diff --git a/README.md b/README.md index 82b0665..e6d6de4 100644 --- a/README.md +++ b/README.md @@ -18,16 +18,14 @@ Most wanted: * `truecrypt-4.3-source-code.zip` * `truecrypt-4.3-source-code.zip.sig` * `truecrypt-4.3-source-code.tar.gz.sig` -* `TrueCrypt Setup 4.3a-2.exe` - * Second re-release, with `TrueCrypt Collective License Version 1.4` (`TrueCrypt License Version 2.5`). - * See [License History](https://github.com/stefansundin/truecrypt-archive/wiki/License-History). - * Released as `TrueCrypt Setup 4.3a.exe`. * `TrueCrypt 5.0 Source.tar.gz.sig` * `TrueCrypt 5.1 Source.tar.gz` * `TrueCrypt 5.1 Source.tar.gz.sig` Not as important: +* `truecrypt-4.2a-ubuntu-5.10-x86.tar.gz` +* `truecrypt-4.2a-ubuntu-5.10-x86.tar.gz.sig` * `truecrypt-4.3a-ubuntu-6.06-x86.tar.gz` * `truecrypt-4.3a-ubuntu-6.06-x86.tar.gz.sig` * `truecrypt-4.3a-ubuntu-7.04-x64.tar.gz` @@ -64,9 +62,7 @@ The TrueCrypt website offers downloads of _past versions_. Currently they offer > Note: TrueCrypt 4.3a and 5.1a have been repackaged to contain the latest version of the TrueCrypt License introduced with TrueCrypt 6.0 (the original application and driver binaries of those old versions have not been modified; however, the installer used for those new packages was compiled using the source code of TrueCrypt 6.0, not TrueCrypt 5.1a). -This means that there are two different 4.3a and 5.1a, with different licenses. Presumably 4.3a was offered as a _past versions_ download in the past. - -See [License History](https://github.com/stefansundin/truecrypt-archive/wiki/License-History) for more information. +See [License History](doc/License-History.md) for more information. ## Verifying the integrity diff --git a/doc/DNS-Whois.md b/doc/DNS-Whois.md new file mode 100644 index 0000000..e53c654 --- /dev/null +++ b/doc/DNS-Whois.md @@ -0,0 +1,175 @@ +This is the whois records for [truecrypt.org](https://whois.loopia.se/truecrypt.org) and [truecrypt-foundation.org](https://whois.loopia.se/truecrypt-foundation.org) taken at 2013-06-21. + +## truecrypt.org + Access to .ORG WHOIS information is provided to assist persons in + determining the contents of a domain name registration record in the + Public Interest Registry registry database. The data in this record is provided by + Public Interest Registry for informational purposes only, and Public Interest Registry does not + guarantee its accuracy. This service is intended only for query-based + access. You agree that you will use this data only for lawful purposes + and that, under no circumstances will you use this data to: (a) allow, + enable, or otherwise support the transmission by e-mail, telephone, or + facsimile of mass unsolicited, commercial advertising or solicitations + to entities other than the data recipient's own existing customers; or + (b) enable high volume, automated, electronic processes that send + queries or data to the systems of Registry Operator, a Registrar, or + Afilias except as reasonably necessary to register domain names or + modify existing registrations. All rights reserved. Public Interest Registry reserves + the right to modify these terms at any time. By submitting this query, + you agree to abide by this policy. + + Domain ID:D102925909-LROR + Domain Name:TRUECRYPT.ORG + Created On:22-Nov-2003 14:18:12 UTC + Last Updated On:23-Nov-2012 04:17:15 UTC + Expiration Date:22-Nov-2022 14:18:12 UTC + Sponsoring Registrar:Network Solutions, LLC (R63-LROR) + Status:CLIENT TRANSFER PROHIBITED + Registrant ID:44111693-NSIV + Registrant Name:TrueCrypt Developers Association, LC + Registrant Organization:TrueCrypt Developers Association, LC + Registrant Street1:ATTN insert domain name here + Registrant Street2:care of Network Solutions + Registrant Street3: + Registrant City:Drums + Registrant State/Province:PA + Registrant Postal Code:18222 + Registrant Country:US + Registrant Phone:+1.5707088780 + Registrant Phone Ext.: + Registrant FAX: + Registrant FAX Ext.: + Registrant Email:uq5tz85f33h@networksolutionsprivateregistration.com + Admin ID:44111693-NSIV + Admin Name:TrueCrypt Developers Association, LC + Admin Organization:TrueCrypt Developers Association, LC + Admin Street1:ATTN insert domain name here + Admin Street2:care of Network Solutions + Admin Street3: + Admin City:Drums + Admin State/Province:PA + Admin Postal Code:18222 + Admin Country:US + Admin Phone:+1.5707088780 + Admin Phone Ext.: + Admin FAX: + Admin FAX Ext.: + Admin Email:uq5tz85f33h@networksolutionsprivateregistration.com + Tech ID:44111693-NSIV + Tech Name:TrueCrypt Developers Association, LC + Tech Organization:TrueCrypt Developers Association, LC + Tech Street1:ATTN insert domain name here + Tech Street2:care of Network Solutions + Tech Street3: + Tech City:Drums + Tech State/Province:PA + Tech Postal Code:18222 + Tech Country:US + Tech Phone:+1.5707088780 + Tech Phone Ext.: + Tech FAX: + Tech FAX Ext.: + Tech Email:uq5tz85f33h@networksolutionsprivateregistration.com + Name Server:NS1.TRUECRYPT.ORG + Name Server:NS2.TRUECRYPT.ORG + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + DNSSEC:Unsigned + + +## truecrypt-foundation.org + Access to .ORG WHOIS information is provided to assist persons in + determining the contents of a domain name registration record in the + Public Interest Registry registry database. The data in this record is provided by + Public Interest Registry for informational purposes only, and Public Interest Registry does not + guarantee its accuracy. This service is intended only for query-based + access. You agree that you will use this data only for lawful purposes + and that, under no circumstances will you use this data to: (a) allow, + enable, or otherwise support the transmission by e-mail, telephone, or + facsimile of mass unsolicited, commercial advertising or solicitations + to entities other than the data recipient's own existing customers; or + (b) enable high volume, automated, electronic processes that send + queries or data to the systems of Registry Operator, a Registrar, or + Afilias except as reasonably necessary to register domain names or + modify existing registrations. All rights reserved. Public Interest Registry reserves + the right to modify these terms at any time. By submitting this query, + you agree to abide by this policy. + + Domain ID:D106888937-LROR + Domain Name:TRUECRYPT-FOUNDATION.ORG + Created On:12-Jul-2005 19:58:21 UTC + Last Updated On:22-Dec-2011 15:06:56 UTC + Expiration Date:12-Jul-2021 19:58:21 UTC + Sponsoring Registrar:GoDaddy.com, LLC (R91-LROR) + Status:CLIENT DELETE PROHIBITED + Status:CLIENT RENEW PROHIBITED + Status:CLIENT TRANSFER PROHIBITED + Status:CLIENT UPDATE PROHIBITED + Registrant ID:CR31382257 + Registrant Name:TrueCrypt Foundation + Registrant Organization:TrueCrypt Foundation + Registrant Street1:NAVAS Station + Registrant Street2: + Registrant Street3: + Registrant City:80S 124W + Registrant State/Province:Marie Byrd Land + Registrant Postal Code:80S 124W + Registrant Country:AQ + Registrant Phone:+672.000 + Registrant Phone Ext.: + Registrant FAX: + Registrant FAX Ext.: + Registrant Email:domain.admn@truecrypt.org + Admin ID:CR31382259 + Admin Name:TrueCrypt Foundation + Admin Organization:TrueCrypt Foundation + Admin Street1:NAVAS Station + Admin Street2: + Admin Street3: + Admin City:80S 124W + Admin State/Province:Marie Byrd Land + Admin Postal Code:80S 124W + Admin Country:AQ + Admin Phone:+672.000 + Admin Phone Ext.: + Admin FAX: + Admin FAX Ext.: + Admin Email:domain.admn@truecrypt.org + Tech ID:CR31382258 + Tech Name:TrueCrypt Foundation + Tech Organization:TrueCrypt Foundation + Tech Street1:NAVAS Station + Tech Street2: + Tech Street3: + Tech City:80S 124W + Tech State/Province:Marie Byrd Land + Tech Postal Code:80S 124W + Tech Country:AQ + Tech Phone:+672.000 + Tech Phone Ext.: + Tech FAX: + Tech FAX Ext.: + Tech Email:domain.admn@truecrypt.org + Name Server:NS2.TRUECRYPT-FOUNDATION.ORG + Name Server:NS1.TRUECRYPT-FOUNDATION.ORG + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + Name Server: + DNSSEC:Unsigned \ No newline at end of file diff --git a/doc/License-E4M.TXT b/doc/License-E4M.TXT new file mode 100644 index 0000000..6c63a92 --- /dev/null +++ b/doc/License-E4M.TXT @@ -0,0 +1,56 @@ +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. + diff --git a/doc/License-History.md b/doc/License-History.md new file mode 100644 index 0000000..4140412 --- /dev/null +++ b/doc/License-History.md @@ -0,0 +1,21 @@ +This is a list of the licenses used in the different TrueCrypt versions. + +**Note:** 4.3a and 5.1a were re-released in the _past versions_ section on truecrypt.org, with newer licenses. This means that if you downloaded the earlier release, you can use it under the earlier license. + +* 1.0, 1.0a: `TRUECRYPT LICENSE` +* 2.0: `GNU GPLv2` (No, I'm not kidding) +* 2.1, 2.1a, 3.0a, 3.1, 3.1a: `TRUECRYPT LICENSE` + * 3.0: Unknown, presumably `TRUECRYPT LICENSE` +* 4.0, 4.1, 4.2: `TrueCrypt License Version 2.0` +* 4.2a: `TrueCrypt Collective License Version 1.0` (`TrueCrypt License Version 2.1`) +* 4.3: `TrueCrypt Collective License Version 1.1` (`TrueCrypt License Version 2.2`) +* 4.3a (`truecrypt-4.3a.zip`): `TrueCrypt Collective License Version 1.2` (`TrueCrypt License Version 2.3`) + * 4.3a re-release (`TrueCrypt Setup 4.3a.exe`): `TrueCrypt Collective License Version 1.3` (`TrueCrypt License Version 2.4`) + * 4.3a second re-release (`TrueCrypt Setup 4.3a-2.exe`): `TrueCrypt Collective License Version 1.4` (`TrueCrypt License Version 2.5`) +* 5.0, 5.0a, 5.1, 5.1a: `TrueCrypt Collective License Version 1.3` (`TrueCrypt License Version 2.4`) + * 5.1a re-release (`TrueCrypt Setup 5.1a-2.exe`): `TrueCrypt Collective License Version 1.4` (`TrueCrypt License Version 2.5`) +* 6.0, 6.0a: `TrueCrypt Collective License Version 1.4` (`TrueCrypt License Version 2.5`) +* 6.1, 6.1a, 6.2: `TrueCrypt License Version 2.6` +* 6.2a: `TrueCrypt License Version 2.7` +* 6.3, 6.3a: `TrueCrypt License Version 2.8` +* 7.0, 7.0a, 7.1, 7.1a: `TrueCrypt License Version 3.0` diff --git a/doc/License-v1.0.txt b/doc/License-v1.0.txt new file mode 100644 index 0000000..58bc27f --- /dev/null +++ b/doc/License-v1.0.txt @@ -0,0 +1,194 @@ +TRUECRYPT LICENSE + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. + +8. Where applicable, the specific licenses attached to parts of the source +code might take precedence over this general license. + +9. The IDEA cipher described in U.S. patent number 5,214,703 requires a +separate license from Ascom Tech AG for commercial use. IDEA is a trademark +of Ascom Tech AG. + +10. If you use any part of the source code by Dr. Brian Gladman in your +project, you must follow his terms and conditions. + +11. If you use any part of the source code by Markus Friedl in your project, +you must follow his terms and conditions. + +12. This product contains no mechanism or facility that would allow partial +or complete recovery of your data without knowing the correct password or +the key used to encrypt the data. + +Portions of this software are: +Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved. +Copyright (c) 2004 TrueCrypt Team. All Rights Reserved. +Copyright (c) 2004 TrueCrypt Foundation. All Rights Reserved. +Copyright (c) 1995-1997 Eric Young. All Rights Reserved. +Copyright (c) 1992-1999 Masayasu Kumagai, Paulo Barreto, Peter Gutmann. +Copyright (c) 2003 Dr. Brian Gladman, Worcester, UK. All Rights Reserved. +Copyright (c) 2001 Markus Friedl. All Rights Reserved. +For more information, see the legal notices attached to parts of the source code. +This is a TrueCrypt Foundation release. + +END OF GENERAL LICENSE + + +Component Legal Notices: +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.0.txt b/doc/License-v2.0.txt new file mode 100644 index 0000000..3d1e94e --- /dev/null +++ b/doc/License-v2.0.txt @@ -0,0 +1,385 @@ +TrueCrypt License Version 2.0 + + +I. Definitions + +1. "This product" means the parts of the computer software, including, but not +limited to, source code, texts, graphics, and any accompanying files, released +under and covered by this version of this License. + +2. "You" (or "your") means an individual or a legal entity (e.g., a non-profit +organization, commercial organization, government agency, etc.) exercising +permissions granted by this License. + + + +II. Terms and Conditions for Copying, Distribution, and Use + +1. You may copy and/or distribute this product without any restrictions, +provided that the product is not modified and that it is not repackaged (for +terms and conditions for copying and distribution of modified or repackaged +versions of this product, see Section III.) + +2. You may use this product freely (see also Section III.) on single or +multiple computers/systems for non-commercial and/or commercial uses. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. You may modify this product (this also covers implementation of new +features/functionalities, translation into another language, and porting to +another platform), derive new works from this product, include/use this product +or its portion in (or as part of) your product, and you may copy and distribute +such modifications, derivative or aggregated works as your product, provided +that the following conditions are met (for exceptions, see Sections III.2. +and III.3.): + + a. Your product or the modified version must not be called TrueCrypt and + its name must not contain the name TrueCrypt (for example, the following + names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of + its variations that can be easily confused with the name TrueCrypt (e.g., + Truecrypt, True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) + + Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not + to monetize the name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of issues that + might arise from the existence of similar products with the same or similar + name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain + open-source and free software. + + b. The following phrases must be removed from the "About" dialog (the + credits), from this License (Section VI.), and from any other accompanying + materials: + "A TrueCrypt Foundation Release" + "Released by TrueCrypt Foundation" + "This is a TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt" must be displayed by your product (if + technically feasible) or by the modified version and contained in its + documentation. Alternatively, if this product or its portion you included + in your product comprise only a minor portion of your product, phrase + "Portions of this product are based in part on TrueCrypt" may be used + instead. + + d. Complete source code of your product or of the modified version must be + freely and publicly available. If the source code is not included with + every copy of your product/modifications, there must be a well-publicized + means of obtaining the source code, preferably, downloading via the + Internet without charge. The source code must not be deliberately + obfuscated, and it must not be in an intermediate form (e.g., the output of + a preprocessor). Source code means the preferred form in which a programmer + would usually modify the program. + + e. The license and distribution terms of no part of this product may be + changed (i.e., no part of this product can be put under another license), + except as expressly permitted or required by this License. The legal + notices contained in the source code files must be retained. It must be + clearly declared that this product or its parts are distributed under the + TrueCrypt License (contained herein), and it must be clearly and visibly + stated in the distribution where the text of the TrueCrypt License can be + found (you may amend the references to the file 'License.txt' in the source + code accordingly). The text of the TrueCrypt License must accompany (be + distributed along with) your product/modifications. (Any of the Component + Legal Notices contained below in this file may be omitted if the component + to which it pertains is not used. If no cryptographic components of this + product are used, Section IV.3. may be omitted as well.) + + +2. You are not obligated to comply with Sections III.1.a., III.1.b., III.1.c., +and III.1.d. if at least one of the following conditions is met: + + a. You include this product in its entirety and without any modifications + in an operating system distribution (i.e., you include binaries obtained by + compiling the unmodified source code of this product and/or you include the + unmodified contents of the source code distribution archive and/or of the + binary distribution archive). + + b. You include this product in its entirety (the contents of either the + source code distribution archive and/or of the binary distribution archive) + and without any modifications as non-integral part of your product (i.e., + the main functionality of your product will not be affected if such + non-integral part is removed) and phrase "This product utilizes TrueCrypt" + or "This product includes TrueCrypt" is displayed by your product (if + technically feasible) and contained in its documentation. + + +3. You are not obligated to comply with Section III.1.d. if at least one of the +following conditions is met: + + a. Your product/modifications (as defined in Section III.1.) are not + distributed (i.e., your product/modifications are available only to you). + + b. Your product/modifications (as defined in Section III.1.) are + distributed and used only internally within the organization and only by + members/employees of the organization for which you created the + product/modifications and of which you were a member/employee when you + created the product/modifications. (Here the word "organization" means + a non-commercial or commercial organization, or a government agency.) + + + +IV. Disclaimer of Warranties and Liabilities + +1. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT +PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED +"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, +BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE +PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL +ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR DISTRIBUTE THE +PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR +INABILITY TO USE THE PROGRAM, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR +DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A +FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER +OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +3. THIS PRODUCT INCORPORATES CRYPTOGRAPHIC ALGORITHMS THAT MAY BE REGULATED OR +ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT +IS LEGAL TO IMPORT AND/OR EXPORT AND/OR USE THIS PRODUCT IN COUNTRIES WHERE YOU +INTEND TO USE THIS PRODUCT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM +WHICH YOU INTEND TO EXPORT IT. + + + +V. General Terms + +1. Where applicable, the component licenses contained in parts of the source +code and quoted below herein (Section "Component Legal Notices") might take +precedence over the TrueCrypt License. + +2. This product is provided under the terms of this license (agreement). Any +use, reproduction, distribution, or modification of this product or any of its +parts constitutes recipient's acceptance of this agreement. + +3. You may not modify, copy, distribute, or sublicense this product except as +expressly provided under this License. Any attempt otherwise to modify, copy, +distribute, or sublicense this product automatically terminates your rights +under this License. + +4. If any of the license terms is found to be too broad in scope, and/or +declared invalid by any court or legal process, you agree that all other terms +shall not be so affected, and shall remain valid and enforceable. + + + +VI. Copyright and Trademark Information + +TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not to +monetize the name or the product, but to protect the reputation of TrueCrypt, +and to prevent support issues and other kinds of issues that might arise from +the existence of similar products with the same or similar name. Even though +TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free +software. All other trademarks are the sole property of their respective +owners. + +Portions of this software are: +Copyright (c) TrueCrypt Foundation. All Rights Reserved. +Copyright (c) Paul Le Roux. All Rights Reserved. +Copyright (c) TrueCrypt Team. All Rights Reserved. +Copyright (c) Eric Young. All Rights Reserved. +Copyright (c) Dr. Brian Gladman, Worcester, UK. All Rights Reserved. +Copyright (c) Markus Friedl. All Rights Reserved. + +For more information, please see the legal notices attached to parts of the +source code. + +Graphics (logos, icons, etc.) are Copyright (c) TrueCrypt Foundation + + + +COMPONENT LEGAL NOTICES + +Each of the following component licenses applies only to (portions of) the +source code file(s) in which the component license is contained or in which it +is explicitly referenced, and to compiled or otherwise processed forms of such +source code. In other words, none of the following licenses applies to this +product as a whole, even when it uses the term "this product" or any other +equivalent term. +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +This is an independent implementation of the encryption algorithm: + + Twofish by Bruce Schneier and colleagues + +which is a candidate algorithm in the Advanced Encryption Standard +programme of the US National Institute of Standards and Technology. + +Copyright in this implementation is held by Dr B R Gladman but I +hereby give permission for its free direct or derivative use subject +to acknowledgment of its origin and compliance with any conditions +that the originators of the algorithm place on its exploitation. + +My thanks to Doug Whiting and Niels Ferguson for comments that led +to improvements in this implementation. + +Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.1.txt b/doc/License-v2.1.txt new file mode 100644 index 0000000..f88aad8 --- /dev/null +++ b/doc/License-v2.1.txt @@ -0,0 +1,411 @@ +TrueCrypt Collective License Version 1.0 + + +The TrueCrypt Collective License consists of several distinct licenses, which +are contained in this document (separated by lines consisting of underscores) +and which are, in this section, referred to as component licenses. Each of the +component licenses applies only to (portions of) the source code file(s) in +which the component license is contained or in which it is explicitly +referenced, and to compiled or otherwise processed forms of such source code. +None of the component licenses applies to this product as a whole, even when it +uses the phrase "this product" or any other equivalent term/phrase. Unless +otherwise stated, graphics and files that are not part of the source code are +covered solely by the TrueCrypt License. +Note: The TrueCrypt License is one of the component licenses of which the +TrueCrypt Collective License consists. + +Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any +part(s) of work made available under this version of the TrueCrypt Collective +License, is, by such action(s), accepting in full the responsibilities and +obligations contained in the component licenses that apply to the corresponding +part(s) of such work. + +If any term of this license is found to be invalid or unenforceable under +applicable law, it shall not affect the validity or enforceability of any other +terms of this license that are found to be valid and enforceable under +applicable law. + +____________________________________________________________ + +TrueCrypt License Version 2.1 + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, source code, +graphics, texts, and accompanying files) made available under and covered by +this version of this License, as indicated by a copyright notice attached to or +included in the work. + +2. "You" (or "Your") means an individual or a legal entity (e.g., a non-profit +organization, commercial organization, government agency, etc.) exercising +rights under this License. + +3. "Modification" means any alteration of This Product, including, but not +limited to, addition to or deletion from the substance or structure of This +Product, and translation into another language. + +4. "Your Product" means This Product modified by You, any work You derive from +(or base on) This Product, any work in which You include This Product, or any +respective part(s) thereof. + + + +II. Terms and Conditions for Use, Reproduction, and Distribution + +1. You may copy and/or distribute This Product, provided that You do not modify +any part of This Product (for terms and conditions for reproduction and +distribution of modified versions of This Product, see Section III) and +provided that You ensure that all the legal notices and documents (containing, +e.g., the text of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that you make and +distribute. + +2. You may use This Product freely (see also Section III) on any number of +computers/systems for non-commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. You may modify This Product (thus forming Your Product), derive new works +from This Product or portions thereof (thus forming Your Product), include This +Product or portions thereof in another product (thus forming Your Product), and +You may copy and/or distribute Your Product, only if the following conditions +are met (for exceptions, see Sections III.2 and III.3): + + a. The name of Your Product (or of Your modified version of This Product) + must not contain the name TrueCrypt (for example, the following names are + not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, + etc.) nor any of its variations that can be easily confused with the name + TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) + + Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not + to monetize the name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of issues that + might arise from the existence of similar products with the same or similar + name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain + open-source and free software. + + b. The following phrases must be removed from Your Product: + "A TrueCrypt Foundation Release" + "Released by TrueCrypt Foundation" + "This is a TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product (if + technically feasible) and contained in its documentation. Alternatively, if + This Product or its portion You included in Your Product comprises only a + minor portion of Your Product, phrase "Portions of this product are based + in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be + displayed instead. In each of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) + pointing to http://www.truecrypt.org/ and you may freely choose the + location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the + respective phrase. + + d. The complete source code of Your Product must be freely and publicly + available (for exceptions, see Section III.3) at least until you cease to + distribute Your Product. To meet this condition, it is sufficient that You + merely include the source code with every copy of Your Product that you + make and distribute; it is also sufficient that You merely include + information (valid and correct at least until you cease to distribute Your + Product) about where the source code can be freely obtained (e.g., an + Internet URL, etc.) with every copy of Your Product that you make and + distribute. The source code must not be deliberately obfuscated, and it + must not be in an intermediate form (e.g., the output of a preprocessor). + Source code means the preferred form in which a programmer would usually + modify the program. + + e. You must not change the license and distribution terms of This Product + (i.e., no part of This Product may be put under another license), except as + expressly permitted or required by this License. You must keep intact all + the legal notices contained in the source code files. You must include the + following items with every copy of Your Product that you make and + distribute: a clear and conspicuous notice stating that Your Product or + portion(s) thereof is/are distributed under this version of the TrueCrypt + License, a verbatim copy of this version of the TrueCrypt License (as + contained herein), a clear and conspicuous notice containing information + about where the included copy of the License can be found, and an + appropriate copyright notice. + + f. You must not use the name of This Product, names of its authors, or the + names of the legal entities (or informal groups) of which the authors + were/are members/employees, to endorse or promote Your Product without + specific prior written permission from the authors of This Product. + + +2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, +III.1.d, and III.1.f, if all conditions specified in one of the two following +paragraphs are met: + + a. Your Product is an operating system distribution, or other aggregate + software distribution (such as a cover CD-ROM of a magazine) containing + products from different sources, in which You include either This Product + without any modifications or file(s) which You obtain by compiling the + unmodified source code of This Product. + + b. You include This Product in its entirety and without any modifications + (You may omit the source code of This Product) as non-integral part of Your + Product (i.e., none of the main functionalities of Your Product will be + affected if such non-integral part is removed) and phrase "This product + utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or + phrase "This product includes TrueCrypt, freely available at + http://www.truecrypt.org/" is displayed by Your Product (if technically + feasible) and contained in its documentation. In each of the cases + mentioned above in this paragraph, "http://www.truecrypt.org/" must be a + hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ + and you may freely choose the location within the user interface (if there + is any) of Your Product (e.g., an "About" window, etc.) and the way in + which Your Product will display the respective phrase. + + +3. You are not obligated to comply with Section III.1.d if Your Product is not +distributed (i.e., Your Product is available only to You). + + + +IV. Disclaimer of Warranties and Liabilities + +1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE +LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. +SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY +SERVICING, REPAIR OR CORRECTION. + +2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL +ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR +ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR +CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, +INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE +OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO +OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +3. THIS PRODUCT INCORPORATES IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT +MAY BE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR +ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS +SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT +AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE +IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO +EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH +REGULATIONS/RESTRICTIONS. + + + +V. Trademarks + +This License does not grant permission to use trademarks associated with (or +applying to) This Product, except for fair use as defined by applicable law and +except for use expressly permitted or required by this License. + +TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. +Note: The goal is not to monetize the name or the product, but to protect the +reputation of TrueCrypt. TrueCrypt is and will remain open-source and free +software. + + + +VI. General Terms + +1. You may not modify, copy, distribute, or sublicense This Product except as +expressly provided under this License. Any attempt otherwise to modify, copy, +distribute, or sublicense This Product automatically terminates Your rights +under this License. + +2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes +This Product, or any part(s) thereof, is, by such action(s), accepting in full +the responsibilities and obligations contained in this License. + +3. If any term of this License is found to be invalid or unenforceable under +applicable law, You agree that it shall not affect the validity or +enforceability of any other terms of this License that are found to be valid +and enforceable under applicable law. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +This is an independent implementation of the encryption algorithm: + + Twofish by Bruce Schneier and colleagues + +which is a candidate algorithm in the Advanced Encryption Standard +programme of the US National Institute of Standards and Technology. + +Copyright in this implementation is held by Dr B R Gladman but I +hereby give permission for its free direct or derivative use subject +to acknowledgment of its origin and compliance with any conditions +that the originators of the algorithm place on its exploitation. + +My thanks to Doug Whiting and Niels Ferguson for comments that led +to improvements in this implementation. + +Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.2.txt b/doc/License-v2.2.txt new file mode 100644 index 0000000..461cdbb --- /dev/null +++ b/doc/License-v2.2.txt @@ -0,0 +1,440 @@ +TrueCrypt Collective License Version 1.1 + + +The TrueCrypt Collective License consists of several distinct licenses, which +are contained in this document (separated by lines consisting of underscores) +and which are, in this section, referred to as component licenses. Each of the +component licenses applies only to (portions of) the source code file(s) in +which the component license is contained or in which it is explicitly +referenced, and to compiled or otherwise processed forms of such source code. +None of the component licenses applies to this product as a whole, even when it +uses the phrase "this product" or any other equivalent term/phrase. Unless +otherwise stated, graphics and files that are not part of the source code are +covered solely by the TrueCrypt License. +Note: The TrueCrypt License is one of the component licenses of which the +TrueCrypt Collective License consists. + +Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any +part(s) of work made available under this version of the TrueCrypt Collective +License, is, by such action(s), accepting in full the responsibilities and +obligations contained in the component licenses that apply to the corresponding +part(s) of such work. + +If any term of this license is found to be invalid or unenforceable under +applicable law, it shall not affect the validity or enforceability of any other +terms of this license that are found to be valid and enforceable under +applicable law. + +____________________________________________________________ + +TrueCrypt License Version 2.2 + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, source code, +graphics, texts, and accompanying files) made available under and covered by +this version of this License, as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., +a non-profit organization, commercial organization, government agency, etc.) +exercising rights under this License. + +3. "Modification" means (and "modify" refers to) any alteration of This +Product, including, but not limited to, addition to or deletion from the +substance or structure of This Product, and translation into another language. + +4. "Your Product" means This Product modified by You, any work You derive from +(or base on) This Product, any work in which You include This Product, or any +respective part(s) thereof. + +5. "Distribution" means (and "distribute" refers to), regardless of means or +methods, conveyance or transfer of This/Your Product or portions thereof to +third parties, or making This/Your Product or portions thereof available for +download to third parties, regardless of whether any third party downloads the +product (or a portion thereof) made available for download or not. + + + +II. Terms and Conditions for Use, Reproduction, and Distribution + +1. You may copy and/or distribute This Product, provided that You do not modify +any part of This Product (for terms and conditions for reproduction and +distribution of modified versions of This Product, see Section III) and +provided that You ensure that all the legal notices and documents (containing, +e.g., the text of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that you make and +distribute. + +2. You may use This Product freely (see also Section III) on any number of +computers/systems for non-commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. You may modify This Product (thus forming Your Product), derive new works +from This Product or portions thereof (thus forming Your Product), include This +Product or portions thereof in another product (thus forming Your Product), and +You may copy and/or distribute Your Product, only if the following conditions +are met (for exceptions, see Sections III.2 and III.3): + + a. The name of Your Product (or of Your modified version of This Product) + must not contain the name TrueCrypt (for example, the following names are + not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, + etc.) nor any of its variations that can be easily confused with the name + TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) + + Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not + to monetize the name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of issues that + might arise from the existence of similar products with the same or similar + name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain + open-source and free software. + + b. The following phrases must be removed from Your Product and from any + associated materials: + "A TrueCrypt Foundation Release" + "Released by TrueCrypt Foundation" + "This is a TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product (if + technically feasible) and contained in its documentation. Alternatively, if + This Product or its portion You included in Your Product comprises only a + minor portion of Your Product, phrase "Portions of this product are based + in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be + displayed instead. In each of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) + pointing to http://www.truecrypt.org/ and you may freely choose the + location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the + respective phrase. + + Your Product (and any associated materials, e.g., the documentation, the + content of the official web site of Your Product, etc.) must not present + any Internet address containing the domain name truecrypt.org (or any + domain name that forwards to the domain name truecrypt.org) in a manner + that suggests that it is where information about Your Product may be + obtained or where bugs found in Your Product may be reported or where + support for Your Product may be available or otherwise attempt to indicate + that the domain name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely and publicly + available (for exceptions, see Sections III.2 and III.3) at least until you + cease to distribute Your Product. To meet this condition, it is sufficient + that You merely include the source code with every copy of Your Product + that you make and distribute; it is also sufficient that You merely include + information (valid and correct at least until you cease to distribute Your + Product) about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that you make and + distribute. The source code must be available under license(s) that are/is + compatible with this version of the TrueCrypt License and that allow(s) + anyone to modify and derive new works from Your Product (and portions + thereof) and to redistribute such modifications and/or derived works. The + license(s) must be non-exclusive, royalty-free, no-charge, perpetual, and + world-wide. The text of the license(s) must be included with every copy of + Your Product that you make and distribute. The source code must not be + deliberately obfuscated, and it must not be in an intermediate form (e.g., + the output of a preprocessor). Source code means the preferred form in + which a programmer would usually modify the program. + + Note: If you cannot comply with the above requirements, we may grant an + exception under certain conditions. You may request an exception at: + licensing@truecrypt.org + + e. You must not change the license and distribution terms of This Product + in any way (i.e., no part of This Product may be put under another + license). You must keep intact all the legal notices contained in the + source code files. You must include the following items with every copy of + Your Product that you make and distribute: a clear and conspicuous notice + stating that Your Product or portion(s) thereof is/are distributed under + this version of the TrueCrypt License, a verbatim copy of this version of + the TrueCrypt License (as contained herein), a clear and conspicuous notice + containing information about where the included copy of the License can be + found, and an appropriate copyright notice. + + f. Without specific prior written permission from the authors of This + Product (or from their common representative), you must not use the name of + This Product, the names of the authors of This Product, or the names of the + legal entities (or informal groups) of which the authors were/are + members/employees, to endorse or promote Your Product, or in a way that + suggests that Your Product is endorsed by one or more authors of This + Product, or in a way that suggests that one or more authors of This Product + directly participated in the creation of Your Product. + + +2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and +III.1.d, if all conditions specified in one of the two following paragraphs are +met: + + a. Your Product is an operating system distribution, or other aggregate + software distribution (such as a cover CD-ROM of a magazine) containing + products from different sources, in which You include either This Product + without any modifications or file(s) which You obtain by compiling the + unmodified source code of This Product. + + b. You include This Product in its entirety and without any modifications + (You may omit the source code of This Product) as non-integral part of Your + Product (i.e., none of the main functionalities of Your Product will be + affected if such non-integral part is removed) and phrase "This product + utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or + phrase "This product includes TrueCrypt, freely available at + http://www.truecrypt.org/" is displayed by Your Product (if technically + feasible) and contained in its documentation. In each of the cases + mentioned above in this paragraph, "http://www.truecrypt.org/" must be a + hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ + and you may freely choose the location within the user interface (if there + is any) of Your Product (e.g., an "About" window, etc.) and the way in + which Your Product will display the respective phrase. + + +3. You are not obligated to comply with Section III.1.d if Your Product is not +distributed (i.e., Your Product is available only to You). + + + +IV. Disclaimer of Warranties and Liabilities + +1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE +LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. +SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY +SERVICING, REPAIR OR CORRECTION. + +2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL +ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR +ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR +CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, +INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE +OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO +OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS +THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR +ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS +SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT +AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE +IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO +EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH +REGULATIONS/RESTRICTIONS. + + + +V. Trademarks + +This License does not grant permission to use trademarks associated with (or +applying to) This Product, except for fair use as defined by applicable law and +except for use expressly permitted or required by this License. + +TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. +Note: The goal is not to monetize the name or the product, but to protect the +reputation of TrueCrypt. TrueCrypt is and will remain open-source and free +software. + + + +VI. General Terms + +1. You may not use, modify, reproduce, (re)distribute, or sublicense This +Product except as expressly provided under this License. Any attempt otherwise +to use, modify, reproduce, (re)distribute, or sublicense This Product +automatically terminates Your rights under this License. + +2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes +This Product, or any part(s) thereof, is, by such action(s), accepting in full +the responsibilities and obligations contained in this License. + +3. If any term of this License is found to be invalid or unenforceable under +applicable law, You agree that it shall not affect the validity or +enforceability of any other terms of this License that are found to be valid +and enforceable under applicable law. