/[gentoo-x86]/licenses/truecrypt-2.0
Gentoo

Contents of /licenses/truecrypt-2.0

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.1 - (show annotations) (download)
Mon Jun 5 08:13:29 2006 UTC (13 years, 5 months ago) by dragonheart
Branch: MAIN
added truecrypt-2.0

1 TrueCrypt License Version 2.0
2
3
4 I. Definitions
5
6 1. "This product" means the parts of the computer software, including, but not
7 limited to, source code, texts, graphics, and any accompanying files, released
8 under and covered by this version of this License.
9
10 2. "You" (or "your") means an individual or a legal entity (e.g., a non-profit
11 organization, commercial organization, government agency, etc.) exercising
12 permissions granted by this License.
13
14
15
16 II. Terms and Conditions for Copying, Distribution, and Use
17
18 1. You may copy and/or distribute this product without any restrictions,
19 provided that the product is not modified and that it is not repackaged (for
20 terms and conditions for copying and distribution of modified or repackaged
21 versions of this product, see Section III.)
22
23 2. You may use this product freely (see also Section III.) on single or
24 multiple computers/systems for non-commercial and/or commercial uses.
25
26
27
28 III. Terms and Conditions for Modification and Derivation of New Products
29
30 1. You may modify this product (this also covers implementation of new
31 features/functionalities, translation into another language, and porting to
32 another platform), derive new works from this product, include/use this product
33 or its portion in (or as part of) your product, and you may copy and distribute
34 such modifications, derivative or aggregated works as your product, provided
35 that the following conditions are met (for exceptions, see Sections III.2.
36 and III.3.):
37
38 a. Your product or the modified version must not be called TrueCrypt and
39 its name must not contain the name TrueCrypt (for example, the following
40 names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of
41 its variations that can be easily confused with the name TrueCrypt (e.g.,
42 Truecrypt, True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
43
44 Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
45 to monetize the name or the product, but to protect the reputation of
46 TrueCrypt, and to prevent support issues and other kinds of issues that
47 might arise from the existence of similar products with the same or similar
48 name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
49 open-source and free software.
50
51 b. The following phrases must be removed from the "About" dialog (the
52 credits), from this License (Section VI.), and from any other accompanying
53 materials:
54 "A TrueCrypt Foundation Release"
55 "Released by TrueCrypt Foundation"
56 "This is a TrueCrypt Foundation release."
57
58 c. Phrase "Based on TrueCrypt" must be displayed by your product (if
59 technically feasible) or by the modified version and contained in its
60 documentation. Alternatively, if this product or its portion you included
61 in your product comprise only a minor portion of your product, phrase
62 "Portions of this product are based in part on TrueCrypt" may be used
63 instead.
64
65 d. Complete source code of your product or of the modified version must be
66 freely and publicly available. If the source code is not included with
67 every copy of your product/modifications, there must be a well-publicized
68 means of obtaining the source code, preferably, downloading via the
69 Internet without charge. The source code must not be deliberately
70 obfuscated, and it must not be in an intermediate form (e.g., the output of
71 a preprocessor). Source code means the preferred form in which a programmer
72 would usually modify the program.
73
74 e. The license and distribution terms of no part of this product may be
75 changed (i.e., no part of this product can be put under another license),
76 except as expressly permitted or required by this License. The legal
77 notices contained in the source code files must be retained. It must be
78 clearly declared that this product or its parts are distributed under the
79 TrueCrypt License (contained herein), and it must be clearly and visibly
80 stated in the distribution where the text of the TrueCrypt License can be
81 found (you may amend the references to the file 'License.txt' in the source
82 code accordingly). The text of the TrueCrypt License must accompany (be
83 distributed along with) your product/modifications. (Any of the Component
84 Legal Notices contained below in this file may be omitted if the component
85 to which it pertains is not used. If no cryptographic components of this
86 product are used, Section IV.3. may be omitted as well.)
87
88
89 2. You are not obligated to comply with Sections III.1.a., III.1.b., III.1.c.,
90 and III.1.d. if at least one of the following conditions is met:
91
92 a. You include this product in its entirety and without any modifications
93 in an operating system distribution (i.e., you include binaries obtained by
94 compiling the unmodified source code of this product and/or you include the
95 unmodified contents of the source code distribution archive and/or of the
96 binary distribution archive).
97
98 b. You include this product in its entirety (the contents of either the
99 source code distribution archive and/or of the binary distribution archive)
100 and without any modifications as non-integral part of your product (i.e.,
101 the main functionality of your product will not be affected if such
102 non-integral part is removed) and phrase "This product utilizes TrueCrypt"
103 or "This product includes TrueCrypt" is displayed by your product (if
104 technically feasible) and contained in its documentation.
