/[gentoo-x86]/licenses/truecrypt-2.0
Gentoo

Contents of /licenses/truecrypt-2.0

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.2 - (hide annotations) (download)
Mon Feb 5 22:32:13 2007 UTC (12 years, 8 months ago) by mr_bones_
Branch: MAIN
CVS Tags: HEAD
Changes since 1.1: +0 -0 lines
FILE REMOVED
remove a bunch of unused licenses related to xfree86

1 dragonheart 1.1 TrueCrypt License Version 2.0
2    
3    
4     I. Definitions
5    
6     1. "This product" means the parts of the computer software, including, but not
7     limited to, source code, texts, graphics, and any accompanying files, released
8     under and covered by this version of this License.
9    
10     2. "You" (or "your") means an individual or a legal entity (e.g., a non-profit
11     organization, commercial organization, government agency, etc.) exercising
12     permissions granted by this License.
13    
14    
15    
16     II. Terms and Conditions for Copying, Distribution, and Use
17    
18     1. You may copy and/or distribute this product without any restrictions,
19     provided that the product is not modified and that it is not repackaged (for
20     terms and conditions for copying and distribution of modified or repackaged
21     versions of this product, see Section III.)
22    
23     2. You may use this product freely (see also Section III.) on single or
24     multiple computers/systems for non-commercial and/or commercial uses.
25    
26    
27    
28     III. Terms and Conditions for Modification and Derivation of New Products
29    
30     1. You may modify this product (this also covers implementation of new
31     features/functionalities, translation into another language, and porting to
32     another platform), derive new works from this product, include/use this product
33     or its portion in (or as part of) your product, and you may copy and distribute
34     such modifications, derivative or aggregated works as your product, provided
35     that the following conditions are met (for exceptions, see Sections III.2.
36     and III.3.):
37    
38     a. Your product or the modified version must not be called TrueCrypt and
39     its name must not contain the name TrueCrypt (for example, the following
40     names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of
41     its variations that can be easily confused with the name TrueCrypt (e.g.,
42     Truecrypt, True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
43    
44     Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
45     to monetize the name or the product, but to protect the reputation of
46     TrueCrypt, and to prevent support issues and other kinds of issues that
47     might arise from the existence of similar products with the same or similar
48     name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
49     open-source and free software.
50    
51     b. The following phrases must be removed from the "About" dialog (the
52     credits), from this License (Section VI.), and from any other accompanying
53     materials:
54     "A TrueCrypt Foundation Release"
55     "Released by TrueCrypt Foundation"
56     "This is a TrueCrypt Foundation release."
57    
58     c. Phrase "Based on TrueCrypt" must be displayed by your product (if
59     technically feasible) or by the modified version and contained in its
60     documentation. Alternatively, if this product or its portion you included
61     in your product comprise only a minor portion of your product, phrase
62     "Portions of this product are based in part on TrueCrypt" may be used
63     instead.
64    
65     d. Complete source code of your product or of the modified version must be
66     freely and publicly available. If the source code is not included with
67     every copy of your product/modifications, there must be a well-publicized
68     means of obtaining the source code, preferably, downloading via the
69     Internet without charge. The source code must not be deliberately
70     obfuscated, and it must not be in an intermediate form (e.g., the output of
71     a preprocessor). Source code means the preferred form in which a programmer
72     would usually modify the program.
73    
74     e. The license and distribution terms of no part of this product may be
75     changed (i.e., no part of this product can be put under another license),
76     except as expressly permitted or required by this License. The legal
77     notices contained in the source code files must be retained. It must be
78     clearly declared that this product or its parts are distributed under the
79     TrueCrypt License (contained herein), and it must be clearly and visibly
80     stated in the distribution where the text of the TrueCrypt License can be
81     found (you may amend the references to the file 'License.txt' in the source
82     code accordingly). The text of the TrueCrypt License must accompany (be
83     distributed along with) your product/modifications. (Any of the Component
84     Legal Notices contained below in this file may be omitted if the component
85     to which it pertains is not used. If no cryptographic components of this
86     product are used, Section IV.3. may be omitted as well.)
87    
88    
89     2. You are not obligated to comply with Sections III.1.a., III.1.b., III.1.c.,
90     and III.1.d. if at least one of the following conditions is met:
91    
92     a. You include this product in its entirety and without any modifications
93     in an operating system distribution (i.e., you include binaries obtained by
94     compiling the unmodified source code of this product and/or you include the
95     unmodified contents of the source code distribution archive and/or of the
96     binary distribution archive).
97    
98     b. You include this product in its entirety (the contents of either the
99     source code distribution archive and/or of the binary distribution archive)
100     and without any modifications as non-integral part of your product (i.e.,
101     the main functionality of your product will not be affected if such
102     non-integral part is removed) and phrase "This product utilizes TrueCrypt"
103     or "This product includes TrueCrypt" is displayed by your product (if
104     technically feasible) and contained in its documentation.