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +This is an independent implementation of the encryption algorithm: + + Twofish by Bruce Schneier and colleagues + +which is a candidate algorithm in the Advanced Encryption Standard +programme of the US National Institute of Standards and Technology. + +Copyright in this implementation is held by Dr B R Gladman but I +hereby give permission for its free direct or derivative use subject +to acknowledgment of its origin and compliance with any conditions +that the originators of the algorithm place on its exploitation. + +My thanks to Doug Whiting and Niels Ferguson for comments that led +to improvements in this implementation. + +Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.3.txt b/doc/License-v2.3.txt new file mode 100644 index 0000000..582a808 --- /dev/null +++ b/doc/License-v2.3.txt @@ -0,0 +1,474 @@ +TrueCrypt Collective License Version 1.2 + + +The TrueCrypt Collective License consists of several distinct licenses, which +are contained in this document (separated by lines consisting of underscores) +and which are, in this section, referred to as component licenses. Each of the +component licenses applies only to (portions of) the source code file(s) in +which the component license is contained or in which it is explicitly +referenced, and to compiled or otherwise processed forms of such source code. +None of the component licenses applies to this product as a whole, even when it +uses the phrase "this product" or any other equivalent term/phrase. Unless +otherwise stated, graphics and files that are not part of the source code are +covered solely by the TrueCrypt License. +Note: The TrueCrypt License is one of the component licenses of which the +TrueCrypt Collective License consists. + +Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any +part(s) of work made available under this version of the TrueCrypt Collective +License, is, by such action(s), accepting in full the responsibilities and +obligations contained in the component licenses that apply to the corresponding +part(s) of such work. + +If any term of this license is found to be invalid or unenforceable under +applicable law, it shall not affect the validity or enforceability of any other +terms of this license that are found to be valid and enforceable under +applicable law. + +____________________________________________________________ + +TrueCrypt License Version 2.3 + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, source code, +graphics, texts, and accompanying files) made available under and covered by +this version of this License, as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., +a non-profit organization, commercial organization, government agency, etc.) +exercising rights under this License. + +3. "Modification" means (and "modify" refers to) any alteration of This +Product, including, but not limited to, addition to or deletion from the +substance or structure of This Product, and translation into another language. + +4. "Your Product" means This Product modified by You, any work You derive from +(or base on) This Product, any work in which You include This Product, or any +respective part(s) thereof. + +5. "Distribution" means (and "distribute" refers to), regardless of means or +methods, conveyance or transfer of This/Your Product or portions thereof to +third parties, or making This/Your Product or portions thereof available for +download to third parties, regardless of whether any third party downloads the +product (or a portion thereof) made available for download or not. + + + +II. Terms and Conditions for Use, Reproduction, and Distribution + +1. You may reproduce and/or distribute This Product, provided that You do not +modify any part of This Product (for terms and conditions for reproduction and +distribution of modified versions of This Product, see Section III) and +provided that You ensure that all the legal notices and documents (containing, +e.g., the text of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that you make and +distribute, and provided that you comply with all applicable terms and +conditions of this License. + +2. Provided that you comply with all applicable terms and conditions of this +License, You may use This Product freely (see also Section III) on any number +of computers/systems for non-commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. If all conditions specified in the following paragraphs in this Section are +met (for exceptions, see Sections III.2 and III.3), You may modify This Product +(thus forming Your Product), derive new works from This Product or portions +thereof (thus forming Your Product), include This Product or portions thereof +in another product (thus forming Your Product), and You may copy and/or +distribute Your Product. + + a. The name of Your Product (or of Your modified version of This Product) + must not contain the name TrueCrypt (for example, the following names are + not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, + etc.) nor any of its variations that can be easily confused with the name + TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt + Foundation. The goal is not to monetize the name or the product, but to + protect the reputation of TrueCrypt, and to prevent support issues and + other kinds of issues that might arise from the existence of similar + products with the same or similar name. Even though TrueCrypt and the + TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source + and free software. + + All graphics files showing any TrueCrypt logo (including the non-textual + logo consisting primarily of a key in stylized form) must be removed from + Your Product (or from Your modified version of This Product) and from any + associated materials. Logo(s) included in (or attached to) Your Product + (or in/to associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos or portion(s) thereof. + + b. The following phrases must be removed from Your Product and from any + associated materials: + "A TrueCrypt Foundation Release" + "Released by TrueCrypt Foundation" + "This is a TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product (if + technically feasible) and contained in its documentation. Alternatively, if + This Product or its portion You included in Your Product comprises only a + minor portion of Your Product, phrase "Portions of this product are based + in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be + displayed instead. In each of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) + pointing to http://www.truecrypt.org/ and you may freely choose the + location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the + respective phrase. + + Your Product (and any associated materials, e.g., the documentation, the + content of the official web site of Your Product, etc.) must not present + any Internet address containing the domain name truecrypt.org (or any + domain name that forwards to the domain name truecrypt.org) in a manner + that suggests that it is where information about Your Product may be + obtained or where bugs found in Your Product may be reported or where + support for Your Product may be available or otherwise attempt to indicate + that the domain name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely and publicly + available (for exceptions, see Sections III.2 and III.3) at least until you + cease to distribute Your Product. To meet this condition, it is sufficient + that You merely include the source code with every copy of Your Product + that you make and distribute; it is also sufficient that You merely include + information (valid and correct at least until you cease to distribute Your + Product) about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that you make and + distribute. The source code must be available under license(s) that are/is + compatible with this version of the TrueCrypt License (however, see also + Section III.1.e) and that allow(s) anyone to modify and derive new works + from Your Product (and portions thereof) and to use, reproduce, and + redistribute such modifications and/or derived works. The license(s) must + be non-exclusive, royalty-free, no-charge, perpetual, and world-wide. The + text of the license(s) must be included with every copy of Your Product + that you make and distribute. The source code must not be deliberately + obfuscated, and it must not be in an intermediate form (e.g., the output of + a preprocessor). Source code means the preferred form in which a programmer + would usually modify the program. + + Note: If you cannot comply with the above requirements, we may grant an + exception under certain conditions. You may request an exception at: + licensing@truecrypt.org + + e. You must not change the license and distribution terms of This Product + in any way (i.e., no part of This Product may be put under another + license). You must keep intact all the legal notices contained in the + source code files. You must include the following items with every copy of + Your Product that you make and distribute: a clear and conspicuous notice + stating that Your Product or portion(s) thereof is/are distributed under + this version of the TrueCrypt License, a verbatim copy of this version of + the TrueCrypt License (as contained herein), a clear and conspicuous notice + containing information about where the included copy of the License can be + found, and an appropriate copyright notice. + + f. Without specific prior written permission from the authors of This + Product (or from their common representative), you must not use the name of + This Product, the names of the authors of This Product, or the names of the + legal entities (or informal groups) of which the authors were/are + members/employees, to endorse or promote Your Product, or in a way that + suggests that Your Product is endorsed by one or more authors of This + Product, or in a way that suggests that one or more authors of This Product + directly participated in the creation of Your Product. + + +2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and +III.1.d, if all conditions specified in one of the two following paragraphs are +met: + + a. Your Product is an operating system distribution, or other aggregate + software distribution (such as a cover CD-ROM of a magazine) containing + products from different sources, in which You include either This Product + without any modifications or file(s) which You obtain by compiling the + unmodified source code of This Product. + + b. You include This Product in its entirety and without any modifications + (You may omit the source code of This Product) as non-integral part of Your + Product (i.e., none of the main functionalities of Your Product will be + affected if such non-integral part is removed) and phrase "This product + utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or + phrase "This product includes TrueCrypt, freely available at + http://www.truecrypt.org/" is displayed by Your Product (if technically + feasible) and contained in its documentation. In each of the cases + mentioned above in this paragraph, "http://www.truecrypt.org/" must be a + hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ + and you may freely choose the location within the user interface (if there + is any) of Your Product (e.g., an "About" window, etc.) and the way in + which Your Product will display the respective phrase. + + +3. You are not obligated to comply with Section III.1.d if Your Product is not +distributed (i.e., Your Product is available only to You). + + + +IV. Disclaimer of Warranties and Liabilities; Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE +COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY REPRODUCE AND/OR +(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE +LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED +TO, ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF +THE USE, REPRODUCTION, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A +PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), +INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, LOSSES SUSTAINED BY +YOU OR THIRD PARTIES, OR A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER +PRODUCT, EVEN IF SUCH (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, AND/OR ANY OTHER +PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. +SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY +SERVICING, REPAIR OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS +THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR +ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT +IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS +THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO +IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND THAT IT IS SOLELY YOUR +RESPONSIBILITY TO COMPLY WITH ANY SUCH REGULATIONS/RESTRICTIONS. + +4. You shall indemnify, defend and hold all (co)authors of This Product, their +agents and associates, and applicable copyright/trademark owners, harmless +from/against any liability, loss, expense, damages, claims or causes of action, +arising out of Your use, inability to use, reproduction, (re)distribution, +import and/or (re)export of This Product (or portions thereof) and/or Your +breach of any term of this License. + + + +V. Trademarks + +This License does not grant permission to use trademarks associated with (or +applying to) This Product, except for fair use as defined by applicable law and +except for use expressly permitted or required by this License. + +TrueCrypt and the TrueCrypt logos (including the non-textual logo consisting +primarily of a key in stylized form) are trademarks of the TrueCrypt +Foundation. + +Note: The goal is not to monetize the name or the product, but to protect the +reputation of TrueCrypt. TrueCrypt is and will remain open-source and free +software. + + + +VI. General Terms + +1. You may not use, modify, reproduce, derive from, (re)distribute, or +sublicense This Product, or portion(s) thereof, except as expressly provided +under this License. Any attempt (even if permitted by applicable law) otherwise +to use, modify, reproduce, derive from, (re)distribute, or sublicense This +Product, or portion(s) thereof, automatically and immediately terminates Your +rights under this License. + +2. ANYONE WHO USES AND/OR REPRODUCES AND/OR MODIFIES AND/OR DERIVES FROM AND/OR +(RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S), +ACCEPTING ALL TERMS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS +CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT THEM, DO NOT USE, MODIFY, +REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) +THEREOF. + +3. IF ANY PROVISION OF SECTION IV OF THIS LICENSE IS UNENFORCEABLE, PROHIBITED, +OR INVALID UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU MAY NOT USE, MODIFY, +REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) +THEREOF. + +4. If any term of this License is found to be invalid or unenforceable under +applicable law, You agree that it shall not affect the validity or +enforceability of any other terms of this License that are found to be valid +and enforceable under applicable law. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +This is an independent implementation of the encryption algorithm: + + Twofish by Bruce Schneier and colleagues + +which is a candidate algorithm in the Advanced Encryption Standard +programme of the US National Institute of Standards and Technology. + +Copyright in this implementation is held by Dr B R Gladman but I +hereby give permission for its free direct or derivative use subject +to acknowledgment of its origin and compliance with any conditions +that the originators of the algorithm place on its exploitation. + +My thanks to Doug Whiting and Niels Ferguson for comments that led +to improvements in this implementation. + +Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.4.txt b/doc/License-v2.4.txt new file mode 100644 index 0000000..7d29e71 --- /dev/null +++ b/doc/License-v2.4.txt @@ -0,0 +1,530 @@ +TrueCrypt Collective License Version 1.3 + +Software distributed under this license is distributed on an "AS IS" BASIS +WITHOUT WARRANTIES OF ANY KIND. THE LIABILITY OF THE AUTHORS AND DISTRIBUTORS +OF THE SOFTWARE IS LIMITED. + +ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART(S) OF A WORK +MADE AVAILABLE UNDER THIS VERSION OF THE TRUECRYPT COLLECTIVE LICENSE, IS, BY +SUCH ACTION(S), ACCEPTING ALL TERMS OF THE COMPONENT LICENSES (SEE BELLOW) THAT +APPLY TO THE CORRESPONDING PART(S) OF THE WORK. IF YOU DO NOT ACCEPT THEM, DO +NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE WORK, NOR ANY PART(S) THEREOF. + +The TrueCrypt Collective License consists of several distinct licenses, which +are contained in this document (separated by lines consisting of underscores) +and which are, in this section, referred to as component licenses. Each of the +component licenses applies only to (portions of) the source code file(s) in +which the component license is contained or in which it is explicitly +referenced, and to compiled or otherwise processed forms of such source code. +None of the component licenses applies to this product as a whole, even when it +uses the phrase "this product" or any other equivalent term/phrase. Unless +otherwise stated, graphics and files that are not part of the source code are +governed solely by the TrueCrypt License. Note: The TrueCrypt License is one of +the component licenses of which the TrueCrypt Collective License consists. + +____________________________________________________________ + +This software is copyright (c) 2003-2008 TrueCrypt Foundation + +TrueCrypt License Version 2.4 + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, source code, +graphics, texts, and accompanying files) made available under and governed by +this version of this license ("License"), as may be indicated by, but is not +limited to, copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., +a non-profit organization, commercial organization, government agency, etc.) +exercising permissions granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration of This +Product, including, but not limited to, addition to or deletion from the +substance or structure of This Product, and translation into another language. + +4. "Your Product" means This Product modified by You, any work You derive from +(or base on) This Product, any work in which You include This Product, or any +respective part(s) thereof. + +5. "Distribution" means (and "distribute" refers