summaryrefslogtreecommitdiff
blob: 3d1e94e022e9c5cfb288c7e9b07e5357d3810072 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
TrueCrypt License Version 2.0


I. Definitions 

1. "This product" means the parts of the computer software, including, but not
limited to, source code, texts, graphics, and any accompanying files, released
under and covered by this version of this License. 

2. "You" (or "your") means an individual or a legal entity (e.g., a non-profit
organization, commercial organization, government agency, etc.) exercising 
permissions granted by this License. 



II. Terms and Conditions for Copying, Distribution, and Use

1. You may copy and/or distribute this product without any restrictions,
provided that the product is not modified and that it is not repackaged (for
terms and conditions for copying and distribution of modified or repackaged
versions of this product, see Section III.)

2. You may use this product freely (see also Section III.) on single or
multiple computers/systems for non-commercial and/or commercial uses.



III. Terms and Conditions for Modification and Derivation of New Products

1. You may modify this product (this also covers implementation of new
features/functionalities, translation into another language, and porting to
another platform), derive new works from this product, include/use this product
or its portion in (or as part of) your product, and you may copy and distribute
such modifications, derivative or aggregated works as your product, provided
that the following conditions are met (for exceptions, see Sections III.2.
and III.3.):

    a. Your product or the modified version must not be called TrueCrypt and
    its name must not contain the name TrueCrypt (for example, the following
    names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of
    its variations that can be easily confused with the name TrueCrypt (e.g.,
    Truecrypt, True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)

    Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
    to monetize the name or the product, but to protect the reputation of
    TrueCrypt, and to prevent support issues and other kinds of issues that
    might arise from the existence of similar products with the same or similar
    name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
    open-source and free software.

    b. The following phrases must be removed from the "About" dialog (the
    credits), from this License (Section VI.), and from any other accompanying
    materials:
    "A TrueCrypt Foundation Release"
    "Released by TrueCrypt Foundation"
    "This is a TrueCrypt Foundation release."

    c. Phrase "Based on TrueCrypt" must be displayed by your product (if
    technically feasible) or by the modified version and contained in its 
    documentation. Alternatively, if this product or its portion you included
    in your product comprise only a minor portion of your product, phrase 
    "Portions of this product are based in part on TrueCrypt" may be used
    instead.

    d. Complete source code of your product or of the modified version must be
    freely and publicly available. If the source code is not included with
    every copy of your product/modifications, there must be a well-publicized
    means of obtaining the source code, preferably, downloading via the
    Internet without charge. The source code must not be deliberately 
    obfuscated, and it must not be in an intermediate form (e.g., the output of
    a preprocessor). Source code means the preferred form in which a programmer
    would usually modify the program. 

    e. The license and distribution terms of no part of this product may be
    changed (i.e., no part of this product can be put under another license),
    except as expressly permitted or required by this License. The legal 
    notices contained in the source code files must be retained. It must be 
    clearly declared that this product or its parts are distributed under the
    TrueCrypt License (contained herein), and it must be clearly and visibly 
    stated in the distribution where the text of the TrueCrypt License can be 
    found (you may amend the references to the file 'License.txt' in the source
    code accordingly). The text of the TrueCrypt License must accompany (be
    distributed along with) your product/modifications. (Any of the Component
    Legal Notices contained below in this file may be omitted if the component
    to which it pertains is not used. If no cryptographic components of this
    product are used, Section IV.3. may be omitted as well.)


2. You are not obligated to comply with Sections III.1.a., III.1.b., III.1.c.,
and III.1.d. if at least one of the following conditions is met:

    a. You include this product in its entirety and without any modifications
    in an operating system distribution (i.e., you include binaries obtained by
    compiling the unmodified source code of this product and/or you include the
    unmodified contents of the source code distribution archive and/or of the
    binary distribution archive).

    b. You include this product in its entirety (the contents of either the
    source code distribution archive and/or of the binary distribution archive)
    and without any modifications as non-integral part of your product (i.e.,
    the main functionality of your product will not be affected if such
    non-integral part is removed) and phrase "This product utilizes TrueCrypt"
    or "This product includes TrueCrypt" is displayed by your product (if
    technically feasible) and contained in its documentation.


3. You are not obligated to comply with Section III.1.d. if at least one of the
following conditions is met:

    a. Your product/modifications (as defined in Section III.1.) are not
    distributed (i.e., your product/modifications are available only to you).

    b. Your product/modifications (as defined in Section III.1.) are
    distributed and used only internally within the organization and only by
    members/employees of the organization for which you created the
    product/modifications and of which you were a member/employee when you
    created the product/modifications. (Here the word "organization" means
    a non-commercial or commercial organization, or a government agency.)



