/[gentoo-x86]/licenses/truecrypt-collective-1.0
Gentoo

Contents of /licenses/truecrypt-collective-1.0

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.2 - (show annotations) (download)
Thu Oct 14 17:02:22 2010 UTC (8 years, 11 months ago) by mr_bones_
Branch: MAIN
CVS Tags: HEAD
Changes since 1.1: +0 -0 lines
FILE REMOVED
remove unused licenses

1 TrueCrypt Collective License Version 1.0
2
3
4 The TrueCrypt Collective License consists of several distinct licenses, which
5 are contained in this document (separated by lines consisting of underscores)
6 and which are, in this section, referred to as component licenses. Each of the
7 component licenses applies only to (portions of) the source code file(s) in
8 which the component license is contained or in which it is explicitly
9 referenced, and to compiled or otherwise processed forms of such source code.
10 None of the component licenses applies to this product as a whole, even when it
11 uses the phrase "this product" or any other equivalent term/phrase. Unless
12 otherwise stated, graphics and files that are not part of the source code are
13 covered solely by the TrueCrypt License.
14 Note: The TrueCrypt License is one of the component licenses of which the
15 TrueCrypt Collective License consists.
16
17 Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any
18 part(s) of work made available under this version of the TrueCrypt Collective
19 License, is, by such action(s), accepting in full the responsibilities and
20 obligations contained in the component licenses that apply to the corresponding
21 part(s) of such work.
22
23 If any term of this license is found to be invalid or unenforceable under
24 applicable law, it shall not affect the validity or enforceability of any other
25 terms of this license that are found to be valid and enforceable under
26 applicable law.
27
28 ____________________________________________________________
29
30 TrueCrypt License Version 2.1
31
32
33 I. Definitions
34
35 1. "This Product" means the work (including, but not limited to, source code,
36 graphics, texts, and accompanying files) made available under and covered by
37 this version of this License, as indicated by a copyright notice attached to or
38 included in the work.
39
40 2. "You" (or "Your") means an individual or a legal entity (e.g., a non-profit
41 organization, commercial organization, government agency, etc.) exercising
42 rights under this License.
43
44 3. "Modification" means any alteration of This Product, including, but not
45 limited to, addition to or deletion from the substance or structure of This
46 Product, and translation into another language.
47
48 4. "Your Product" means This Product modified by You, any work You derive from
49 (or base on) This Product, any work in which You include This Product, or any
50 respective part(s) thereof.
51
52
53
54 II. Terms and Conditions for Use, Reproduction, and Distribution
55
56 1. You may copy and/or distribute This Product, provided that You do not modify
57 any part of This Product (for terms and conditions for reproduction and
58 distribution of modified versions of This Product, see Section III) and
59 provided that You ensure that all the legal notices and documents (containing,
60 e.g., the text of this License, references to this License, etc.) included with
61 This Product are included with every copy of This Product that you make and
62 distribute.
63
64 2. You may use This Product freely (see also Section III) on any number of
65 computers/systems for non-commercial and/or commercial purposes.
66
67
68
69 III. Terms and Conditions for Modification and Derivation of New Products
70
71 1. You may modify This Product (thus forming Your Product), derive new works
72 from This Product or portions thereof (thus forming Your Product), include This
73 Product or portions thereof in another product (thus forming Your Product), and
74 You may copy and/or distribute Your Product, only if the following conditions
75 are met (for exceptions, see Sections III.2 and III.3):
76
77 a. The name of Your Product (or of Your modified version of This Product)
78 must not contain the name TrueCrypt (for example, the following names are
79 not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
80 etc.) nor any of its variations that can be easily confused with the name
81 TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)
82
83 Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
84 to monetize the name or the product, but to protect the reputation of
85 TrueCrypt, and to prevent support issues and other kinds of issues that
86 might arise from the existence of similar products with the same or similar
87 name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
88 open-source and free software.
89
90 b. The following phrases must be removed from Your Product:
91 "A TrueCrypt Foundation Release"
92 "Released by TrueCrypt Foundation"
93 "This is a TrueCrypt Foundation release."
94
95 c. Phrase "Based on TrueCrypt, freely available at
96 http://www.truecrypt.org/" must be displayed by Your Product (if
97 technically feasible) and contained in its documentation. Alternatively, if
98 This Product or its portion You included in Your Product comprises only a
99 minor portion of Your Product, phrase "Portions of this product are based
100 in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
101 displayed instead. In each of the cases mentioned above in this paragraph,
102 "http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
103 pointing to http://www.truecrypt.org/ and you may freely choose the
104 location within the user interface (if there is any) of Your Product (e.g.,
105 an "About" window, etc.) and the way in which Your Product will display the
106 respective phrase.