to), regardless of means or +methods, conveyance, transfer, providing, or making available of This/Your +Product or portions thereof to third parties (including, but not limited to, +making This/Your Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the product, or any +portion thereof, made available for download). + + + +II. Terms and Conditions for Use, Copying, and Distribution + +1. You may copy and/or distribute This Product, provided that You do not modify +This Product (for terms and conditions for copying and distribution of modified +versions of This Product, see Chapter III) and provided that You do not include +This Product in another product (except as permitted under Chapter III), and +provided that You ensure that all the legal notices and documents (containing, +e.g., the text of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that You make and +distribute, and provided that You comply with all other applicable terms and +conditions of this License. + +2. Provided that You comply with all applicable terms and conditions of this +License, You may use This Product freely (see also Chapter III) on any number +of computers/systems for non-commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. If all conditions specified in the following paragraphs in this Chapter +(III) are met (for exceptions, see Sections III.2 and III.3) and if You comply +with all other applicable terms and conditions of this License, You may modify +This Product (thus forming Your Product), derive new works from This Product or +portions thereof (thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product), and You may copy and/or +distribute Your Product. + + a. The name of Your Product (or of Your modified version of This Product) + must not contain the name TrueCrypt (for example, the following names are + not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, + etc.) nor any other names confusingly similar to the name TrueCrypt (e.g., + True-Crypt, True Crypt, TruKrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt + Foundation. The goal is not to monetize the name or the product, but to + protect the reputation of TrueCrypt, and to prevent support issues and + other kinds of issues that might arise from the existence of similar + products with the same or similar name. Even though TrueCrypt and the + TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source + and free software. + + All occurrences of the name TrueCrypt that could reasonably be considered + to identify Your Product must be removed from Your Product and from any + associated materials. Logo(s) included in (or attached to) Your Product + (and in/to associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos (including the + non-textual logo consisting primarily of a key in stylized form) or + portion(s) thereof. All graphics contained in This Product (logos, icons, + etc.) must be removed from Your Product (or from Your modified version of + This Product) and from any associated materials. + + b. The following phrases must be removed from Your Product and from any + associated materials, except the text of this License: "A TrueCrypt + Foundation Release", "Released by TrueCrypt Foundation", "This is a + TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product (if + technically feasible) and contained in its documentation. Alternatively, if + This Product or its portion You included in Your Product constitutes only a + minor portion of Your Product, phrase "Portions of this product are based + in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be + displayed instead. In each of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) + pointing to http://www.truecrypt.org/ and You may freely choose the + location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the + respective phrase. + + Your Product (and any associated materials, e.g., the documentation, the + content of the official web site of Your Product, etc.) must not present + any Internet address containing the domain name truecrypt.org (or any + domain name that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your Product may be + obtained or where bugs found in Your Product may be reported or where + support for Your Product may be available or otherwise attempt to indicate + that the domain name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely and publicly + available (for exceptions, see Sections III.2 and III.3) at least until You + cease to distribute Your Product. To meet this condition, it is sufficient + that You merely include the source code with every copy of Your Product + that You make and distribute; it is also sufficient that You merely include + information (valid and correct at least until You cease to distribute Your + Product) about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that You make and + distribute. Portions of the source code that were created by You (e.g. Your + additions to This Product) must be available under license(s) that are/is + compatible with this version of the TrueCrypt License (however, see also + Subsection III.1.e) and that allow(s) anyone to modify and derive new works + from Your Product (and portions thereof) and to use, copy, and redistribute + such modifications and/or derivative works. The license(s) must be + perpetual, non-exclusive, royalty-free, no-charge, and worldwide, and must + not invalidate, weaken, restrict, interpret, amend, modify, interfere with + or otherwise affect any part, term, provision, or clause of this License. + The text of the license(s) must be included with every copy of Your Product + that You make and distribute. The source code must not be deliberately + obfuscated, and it must not be in an intermediate form (e.g., the output of + a preprocessor). Source code means the preferred form in which a programmer + would usually modify the program. + + Note: If you cannot comply with the above requirements, we may grant an + exception under certain conditions. You may request an exception at: + licensing@truecrypt.org + + e. You must not change the license terms of This Product in any way (adding + any new terms is considered changing the license terms even if the original + terms are retained), which means, e.g., that no part of This Product may be + put under another license. You must keep intact all the legal notices + contained in the source code files. You must include the following items + with every copy of Your Product that You make and distribute: a clear and + conspicuous notice stating that Your Product or portion(s) thereof is/are + distributed under this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), a clear and + conspicuous notice containing information about where the included copy of + the License can be found, and an appropriate copyright notice. + + f. Without specific prior written permission from the authors of This + Product (or from their common representative), You must not use the name of + This Product, the names of the authors of This Product, or the names of the + legal entities (or informal groups) of which the authors were/are + members/employees, to endorse or promote Your Product (or You, or Your + affiliates), or in a way that might suggest that Your Product (or You, or + Your affiliates) is/are endorsed by one or more authors of This Product, or + in a way that might suggest that one or more authors of This Product is/are + affiliated with You or directly participated in the creation of Your + Product. + + +2. You are not obligated to comply with Subsections III.1.a, III.1.b, III.1.c, +and III.1.d, if all conditions specified in one of the two following +Subsections (III.2.a or III.2.b) are met: + + a. Your Product is an operating system distribution, or other aggregate + software distribution (such as a cover CD-ROM of a magazine) containing + products from different sources, in which You include either This Product + without any modifications or file(s) which You obtain by compiling the + unmodified source code of This Product. + + b. You include This Product in its entirety and without any modifications + (You may omit the source code of This Product) as non-integral part of Your + Product (i.e., none of the main functionalities of Your Product will be + affected if such non-integral part is removed) and phrase "This product + utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or + phrase "This product includes TrueCrypt, freely available at + http://www.truecrypt.org/" is displayed by Your Product (if technically + feasible) and contained in its documentation. In each of the cases + mentioned above in this paragraph, "http://www.truecrypt.org/" must be a + hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user interface (if there + is any) of Your Product (e.g., an "About" window, etc.) and the way in + which Your Product will display the respective phrase. + + +3. You are not obligated to comply with Subsection III.1.d if Your Product is +not distributed (i.e., Your Product is available only to You). + + + +IV. Limitation of Liability, Disclaimer of Warranty, Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE +COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR +(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE +LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED +TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR +CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF +DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT +TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, +OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT +(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, +MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF +YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A +PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY +OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER +EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES +OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. +SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY +SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS +THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR +ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT +IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS +THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO +IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR +RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND +LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, THEIR +AGENTS AND ASSOCIATES, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS +FROM/AGAINST ANY LIABILITY, LOSS, EXPENSE, DAMAGES, CLAIMS OR CAUSES OF ACTION, +ARISING OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT +AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF +ANY TERM OF THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks associated with (or +applying to) This Product, except for fair use as defined by applicable law and +except for use expressly permitted or required by this License. Any attempt +otherwise to use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This License and may +constitute trademark infringement (which may be prosecuted). + +TrueCrypt is a registered trademark of the TrueCrypt Foundation registered with +the World Intellectual Property Organization, an agency of the United Nations, +(international trademark registration), in the U.S. Patent and Trademark +Office, and in the trademark offices of other countries. All TrueCrypt logos +(including the non-textual logo consisting primarily of a key in stylized form) +are trademarks of the TrueCrypt Foundation. + +Note: The goal is not to monetize the name or the product, but to protect the +reputation of TrueCrypt. TrueCrypt is and will remain open-source and free +software. + + + +VI. General Terms + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE +WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY +SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS OF THIS LICENSE +(AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). IF YOU DO +NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS OF THIS LICENSE, DO NOT USE, +COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR +ANY PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, +OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED +IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT +(EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE +DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS +LICENSE AND CAN CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). +ANY RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF +THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR +FAILURE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO +PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE +CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). NOTHING IN THIS +LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT +TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT. + +3. This license does not constitute or imply a waiver of any intellectual +property rights. This license does not transfer, assign, or convey any +intellectual property rights (e.g., it does not transfer ownership of +copyrights or trademarks). + +4. Subject to the terms of this License, You may allow a third party to use +Your copy of This Product (or a copy that you make and distribute, or Your +Product, or respective parts thereof) provided that the third party explicitly +accepts and agrees to be bound by all terms of this License and the third party +is not prohibited from using This Product (or portions thereof) by this License +(see, e.g., Section VI.6) or by applicable law. However, You are not obligated +to ensure that the third party accepts (and agrees to be bound by all terms of) +this License if You distribute only the self-extracting package (containing +This Product) that does not allow the user to install (nor extract) the files +contained in the package until he or she accepts and agrees to be bound by all +terms of this License. + +5. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF +YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS OF THIS LICENSE, YOU +MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS +PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A LAWYER. + +6. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS +UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR +JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +7. If any provision of this License, or a portion thereof, is found to be +invalid or unenforceable under applicable law, it shall not affect the validity +or enforceability of the remainder of this License, and such invalid or +unenforceable provision shall be construed to reflect the original intent of +such provision and shall be enforced to the maximum extent permitted by +applicable law so as to effect the original intent of such provision as closely +as possible. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software in both source and binary +form is allowed (with or without changes) provided that: + + 1. distributions of this source code include the above copyright + notice, this list of conditions and the following disclaimer; + + 2. distributions in binary form include the above copyright + notice, this list of conditions and the following disclaimer + in the documentation and/or other associated materials; + + 3. the copyright holder's name is not used to endorse products + built using this software without specific written permission. + +ALTERNATIVELY, provided that this notice is retained in full, this product +may be distributed under the terms of the GNU General Public License (GPL), +in which case the provisions of the GPL apply INSTEAD OF those given above. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +This is an independent implementation of the encryption algorithm: + + Twofish by Bruce Schneier and colleagues + +which is a candidate algorithm in the Advanced Encryption Standard +programme of the US National Institute of Standards and Technology. + +Copyright in this implementation is held by Dr B R Gladman but I +hereby give permission for its free direct or derivative use subject +to acknowledgment of its origin and compliance with any conditions +that the originators of the algorithm place on its exploitation. + +My thanks to Doug Whiting and Niels Ferguson for comments that led +to improvements in this implementation. + +Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.5.txt b/doc/License-v2.5.txt new file mode 100644 index 0000000..f7f2036 --- /dev/null +++ b/doc/License-v2.5.txt @@ -0,0 +1,542 @@ +TrueCrypt Collective License Version 1.4 + +Software distributed under this license is distributed on an "AS IS" BASIS +WITHOUT WARRANTIES OF ANY KIND. THE LIABILITY OF THE AUTHORS AND DISTRIBUTORS +OF THE SOFTWARE IS LIMITED. + +ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART(S) OF A WORK +MADE AVAILABLE UNDER THIS VERSION OF THE TRUECRYPT COLLECTIVE LICENSE, IS, BY +SUCH ACTION(S), ACCEPTING ALL TERMS AND CONDITIONS OF THE COMPONENT LICENSES +(SEE BELOW) THAT APPLY TO THE CORRESPONDING PART(S) OF THE WORK. IF YOU DO NOT +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE WORK, NOR ANY +PART(S) THEREOF. + +The TrueCrypt Collective License consists of several distinct licenses, which +are contained in this document (separated by lines consisting of underscores) +and which are, in this section, referred to as component licenses. Each of the +component licenses applies only to (portions of) the source code file(s) in +which the component license is contained or in which it is explicitly +referenced, and to compiled or otherwise processed forms of such source code. +None of the component licenses applies to this product as a whole, even when it +uses the phrase "this product" or any other equivalent term/phrase. Unless +otherwise stated, graphics and files that are not part of the source code are +governed solely by the TrueCrypt License. Note: The TrueCrypt License is one of +the component licenses of which the TrueCrypt Collective License consists. + +____________________________________________________________ + +This software is copyright (c) 2003-2008 TrueCrypt Foundation + +TrueCrypt License Version 2.5 + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, source code, +graphics, texts, and accompanying files) made available under and governed by +this version of this license ("License"), as may be indicated by, but is not +limited to, copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., +a non-profit organization, commercial organization, government agency, etc.) +exercising permissions granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration of This +Product, including, but not limited to, addition to or deletion from the +substance or structure of This Product, and translation into another language. + +4. "Your Product" means This Product modified by You, any work You derive from +(or base on) This Product, any work in which You include This Product, or any +respective part(s) thereof. + +5. "Distribution" means (and "distribute" refers to), regardless of means or +methods, conveyance, transfer, providing, or making available of This/Your +Product or portions thereof to third parties (including, but not limited to, +making This/Your Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the product, or any +portion thereof, made available for download). + + + +II. Terms and Conditions for Use, Copying, and Distribution + +1. You may copy and/or distribute This Product, provided that You do not modify +This Product (for terms and conditions for copying and distribution of modified +versions of This Product, see Chapter III) and provided that You do not include +This Product in another product (except as permitted under Chapter III), and +provided that You ensure that all the legal notices and documents (containing, +e.g., the text of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that You make and +distribute, and provided that You comply with all other applicable terms and +conditions of this License. + +2. Provided that You comply with all applicable terms and conditions of this +License, You may use This Product freely (see also Chapter III) on any number +of computers/systems for non-commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New Products + +1. If all conditions specified in the following paragraphs in this Chapter +(III) are met (for exceptions, see Sections III.2 and III.3) and if You comply +with all other applicable terms and conditions of this License, You may modify +This Product (thus forming Your Product), derive new works from This Product or +portions thereof (thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product), and You may copy and/or +distribute Your Product. + + a. The name of Your Product (or of Your modified version of This Product) + must not contain the name TrueCrypt (for example, the following names are + not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, + etc.) nor any other names confusingly similar to the name TrueCrypt (e.g., + True-Crypt, True Crypt, TruKrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt + Foundation. The goal is not to monetize the name or the product, but to + protect the reputation of TrueCrypt, and to prevent support issues and + other kinds of issues that might arise from the existence of similar + products with the