IV. Disclaimer of Warranties and Liabilities

1. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED 
"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, 
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
   
2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR DISTRIBUTE THE 
PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR
DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
     
3. THIS PRODUCT INCORPORATES CRYPTOGRAPHIC ALGORITHMS THAT MAY BE REGULATED OR
ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
IS LEGAL TO IMPORT AND/OR EXPORT AND/OR USE THIS PRODUCT IN COUNTRIES WHERE YOU
INTEND TO USE THIS PRODUCT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM
WHICH YOU INTEND TO EXPORT IT.



V. General Terms 

1. Where applicable, the component licenses contained in parts of the source
code and quoted below herein (Section "Component Legal Notices") might take
precedence over the TrueCrypt License. 

2. This product is provided under the terms of this license (agreement). Any
use, reproduction, distribution, or modification of this product or any of its
parts constitutes recipient's acceptance of this agreement.

3. You may not modify, copy, distribute, or sublicense this product except as
expressly provided under this License. Any attempt otherwise to modify, copy,
distribute, or sublicense this product automatically terminates your rights
under this License. 

4. If any of the license terms is found to be too broad in scope, and/or
declared invalid by any court or legal process, you agree that all other terms
shall not be so affected, and shall remain valid and enforceable.



VI. Copyright and Trademark Information

TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not to
monetize the name or the product, but to protect the reputation of TrueCrypt,
and to prevent support issues and other kinds of issues that might arise from
the existence of similar products with the same or similar name. Even though
TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free
software. All other trademarks are the sole property of their respective
owners.

Portions of this software are:
Copyright (c) TrueCrypt Foundation. All Rights Reserved.
Copyright (c) Paul Le Roux. All Rights Reserved.
Copyright (c) TrueCrypt Team. All Rights Reserved.
Copyright (c) Eric Young. All Rights Reserved.
Copyright (c) Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
Copyright (c) Markus Friedl. All Rights Reserved.

For more information, please see the legal notices attached to parts of the
source code.

Graphics (logos, icons, etc.) are Copyright (c) TrueCrypt Foundation



COMPONENT LEGAL NOTICES

Each of the following component licenses applies only to (portions of) the
source code file(s) in which the component license is contained or in which it
is explicitly referenced, and to compiled or otherwise processed forms of such
source code. In other words, none of the following licenses applies to this
product as a whole, even when it uses the term "this product" or any other
equivalent term.
____________________________________________________________

License agreement for Encryption for the Masses.

Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.

This product can be copied and distributed free of charge, including
source code.

You may modify this product and source code, and distribute such modifications, 
and you may derive new works based on this product, provided that:

1. Any product which is simply derived from this product cannot be
called E4M, or Encryption for the Masses.

2. If you use any of the source code in your product, and your product
is distributed with source code, you must include this notice with
those portions of this source code that you use. 

Or, 

If your product is distributed in binary form only, you must display
on any packaging, and marketing materials which reference
your product, a notice which states: 

"This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"

3. If you use any of the source code originally by Eric Young, you must
in addition follow his terms and conditions.

4. Nothing requires that you accept this License, as you have not
signed it. However, nothing else grants you permission to modify or
distribute the product or its derivative works.

These actions are prohibited by law if you do not accept this License.

5. If any of these license terms is found to be to broad in scope, and  
declared invalid by any court or legal process, you agree that all other
terms shall not be so affected, and shall remain valid and enforceable.

6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY 
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE 
STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER 
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE 
QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE 
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED 
OF THE POSSIBILITY OF SUCH DAMAGES.
____________________________________________________________

Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
All rights reserved.

This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as
the following conditions are aheared to.  The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code.  The SSL documentation
included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
   must display the following acknowledgement:
   "This product includes cryptographic software written by
    Eric Young (eay@cryptsoft.com)"
   The word 'cryptographic' can be left out if the rouines from the library
   being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from 
   the apps directory (application code) you must include an acknowledgement:
   "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.

The licence and distribution terms for any publically available version or
derivative of this code cannot be changed.  i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
____________________________________________________________

Copyright (c) 2003, Dr Brian Gladman, Worcester, UK.   All rights reserved.

LICENSE TERMS

The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:

  1. distributions of this source code include the above copyright
     notice, this list of conditions and the following disclaimer;

  2. distributions in binary form include the above copyright
     notice, this list of conditions and the following disclaimer
     in the documentation and/or other associated materials;

  3. the copyright holder's name is not used to endorse products
     built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER

This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
____________________________________________________________

This is an independent implementation of the encryption algorithm:  
                                                                    
        Twofish by Bruce Schneier and colleagues                    
                                                                    
which is a candidate algorithm in the Advanced Encryption Standard  
programme of the US National Institute of Standards and Technology. 
                                                                    
Copyright in this implementation is held by Dr B R Gladman but I    
hereby give permission for its free direct or derivative use subject
to acknowledgment of its origin and compliance with any conditions  
that the originators of the algorithm place on its exploitation.    
                                                                    
My thanks to Doug Whiting and Niels Ferguson for comments that led  
to improvements in this implementation.                             
                                                                    
Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999    
____________________________________________________________

Copyright (c) 2001 Markus Friedl.  All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.