107
108 d. The complete source code of Your Product must be freely and publicly
109 available (for exceptions, see Section III.3) at least until you cease to
110 distribute Your Product. To meet this condition, it is sufficient that You
111 merely include the source code with every copy of Your Product that you
112 make and distribute; it is also sufficient that You merely include
113 information (valid and correct at least until you cease to distribute Your
114 Product) about where the source code can be freely obtained (e.g., an
115 Internet URL, etc.) with every copy of Your Product that you make and
116 distribute. The source code must not be deliberately obfuscated, and it
117 must not be in an intermediate form (e.g., the output of a preprocessor).
118 Source code means the preferred form in which a programmer would usually
119 modify the program.
120
121 e. You must not change the license and distribution terms of This Product
122 (i.e., no part of This Product may be put under another license), except as
123 expressly permitted or required by this License. You must keep intact all
124 the legal notices contained in the source code files. You must include the
125 following items with every copy of Your Product that you make and
126 distribute: a clear and conspicuous notice stating that Your Product or
127 portion(s) thereof is/are distributed under this version of the TrueCrypt
128 License, a verbatim copy of this version of the TrueCrypt License (as
129 contained herein), a clear and conspicuous notice containing information
130 about where the included copy of the License can be found, and an
131 appropriate copyright notice.
132
133 f. You must not use the name of This Product, names of its authors, or the
134 names of the legal entities (or informal groups) of which the authors
135 were/are members/employees, to endorse or promote Your Product without
136 specific prior written permission from the authors of This Product.
137
138
139 2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c,
140 III.1.d, and III.1.f, if all conditions specified in one of the two following
141 paragraphs are met:
142
143 a. Your Product is an operating system distribution, or other aggregate
144 software distribution (such as a cover CD-ROM of a magazine) containing
145 products from different sources, in which You include either This Product
146 without any modifications or file(s) which You obtain by compiling the
147 unmodified source code of This Product.
148
149 b. You include This Product in its entirety and without any modifications
150 (You may omit the source code of This Product) as non-integral part of Your
151 Product (i.e., none of the main functionalities of Your Product will be
152 affected if such non-integral part is removed) and phrase "This product
153 utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
154 phrase "This product includes TrueCrypt, freely available at
155 http://www.truecrypt.org/" is displayed by Your Product (if technically
156 feasible) and contained in its documentation. In each of the cases
157 mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
158 hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
159 and you may freely choose the location within the user interface (if there
160 is any) of Your Product (e.g., an "About" window, etc.) and the way in
161 which Your Product will display the respective phrase.
162
163
164 3. You are not obligated to comply with Section III.1.d if Your Product is not
165 distributed (i.e., Your Product is available only to You).
166
167
168
169 IV. Disclaimer of Warranties and Liabilities
170
171 1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE
172 LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY
173 OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
174 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
175 ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
176 SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
177 SERVICING, REPAIR OR CORRECTION.
178
179 2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
180 ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY
181 MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR
182 ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
183 CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM,
184 INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE
185 OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
186 OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD
187 PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
188
189 3. THIS PRODUCT INCORPORATES IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT
190 MAY BE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
191 ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS
192 SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT
193 AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE
194 IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO
195 EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH
196 REGULATIONS/RESTRICTIONS.
197
198
199
200 V. Trademarks
201
202 This License does not grant permission to use trademarks associated with (or
203 applying to) This Product, except for fair use as defined by applicable law and
204 except for use expressly permitted or required by this License.
205
206 TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation.
207 Note: The goal is not to monetize the name or the product, but to protect the
208 reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
209 software.
210
211
212
213 VI. General Terms
214
215 1. You may not modify, copy, distribute, or sublicense This Product except as
216 expressly provided under this License. Any attempt otherwise to modify, copy,
217 distribute, or sublicense This Product automatically terminates Your rights
218 under this License.
219
220 2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes
221 This Product, or any part(s) thereof, is, by such action(s), accepting in full
222 the responsibilities and obligations contained in this License.
223
224 3. If any term of this License is found to be invalid or unenforceable under
225 applicable law, You agree that it shall not affect the validity or
226 enforceability of any other terms of this License that are found to be valid
227 and enforceable under applicable law.
228
229 ____________________________________________________________
230
231 License agreement for Encryption for the Masses.
232
233 Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
234
235 This product can be copied and distributed free of charge, including
236 source code.
237
238 You may modify this product and source code, and distribute such modifications,
239 and you may derive new works based on this product, provided that:
240
241 1. Any product which is simply derived from this product cannot be
242 called E4M, or Encryption for the Masses.
243
244 2. If you use any of the source code in your product, and your product
245 is distributed with source code, you must include this notice with
246 those portions of this source code that you use.
247
248 Or,
249
250 If your product is distributed in binary form only, you must display
251 on any packaging, and marketing materials which reference
252 your product, a notice which states:
253
254 "This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
255
256 3. If you use any of the source code originally by Eric Young, you must
257 in addition follow his terms and conditions.