105
106
107 3. You are not obligated to comply with Section III.1.d. if at least one of the
108 following conditions is met:
109
110 a. Your product/modifications (as defined in Section III.1.) are not
111 distributed (i.e., your product/modifications are available only to you).
112
113 b. Your product/modifications (as defined in Section III.1.) are
114 distributed and used only internally within the organization and only by
115 members/employees of the organization for which you created the
116 product/modifications and of which you were a member/employee when you
117 created the product/modifications. (Here the word "organization" means
118 a non-commercial or commercial organization, or a government agency.)
119
120
121
122 IV. Disclaimer of Warranties and Liabilities
123
124 1. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT
125 PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED
126 "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
127 BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
128 A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
129 PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
130 ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
131
132 2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
133 ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR DISTRIBUTE THE
134 PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
135 GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
136 INABILITY TO USE THE PROGRAM, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR
137 DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
138 FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
139 OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
140
141 3. THIS PRODUCT INCORPORATES CRYPTOGRAPHIC ALGORITHMS THAT MAY BE REGULATED OR
142 ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
143 IS LEGAL TO IMPORT AND/OR EXPORT AND/OR USE THIS PRODUCT IN COUNTRIES WHERE YOU
144 INTEND TO USE THIS PRODUCT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM
145 WHICH YOU INTEND TO EXPORT IT.
146
147
148
149 V. General Terms
150
151 1. Where applicable, the component licenses contained in parts of the source
152 code and quoted below herein (Section "Component Legal Notices") might take
153 precedence over the TrueCrypt License.
154
155 2. This product is provided under the terms of this license (agreement). Any
156 use, reproduction, distribution, or modification of this product or any of its
157 parts constitutes recipient's acceptance of this agreement.
158
159 3. You may not modify, copy, distribute, or sublicense this product except as
160 expressly provided under this License. Any attempt otherwise to modify, copy,
161 distribute, or sublicense this product automatically terminates your rights
162 under this License.
163
164 4. If any of the license terms is found to be too broad in scope, and/or
165 declared invalid by any court or legal process, you agree that all other terms
166 shall not be so affected, and shall remain valid and enforceable.
167
168
169
170 VI. Copyright and Trademark Information
171
172 TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not to
173 monetize the name or the product, but to protect the reputation of TrueCrypt,
174 and to prevent support issues and other kinds of issues that might arise from
175 the existence of similar products with the same or similar name. Even though
176 TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free
177 software. All other trademarks are the sole property of their respective
178 owners.
179
180 Portions of this software are:
181 Copyright (c) TrueCrypt Foundation. All Rights Reserved.
182 Copyright (c) Paul Le Roux. All Rights Reserved.
183 Copyright (c) TrueCrypt Team. All Rights Reserved.
184 Copyright (c) Eric Young. All Rights Reserved.
185 Copyright (c) Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
186 Copyright (c) Markus Friedl. All Rights Reserved.
187
188 For more information, please see the legal notices attached to parts of the
189 source code.
190
191 Graphics (logos, icons, etc.) are Copyright (c) TrueCrypt Foundation
192
193
194
195 COMPONENT LEGAL NOTICES
196
197 Each of the following component licenses applies only to (portions of) the
198 source code file(s) in which the component license is contained or in which it
199 is explicitly referenced, and to compiled or otherwise processed forms of such
200 source code. In other words, none of the following licenses applies to this
201 product as a whole, even when it uses the term "this product" or any other
202 equivalent term.
203 ____________________________________________________________
204
205 License agreement for Encryption for the Masses.
206
207 Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
208
209 This product can be copied and distributed free of charge, including
210 source code.
211
212 You may modify this product and source code, and distribute such modifications,
213 and you may derive new works based on this product, provided that:
214
215 1. Any product which is simply derived from this product cannot be
216 called E4M, or Encryption for the Masses.
217
218 2. If you use any of the source code in your product, and your product
219 is distributed with source code, you must include this notice with
220 those portions of this source code that you use.
221
222 Or,
223
224 If your product is distributed in binary form only, you must display
225 on any packaging, and marketing materials which reference
226 your product, a notice which states:
227
228 "This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
229
230 3. If you use any of the source code originally by Eric Young, you must
231 in addition follow his terms and conditions.
232
233 4. Nothing requires that you accept this License, as you have not
234 signed it. However, nothing else grants you permission to modify or
235 distribute the product or its derivative works.
236
237 These actions are prohibited by law if you do not accept this License.
238
239 5. If any of these license terms is found to be to broad in scope, and
240 declared invalid by any court or legal process, you agree that all other
241 terms shall not be so affected, and shall remain valid and enforceable.
