home *** CD-ROM | disk | FTP | other *** search
- TrueCrypt Collective License Version 1.2
-
-
- The TrueCrypt Collective License consists of several distinct licenses, which
- are contained in this document (separated by lines consisting of underscores)
- and which are, in this section, referred to as component licenses. Each of the
- component licenses applies only to (portions of) the source code file(s) in
- which the component license is contained or in which it is explicitly
- referenced, and to compiled or otherwise processed forms of such source code.
- None of the component licenses applies to this product as a whole, even when it
- uses the phrase "this product" or any other equivalent term/phrase. Unless
- otherwise stated, graphics and files that are not part of the source code are
- covered solely by the TrueCrypt License.
- Note: The TrueCrypt License is one of the component licenses of which the
- TrueCrypt Collective License consists.
-
- Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any
- part(s) of work made available under this version of the TrueCrypt Collective
- License, is, by such action(s), accepting in full the responsibilities and
- obligations contained in the component licenses that apply to the corresponding
- part(s) of such work.
-
- If any term of this license is found to be invalid or unenforceable under
- applicable law, it shall not affect the validity or enforceability of any other
- terms of this license that are found to be valid and enforceable under
- applicable law.
-
- ____________________________________________________________
-
- TrueCrypt License Version 2.3
-
-
- I. Definitions
-
- 1. "This Product" means the work (including, but not limited to, source code,
- graphics, texts, and accompanying files) made available under and covered by
- this version of this License, as may be indicated by, but is not limited to,
- copyright notice(s) attached to or included in the work.
-
- 2. "You" means (and "Your" refers to) an individual or a legal entity (e.g.,
- a non-profit organization, commercial organization, government agency, etc.)
- exercising rights under this License.
-
- 3. "Modification" means (and "modify" refers to) any alteration of This
- Product, including, but not limited to, addition to or deletion from the
- substance or structure of This Product, and translation into another language.
-
- 4. "Your Product" means This Product modified by You, any work You derive from
- (or base on) This Product, any work in which You include This Product, or any
- respective part(s) thereof.
-
- 5. "Distribution" means (and "distribute" refers to), regardless of means or
- methods, conveyance or transfer of This/Your Product or portions thereof to
- third parties, or making This/Your Product or portions thereof available for
- download to third parties, regardless of whether any third party downloads the
- product (or a portion thereof) made available for download or not.
-
-
-
- II. Terms and Conditions for Use, Reproduction, and Distribution
-
- 1. You may reproduce and/or distribute This Product, provided that You do not
- modify any part of This Product (for terms and conditions for reproduction and
- distribution of modified versions of This Product, see Section III) and
- provided that You ensure that all the legal notices and documents (containing,
- e.g., the text of this License, references to this License, etc.) included with
- This Product are included with every copy of This Product that you make and
- distribute, and provided that you comply with all applicable terms and
- conditions of this License.
-
- 2. Provided that you comply with all applicable terms and conditions of this
- License, You may use This Product freely (see also Section III) on any number
- of computers/systems for non-commercial and/or commercial purposes.
-
-
-
- III. Terms and Conditions for Modification and Derivation of New Products
-
- 1. If all conditions specified in the following paragraphs in this Section are
- met (for exceptions, see Sections III.2 and III.3), You may modify This Product
- (thus forming Your Product), derive new works from This Product or portions
- thereof (thus forming Your Product), include This Product or portions thereof
- in another product (thus forming Your Product), and You may copy and/or
- distribute Your Product.
-
- a. The name of Your Product (or of Your modified version of This Product)
- must not contain the name TrueCrypt (for example, the following names are
- not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
- etc.) nor any of its variations that can be easily confused with the name
- TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
-
- Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt
- Foundation. The goal is not to monetize the name or the product, but to
- protect the reputation of TrueCrypt, and to prevent support issues and
- other kinds of issues that might arise from the existence of similar
- products with the same or similar name. Even though TrueCrypt and the
- TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source
- and free software.
