summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Sterrett <mr_bones_@gentoo.org>2008-07-14 02:50:43 +0000
committerMichael Sterrett <mr_bones_@gentoo.org>2008-07-14 02:50:43 +0000
commit00729625ec0fca5f82e0e5e9048e9029c9925d42 (patch)
treee0607d13cf8d7ca7fbbc006487864fc0a6eb6098 /licenses
parentStable for HPPA (bug #231587). (diff)
downloadhistorical-00729625ec0fca5f82e0e5e9048e9029c9925d42.tar.gz
historical-00729625ec0fca5f82e0e5e9048e9029c9925d42.tar.bz2
historical-00729625ec0fca5f82e0e5e9048e9029c9925d42.zip
remove unused license
Diffstat (limited to 'licenses')
-rw-r--r--licenses/truecrypt-collective-1.3530
1 files changed, 0 insertions, 530 deletions
diff --git a/licenses/truecrypt-collective-1.3 b/licenses/truecrypt-collective-1.3
deleted file mode 100644
index 7d29e71d9947..000000000000
--- a/licenses/truecrypt-collective-1.3
+++ /dev/null
@@ -1,530 +0,0 @@
-TrueCrypt Collective License Version 1.3
-
-Software distributed under this license is distributed on an "AS IS" BASIS
-WITHOUT WARRANTIES OF ANY KIND. THE LIABILITY OF THE AUTHORS AND DISTRIBUTORS
-OF THE SOFTWARE IS LIMITED.
-
-ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART(S) OF A WORK
-MADE AVAILABLE UNDER THIS VERSION OF THE TRUECRYPT COLLECTIVE LICENSE, IS, BY
-SUCH ACTION(S), ACCEPTING ALL TERMS OF THE COMPONENT LICENSES (SEE BELLOW) THAT
-APPLY TO THE CORRESPONDING PART(S) OF THE WORK. IF YOU DO NOT ACCEPT THEM, DO
-NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE WORK, NOR ANY PART(S) THEREOF.
-
-The TrueCrypt Collective License consists of several distinct licenses, which
-are contained in this document (separated by lines consisting of underscores)
-and which are, in this section, referred to as component licenses. Each of the
-component licenses applies only to (portions of) the source code file(s) in
-which the component license is contained or in which it is explicitly
-referenced, and to compiled or otherwise processed forms of such source code.
-None of the component licenses applies to this product as a whole, even when it
-uses the phrase "this product" or any other equivalent term/phrase. Unless
-otherwise stated, graphics and files that are not part of the source code are
-governed solely by the TrueCrypt License. Note: The TrueCrypt License is one of
-the component licenses of which the TrueCrypt Collective License consists.
-
-____________________________________________________________
-
-This software is copyright (c) 2003-2008 TrueCrypt Foundation
-
-TrueCrypt License Version 2.4
-
-
-I. Definitions
-
-1. "This Product" means the work (including, but not limited to, source code,
-graphics, texts, and accompanying files) made available under and governed by
-this version of this license ("License"), as may be indicated by, but is not
-limited to, copyright notice(s) attached to or included in the work.
-
-2. "You" means (and "Your" refers to) an individual or a legal entity (e.g.,
-a non-profit organization, commercial organization, government agency, etc.)
-exercising permissions granted by this License.
-
-3. "Modification" means (and "modify" refers to) any alteration of This
-Product, including, but not limited to, addition to or deletion from the
-substance or structure of This Product, and translation into another language.
-
-4. "Your Product" means This Product modified by You, any work You derive from
-(or base on) This Product, any work in which You include This Product, or any
-respective part(s) thereof.
-
-5. "Distribution" means (and "distribute" refers to), regardless of means or
-methods, conveyance, transfer, providing, or making available of This/Your
-Product or portions thereof to third parties (including, but not limited to,
-making This/Your Product, or portions thereof, available for download to third
-parties, whether or not any third party has downloaded the product, or any
-portion thereof, made available for download).
