home *** CD-ROM | disk | FTP | other *** search
- TRUECRYPT LICENSE
-
- This product may be used free of charge by individuals, non-profit
- organizations, commercial organizations, and government agencies, on single or
- multiple computers/systems for non-commercial and/or commercial uses.
-
- This product, including the source code and the documentation, may be copied
- and/or distributed free of charge.
-
- This product contains no mechanism or facility that would allow partial or
- complete recovery of your encrypted data without knowing the correct password
- or the key used to encrypt the data.
-
- AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT
- PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED
- "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
- BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
- PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
- ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
- COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
- PROGRAM AS PERMITTED BELOW, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
- GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
- INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
- BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
- FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
- OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
-
- You may modify this product and its source code, and distribute such
- modifications, and you may derive new works based on this product, provided
- that the following conditions are met:
-
- 1. Any product which is simply derived from this product must not be called
- E4M, or Encryption for the Masses (see also section 3.a.)
-
- 2. If you use any of the source code in your product, and your product is
- distributed with source code, you must include this notice with those
- portions of this source code that you use.
-
- or
-
- If your product is distributed in binary form only and you use any part of
- the source code by Paul Le Roux in your product, you must display on any
- packaging, and marketing materials which reference your product, a notice
- which states: "This product uses components written by Paul Le Roux
- <pleroux@swprofessionals.com>"
-
- 3. If you use any part of TrueCrypt (e.g., the source code, graphics, user
- interface, texts, etc.) created by the TrueCrypt Foundation and/or by the
- TrueCrypt Team (with or without modification) in your product or if you
- modify any of these parts (including, but not limited to, translation into
- another language, localization, porting to another platform, or adding a
- new feature/functionality), then the following additional conditions must
- be met:
-
- a. The product or the modified version must not be called TrueCrypt and
- its name must not contain the name TrueCrypt (for example, the
- following names are not allowed: TrueCrypt+, TrueCrypt Professional,
- etc.) nor any of its variations that can be easily confused with the
- name TrueCrypt (e.g., Truecrypt, TrueKrypt, etc.)
-
- b. Complete source code of the product or of the modified version must be
- freely and publicly available.
-
- c. Phrase "Based on TrueCrypt" must be displayed by the product (if
- technically feasible) or by the modified version and contained in its
- documentation. Alternatively, if the used parts represent only a minor
- portion of your product, phrase "Portions of this software are based in
- part on TrueCrypt" may be used instead.
-
- d. TrueCrypt Foundation and TrueCrypt Team must be given attribution as
- the authors of the parts used. This must be done in the way described
- in section 3.c.
-
- e. The licence and distribution terms of these modified or unmodified
- parts must not be changed (i.e., none of these parts can be put under
- another distribution licence). The legal notices attached to parts of
- the source code must be retained in full.
-
- 4. If you use any part of the source code originally by Eric Young, you must
- in addition follow his terms and conditions.
-
- 5. If you use any part of the source code by Dr. Brian Gladman in your
- product, you must in addition follow his terms and conditions.
-
- 6. If you use any part of the source code by Markus Friedl in your product,
- you must in addition follow his terms and conditions.
-
- 7. If you use any part of the source code by Dag Arne Osvik in your product,
- you must in addition follow his terms and conditions.
-
-
- Where applicable, the specific licenses attached to parts of the source code
- might take precedence over this general license. Each of the specific licenses
- applies only to the part of the source code it is attached to.
-
- If any of these license terms is found to be to broad in scope, and/or declared
- invalid by any court or legal process, you agree that all other terms shall not
- be so affected, and shall remain valid and enforceable.
-
- Nothing requires that you accept this license. However, nothing else grants you
- permission to use, modify, or distribute the product or its derivative works.
- These actions are prohibited by law if you do not accept this license.
-
- Portions of this software are:
- Copyright (c) 2004-2005 TrueCrypt Foundation. All Rights Reserved.
- Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved.
- Copyright (c) 2004 TrueCrypt Team. All Rights Reserved.
- Copyright (c) 1995-1997 Eric Young. All Rights Reserved.
- Copyright (c) 1999-2004 Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
- Copyright (c) 2001 Markus Friedl. All Rights Reserved.
- Copyright (c) 2000 Dag Arne Osvik. All Rights Reserved.