-
- All graphics files showing any TrueCrypt logo (including the non-textual
- logo consisting primarily of a key in stylized form) must be removed from
- Your Product (or from Your modified version of This Product) and from any
- associated materials. Logo(s) included in (or attached to) Your Product
- (or in/to associated materials) must not incorporate and must not be
- confusingly similar to any of the TrueCrypt logos or portion(s) thereof.
-
- b. The following phrases must be removed from Your Product and from any
- associated materials:
- "A TrueCrypt Foundation Release"
- "Released by TrueCrypt Foundation"
- "This is a TrueCrypt Foundation release."
-
- c. Phrase "Based on TrueCrypt, freely available at
- http://www.truecrypt.org/" must be displayed by Your Product (if
- technically feasible) and contained in its documentation. Alternatively, if
- This Product or its portion You included in Your Product comprises only a
- minor portion of Your Product, phrase "Portions of this product are based
- in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
- displayed instead. In each of the cases mentioned above in this paragraph,
- "http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
- pointing to http://www.truecrypt.org/ and you may freely choose the
- location within the user interface (if there is any) of Your Product (e.g.,
- an "About" window, etc.) and the way in which Your Product will display the
- respective phrase.
-
- Your Product (and any associated materials, e.g., the documentation, the
- content of the official web site of Your Product, etc.) must not present
- any Internet address containing the domain name truecrypt.org (or any
- domain name that forwards to the domain name truecrypt.org) in a manner
- that suggests that it is where information about Your Product may be
- obtained or where bugs found in Your Product may be reported or where
- support for Your Product may be available or otherwise attempt to indicate
- that the domain name truecrypt.org is associated with Your Product.
-
- d. The complete source code of Your Product must be freely and publicly
- available (for exceptions, see Sections III.2 and III.3) at least until you
- cease to distribute Your Product. To meet this condition, it is sufficient
- that You merely include the source code with every copy of Your Product
- that you make and distribute; it is also sufficient that You merely include
- information (valid and correct at least until you cease to distribute Your
- Product) about where the source code can be freely obtained (e.g., an
- Internet address, etc.) with every copy of Your Product that you make and
- distribute. The source code must be available under license(s) that are/is
- compatible with this version of the TrueCrypt License (however, see also
- Section III.1.e) and that allow(s) anyone to modify and derive new works
- from Your Product (and portions thereof) and to use, reproduce, and
- redistribute such modifications and/or derived works. The license(s) must
- be non-exclusive, royalty-free, no-charge, perpetual, and world-wide. The
- text of the license(s) must be included with every copy of Your Product
- that you make and distribute. The source code must not be deliberately
- obfuscated, and it must not be in an intermediate form (e.g., the output of
- a preprocessor). Source code means the preferred form in which a programmer
- would usually modify the program.
-
- Note: If you cannot comply with the above requirements, we may grant an
- exception under certain conditions. You may request an exception at:
- licensing@truecrypt.org
-
- e. You must not change the license and distribution terms of This Product
- in any way (i.e., no part of This Product may be put under another
- license). You must keep intact all the legal notices contained in the
- source code files. You must include the following items with every copy of
- Your Product that you make and distribute: a clear and conspicuous notice
- stating that Your Product or portion(s) thereof is/are distributed under
- this version of the TrueCrypt License, a verbatim copy of this version of
- the TrueCrypt License (as contained herein), a clear and conspicuous notice
- containing information about where the included copy of the License can be
- found, and an appropriate copyright notice.
-
- f. Without specific prior written permission from the authors of This
- Product (or from their common representative), you must not use the name of
- This Product, the names of the authors of This Product, or the names of the
- legal entities (or informal groups) of which the authors were/are
- members/employees, to endorse or promote Your Product, or in a way that
- suggests that Your Product is endorsed by one or more authors of This
- Product, or in a way that suggests that one or more authors of This Product
- directly participated in the creation of Your Product.
-
-
- 2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and
- III.1.d, if all conditions specified in one of the two following paragraphs are
- met:
-
- a. Your Product is an operating system distribution, or other aggregate
- software distribution (such as a cover CD-ROM of a magazine) containing
- products from different sources, in which You include either This Product
- without any modifications or file(s) which You obtain by compiling the
- unmodified source code of This Product.