242
243 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
244 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
245 STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
246 EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
247 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
248 QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
249 DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
250
251 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
252 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
253 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
254 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
255 OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
256 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
257 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
258 PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
259 OF THE POSSIBILITY OF SUCH DAMAGES.
260 ____________________________________________________________
261
262 Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
263 All rights reserved.
264
265 This package is an SSL implementation written
266 by Eric Young (eay@cryptsoft.com).
267 The implementation was written so as to conform with Netscapes SSL.
268
269 This library is free for commercial and non-commercial use as long as
270 the following conditions are aheared to. The following conditions
271 apply to all code found in this distribution, be it the RC4, RSA,
272 lhash, DES, etc., code; not just the SSL code. The SSL documentation
273 included with this distribution is covered by the same copyright terms
274 except that the holder is Tim Hudson (tjh@cryptsoft.com).
275
276 Copyright remains Eric Young's, and as such any Copyright notices in
277 the code are not to be removed.
278 If this package is used in a product, Eric Young should be given attribution
279 as the author of the parts of the library used.
280 This can be in the form of a textual message at program startup or
281 in documentation (online or textual) provided with the package.
282
283 Redistribution and use in source and binary forms, with or without
284 modification, are permitted provided that the following conditions
285 are met:
286 1. Redistributions of source code must retain the copyright
287 notice, this list of conditions and the following disclaimer.
288 2. Redistributions in binary form must reproduce the above copyright
289 notice, this list of conditions and the following disclaimer in the
290 documentation and/or other materials provided with the distribution.
291 3. All advertising materials mentioning features or use of this software
292 must display the following acknowledgement:
293 "This product includes cryptographic software written by
294 Eric Young (eay@cryptsoft.com)"
295 The word 'cryptographic' can be left out if the rouines from the library
296 being used are not cryptographic related :-).
297 4. If you include any Windows specific code (or a derivative thereof) from
298 the apps directory (application code) you must include an acknowledgement:
299 "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
300
301 THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
302 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
303 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
304 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
305 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
306 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
307 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
308 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
309 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
310 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
311 SUCH DAMAGE.
312
313 The licence and distribution terms for any publically available version or
314 derivative of this code cannot be changed. i.e. this code cannot simply be
315 copied and put under another distribution licence
316 [including the GNU Public Licence.]
317 ____________________________________________________________
318
319 Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
320
321 LICENSE TERMS
322
323 The free distribution and use of this software in both source and binary
324 form is allowed (with or without changes) provided that:
325
326 1. distributions of this source code include the above copyright
327 notice, this list of conditions and the following disclaimer;
328
329 2. distributions in binary form include the above copyright
330 notice, this list of conditions and the following disclaimer
331 in the documentation and/or other associated materials;
332
333 3. the copyright holder's name is not used to endorse products
334 built using this software without specific written permission.
335
336 ALTERNATIVELY, provided that this notice is retained in full, this product
337 may be distributed under the terms of the GNU General Public License (GPL),
338 in which case the provisions of the GPL apply INSTEAD OF those given above.
339
340 DISCLAIMER
341
342 This software is provided 'as is' with no explicit or implied warranties
343 in respect of its properties, including, but not limited to, correctness
344 and/or fitness for purpose.
345 ____________________________________________________________
346
347 This is an independent implementation of the encryption algorithm:
348
349 Twofish by Bruce Schneier and colleagues
350
351 which is a candidate algorithm in the Advanced Encryption Standard
352 programme of the US National Institute of Standards and Technology.
353
354 Copyright in this implementation is held by Dr B R Gladman but I
355 hereby give permission for its free direct or derivative use subject
356 to acknowledgment of its origin and compliance with any conditions
357 that the originators of the algorithm place on its exploitation.
358
359 My thanks to Doug Whiting and Niels Ferguson for comments that led
360 to improvements in this implementation.
361
362 Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
363 ____________________________________________________________
364
365 Copyright (c) 2001 Markus Friedl. All rights reserved.
366
367 Redistribution and use in source and binary forms, with or without
368 modification, are permitted provided that the following conditions
369 are met:
370 1. Redistributions of source code must retain the above copyright
371 notice, this list of conditions and the following disclaimer.
372 2. Redistributions in binary form must reproduce the above copyright
373 notice, this list of conditions and the following disclaimer in the
374 documentation and/or other materials provided with the distribution.
375
376 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
377 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
378 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
379 IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
380 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
381 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
382 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
383 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
384 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
385 THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

  ViewVC Help
Powered by ViewVC 1.1.20