105    
106    
107     3. You are not obligated to comply with Section III.1.d. if at least one of the
108     following conditions is met:
109    
110     a. Your product/modifications (as defined in Section III.1.) are not
111     distributed (i.e., your product/modifications are available only to you).
112    
113     b. Your product/modifications (as defined in Section III.1.) are
114     distributed and used only internally within the organization and only by
115     members/employees of the organization for which you created the
116     product/modifications and of which you were a member/employee when you
117     created the product/modifications. (Here the word "organization" means
118     a non-commercial or commercial organization, or a government agency.)
119    
120    
121    
122     IV. Disclaimer of Warranties and Liabilities
123    
124     1. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT
125     PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED
126     "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
127     BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
128     A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
129     PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
130     ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
131    
132     2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
133     ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR DISTRIBUTE THE
134     PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
135     GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
136     INABILITY TO USE THE PROGRAM, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR
137     DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
138     FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
139     OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
140    
141     3. THIS PRODUCT INCORPORATES CRYPTOGRAPHIC ALGORITHMS THAT MAY BE REGULATED OR
142     ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
143     IS LEGAL TO IMPORT AND/OR EXPORT AND/OR USE THIS PRODUCT IN COUNTRIES WHERE YOU
144     INTEND TO USE THIS PRODUCT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM
145     WHICH YOU INTEND TO EXPORT IT.
146    
147    
148    
149     V. General Terms
150    
151     1. Where applicable, the component licenses contained in parts of the source
152     code and quoted below herein (Section "Component Legal Notices") might take
153     precedence over the TrueCrypt License.
154    
155     2. This product is provided under the terms of this license (agreement). Any
156     use, reproduction, distribution, or modification of this product or any of its
157     parts constitutes recipient's acceptance of this agreement.
158    
159     3. You may not modify, copy, distribute, or sublicense this product except as
160     expressly provided under this License. Any attempt otherwise to modify, copy,
161     distribute, or sublicense this product automatically terminates your rights
162     under this License.
163    
164     4. If any of the license terms is found to be too broad in scope, and/or
165     declared invalid by any court or legal process, you agree that all other terms
166     shall not be so affected, and shall remain valid and enforceable.
167    
168    
169    
170     VI. Copyright and Trademark Information
171    
172     TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not to
173     monetize the name or the product, but to protect the reputation of TrueCrypt,
174     and to prevent support issues and other kinds of issues that might arise from
175     the existence of similar products with the same or similar name. Even though
176     TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free
177     software. All other trademarks are the sole property of their respective
178     owners.
179    
180     Portions of this software are:
181     Copyright (c) TrueCrypt Foundation. All Rights Reserved.
182     Copyright (c) Paul Le Roux. All Rights Reserved.
183     Copyright (c) TrueCrypt Team. All Rights Reserved.
184     Copyright (c) Eric Young. All Rights Reserved.
185     Copyright (c) Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
186     Copyright (c) Markus Friedl. All Rights Reserved.
187    
188     For more information, please see the legal notices attached to parts of the
189     source code.
190    
191     Graphics (logos, icons, etc.) are Copyright (c) TrueCrypt Foundation
192    
193    
194    
195     COMPONENT LEGAL NOTICES
196    
197     Each of the following component licenses applies only to (portions of) the
198     source code file(s) in which the component license is contained or in which it
199     is explicitly referenced, and to compiled or otherwise processed forms of such
200     source code. In other words, none of the following licenses applies to this
201     product as a whole, even when it uses the term "this product" or any other
202     equivalent term.
203     ____________________________________________________________
204    
205     License agreement for Encryption for the Masses.
206    
207     Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
208    
209     This product can be copied and distributed free of charge, including
210     source code.
211    
212     You may modify this product and source code, and distribute such modifications,
213     and you may derive new works based on this product, provided that:
214    
215     1. Any product which is simply derived from this product cannot be
216     called E4M, or Encryption for the Masses.
217    
218     2. If you use any of the source code in your product, and your product
219     is distributed with source code, you must include this notice with
220     those portions of this source code that you use.
221    
222     Or,
223    
224     If your product is distributed in binary form only, you must display
225     on any packaging, and marketing materials which reference
226     your product, a notice which states:
227    
228     "This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
229    
230     3. If you use any of the source code originally by Eric Young, you must
231     in addition follow his terms and conditions.
232    
233     4. Nothing requires that you accept this License, as you have not
234     signed it. However, nothing else grants you permission to modify or
235     distribute the product or its derivative works.
236    
237     These actions are prohibited by law if you do not accept this License.
238    
239     5. If any of these license terms is found to be to broad in scope, and
240     declared invalid by any court or legal process, you agree that all other
241     terms shall not be so affected, and shall remain valid and enforceable.