-
- b. You include This Product in its entirety and without any modifications
- (You may omit the source code of This Product) as non-integral part of Your
- Product (i.e., none of the main functionalities of Your Product will be
- affected if such non-integral part is removed) and phrase "This product
- utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
- phrase "This product includes TrueCrypt, freely available at
- http://www.truecrypt.org/" is displayed by Your Product (if technically
- feasible) and contained in its documentation. In each of the cases
- mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
- hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
- and you may freely choose the location within the user interface (if there
- is any) of Your Product (e.g., an "About" window, etc.) and the way in
- which Your Product will display the respective phrase.
-
-
- 3. You are not obligated to comply with Section III.1.d if Your Product is not
- distributed (i.e., Your Product is available only to You).
-
-
-
- IV. Disclaimer of Warranties and Liabilities; Indemnification
-
- You expressly acknowledge and agree to the following:
-
- 1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE
- COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY REPRODUCE AND/OR
- (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE
- LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED
- TO, ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
- THE USE, REPRODUCTION, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A
- PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF),
- INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, LOSSES SUSTAINED BY
- YOU OR THIRD PARTIES, OR A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER
- PRODUCT, EVEN IF SUCH (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, AND/OR ANY OTHER
- PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
- 2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER
- EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF
- MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE
- ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU.
- SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
- SERVICING, REPAIR OR CORRECTION.
-
- 3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS
- THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
- ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
- IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS
- THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO
- IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND THAT IT IS SOLELY YOUR
- RESPONSIBILITY TO COMPLY WITH ANY SUCH REGULATIONS/RESTRICTIONS.
-
- 4. You shall indemnify, defend and hold all (co)authors of This Product, their
- agents and associates, and applicable copyright/trademark owners, harmless
- from/against any liability, loss, expense, damages, claims or causes of action,
- arising out of Your use, inability to use, reproduction, (re)distribution,
- import and/or (re)export of This Product (or portions thereof) and/or Your
- breach of any term of this License.
-
-
-
- V. Trademarks
-
- This License does not grant permission to use trademarks associated with (or
- applying to) This Product, except for fair use as defined by applicable law and
- except for use expressly permitted or required by this License.
-
- TrueCrypt and the TrueCrypt logos (including the non-textual logo consisting
- primarily of a key in stylized form) are trademarks of the TrueCrypt
- Foundation.
-
- Note: The goal is not to monetize the name or the product, but to protect the
- reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
- software.
-
-
-
- VI. General Terms
-
- 1. You may not use, modify, reproduce, derive from, (re)distribute, or
- sublicense This Product, or portion(s) thereof, except as expressly provided
- under this License. Any attempt (even if permitted by applicable law) otherwise
- to use, modify, reproduce, derive from, (re)distribute, or sublicense This
- Product, or portion(s) thereof, automatically and immediately terminates Your
- rights under this License.
-
- 2. ANYONE WHO USES AND/OR REPRODUCES AND/OR MODIFIES AND/OR DERIVES FROM AND/OR
- (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S),
- ACCEPTING ALL TERMS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS
- CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT THEM, DO NOT USE, MODIFY,
- REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S)
- THEREOF.
-
- 3. IF ANY PROVISION OF SECTION IV OF THIS LICENSE IS UNENFORCEABLE, PROHIBITED,
- OR INVALID UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU MAY NOT USE, MODIFY,
- REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S)
- THEREOF.
-
- 4. If any term of this License is found to be invalid or unenforceable under
- applicable law, You agree that it shall not affect the validity or
- enforceability of any other terms of this License that are found to be valid
- and enforceable under applicable law.
-
- ____________________________________________________________
-
- License agreement for Encryption for the Masses.
-
- Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
-
- This product can be copied and distributed free of charge, including
- source code.
-
- You may modify this product and source code, and distribute such modifications,
- and you may derive new works based on this product, provided that:
-
- 1. Any product which is simply derived from this product cannot be
- called E4M, or Encryption for the Masses.