-
- For more information, see the legal notices attached to parts of the source code.
-
- This is a TrueCrypt Foundation release.
-
-
- END OF GENERAL LICENSE
-
-
- Component Legal Notices:
- ____________________________________________________________
-
- Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
- All rights reserved.
-
- This package is an SSL implementation written
- by Eric Young (eay@cryptsoft.com).
- The implementation was written so as to conform with Netscapes SSL.
-
- This library is free for commercial and non-commercial use as long as
- the following conditions are aheared to. The following conditions
- apply to all code found in this distribution, be it the RC4, RSA,
- lhash, DES, etc., code; not just the SSL code. The SSL documentation
- included with this distribution is covered by the same copyright terms
- except that the holder is Tim Hudson (tjh@cryptsoft.com).
-
- Copyright remains Eric Young's, and as such any Copyright notices in
- the code are not to be removed.
- If this package is used in a product, Eric Young should be given attribution
- as the author of the parts of the library used.
- This can be in the form of a textual message at program startup or
- in documentation (online or textual) provided with the package.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
- 3. All advertising materials mentioning features or use of this software
- must display the following acknowledgement:
- "This product includes cryptographic software written by
- Eric Young (eay@cryptsoft.com)"
- The word 'cryptographic' can be left out if the rouines from the library
- being used are not cryptographic related :-).
- 4. If you include any Windows specific code (or a derivative thereof) from
- the apps directory (application code) you must include an acknowledgement:
- "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
-
- THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- SUCH DAMAGE.
-
- The licence and distribution terms for any publically available version or
- derivative of this code cannot be changed. i.e. this code cannot simply be
- copied and put under another distribution licence
- [including the GNU Public Licence.]
- ____________________________________________________________
-
- Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
-
- LICENSE TERMS
-
- The free distribution and use of this software in both source and binary
- form is allowed (with or without changes) provided that:
-
- 1. distributions of this source code include the above copyright
- notice, this list of conditions and the following disclaimer;
-
- 2. distributions in binary form include the above copyright
- notice, this list of conditions and the following disclaimer
- in the documentation and/or other associated materials;
-
- 3. the copyright holder's name is not used to endorse products
- built using this software without specific written permission.
-
- ALTERNATIVELY, provided that this notice is retained in full, this product
- may be distributed under the terms of the GNU General Public License (GPL),
- in which case the provisions of the GPL apply INSTEAD OF those given above.
-
- DISCLAIMER
-
- This software is provided 'as is' with no explicit or implied warranties
- in respect of its properties, including, but not limited to, correctness
- and/or fitness for purpose.
- ____________________________________________________________
-
- This is an independent implementation of the encryption algorithm:
-
- Twofish by Bruce Schneier and colleagues
-
- which is a candidate algorithm in the Advanced Encryption Standard
- programme of the US National Institute of Standards and Technology.
-
- Copyright in this implementation is held by Dr B R Gladman but I
- hereby give permission for its free direct or derivative use subject
- to acknowledgment of its origin and compliance with any conditions
- that the originators of the algorithm place on its exploitation.
-
- My thanks to Doug Whiting and Niels Ferguson for comments that led
- to improvements in this implementation.
-
- Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
- ____________________________________________________________
-
- Except as noted below copyright in this code is held by Dr B.R. Gladman
- but free direct or derivative use is permitted subject to acknowledgement
- of its origin and subject to any constraints placed on the use of the
- algorithm by its designers (if such constraints may exist, this will be
- indicated below).
-
- Dr. B. R. Gladman ( ). 25th January 2000.
-
- This is an implementation of Serpent, an encryption algorithm designed
- by Anderson, Biham and Knudsen and submitted as a candidate for the
- Advanced Encryption Standard programme of the US National Institute of
- Standards and Technology.
-
- The designers of Serpent have not placed any constraints on the use of
- this algorithm.
-
- The S box expressions used below are Copyright (C) 2000 Dag Arne Osvik.
- ____________________________________________________________
-
- Copyright (c) 2001 Markus Friedl. All rights reserved.
-
- Redistribution and use in source and binary forms, with or without
- modification, are permitted provided that the following conditions
- are met:
- 1. Redistributions of source code must retain the above copyright
- notice, this list of conditions and the following disclaimer.
- 2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
-
- THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
- IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
- OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
- IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
- INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
- NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
- THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-