242    
243     6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
244     FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
245     STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
246     EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
247     MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
248     QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
249     DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
250    
251     7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
252     WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
253     REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
254     INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
255     OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
256     TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
257     YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
258     PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
259     OF THE POSSIBILITY OF SUCH DAMAGES.
260     ____________________________________________________________
261    
262     Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
263     All rights reserved.
264    
265     This package is an SSL implementation written
266     by Eric Young (eay@cryptsoft.com).
267     The implementation was written so as to conform with Netscapes SSL.
268    
269     This library is free for commercial and non-commercial use as long as
270     the following conditions are aheared to. The following conditions
271     apply to all code found in this distribution, be it the RC4, RSA,
272     lhash, DES, etc., code; not just the SSL code. The SSL documentation
273     included with this distribution is covered by the same copyright terms
274     except that the holder is Tim Hudson (tjh@cryptsoft.com).
275    
276     Copyright remains Eric Young's, and as such any Copyright notices in
277     the code are not to be removed.
278     If this package is used in a product, Eric Young should be given attribution
279     as the author of the parts of the library used.
280     This can be in the form of a textual message at program startup or
281     in documentation (online or textual) provided with the package.
282    
283     Redistribution and use in source and binary forms, with or without
284     modification, are permitted provided that the following conditions
285     are met:
286     1. Redistributions of source code must retain the copyright
287     notice, this list of conditions and the following disclaimer.
288     2. Redistributions in binary form must reproduce the above copyright
289     notice, this list of conditions and the following disclaimer in the
290     documentation and/or other materials provided with the distribution.
291     3. All advertising materials mentioning features or use of this software
292     must display the following acknowledgement:
293     "This product includes cryptographic software written by
294     Eric Young (eay@cryptsoft.com)"
295     The word 'cryptographic' can be left out if the rouines from the library
296     being used are not cryptographic related :-).
297     4. If you include any Windows specific code (or a derivative thereof) from
298     the apps directory (application code) you must include an acknowledgement:
299     "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
300    
301     THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
302     ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
303     IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
304     ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
305     FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
306     DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
307     OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
308     HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
309     LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
310     OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
311     SUCH DAMAGE.
312    
313     The licence and distribution terms for any publically available version or
314     derivative of this code cannot be changed. i.e. this code cannot simply be
315     copied and put under another distribution licence
316     [including the GNU Public Licence.]
317     ____________________________________________________________
318    
319     Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
320    
321     LICENSE TERMS
322    
323     The free distribution and use of this software in both source and binary
324     form is allowed (with or without changes) provided that:
325    
326     1. distributions of this source code include the above copyright
327     notice, this list of conditions and the following disclaimer;
328    
329     2. distributions in binary form include the above copyright
330     notice, this list of conditions and the following disclaimer
331     in the documentation and/or other associated materials;
332    
333     3. the copyright holder's name is not used to endorse products
334     built using this software without specific written permission.
335    
336     ALTERNATIVELY, provided that this notice is retained in full, this product
337     may be distributed under the terms of the GNU General Public License (GPL),
338     in which case the provisions of the GPL apply INSTEAD OF those given above.
339    
340     DISCLAIMER
341    
342     This software is provided 'as is' with no explicit or implied warranties
343     in respect of its properties, including, but not limited to, correctness
344     and/or fitness for purpose.
345     ____________________________________________________________
346    
347     This is an independent implementation of the encryption algorithm:
348    
349     Twofish by Bruce Schneier and colleagues
350    
351     which is a candidate algorithm in the Advanced Encryption Standard
352     programme of the US National Institute of Standards and Technology.
353    
354     Copyright in this implementation is held by Dr B R Gladman but I
355     hereby give permission for its free direct or derivative use subject
356     to acknowledgment of its origin and compliance with any conditions
357     that the originators of the algorithm place on its exploitation.
358    
359     My thanks to Doug Whiting and Niels Ferguson for comments that led
360     to improvements in this implementation.
361    
362     Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
363     ____________________________________________________________
364    
365     Copyright (c) 2001 Markus Friedl. All rights reserved.
366    
367     Redistribution and use in source and binary forms, with or without
368     modification, are permitted provided that the following conditions
369     are met:
370     1. Redistributions of source code must retain the above copyright
371     notice, this list of conditions and the following disclaimer.
372     2. Redistributions in binary form must reproduce the above copyright
373     notice, this list of conditions and the following disclaimer in the
374     documentation and/or other materials provided with the distribution.
375    
376     THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
377     IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
378     OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
379     IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
380     INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
381     NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
382     DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
383     THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
384     (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
385     THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

  ViewVC Help
Powered by ViewVC 1.1.20