-
- 2. If you use any of the source code in your product, and your product
- is distributed with source code, you must include this notice with
- those portions of this source code that you use.
-
- Or,
-
- If your product is distributed in binary form only, you must display
- on any packaging, and marketing materials which reference
- your product, a notice which states:
-
- "This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
-
- 3. If you use any of the source code originally by Eric Young, you must
- in addition follow his terms and conditions.
-
- 4. Nothing requires that you accept this License, as you have not
- signed it. However, nothing else grants you permission to modify or
- distribute the product or its derivative works.
-
- These actions are prohibited by law if you do not accept this License.
-
- 5. If any of these license terms is found to be to broad in scope, and
- declared invalid by any court or legal process, you agree that all other
- terms shall not be so affected, and shall remain valid and enforceable.
-
- 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
- FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
- STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
- EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
- MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
- QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
- DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
- WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
- REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
- INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
- OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
- TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
- YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
- PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
- OF THE POSSIBILITY OF SUCH DAMAGES.
- ____________________________________________________________
-
- Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
- All rights reserved.
-
- This package is an SSL implementation written
- by Eric Young (eay@cryptsoft.com).
- The implementation was written so as to conform with Netscapes SSL.
-
- This library is free for commercial and non-commercial use as long as
- the following conditions are aheared to. The following conditions
- apply to all code found in this distribution, be it the RC4, RSA,
- lhash, DES, etc., code; not just the SSL code. The SSL documentation
- included with this distribution is covered by the same copyright terms
- except that the holder is Tim Hudson (tjh@cryptsoft.com).
-
- Copyright remains Eric Young's, and as such any Copyright notices in
- the code are not to be removed.
- If this package is used in a product, Eric Young should be given attribution
- as the author of the parts of the library used.
- This can be in the form of a textual message at program startup or
- in documentation (online or textual) provided with the package.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
- 3. All advertising materials mentioning features or use of this software
- must display the following acknowledgement:
- "This product includes cryptographic software written by
- Eric Young (eay@cryptsoft.com)"
- The word 'cryptographic' can be left out if the rouines from the library
- being used are not cryptographic related :-).
- 4. If you include any Windows specific code (or a derivative thereof) from
- the apps directory (application code) you must include an acknowledgement:
- "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
-
- THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- SUCH DAMAGE.
-
- The licence and distribution terms for any publically available version or
- derivative of this code cannot be changed. i.e. this code cannot simply be
- copied and put under another distribution licence
- [including the GNU Public Licence.]
- ____________________________________________________________
-
- Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved.
-
- LICENSE TERMS
-
- The free distribution and use of this software in both source and binary
- form is allowed (with or without changes) provided that:
-
- 1. distributions of this source code include the above copyright
- notice, this list of conditions and the following disclaimer;
-
- 2. distributions in binary form include the above copyright
- notice, this list of conditions and the following disclaimer
- in the documentation and/or other associated materials;
-
- 3. the copyright holder's name is not used to endorse products
- built using this software without specific written permission.
-
- ALTERNATIVELY, provided that this notice is retained in full, this product
- may be distributed under the terms of the GNU General Public License (GPL),
- in which case the provisions of the GPL apply INSTEAD OF those given above.
-
- DISCLAIMER
-
- This software is provided 'as is' with no explicit or implied warranties
- in respect of its properties, including, but not limited to, correctness
- and/or fitness for purpose.
- ____________________________________________________________
-
- This is an independent implementation of the encryption algorithm:
-
- Twofish by Bruce Schneier and colleagues
-
- which is a candidate algorithm in the Advanced Encryption Standard
- programme of the US National Institute of Standards and Technology.
-
- Copyright in this implementation is held by Dr B R Gladman but I
- hereby give permission for its free direct or derivative use subject
- to acknowledgment of its origin and compliance with any conditions
- that the originators of the algorithm place on its exploitation.
-
- My thanks to Doug Whiting and Niels Ferguson for comments that led
- to improvements in this implementation.
-
- Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
- ____________________________________________________________
-
- Copyright (c) 2001 Markus Friedl. All rights reserved.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the above copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
-
- THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-