-
-
-
-II. Terms and Conditions for Use, Copying, and Distribution
-
-1. You may copy and/or distribute This Product, provided that You do not modify
-This Product (for terms and conditions for copying and distribution of modified
-versions of This Product, see Chapter III) and provided that You do not include
-This Product in another product (except as permitted under Chapter III), and
-provided that You ensure that all the legal notices and documents (containing,
-e.g., the text of this License, references to this License, etc.) included with
-This Product are included with every copy of This Product that You make and
-distribute, and provided that You comply with all other applicable terms and
-conditions of this License.
-
-2. Provided that You comply with all applicable terms and conditions of this
-License, You may use This Product freely (see also Chapter III) on any number
-of computers/systems for non-commercial and/or commercial purposes.
-
-
-
-III. Terms and Conditions for Modification and Derivation of New Products
-
-1. If all conditions specified in the following paragraphs in this Chapter
-(III) are met (for exceptions, see Sections III.2 and III.3) and if You comply
-with all other applicable terms and conditions of this License, You may modify
-This Product (thus forming Your Product), derive new works from This Product or
-portions thereof (thus forming Your Product), include This Product or portions
-thereof in another product (thus forming Your Product), and You may copy and/or
-distribute Your Product.
-
- a. The name of Your Product (or of Your modified version of This Product)
- must not contain the name TrueCrypt (for example, the following names are
- not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
- etc.) nor any other names confusingly similar to the name TrueCrypt (e.g.,
- True-Crypt, True Crypt, TruKrypt, etc.)
-
- Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt
- Foundation. The goal is not to monetize the name or the product, but to
- protect the reputation of TrueCrypt, and to prevent support issues and
- other kinds of issues that might arise from the existence of similar
- products with the same or similar name. Even though TrueCrypt and the
- TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source
- and free software.
-
- All occurrences of the name TrueCrypt that could reasonably be considered
- to identify Your Product must be removed from Your Product and from any
- associated materials. Logo(s) included in (or attached to) Your Product
- (and in/to associated materials) must not incorporate and must not be
- confusingly similar to any of the TrueCrypt logos (including the
- non-textual logo consisting primarily of a key in stylized form) or
- portion(s) thereof. All graphics contained in This Product (logos, icons,
- etc.) must be removed from Your Product (or from Your modified version of
- This Product) and from any associated materials.
-
- b. The following phrases must be removed from Your Product and from any
- associated materials, except the text of this License: "A TrueCrypt
- Foundation Release", "Released by TrueCrypt Foundation", "This is a
- TrueCrypt Foundation release."
-
- c. Phrase "Based on TrueCrypt, freely available at
- http://www.truecrypt.org/" must be displayed by Your Product (if
- technically feasible) and contained in its documentation. Alternatively, if
- This Product or its portion You included in Your Product constitutes only a
- minor portion of Your Product, phrase "Portions of this product are based
- in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
- displayed instead. In each of the cases mentioned above in this paragraph,
- "http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
- pointing to http://www.truecrypt.org/ and You may freely choose the
- location within the user interface (if there is any) of Your Product (e.g.,
- an "About" window, etc.) and the way in which Your Product will display the
- respective phrase.
-
- Your Product (and any associated materials, e.g., the documentation, the
- content of the official web site of Your Product, etc.) must not present
- any Internet address containing the domain name truecrypt.org (or any
- domain name that forwards to the domain name truecrypt.org) in a manner
- that might suggest that it is where information about Your Product may be
- obtained or where bugs found in Your Product may be reported or where
- support for Your Product may be available or otherwise attempt to indicate
- that the domain name truecrypt.org is associated with Your Product.
-
- d. The complete source code of Your Product must be freely and publicly
- available (for exceptions, see Sections III.2 and III.3) at least until You
- cease to distribute Your Product. To meet this condition, it is sufficient
- that You merely include the source code with every copy of Your Product
- that You make and distribute; it is also sufficient that You merely include
- information (valid and correct at least until You cease to distribute Your
- Product) about where the source code can be freely obtained (e.g., an
- Internet address, etc.) with every copy of Your Product that You make and
- distribute. Portions of the source code that were created by You (e.g. Your
- additions to This Product) must be available under license(s) that are/is
- compatible with this version of the TrueCrypt License (however, see also
- Subsection III.1.e) and that allow(s) anyone to modify and derive new works
- from Your Product (and portions thereof) and to use, copy, and redistribute
- such modifications and/or derivative works. The license(s) must be
- perpetual, non-exclusive, royalty-free, no-charge, and worldwide, and must
- not invalidate, weaken, restrict, interpret, amend, modify, interfere with
- or otherwise affect any part, term, provision, or clause of this License.
