrase.
-
-
- 3. You are not obligated to comply with Section III.1.d if Your Product is not
- distributed (i.e., Your Product is available only to You).
-
-
-
- IV. Disclaimer of Warranties and Liabilities
-
- 1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE
- LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY
- OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
- ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
- SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
- SERVICING, REPAIR OR CORRECTION.
-
- 2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
- ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY
- MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR
- ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
- CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM,
- INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE
- OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
- OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD
- PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
- 3. THIS PRODUCT INCORPORATES IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT
- MAY BE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
- ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS
- SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT
- AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE
- IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO
- EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH
- REGULATIONS/RESTRICTIONS.
-
-
-
- V. Trademarks
-
- This License does not grant permission to use trademarks associated with (or
- applying to) This Product, except for fair use as defined by applicable law and
- except for use expressly permitted or required by this License.
-
- TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation.
- Note: The goal is not to monetize the name or the product, but to protect the
- reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
- software.
-
-
-
- VI. General Terms
-
- 1. You may not modify, copy, distribute, or sublicense This Product except as
- expressly provided under this License. Any attempt otherwise to modify, copy,
- distribute, or sublicense This Product automatically terminates Your rights
- under this License.
-
- 2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes
- This Product, or any part(s) thereof, is, by such action(s), accepting in full
- the responsibilities and obligations contained in this License.
-
- 3. If any term of this License is found to be invalid or unenforceable under
- applicable law, You agree that it shall not affect the validity or
- enforceability of any other terms of this License that are found to be valid
- and enforceable under applicable law.
-
- ____________________________________________________________
-
- License agreement for Encryption for the Masses.
-
- Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
-
- This product can be copied and distributed free of charge, including
- source code.
-
- You may modify this product and source code, and distribute such modifications,
- and you may derive new works based on this product, provided that:
-
- 1. Any product which is simply derived from this product cannot be
- called E4M, or Encryption for the Masses.
-
- 2. If you use any of the source code in your product, and your product
- is distributed with source code, you must include this notice with
- those portions of this source code that you use.
-
- Or,
-
- If your product is distributed in binary form only, you must display
- on any packaging, and marketing materials which reference
- your product, a notice which states:
-
- "This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
-
- 3. If you use any of the source code originally by Eric Young, you must
- in addition follow his terms and conditions.
-
- 4. Nothing requires that you accept this License, as you have not
- signed it. However, nothing else grants you permission to modify or
- distribute the product or its derivative works.
-
- These actions are prohibited by law if you do not accept this License.
-
- 5. If any of these license terms is found to be to broad in scope, and
- declared invalid by any court or legal process, you agree that all other
- terms shall not be so affected, and shall remain valid and enforceable.
-
- 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
- FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
- STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
- EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
- MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
- QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
- DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
- WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
- REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
- INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
- OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
- TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
- YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
- PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
- OF THE POSSIBILITY OF SUCH DAMAGES.
- ____________________________________________________________
-
- Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
- All rights reserved.
-
- This package is an SSL implementation written
- by Eric Young (eay@cryptsoft.com).
- The implementation was written so as to conform with Netscapes SSL.
-
- This library is free for commercial and non-commercial use as long as
- the following conditions are aheared to. The following conditions
- apply to all code found in this distribution, be it the RC4, RSA,
- lhash, DES, etc., code; not just the SSL code. The SSL documentation
- included with this distribution is covered by the same copyright terms
- except that the holder is Tim Hudson (tjh@cryptsoft.com).
-
- Copyright remains Eric Young's, and as such any Copyright notices in
- the code are not to be removed.
- If this package is used in a product, Eric Young should be given attribution
- as the author of the parts of the library used.
- This can be in the form of a textual message at program startup or
- in documentation (online or textual) provided with the package.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
- 3. All advertising materials mentioning features or use of this software
- must display the following acknowledgement:
- "This product includes cryptographic software written by
- Eric Young (eay@cryptsoft.com)"
- The word 'cryptographic' can be left out if the rouines from the library
- being used are not cryptographic related :-).
- 4. If you include any Windows specific code (or a derivative thereof) from
- the apps directory (application code) you must include an acknowledgement:
- "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
-
- THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- SUCH DAMAGE.
-
- The licence and distribution terms for any publically available version or
- derivative of this code cannot be changed. i.e. this code cannot simply be
- copied and put under another distribution licence
- [including the GNU Public Licence.]
- ____________________________________________________________
-
- Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
-
- LICENSE TERMS
-
- The free distribution and use of this software in both source and binary
- form is allowed (with or without changes) provided that:
-
- 1. distributions of this source code include the above copyright
- notice, this list of conditions and the following disclaimer;
-
- 2. distributions in binary form include the above copyright
- notice, this list of conditions and the following disclaimer
- in the documentation and/or other associated materials;
-
- 3. the copyright holder's name is not used to endorse products
- built using this software without specific written permission.
-
- ALTERNATIVELY, provided that this notice is retained in full, this product
- may be distributed under the terms of the GNU General Public License (GPL),
- in which case the provisions of the GPL apply INSTEAD OF those given above.
-
- DISCLAIMER
-
- This software is provided 'as is' with no explicit or implied warranties
- in respect of its properties, including, but not limited to, correctness
- and/or fitness for purpose.
- ____________________________________________________________
-
- This is an independent implementation of the encryption algorithm:
-
- Twofish by Bruce Schneier and colleagues
-
- which is a candidate algorithm in the Advanced Encryption Standard
- programme of the US National Institute of Standards and Technology.
-
- Copyright in this implementation is held by Dr B R Gladman but I
- hereby give permission for its free direct or derivative use subject
- to acknowledgment of its origin and compliance with any conditions
- that the originators of the algorithm place on its exploitation.
-
- My thanks to Doug Whiting and Niels Ferguson for comments that led
- to improvements in this implementation.
-
- Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
- ____________________________________________________________
-
- Copyright (c) 2001 Markus Friedl. All rights reserved.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the above copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
-
- THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-