258
259 4. Nothing requires that you accept this License, as you have not
260 signed it. However, nothing else grants you permission to modify or
261 distribute the product or its derivative works.
262
263 These actions are prohibited by law if you do not accept this License.
264
265 5. If any of these license terms is found to be to broad in scope, and
266 declared invalid by any court or legal process, you agree that all other
267 terms shall not be so affected, and shall remain valid and enforceable.
268
269 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
270 FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
271 STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
272 EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
273 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
274 QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
275 DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
276
277 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
278 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
279 REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
280 INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
281 OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
282 TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
283 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
284 PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
285 OF THE POSSIBILITY OF SUCH DAMAGES.
286 ____________________________________________________________
287
288 Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
289 All rights reserved.
290
291 This package is an SSL implementation written
292 by Eric Young (eay@cryptsoft.com).
293 The implementation was written so as to conform with Netscapes SSL.
294
295 This library is free for commercial and non-commercial use as long as
296 the following conditions are aheared to. The following conditions
297 apply to all code found in this distribution, be it the RC4, RSA,
298 lhash, DES, etc., code; not just the SSL code. The SSL documentation
299 included with this distribution is covered by the same copyright terms
300 except that the holder is Tim Hudson (tjh@cryptsoft.com).
301
302 Copyright remains Eric Young's, and as such any Copyright notices in
303 the code are not to be removed.
304 If this package is used in a product, Eric Young should be given attribution
305 as the author of the parts of the library used.
306 This can be in the form of a textual message at program startup or
307 in documentation (online or textual) provided with the package.
308
309 Redistribution and use in source and binary forms, with or without
310 modification, are permitted provided that the following conditions
311 are met:
312 1. Redistributions of source code must retain the copyright
313 notice, this list of conditions and the following disclaimer.
314 2. Redistributions in binary form must reproduce the above copyright
315 notice, this list of conditions and the following disclaimer in the
316 documentation and/or other materials provided with the distribution.
317 3. All advertising materials mentioning features or use of this software
318 must display the following acknowledgement:
319 "This product includes cryptographic software written by
320 Eric Young (eay@cryptsoft.com)"
321 The word 'cryptographic' can be left out if the rouines from the library
322 being used are not cryptographic related :-).
323 4. If you include any Windows specific code (or a derivative thereof) from
324 the apps directory (application code) you must include an acknowledgement:
325 "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
326
327 THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
328 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
329 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
330 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
331 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
332 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
333 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
334 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
335 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
336 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
337 SUCH DAMAGE.
338
339 The licence and distribution terms for any publically available version or
340 derivative of this code cannot be changed. i.e. this code cannot simply be
341 copied and put under another distribution licence
342 [including the GNU Public Licence.]
343 ____________________________________________________________
344
345 Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved.
346
347 LICENSE TERMS
348
349 The free distribution and use of this software in both source and binary
350 form is allowed (with or without changes) provided that:
351
352 1. distributions of this source code include the above copyright
353 notice, this list of conditions and the following disclaimer;
354
355 2. distributions in binary form include the above copyright
356 notice, this list of conditions and the following disclaimer
357 in the documentation and/or other associated materials;
358
359 3. the copyright holder's name is not used to endorse products
360 built using this software without specific written permission.
361
362 ALTERNATIVELY, provided that this notice is retained in full, this product
363 may be distributed under the terms of the GNU General Public License (GPL),
364 in which case the provisions of the GPL apply INSTEAD OF those given above.
365
366 DISCLAIMER
367
368 This software is provided 'as is' with no explicit or implied warranties
369 in respect of its properties, including, but not limited to, correctness
370 and/or fitness for purpose.
371 ____________________________________________________________
372
373 This is an independent implementation of the encryption algorithm:
374
375 Twofish by Bruce Schneier and colleagues
376
377 which is a candidate algorithm in the Advanced Encryption Standard
378 programme of the US National Institute of Standards and Technology.
379
380 Copyright in this implementation is held by Dr B R Gladman but I
381 hereby give permission for its free direct or derivative use subject
382 to acknowledgment of its origin and compliance with any conditions
383 that the originators of the algorithm place on its exploitation.
384
385 My thanks to Doug Whiting and Niels Ferguson for comments that led
386 to improvements in this implementation.
387
388 Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
389 ____________________________________________________________
390
391 Copyright (c) 2001 Markus Friedl. All rights reserved.
392
393 Redistribution and use in source and binary forms, with or without
394 modification, are permitted provided that the following conditions
395 are met:
396 1. Redistributions of source code must retain the above copyright
397 notice, this list of conditions and the following disclaimer.
398 2. Redistributions in binary form must reproduce the above copyright
399 notice, this list of conditions and the following disclaimer in the
400 documentation and/or other materials provided with the distribution.
401
402 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
403 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
404 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
405 IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
406 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
407 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
408 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
409 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
410 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
411 THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

  ViewVC Help
Powered by ViewVC 1.1.20