- The text of the license(s) must be included with every copy of Your Product
- that You make and distribute. The source code must not be deliberately
- obfuscated, and it must not be in an intermediate form (e.g., the output of
- a preprocessor). Source code means the preferred form in which a programmer
- would usually modify the program.
-
- Note: If you cannot comply with the above requirements, we may grant an
- exception under certain conditions. You may request an exception at:
- licensing@truecrypt.org
-
- e. You must not change the license terms of This Product in any way (adding
- any new terms is considered changing the license terms even if the original
- terms are retained), which means, e.g., that no part of This Product may be
- put under another license. You must keep intact all the legal notices
- contained in the source code files. You must include the following items
- with every copy of Your Product that You make and distribute: a clear and
- conspicuous notice stating that Your Product or portion(s) thereof is/are
- distributed under this version of the TrueCrypt License, a verbatim copy of
- this version of the TrueCrypt License (as contained herein), a clear and
- conspicuous notice containing information about where the included copy of
- the License can be found, and an appropriate copyright notice.
-
- f. Without specific prior written permission from the authors of This
- Product (or from their common representative), You must not use the name of
- This Product, the names of the authors of This Product, or the names of the
- legal entities (or informal groups) of which the authors were/are
- members/employees, to endorse or promote Your Product (or You, or Your
- affiliates), or in a way that might suggest that Your Product (or You, or
- Your affiliates) is/are endorsed by one or more authors of This Product, or
- in a way that might suggest that one or more authors of This Product is/are
- affiliated with You or directly participated in the creation of Your
- Product.
-
-
-2. You are not obligated to comply with Subsections III.1.a, III.1.b, III.1.c,
-and III.1.d, if all conditions specified in one of the two following
-Subsections (III.2.a or III.2.b) are met:
-
- a. Your Product is an operating system distribution, or other aggregate
- software distribution (such as a cover CD-ROM of a magazine) containing
- products from different sources, in which You include either This Product
- without any modifications or file(s) which You obtain by compiling the
- unmodified source code of This Product.
-
- b. You include This Product in its entirety and without any modifications
- (You may omit the source code of This Product) as non-integral part of Your
- Product (i.e., none of the main functionalities of Your Product will be
- affected if such non-integral part is removed) and phrase "This product
- utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
- phrase "This product includes TrueCrypt, freely available at
- http://www.truecrypt.org/" is displayed by Your Product (if technically
- feasible) and contained in its documentation. In each of the cases
- mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
- hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
- and You may freely choose the location within the user interface (if there
- is any) of Your Product (e.g., an "About" window, etc.) and the way in
- which Your Product will display the respective phrase.
-
-
-3. You are not obligated to comply with Subsection III.1.d if Your Product is
-not distributed (i.e., Your Product is available only to You).
-
-
-
-IV. Limitation of Liability, Disclaimer of Warranty, Indemnification
-
-You expressly acknowledge and agree to the following:
-
-1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE
-COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR
-(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE
-LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED
-TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR
-CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF
-DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT
-TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,
-OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT
-(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING,
-MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF
-YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A
-PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY
-OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
-2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER
-EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES
-OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE
-ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU.
-SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
-SERVICING, REPAIR, OR CORRECTION.
-
-3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS
-THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
-ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT
-IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS
-THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO
-IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR
-RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND
-LAWS.
-
-4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, THEIR
-AGENTS AND ASSOCIATES, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS
-FROM/AGAINST ANY LIABILITY, LOSS, EXPENSE, DAMAGES, CLAIMS OR CAUSES OF ACTION,
-ARISING OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT
-AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF
-ANY TERM OF THIS LICENSE.
-
-
-
-V. Trademarks
-
-This License does not grant permission to use trademarks associated with (or
-applying to) This Product, except for fair use as defined by applicable law and
-except for use expressly permitted or required by this License. Any attempt
-otherwise to use trademarks associated with (or applying to) This Product
-automatically and immediately terminates Your rights under This License and may
-constitute trademark infringement (which may be prosecuted).
-
-TrueCrypt is a registered trademark of the TrueCrypt Foundation registered with
-the World Intellectual Property Organization, an agency of the United Nations,
-(international trademark registration), in the U.S. Patent and Trademark
-Office, and in the trademark offices of other countries. All TrueCrypt logos
-(including the non-textual logo consisting primarily of a key in stylized form)
-are trademarks of the TrueCrypt Foundation.
-
-Note: The goal is not to monetize the name or the product, but to protect the
-reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
-software.
-
-
-
-VI. General Terms
-
-1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE
-WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY
-SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS OF THIS LICENSE
-(AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). IF YOU DO
-NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS OF THIS LICENSE, DO NOT USE,
-COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR
-ANY PORTION(S) THEREOF.
-
-2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE,
-OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED
-IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT
-(EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE
-DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S)
-THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS
-LICENSE AND CAN CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED).
-ANY RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF
-THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR
-FAILURE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO
-PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND
-IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE
-CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). NOTHING IN THIS
-LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT
-TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT.
-
-3. This license does not constitute or imply a waiver of any intellectual
-property rights. This license does not transfer, assign, or convey any
-intellectual property rights (e.g., it does not transfer ownership of
-copyrights or trademarks).
-
-4. Subject to the terms of this License, You may allow a third party to use
-Your copy of This Product (or a copy that you make and distribute, or Your
-Product, or respective parts thereof) provided that the third party explicitly
-accepts and agrees to be bound by all terms of this License and the third party
-is not prohibited from using This Product (or portions thereof) by this License
-(see, e.g., Section VI.6) or by applicable law. However, You are not obligated
-to ensure that the third party accepts (and agrees to be bound by all terms of)
-this License if You distribute only the self-extracting package (containing
-This Product) that does not allow the user to install (nor extract) the files
-contained in the package until he or she accepts and agrees to be bound by all
-terms of this License.
-
-5. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF
-YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS OF THIS LICENSE, YOU
-MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS
-PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A LAWYER.
-
-6. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS
-UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR
-JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY,
-MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY
-PORTION(S) THEREOF.
-
-7. If any provision of this License, or a portion thereof, is found to be
-invalid or unenforceable under applicable law, it shall not affect the validity
-or enforceability of the remainder of this License, and such invalid or
-unenforceable provision shall be construed to reflect the original intent of
-such provision and shall be enforced to the maximum extent permitted by
-applicable law so as to effect the original intent of such provision as closely
-as possible.
-
-____________________________________________________________
-
-License agreement for Encryption for the Masses.
-
-Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.
-
-This product can be copied and distributed free of charge, including
-source code.
-
-You may modify this product and source code, and distribute such modifications,
-and you may derive new works based on this product, provided that:
-
-1. Any product which is simply derived from this product cannot be
-called E4M, or Encryption for the Masses.
-
-2. If you use any of the source code in your product, and your product
-is distributed with source code, you must include this notice with
-those portions of this source code that you use.
-
-Or,
-
-If your product is distributed in binary form only, you must display
-on any packaging, and marketing materials which reference
-your product, a notice which states:
-
-"This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"
-
-3. If you use any of the source code originally by Eric Young, you must
-in addition follow his terms and conditions.
-
-4. Nothing requires that you accept this License, as you have not
-signed it. However, nothing else grants you permission to modify or
-distribute the product or its derivative works.
-
-These actions are prohibited by law if you do not accept this License.
-
-5. If any of these license terms is found to be to broad in scope, and
-declared invalid by any court or legal process, you agree that all other
-terms shall not be so affected, and shall remain valid and enforceable.
-
-6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
-FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
-STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
-EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
-MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
-QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
-DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
-7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
-WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
-REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
-INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
-OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
-TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
-YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
-PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
-OF THE POSSIBILITY OF SUCH DAMAGES.
-____________________________________________________________
-
-Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
-All rights reserved.
-
-This package is an SSL implementation written
-by Eric Young (eay@cryptsoft.com).
-The implementation was written so as to conform with Netscapes SSL.
-
-This library is free for commercial and non-commercial use as long as
-the following conditions are aheared to. The following conditions
-apply to all code found in this distribution, be it the RC4, RSA,
-lhash, DES, etc., code; not just the SSL code. The SSL documentation
-included with this distribution is covered by the same copyright terms
-except that the holder is Tim Hudson (tjh@cryptsoft.com).
-
-Copyright remains Eric Young's, and as such any Copyright notices in
-the code are not to be removed.
-If this package is used in a product, Eric Young should be given attribution
-as the author of the parts of the library used.
-This can be in the form of a textual message at program startup or
-in documentation (online or textual) provided with the package.
-
-Redistribution and use in source and binary forms, with or without
-modification, are permitted provided that the following conditions
-are met:
-1. Redistributions of source code must retain the copyright
- notice, this list of conditions and the following disclaimer.
-2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
-3. All advertising materials mentioning features or use of this software
- must display the following acknowledgement:
- "This product includes cryptographic software written by
- Eric Young (eay@cryptsoft.com)"
- The word 'cryptographic' can be left out if the rouines from the library
- being used are not cryptographic related :-).
-4. If you include any Windows specific code (or a derivative thereof) from
- the apps directory (application code) you must include an acknowledgement:
- "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
-
-THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
-ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
-FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-SUCH DAMAGE.
-
-The licence and distribution terms for any publically available version or
-derivative of this code cannot be changed. i.e. this code cannot simply be
-copied and put under another distribution licence
-[including the GNU Public Licence.]
-____________________________________________________________
-
-Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved.
-
-LICENSE TERMS
-
-The free distribution and use of this software in both source and binary
-form is allowed (with or without changes) provided that:
-
- 1. distributions of this source code include the above copyright
- notice, this list of conditions and the following disclaimer;
-
- 2. distributions in binary form include the above copyright
- notice, this list of conditions and the following disclaimer
- in the documentation and/or other associated materials;
-
- 3. the copyright holder's name is not used to endorse products
- built using this software without specific written permission.
-
-ALTERNATIVELY, provided that this notice is retained in full, this product
-may be distributed under the terms of the GNU General Public License (GPL),
-in which case the provisions of the GPL apply INSTEAD OF those given above.
-
-DISCLAIMER
-
-This software is provided 'as is' with no explicit or implied warranties
-in respect of its properties, including, but not limited to, correctness
-and/or fitness for purpose.
-____________________________________________________________
-
-This is an independent implementation of the encryption algorithm:
-
- Twofish by Bruce Schneier and colleagues
-
-which is a candidate algorithm in the Advanced Encryption Standard
-programme of the US National Institute of Standards and Technology.
-
-Copyright in this implementation is held by Dr B R Gladman but I
-hereby give permission for its free direct or derivative use subject
-to acknowledgment of its origin and compliance with any conditions
-that the originators of the algorithm place on its exploitation.
-
-My thanks to Doug Whiting and Niels Ferguson for comments that led
-to improvements in this implementation.
-
-Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
-____________________________________________________________
-
-Copyright (c) 2001 Markus Friedl. All rights reserved.
-
-Redistribution and use in source and binary forms, with or without
-modification, are permitted provided that the following conditions
-are met:
-1. Redistributions of source code must retain the above copyright
- notice, this list of conditions and the following disclaimer.
-2. Redistributions in binary form must reproduce the above copyright
- notice, this list of conditions and the following disclaimer in the
- documentation and/or other materials provided with the distribution.
-
-THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
-IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
-OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
-IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
-INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
-NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
-THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
-(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
-THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.