same or similar name. Even though TrueCrypt and the + TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source + and free software. + + All occurrences of the name TrueCrypt that could reasonably be considered + to identify Your Product must be removed from Your Product and from any + associated materials. Logo(s) included in (or attached to) Your Product + (and in/to associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos (including the + non-textual logo consisting primarily of a key in stylized form) or + portion(s) thereof. All graphics contained in This Product (logos, icons, + etc.) must be removed from Your Product (or from Your modified version of + This Product) and from any associated materials. + + b. The following phrases must be removed from Your Product and from any + associated materials, except the text of this License: "A TrueCrypt + Foundation Release", "Released by TrueCrypt Foundation", "This is a + TrueCrypt Foundation release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product (if + technically feasible) and contained in its documentation. Alternatively, if + This Product or its portion You included in Your Product constitutes only a + minor portion of Your Product, phrase "Portions of this product are based + in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be + displayed instead. In each of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) + pointing to http://www.truecrypt.org/ and You may freely choose the + location within the user interface (if there is any) of Your Product (e.g., + an "About" window, etc.) and the way in which Your Product will display the + respective phrase. + + Your Product (and any associated materials, e.g., the documentation, the + content of the official web site of Your Product, etc.) must not present + any Internet address containing the domain name truecrypt.org (or any + domain name that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your Product may be + obtained or where bugs found in Your Product may be reported or where + support for Your Product may be available or otherwise attempt to indicate + that the domain name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely and publicly + available (for exceptions, see Sections III.2 and III.3) at least until You + cease to distribute Your Product. To meet this condition, it is sufficient + that You merely include the source code with every copy of Your Product + that You make and distribute (see also below in this Subsection III.1.d for + conditions that licenses governing the source code must meet) provided that + You make the copies available to the general public free of charge; it is + also sufficient that You merely include information (valid and correct at + least until You cease to distribute Your Product) about where the source + code can be freely obtained (e.g., an Internet address, etc.) with every + copy of Your Product that You make and distribute (see also below in this + Subsection III.1.d for conditions that licenses governing the source code + must meet) provided that You make the copies available to the general + public free of charge. + + Portions of the source code that were created by You (e.g. Your additions + to This Product) must be available under license(s) that are/is compatible + with this version of the TrueCrypt License (however, see also Subsection + III.1.e) and that allow(s) anyone to modify and derive new works from the + portions of the source code that were created by You and to use, copy, and + redistribute such modifications and/or derivative works. The license(s) + must be perpetual, non-exclusive, royalty-free, no-charge, and worldwide, + and must not invalidate, weaken, restrict, interpret, amend, modify, + interfere with or otherwise affect any part, term, provision, or clause of + this License. The text of the license(s) must be included with every copy + of Your Product that You make and distribute. The source code must not be + deliberately obfuscated, and it must not be in an intermediate form (e.g., + the output of a preprocessor). Source code means the preferred form in + which a programmer would usually modify the program. + + Note: If you cannot comply with the above requirements, we may grant an + exception under certain conditions. You may request an exception at: + licensing@truecrypt.org + + e. You must not change the license terms of This Product in any way (adding + any new terms is considered changing the license terms even if the original + terms are retained), which means, e.g., that no part of This Product may be + put under another license. You must keep intact all the legal notices + contained in the source code files. You must include the following items + with every copy of Your Product that You make and distribute: a clear and + conspicuous notice stating that Your Product or portion(s) thereof is/are + distributed under this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), a clear and + conspicuous notice containing information about where the included copy of + the License can be found, and an appropriate copyright notice. + + f. Without specific prior written permission from the authors of This + Product (or from their common representative), You must not use the name of + This Product, the names of the authors of This Product, or the names of the + legal entities (or informal groups) of which the authors were/are + members/employees, to endorse or promote Your Product (or You, or Your + affiliates), or in a way that might suggest that Your Product (or You, or + Your affiliates) is/are endorsed by one or more authors of This Product, or + in a way that might suggest that one or more authors of This Product is/are + affiliated with You or directly participated in the creation of Your + Product. + + +2. You are not obligated to comply with Subsections III.1.a, III.1.b, III.1.c, +and III.1.d, if all conditions specified in one of the two following +Subsections (III.2.a or III.2.b) are met: + + a. Your Product is an operating system distribution, or other aggregate + software distribution (such as a cover CD-ROM of a magazine) containing + products from different sources, in which You include either This Product + without any modifications or file(s) which You obtain by compiling the + unmodified source code of This Product (see also Section VI.4). + + b. You include This Product in its entirety and without any modifications + (You may omit the source code of This Product) as non-integral part of Your + Product (i.e., none of the main functionalities of Your Product will be + affected if such non-integral part is removed) and phrase "This product + utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or + phrase "This product includes TrueCrypt, freely available at + http://www.truecrypt.org/" is displayed by Your Product (if technically + feasible) and contained in its documentation. In each of the cases + mentioned above in this paragraph, "http://www.truecrypt.org/" must be a + hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user interface (if there + is any) of Your Product (e.g., an "About" window, etc.) and the way in + which Your Product will display the respective phrase. + + Note: If you cannot comply with Subsection III.1.d, we may grant an + exception under certain conditions. You may request an exception at: + licensing@truecrypt.org + + +3. You are not obligated to comply with Subsection III.1.d if Your Product is +not distributed (i.e., Your Product is available only to You). + + + +IV. Limitation of Liability, Disclaimer of Warranty, Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE +COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR +(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE +LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED +TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR +CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF +DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT +TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, +OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT +(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, +MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF +YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A +PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY +OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER +EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES +OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. +SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY +SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS +THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR +ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT +IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS +THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO +IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR +RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND +LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, THEIR +AGENTS AND ASSOCIATES, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS FROM +AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, +FINES, COSTS, EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES +OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, RELATED TO OR ARISING OUT +OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT AND/OR +(RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF ANY TERM +OF THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks associated with (or +applying to) This Product, except for fair use as defined by applicable law and +except for use expressly permitted or required by this License. Any attempt +otherwise to use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This License and may +constitute trademark infringement (which may be prosecuted). + +TrueCrypt is a registered trademark of the TrueCrypt Foundation registered with +the World Intellectual Property Organization, an agency of the United Nations, +(international trademark registration), in the U.S. Patent and Trademark +Office, and in the trademark offices of other countries. All TrueCrypt logos +(including the non-textual logo consisting primarily of a key in stylized form) +are trademarks of the TrueCrypt Foundation. + +Note: The goal is not to monetize the name or the product, but to protect the +reputation of TrueCrypt. TrueCrypt is and will remain open-source and free +software. + + + +VI. General Terms and Conditions, Miscellaneous Provisions + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE +WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY +SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS AND CONDITIONS +OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS +LICENSE). IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND +CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS +OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, +OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED +IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT +(EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE +DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS +LICENSE AND CAN CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). +ANY RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF +THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR +FAILURE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO +PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE +CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). NOTHING IN THIS +LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT +TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT. + +3. This license does not constitute or imply a waiver of any intellectual +property rights. This license does not transfer, assign, or convey any +intellectual property rights (e.g., it does not transfer ownership of +copyrights or trademarks). + +4. Subject to the terms and conditions of this License, You may allow a third +party to use Your copy of This Product (or a copy that you make and distribute, +or Your Product, or respective parts thereof) provided that the third party +overtly accepts and agrees to be bound by all terms and conditions of this +License and the third party is not prohibited from using This Product (or +portions thereof) by this License (see, e.g., Section VI.6) or by applicable +law. However, You are not obligated to ensure that the third party accepts (and +agrees to be bound by all terms of) this License if You distribute only the +self-extracting package (containing This Product) that does not allow the user +to install (nor extract) the files contained in the package until he or she +accepts and agrees to be bound by all terms and conditions of this License. + +5. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF +YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS AND CONDITIONS OF THIS +LICENSE, YOU MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR +(RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH +A LAWYER. + +6. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS +UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR +JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +7. If any provision of this License, or a portion thereof, is found to be +invalid or unenforceable under applicable law, it shall not affect the validity +or enforceability of the remainder of this License, and such invalid or +unenforceable provision shall be construed to reflect the original intent of +the provision and shall be enforced to the maximum extent permitted by +applicable law so as to effect the original intent of the provision as closely +as possible. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, including +source code. + +You may modify this product and source code, and distribute such modifications, +and you may derive new works based on this product, provided that: + +1. Any product which is simply derived from this product cannot be +called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your product +is distributed with source code, you must include this notice with +those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must display +on any packaging, and marketing materials which reference +your product, a notice which states: + +"This product uses components written by Paul Le Roux " + +3. If you use any of the source code originally by Eric Young, you must +in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have not +signed it. However, nothing else grants you permission to modify or +distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this License. + +5. If any of these license terms is found to be to broad in scope, and +declared invalid by any court or legal process, you agree that all other +terms shall not be so affected, and shall remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY +FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE +STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER +EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE +QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE +DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR +REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, +INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING +OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED +TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER +PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software is allowed (with or without +changes) provided that: + + 1. source code distributions include the above copyright notice, this + list of conditions and the following disclaimer; + + 2. binary distributions include the above copyright notice, this list + of conditions and the following disclaimer in their documentation; + + 3. the name of the copyright holder is not used to endorse products + built using this software without specific written permission. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied warranties +in respect of its properties, including, but not limited to, correctness +and/or fitness for purpose. +____________________________________________________________ + +Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) +All rights reserved. + +This package is an SSL implementation written +by Eric Young (eay@cryptsoft.com). +The implementation was written so as to conform with Netscapes SSL. + +This library is free for commercial and non-commercial use as long as +the following conditions are aheared to. The following conditions +apply to all code found in this distribution, be it the RC4, RSA, +lhash, DES, etc., code; not just the SSL code. The SSL documentation +included with this distribution is covered by the same copyright terms +except that the holder is Tim Hudson (tjh@cryptsoft.com). + +Copyright remains Eric Young's, and as such any Copyright notices in +the code are not to be removed. +If this package is used in a product, Eric Young should be given attribution +as the author of the parts of the library used. +This can be in the form of a textual message at program startup or +in documentation (online or textual) provided with the package. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. +3. All advertising materials mentioning features or use of this software + must display the following acknowledgement: + "This product includes cryptographic software written by + Eric Young (eay@cryptsoft.com)" + The word 'cryptographic' can be left out if the rouines from the library + being used are not cryptographic related :-). +4. If you include any Windows specific code (or a derivative thereof) from + the apps directory (application code) you must include an acknowledgement: + "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" + +THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND +ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +SUCH DAMAGE. + +The licence and distribution terms for any publically available version or +derivative of this code cannot be changed. i.e. this code cannot simply be +copied and put under another distribution licence +[including the GNU Public Licence.] +____________________________________________________________ + +Copyright (C) 2002-2004 Mark Adler, all rights reserved +version 1.8, 9 Jan 2004 + +This software is provided 'as-is', without any express or implied +warranty. In no event will the author be held liable for any damages +arising from the use of this software. + +Permission is granted to anyone to use this software for any purpose, +including commercial applications, and to alter it and redistribute it +freely, subject to the following restrictions: + +1. The origin of this software must not be misrepresented; you must not + claim that you wrote the original software. If you use this software + in a product, an acknowledgment in the product documentation would be + appreciated but is not required. +2. Altered source versions must be plainly marked as such, and must not be + misrepresented as being the original software. +3. This notice may not be removed or altered from any source distribution. +____________________________________________________________ + +Copyright (c) 2001 Markus Friedl. All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions +are met: +1. Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. +2. Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in the + documentation and/or other materials provided with the distribution. + +THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR +IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. +IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, +INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT +NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF +THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/doc/License-v2.6.txt b/doc/License-v2.6.txt new file mode 100644 index 0000000..85c5a02 --- /dev/null +++ b/doc/License-v2.6.txt @@ -0,0 +1,531 @@ +TrueCrypt License Version 2.6 + +Software distributed under this license is distributed on an "AS +IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND +DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO +USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE +SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE +BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE +SOFTWARE, NOR ANY PART(S) THEREOF. + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, +source code, graphics, texts, and accompanying files) made +available under and governed by this version of this license +("License"), as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal +entity (e.g., a non-profit organization, commercial +organization, government agency, etc.) exercising permissions +granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration +of This Product, including, but not limited to, addition to or +deletion from the substance or structure of This Product, and +translation into another language. + +4. "Your Product" means This Product modified by You, any work +You derive from (or base on) This Product, or any respective +part(s) thereof. In addition, "Your Product" means any work in +which You include any portion of This Product (unless the work +in which you include it is an aggregate software distribution, +such as an operating system distribution or a cover CD-ROM of a +magazine, containing separate and independent products from +different sources, provided that the license governing the +aggregate software distribution does not invalidate, weaken, +restrict, interpret, amend, modify, interfere with or otherwise +affect any part, term, provision, or clause of this License) or +any respective part(s) thereof. + +5. "Distribution" means (and "distribute" refers to), regardless +of means or methods, conveyance, transfer, providing, or making +available of This/Your Product or portions thereof to third +parties (including, but not limited to, making This/Your +Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the +product, or any portion thereof, made available for download). + + + +II. Terms and Conditions for Use, Copying, and Distribution + +1. You may copy and/or distribute This Product, provided that +You do not modify This Product (for terms and conditions for +copying and distribution of modified versions of This Product, +see Chapter III) and provided that You do not include This +Product in another product forming Your Product (except as +permitted under Chapter III), and provided that You ensure that +all the legal notices and documents (containing, e.g., the text +of this License, references to this License, etc.) included with +This Product are included with every copy of This Product that +You make and distribute, and provided that You comply with all +other applicable terms and conditions of this License. + +2. Provided that You comply with all applicable terms and +conditions of this License, You may use This Product freely (see +also Chapter III) on any number of computers/systems for non- +commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New +Products + +1. If all conditions specified in the following paragraphs in +this Chapter (III) are met (for exceptions, see Section III.2) +and if You comply with all other applicable terms and conditions +of this License, You may modify This Product (thus forming Your +Product), derive new works from This Product or portions thereof +(thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product, unless +defined otherwise in Chapter I), and You may use (for non- +commercial and/or commercial purposes), copy, and/or distribute +Your Product. + + a. The name of Your Product (or of Your modified version of + This Product) must not contain the name TrueCrypt (for + example, the following names are not allowed: TrueCrypt, + TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor + any other names confusingly similar to the name TrueCrypt + (e.g., True-Crypt, True Crypt, TruKrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of + the TrueCrypt Foundation. The goal is not to monetize the + name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of + issues that might arise from the existence of similar + products with the same or similar name. Even though + TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt + is and will remain open-source and free software. + + All occurrences of the name TrueCrypt that could reasonably + be considered to identify Your Product must be removed from + Your Product and from any associated materials. Logo(s) + included in (or attached to) Your Product (and in/to + associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos (including + the non-textual logo consisting primarily of a key in + stylized form) or portion(s) thereof. All graphics contained + in This Product (logos, icons, etc.) must be removed from + Your Product (or from Your modified version of This Product) + and from any associated materials. + + b. The following phrases must be removed from Your Product + and from any associated materials, except the text of this + License: "A TrueCrypt Foundation Release", "Released by + TrueCrypt Foundation", "This is a TrueCrypt Foundation + release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product + (if technically feasible) and contained in its + documentation. Alternatively, if This Product or its portion + You included in Your Product constitutes only a minor + portion of Your Product, phrase "Portions of this product + are based in part on TrueCrypt, freely available at + http://www.truecrypt.org/" may be displayed instead. In each + of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if + technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user + interface (if there is any) of Your Product (e.g., an + "About" window, etc.) and the way in which Your Product will + display the respective phrase. + + Your Product (and any associated materials, e.g., the + documentation, the content of the official web site of Your + Product, etc.) must not present any Internet address + containing the domain name truecrypt.org (or any domain name + that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your + Product may be obtained or where bugs found in Your Product + may be reported or where support for Your Product may be + available or otherwise attempt to indicate that the domain + name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely + and publicly available (for exceptions, see Section III.2) + at least until You cease to distribute Your Product and + there must be a well-publicized means of obtaining the + source code free of charge or for a reasonable reproduction + fee (at least until You cease to distribute Your Product). + Examples of possible ways to meet these conditions: (i) You + include the source code with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee, or (ii) You include information (valid and + correct at least until You cease to distribute Your Product) + about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee. + + Portions of the source code that were created by You (e.g. + Your additions to This Product) must be available under + license(s) that are/is compatible with this version of the + TrueCrypt License (however, see also Subsection III.1.e) and + that allow(s) anyone to modify and derive new works from the + portions of the source code that were created by You and to + use, copy, and redistribute such modifications and/or + derivative works. The license(s) must be perpetual, non- + exclusive, royalty-free, no-charge, and worldwide, and must + not invalidate, weaken, restrict, interpret, amend, modify, + interfere with or otherwise affect any part, term, + provision, or clause of this License. The text of the + license(s) must be included with every copy of Your Product + that You make and distribute. The source code must not be + deliberately obfuscated, and it must not be in an + intermediate form (e.g., the output of a preprocessor). + Source code means the preferred form in which a programmer + would usually modify the program. + + Note: If you cannot comply with the above requirements, we + may grant an exception under certain conditions. You may + request an exception at: licensing@truecrypt.org + + e. You must not change the license terms of This Product in + any way (adding any new terms is considered changing the + license terms even if the original terms are retained), + which means, e.g., that no part of This Product may be put + under another license. You must keep intact all the legal + notices contained in the source code files. You must include + the following items with every copy of Your Product that You + make and distribute: a clear and conspicuous notice stating + that Your Product or portion(s) thereof is/are governed by + this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), + a clear and conspicuous notice containing information about + where the included copy of the License can be found, and an + appropriate copyright notice. + + +2. You are not obligated to comply with Subsection III.1.d if +Your Product is not distributed (i.e., Your Product is available +only to You). + +Note: If you cannot comply with Subsection III.1.d, we may grant +an exception under certain conditions. You may request an +exception at: licensing@truecrypt.org + + + +IV. Disclaimer of Liability, Disclaimer of Warranty, +Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY +APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY +COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS +MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY +FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, +INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR +CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION +OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A +FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, +PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS +INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT +(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, +COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A +PORTION THEREOF) OR OF YOUR PRODUCT (OR A PORTION THEREOF), OR +INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), EVEN IF +ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY +HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY +KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT +LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A +PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO +THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD +THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC +ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT +CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY +YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR +(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN +COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND +TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT +IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE +REGULATIONS, RESTRICTIONS, AND LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS +PRODUCT, THEIR AGENTS AND ASSOCIATES, AND APPLICABLE +COPYRIGHT/TRADEMARK OWNERS, HARMLESS FROM AND AGAINST ANY AND +ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, FINES, +COSTS, EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, +CAUSES OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, +RELATED TO OR ARISING OUT OF YOUR USE, INABILITY TO USE, +COPYING, (RE)DISTRIBUTION, IMPORT AND/OR (RE)EXPORT OF THIS +PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF ANY TERM OF +THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks +associated with (or applying to) This Product, except for fair +use as defined by applicable law and except for use expressly +permitted or required by this License. Any attempt otherwise to +use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This +License and may constitute trademark infringement (which may be +prosecuted). + +TrueCrypt is a registered trademark of the TrueCrypt Foundation +registered with the World Intellectual Property Organization, an +agency of the United Nations, (international trademark +registration), in the U.S. Patent and Trademark Office, and in +the trademark offices of other countries. All TrueCrypt logos +(including the non-textual logo consisting primarily of a key in +stylized form) are trademarks of the TrueCrypt Foundation. + +Note: The goal is not to monetize the name or the product, but +to protect the reputation of TrueCrypt. TrueCrypt is and will +remain open-source and free software. + + + +VI. General Terms and Conditions, Miscellaneous Provisions + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES +DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY +PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND +BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND +THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). +IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND +CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, +(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF +APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF +PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, +CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS +PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY +TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE +COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY +RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON +THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR +RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY +APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN +CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE +PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED +AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT +OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE. + +3. This license does not constitute or imply a waiver of any +intellectual property rights except as may be otherwise +expressly provided in this License. This license does not +transfer, assign, or convey any intellectual property rights +(e.g., it does not transfer ownership of copyrights or +trademarks). + +4. Subject to the terms and conditions of this License, You may +allow a third party to use Your copy of This Product (or a copy +that you make and distribute, or Your Product, or respective +parts thereof) provided that the third party overtly accepts and +agrees to be bound by all terms and conditions of this License +and the third party is not prohibited from using This Product +(or portions thereof) by this License (see, e.g., Section VI.7) +or by applicable law. However, You are not obligated to ensure +that the third party accepts (and agrees to be bound by all +terms of) this License if You distribute only the self- +extracting package (containing This Product) that does not allow +the user to install (nor extract) the files contained in the +package until he or she accepts and agrees to be bound by all +terms and conditions of this License. + +5. Without specific prior written permission from the authors of +This Product (or from their common representative), You must not +use the name of This Product, the names of the authors of This +Product, or the names of the legal entities (or informal groups) +of which the authors were/are members/employees, to endorse or +promote Your Product or any work in which You include a modified +or unmodified version of This Product, or to endorse or promote +You or Your affiliates, or in a way that might suggest that Your +Product (or any work in which You include a modified or +unmodified version of This Product), You, or Your affiliates +is/are endorsed by one or more authors of This Product, or in a +way that might suggest that one or more authors of This Product +is/are affiliated with You (or Your affiliates) or directly +participated in the creation of Your Product or of any work in +which You include a modified or unmodified version of This +Product. + +6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS +LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL +TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS +PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A +LAWYER. + +7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS +LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER +APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER +THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +8. If any provision of this License, or a portion thereof, is +found to be invalid or unenforceable under applicable law, it +shall not affect the validity or enforceability of the remainder +of this License, and such invalid or unenforceable provision +shall be construed to reflect the original intent of the +provision and shall be enforced to the maximum extent permitted +by applicable law so as to effect the original intent of the +provision as closely as possible. + +____________________________________________________________ + + +Third-Party Licenses + +This Product contains components that were created by third +parties and that are governed by third-party licenses, which are +contained hereinafter (separated by lines consisting of +underscores). Each of the third-party licenses applies only to +(portions of) the source code file(s) in which the third-party +license is contained or in which it is explicitly referenced, +and to compiled or otherwise processed forms of such source +code. None of the third-party licenses applies to This Product +as a whole, even when it uses terms such as "product", +"program", or any other equivalent terms/phrases. This Product +as a whole is governed by the TrueCrypt License (see above). +Some of the third-party components have been modified by the +authors of This Product. Unless otherwise stated, such +modifications and additions are governed by the TrueCrypt +License (see above). Note: Unless otherwise stated, graphics and +files that are not part of the source code are governed by the +TrueCrypt License. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, +including source code. + +You may modify this product and source code, and distribute such +modifications, and you may derive new works based on this +product, provided that: + +1. Any product which is simply derived from this product cannot +be called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your +product is distributed with source code, you must include this +notice with those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must +display on any packaging, and marketing materials which +reference your product, a notice which states: + +"This product uses components written by Paul Le Roux +" + +3. If you use any of the source code originally by Eric Young, +you must in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have +not signed it. However, nothing else grants you permission to +modify or distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this +License. + +5. If any of these license terms is found to be to broad in +scope, and declared invalid by any court or legal process, you +agree that all other terms shall not be so affected, and shall +remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE +IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED +"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR +IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS +WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE +COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE +LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, +INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR +INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS +OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH +ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. +All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software is allowed (with +or without changes) provided that: + + 1. source code distributions include the above copyright + notice, this list of conditions and the following + disclaimer; + + 2. binary distributions include the above copyright notice, + this list of conditions and the following disclaimer in + their documentation; + + 3. the name of the copyright holder is not used to endorse + products built using this software without specific written + permission. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied +warranties in respect of its properties, including, but not +limited to, correctness and/or fitness for purpose. +____________________________________________________________ + +Copyright (C) 2002-2004 Mark Adler, all rights reserved +version 1.8, 9 Jan 2004 + +This software is provided 'as-is', without any express or +implied warranty. In no event will the author be held liable +for any damages arising from the use of this software. + +Permission is granted to anyone to use this software for any +purpose, including commercial applications, and to alter it and +redistribute it freely, subject to the following restrictions: + +1. The origin of this software must not be misrepresented; you + must not claim that you wrote the original software. If you + use this software in a product, an acknowledgment in the + product documentation would be appreciated but is not + required. +2. Altered source versions must be plainly marked as such, and + must not be misrepresented as being the original software. +3. This notice may not be removed or altered from any source + distribution. +____________________________________________________________ diff --git a/doc/License-v2.7.txt b/doc/License-v2.7.txt new file mode 100644 index 0000000..0bb3c64 --- /dev/null +++ b/doc/License-v2.7.txt @@ -0,0 +1,531 @@ +TrueCrypt License Version 2.7 + +Software distributed under this license is distributed on an "AS +IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND +DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO +USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE +SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE +BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE +SOFTWARE, NOR ANY PART(S) THEREOF. + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, +source code, graphics, texts, and accompanying files) made +available under and governed by this version of this license +("License"), as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal +entity (e.g., a non-profit organization, commercial +organization, government agency, etc.) exercising permissions +granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration +of This Product, including, but not limited to, addition to or +deletion from the substance or structure of This Product, +translation into another language, repackaging, alteration or +removal of any file included with This Product, and addition of +any new files to This Product. + +4. "Your Product" means This Product modified by You, or any +work You derive from (or base on) any part of This Product. In +addition, "Your Product" means any work in which You include any +(modified or unmodified) portion of This Product. However, if +the work in which you include it is an aggregate software +distribution (such as an operating system distribution or a +cover CD-ROM of a magazine) containing multiple separate +products, then the term "Your Product" includes only those +products (in the aggregate software distribution) that use, +include, or depend on a modified or unmodified version of This +Product (and the term "Your Product" does not include the whole +aggregate software distribution). For the purposes of this +License, a product suite consisting of two or more products is +considered a single product (operating system distributions and +cover media of magazines are not considered product suites). + +5. "Distribution" means (and "distribute" refers to), regardless +of means or methods, conveyance, transfer, providing, or making +available of This/Your Product or portions thereof to third +parties (including, but not limited to, making This/Your +Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the +product, or any portion thereof, made available for download). + + + +II. Terms and Conditions for Use, Copying, and Distribution + +1. Provided that You comply with all applicable terms and +conditions of this License, You may make copies of This Product +(unmodified) and distribute copies of This Product (unmodified) +that are not included in another product forming Your Product +(except as permitted under Chapter III). Note: For terms and +conditions for copying and distribution of modified versions of +This Product, see Chapter III. + +2. Provided that You comply with all applicable terms and +conditions of this License, You may use This Product freely (see +also Chapter III) on any number of computers/systems for non- +commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New +Products + +1. If all conditions specified in the following paragraphs in +this Chapter (III) are met (for exceptions, see Section III.2) +and if You comply with all other applicable terms and conditions +of this License, You may modify This Product (thus forming Your +Product), derive new works from This Product or portions thereof +(thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product, unless +defined otherwise in Chapter I), and You may use (for non- +commercial and/or commercial purposes), copy, and/or distribute +Your Product. + + a. The name of Your Product (or of Your modified version of + This Product) must not contain the name TrueCrypt (for + example, the following names are not allowed: TrueCrypt, + TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor + any other names confusingly similar to the name TrueCrypt + (e.g., True-Crypt, True Crypt, TruKrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of + the TrueCrypt Foundation. The goal is not to monetize the + name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of + issues that might arise from the existence of similar + products with the same or similar name. Even though + TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt + is and will remain open-source and free software. + + All occurrences of the name TrueCrypt that could reasonably + be considered to identify Your Product must be removed from + Your Product and from any associated materials. Logo(s) + included in (or attached to) Your Product (and in/to + associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos (including + the non-textual logo consisting primarily of a key in + stylized form) or portion(s) thereof. All graphics contained + in This Product (logos, icons, etc.) must be removed from + Your Product (or from Your modified version of This Product) + and from any associated materials. + + b. The following phrases must be removed from Your Product + and from any associated materials, except the text of this + License: "A TrueCrypt Foundation Release", "Released by + TrueCrypt Foundation", "This is a TrueCrypt Foundation + release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product + (if technically feasible) and contained in its + documentation. Alternatively, if This Product or its portion + You included in Your Product constitutes only a minor + portion of Your Product, phrase "Portions of this product + are based in part on TrueCrypt, freely available at + http://www.truecrypt.org/" may be displayed instead. In each + of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if + technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user + interface (if there is any) of Your Product (e.g., an + "About" window, etc.) and the way in which Your Product will + display the respective phrase. + + Your Product (and any associated materials, e.g., the + documentation, the content of the official web site of Your + Product, etc.) must not present any Internet address + containing the domain name truecrypt.org (or any domain name + that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your + Product may be obtained or where bugs found in Your Product + may be reported or where support for Your Product may be + available or otherwise attempt to indicate that the domain + name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely + and publicly available (for exceptions, see Section III.2) + at least until You cease to distribute Your Product and + there must be a well-publicized means of obtaining the + source code free of charge or for a reasonable reproduction + fee (at least until You cease to distribute Your Product). + Examples of possible ways to meet these conditions: (i) You + include the source code with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee, or (ii) You include information (valid and + correct at least until You cease to distribute Your Product) + about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee. + + Portions of the source code of Your Product not contained in + This Product (e.g., portions added by You in creating Your + Product, whether created by You or by third parties) must be + available under license(s) that (however, see also + Subsection III.1.e) allow(s) anyone to modify and derive new + works from the portions of the source code that are not + contained in This Product and to use, copy, and redistribute + such modifications and/or derivative works. The license(s) + must be perpetual, non-exclusive, royalty-free, no-charge, + and worldwide, and must not invalidate, weaken, restrict, + interpret, amend, modify, interfere with or otherwise affect + any part, term, provision, or clause of this License. The + text(s) of the license(s) must be included with every copy + of Your Product that You make and distribute. The source + code must not be deliberately obfuscated, and it must not be + in an intermediate form (e.g., the output of a + preprocessor). Source code means the preferred form in which + a programmer would usually modify the program. + + Note: If you cannot comply with the above requirements, we + may grant an exception under certain conditions. You may + request an exception at: licensing@truecrypt.org + + e. You must not change the license terms of This Product in + any way (adding any new terms is considered changing the + license terms even if the original terms are retained), + which means, e.g., that no part of This Product may be put + under another license. You must keep intact all the legal + notices contained in the source code files. You must include + the following items with every copy of Your Product that You + make and distribute: a clear and conspicuous notice stating + that Your Product or portion(s) thereof is/are governed by + this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), + a clear and conspicuous notice containing information about + where the included copy of the License can be found, and an + appropriate copyright notice. + + +2. You are not obligated to comply with Subsection III.1.d if +Your Product is not distributed (i.e., Your Product is available +only to You). + +Note: If you cannot comply with Subsection III.1.d, we may grant +an exception under certain conditions. You may request an +exception at: licensing@truecrypt.org + + + +IV. Disclaimer of Liability, Disclaimer of Warranty, +Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY +APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY +COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS +MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY +FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, +INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR +CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION +OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A +FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, +PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS +INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT +(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, +COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A +PORTION THEREOF) OR OF YOUR PRODUCT (OR A PORTION THEREOF), OR +INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), EVEN IF +ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY +HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY +KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT +LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A +PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO +THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD +THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC +ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT +CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY +YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR +(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN +COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND +TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT +IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE +REGULATIONS, RESTRICTIONS, AND LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS +PRODUCT, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS +FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, +SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING +REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, +ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING +OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, +IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) +AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks +associated with (or applying to) This Product, except for fair +use as defined by applicable law and except for use expressly +permitted or required by this License. Any attempt otherwise to +use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This +License and may constitute trademark infringement (which may be +prosecuted). + +TrueCrypt is a registered trademark of the TrueCrypt Foundation +registered with the World Intellectual Property Organization, an +agency of the United Nations, (international trademark +registration), in the U.S. Patent and Trademark Office, and in +the trademark offices of other countries. All TrueCrypt logos +(including the non-textual logo consisting primarily of a key in +stylized form) are trademarks of the TrueCrypt Foundation. + +Note: The goal is not to monetize the name or the product, but +to protect the reputation of TrueCrypt. TrueCrypt is and will +remain open-source and free software. + + + +VI. General Terms and Conditions, Miscellaneous Provisions + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES +DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY +PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND +BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND +THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). +IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND +CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, +(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF +APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF +PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, +CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS +PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY +TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE +COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY +RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON +THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR +RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY +APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN +CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE +PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED +AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT +OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE. + +3. This license does not constitute or imply a waiver of any +intellectual property rights except as may be otherwise +expressly provided in this License. This license does not +transfer, assign, or convey any intellectual property rights +(e.g., it does not transfer ownership of copyrights or +trademarks). + +4. Subject to the terms and conditions of this License, You may +allow a third party to use Your copy of This Product (or a copy +that You make and distribute, or Your Product) provided that the +third party overtly accepts and agrees to be bound by all terms +and conditions of this License and the third party is not +prohibited from using This Product (or portions thereof) by this +License (see, e.g., Section VI.7) or by applicable law. However, +You are not obligated to ensure that the third party accepts +(and agrees to be bound by all terms of) this License if You +distribute only the self-extracting package (containing This +Product) that does not allow the user to install (nor extract) +the files contained in the package until he or she accepts and +agrees to be bound by all terms and conditions of this License. + +5. Without specific prior written permission from the authors of +This Product (or from their common representative), You must not +use the name of This Product, the names of the authors of This +Product, or the names of the legal entities (or informal groups) +of which the authors were/are members/employees, to endorse or +promote Your Product or any work in which You include a modified +or unmodified version of This Product, or to endorse or promote +You or Your affiliates, or in a way that might suggest that Your +Product (or any work in which You include a modified or +unmodified version of This Product), You, or Your affiliates +is/are endorsed by one or more authors of This Product, or in a +way that might suggest that one or more authors of This Product +is/are affiliated with You (or Your affiliates) or directly +participated in the creation of Your Product or of any work in +which You include a modified or unmodified version of This +Product. + +6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS +LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL +TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS +PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A +LAWYER. + +7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS +LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER +APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER +THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +8. Except as otherwise provided in this License, if any +provision of this License, or a portion thereof, is found to be +invalid or unenforceable under applicable law, it shall not +affect the validity or enforceability of the remainder of this +License, and such invalid or unenforceable provision shall be +construed to reflect the original intent of the provision and +shall be enforced to the maximum extent permitted by applicable +law so as to effect the original intent of the provision as +closely as possible. + +____________________________________________________________ + + +Third-Party Licenses + +This Product contains components that were created by third +parties and that are governed by third-party licenses, which are +contained hereinafter (separated by lines consisting of +underscores). Each of the third-party licenses applies only to +(portions of) the source code file(s) in which the third-party +license is contained or in which it is explicitly referenced, +and to compiled or otherwise processed forms of such source +code. None of the third-party licenses applies to This Product +as a whole, even when it uses terms such as "product", +"program", or any other equivalent terms/phrases. This Product +as a whole is governed by the TrueCrypt License (see above). +Some of the third-party components have been modified by the +authors of This Product. Unless otherwise stated, such +modifications and additions are governed by the TrueCrypt +License (see above). Note: Unless otherwise stated, graphics and +files that are not part of the source code are governed by the +TrueCrypt License. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, +including source code. + +You may modify this product and source code, and distribute such +modifications, and you may derive new works based on this +product, provided that: + +1. Any product which is simply derived from this product cannot +be called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your +product is distributed with source code, you must include this +notice with those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must +display on any packaging, and marketing materials which +reference your product, a notice which states: + +"This product uses components written by Paul Le Roux +" + +3. If you use any of the source code originally by Eric Young, +you must in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have +not signed it. However, nothing else grants you permission to +modify or distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this +License. + +5. If any of these license terms is found to be to broad in +scope, and declared invalid by any court or legal process, you +agree that all other terms shall not be so affected, and shall +remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE +IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED +"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR +IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS +WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE +COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE +LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, +INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR +INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS +OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH +ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. +All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software is allowed (with +or without changes) provided that: + + 1. source code distributions include the above copyright + notice, this list of conditions and the following + disclaimer; + + 2. binary distributions include the above copyright notice, + this list of conditions and the following disclaimer in + their documentation; + + 3. the name of the copyright holder is not used to endorse + products built using this software without specific written + permission. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied +warranties in respect of its properties, including, but not +limited to, correctness and/or fitness for purpose. +____________________________________________________________ + +Copyright (C) 2002-2004 Mark Adler, all rights reserved +version 1.8, 9 Jan 2004 + +This software is provided 'as-is', without any express or +implied warranty. In no event will the author be held liable +for any damages arising from the use of this software. + +Permission is granted to anyone to use this software for any +purpose, including commercial applications, and to alter it and +redistribute it freely, subject to the following restrictions: + +1. The origin of this software must not be misrepresented; you + must not claim that you wrote the original software. If you + use this software in a product, an acknowledgment in the + product documentation would be appreciated but is not + required. +2. Altered source versions must be plainly marked as such, and + must not be misrepresented as being the original software. +3. This notice may not be removed or altered from any source + distribution. +____________________________________________________________ diff --git a/doc/License-v2.8.txt b/doc/License-v2.8.txt new file mode 100644 index 0000000..df8ef78 --- /dev/null +++ b/doc/License-v2.8.txt @@ -0,0 +1,533 @@ +TrueCrypt License Version 2.8 + +Software distributed under this license is distributed on an "AS +IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND +DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO +USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE +SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE +BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE +SOFTWARE, NOR ANY PART(S) THEREOF. + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, +source code, graphics, texts, and accompanying files) made +available under and governed by this version of this license +("License"), as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal +entity (e.g., a non-profit organization, commercial +organization, government agency, etc.) exercising permissions +granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration +of This Product, including, but not limited to, addition to or +deletion from the substance or structure of This Product, +translation into another language, repackaging, alteration or +removal of any file included with This Product, and addition of +any new files to This Product. + +4. "Your Product" means This Product modified by You, or any +work You derive from (or base on) any part of This Product. In +addition, "Your Product" means any work in which You include any +(modified or unmodified) portion of This Product. However, if +the work in which you include it is an aggregate software +distribution (such as an operating system distribution or a +cover CD-ROM of a magazine) containing multiple separate +products, then the term "Your Product" includes only those +products (in the aggregate software distribution) that use, +include, or depend on a modified or unmodified version of This +Product (and the term "Your Product" does not include the whole +aggregate software distribution). For the purposes of this +License, a product suite consisting of two or more products is +considered a single product (operating system distributions and +cover media of magazines are not considered product suites). + +5. "Distribution" means (and "distribute" refers to), regardless +of means or methods, conveyance, transfer, providing, or making +available of This/Your Product or portions thereof to third +parties (including, but not limited to, making This/Your +Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the +product, or any portion thereof, made available for download). + + + +II. Terms and Conditions for Use, Copying, and Distribution + +1. Provided that You comply with all applicable terms and +conditions of this License, You may make copies of This Product +(unmodified) and distribute copies of This Product (unmodified) +that are not included in another product forming Your Product +(except as permitted under Chapter III). Note: For terms and +conditions for copying and distribution of modified versions of +This Product, see Chapter III. + +2. Provided that You comply with all applicable terms and +conditions of this License, You may use This Product freely (see +also Chapter III) on any number of computers/systems for non- +commercial and/or commercial purposes. + + + +III. Terms and Conditions for Modification and Derivation of New +Products + +1. If all conditions specified in the following paragraphs in +this Chapter (III) are met (for exceptions, see Section III.2) +and if You comply with all other applicable terms and conditions +of this License, You may modify This Product (thus forming Your +Product), derive new works from This Product or portions thereof +(thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product, unless +defined otherwise in Chapter I), and You may use (for non- +commercial and/or commercial purposes), copy, and/or distribute +Your Product. + + a. The name of Your Product (or of Your modified version of + This Product) must not contain the name TrueCrypt (for + example, the following names are not allowed: TrueCrypt, + TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor + any other names confusingly similar to the name TrueCrypt + (e.g., True-Crypt, True Crypt, TruKrypt, etc.) + + Note: TrueCrypt and the TrueCrypt logos are trademarks of + the TrueCrypt Foundation. The goal is not to monetize the + name or the product, but to protect the reputation of + TrueCrypt, and to prevent support issues and other kinds of + issues that might arise from the existence of similar + products with the same or similar name. Even though + TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt + is and will remain open-source and free software. + + All occurrences of the name TrueCrypt that could reasonably + be considered to identify Your Product must be removed from + Your Product and from any associated materials. Logo(s) + included in (or attached to) Your Product (and in/to + associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos + (including, but not limited to, the non-textual logo + consisting primarily of a key in stylized form) or + portion(s) thereof. All graphics contained in This Product + (logos, icons, etc.) must be removed from Your Product (or + from Your modified version of This Product) and from any + associated materials. + + b. The following phrases must be removed from Your Product + and from any associated materials, except the text of this + License: "A TrueCrypt Foundation Release", "Released by + TrueCrypt Foundation", "This is a TrueCrypt Foundation + release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product + (if technically feasible) and contained in its + documentation. Alternatively, if This Product or its portion + You included in Your Product constitutes only a minor + portion of Your Product, phrase "Portions of this product + are based in part on TrueCrypt, freely available at + http://www.truecrypt.org/" may be displayed instead. In each + of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if + technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user + interface (if there is any) of Your Product (e.g., an + "About" window, etc.) and the way in which Your Product will + display the respective phrase. + + Your Product (and any associated materials, e.g., the + documentation, the content of the official web site of Your + Product, etc.) must not present any Internet address + containing the domain name truecrypt.org (or any domain name + that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your + Product may be obtained or where bugs found in Your Product + may be reported or where support for Your Product may be + available or otherwise attempt to indicate that the domain + name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely + and publicly available (for exceptions, see Section III.2) + at least until You cease to distribute Your Product and + there must be a well-publicized means of obtaining the + source code free of charge or for a reasonable reproduction + fee (at least until You cease to distribute Your Product). + Examples of possible ways to meet these conditions: (i) You + include the source code with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee, or (ii) You include information (valid and + correct at least until You cease to distribute Your Product) + about where the source code can be freely obtained (e.g., an + Internet address, etc.) with every copy of Your Product that + You make and distribute (see also below in this Subsection + III.1.d for conditions that licenses governing the source + code must meet) provided that You make the copies available + to the general public free of charge or for a reasonable + reproduction fee. + + Portions of the source code of Your Product not contained in + This Product (e.g., portions added by You in creating Your + Product, whether created by You or by third parties) must be + available under license(s) that (however, see also + Subsection III.1.e) allow(s) anyone to modify and derive new + works from the portions of the source code that are not + contained in This Product and to use, copy, and redistribute + such modifications and/or derivative works. The license(s) + must be perpetual, non-exclusive, royalty-free, no-charge, + and worldwide, and must not invalidate, weaken, restrict, + interpret, amend, modify, interfere with or otherwise affect + any part, term, provision, or clause of this License. The + text(s) of the license(s) must be included with every copy + of Your Product that You make and distribute. The source + code must not be deliberately obfuscated, and it must not be + in an intermediate form (e.g., the output of a + preprocessor). Source code means the preferred form in which + a programmer would usually modify the program. + + Note: If you cannot comply with the above requirements, we + may grant an exception under certain conditions. You may + request an exception at: licensing@truecrypt.org + + e. You must not change the license terms of This Product in + any way (adding any new terms is considered changing the + license terms even if the original terms are retained), + which means, e.g., that no part of This Product may be put + under another license. You must keep intact all the legal + notices contained in the source code files. You must include + the following items with every copy of Your Product that You + make and distribute: a clear and conspicuous notice stating + that Your Product or portion(s) thereof is/are governed by + this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), + a clear and conspicuous notice containing information about + where the included copy of the License can be found, and an + appropriate copyright notice. + + +2. You are not obligated to comply with Subsection III.1.d if +Your Product is not distributed (i.e., Your Product is available +only to You). + +Note: If you cannot comply with Subsection III.1.d, we may grant +an exception under certain conditions. You may request an +exception at: licensing@truecrypt.org + + + +IV. Disclaimer of Liability, Disclaimer of Warranty, +Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY +APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY +COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS +MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY +FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, +INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR +CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION +OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A +FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, +PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS +INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT +(INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, +ARISING OUT OF THE USE, COPYING, MODIFICATION, OR +(RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF +YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS +PRODUCT (OR A PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, +COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY HAS BEEN ADVISED +OF THE POSSIBILITY OF SUCH DAMAGES. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY +KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT +LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A +PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO +THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD +THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC +ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT +CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY +YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR +(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN +COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND +TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT +IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE +REGULATIONS, RESTRICTIONS, AND LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS +PRODUCT, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS +FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, +SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING +REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, +ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING +OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, +IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) +AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks +associated with (or applying to) This Product, except for fair +use as defined by applicable law and except for use expressly +permitted or required by this License. Any attempt otherwise to +use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This +License and may constitute trademark infringement (which may be +prosecuted). + +TrueCrypt is a registered trademark of the TrueCrypt Foundation +registered with the World Intellectual Property Organization, an +agency of the United Nations, (international trademark +registration), in the U.S. Patent and Trademark Office, and in +the trademark offices of other countries. All TrueCrypt logos +(including the non-textual logo consisting primarily of a key in +stylized form) are trademarks of the TrueCrypt Foundation. + +Note: The goal is not to monetize the name or the product, but +to protect the reputation of TrueCrypt. TrueCrypt is and will +remain open-source and free software. + + + +VI. General Terms and Conditions, Miscellaneous Provisions + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES +DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY +PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND +BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND +THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). +IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND +CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, +(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF +APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF +PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, +CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS +PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY +TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE +COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS +AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS +ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR +RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY +APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN +CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE +PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED +AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT +OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE. + +3. This license does not constitute or imply a waiver of any +intellectual property rights except as may be otherwise +expressly provided in this License. This license does not +transfer, assign, or convey any intellectual property rights +(e.g., it does not transfer ownership of copyrights or +trademarks). + +4. Subject to the terms and conditions of this License, You may +allow a third party to use Your copy of This Product (or a copy +that You make and distribute, or Your Product) provided that the +third party overtly accepts and agrees to be bound by all terms +and conditions of this License and the third party is not +prohibited from using This Product (or portions thereof) by this +License (see, e.g., Section VI.7) or by applicable law. However, +You are not obligated to ensure that the third party accepts +(and agrees to be bound by all terms of) this License if You +distribute only the self-extracting package (containing This +Product) that does not allow the user to install (nor extract) +the files contained in the package until he or she accepts and +agrees to be bound by all terms and conditions of this License. + +5. Without specific prior written permission from the authors of +This Product (or from their common representative), You must not +use the name of This Product, the names of the authors of This +Product, or the names of the legal entities (or informal groups) +of which the authors were/are members/employees, to endorse or +promote Your Product or any work in which You include a modified +or unmodified version of This Product, or to endorse or promote +You or Your affiliates, or in a way that might suggest that Your +Product (or any work in which You include a modified or +unmodified version of This Product), You, or Your affiliates +is/are endorsed by one or more authors of This Product, or in a +way that might suggest that one or more authors of This Product +is/are affiliated with You (or Your affiliates) or directly +participated in the creation of Your Product or of any work in +which You include a modified or unmodified version of This +Product. + +6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS +LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL +TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS +PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A +LAWYER. + +7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS +LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER +APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER +THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +8. Except as otherwise provided in this License, if any +provision of this License, or a portion thereof, is found to be +invalid or unenforceable under applicable law, it shall not +affect the validity or enforceability of the remainder of this +License, and such invalid or unenforceable provision shall be +construed to reflect the original intent of the provision and +shall be enforced to the maximum extent permitted by applicable +law so as to effect the original intent of the provision as +closely as possible. + +____________________________________________________________ + + +Third-Party Licenses + +This Product contains components that were created by third +parties and that are governed by third-party licenses, which are +contained hereinafter (separated by lines consisting of +underscores). Each of the third-party licenses applies only to +(portions of) the source code file(s) in which the third-party +license is contained or in which it is explicitly referenced, +and to compiled or otherwise processed forms of such source +code. None of the third-party licenses applies to This Product +as a whole, even when it uses terms such as "product", +"program", or any other equivalent terms/phrases. This Product +as a whole is governed by the TrueCrypt License (see above). +Some of the third-party components have been modified by the +authors of This Product. Unless otherwise stated, such +modifications and additions are governed by the TrueCrypt +License (see above). Note: Unless otherwise stated, graphics and +files that are not part of the source code are governed by the +TrueCrypt License. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, +including source code. + +You may modify this product and source code, and distribute such +modifications, and you may derive new works based on this +product, provided that: + +1. Any product which is simply derived from this product cannot +be called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your +product is distributed with source code, you must include this +notice with those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must +display on any packaging, and marketing materials which +reference your product, a notice which states: + +"This product uses components written by Paul Le Roux +" + +3. If you use any of the source code originally by Eric Young, +you must in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have +not signed it. However, nothing else grants you permission to +modify or distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this +License. + +5. If any of these license terms is found to be to broad in +scope, and declared invalid by any court or legal process, you +agree that all other terms shall not be so affected, and shall +remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE +IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED +"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR +IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS +WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE +COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE +LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, +INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR +INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS +OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH +ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. +All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software is allowed (with +or without changes) provided that: + + 1. source code distributions include the above copyright + notice, this list of conditions and the following + disclaimer; + + 2. binary distributions include the above copyright notice, + this list of conditions and the following disclaimer in + their documentation; + + 3. the name of the copyright holder is not used to endorse + products built using this software without specific written + permission. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied +warranties in respect of its properties, including, but not +limited to, correctness and/or fitness for purpose. +____________________________________________________________ + +Copyright (C) 2002-2004 Mark Adler, all rights reserved +version 1.8, 9 Jan 2004 + +This software is provided 'as-is', without any express or +implied warranty. In no event will the author be held liable +for any damages arising from the use of this software. + +Permission is granted to anyone to use this software for any +purpose, including commercial applications, and to alter it and +redistribute it freely, subject to the following restrictions: + +1. The origin of this software must not be misrepresented; you + must not claim that you wrote the original software. If you + use this software in a product, an acknowledgment in the + product documentation would be appreciated but is not + required. +2. Altered source versions must be plainly marked as such, and + must not be misrepresented as being the original software. +3. This notice may not be removed or altered from any source + distribution. +____________________________________________________________ diff --git a/doc/License-v3.0.txt b/doc/License-v3.0.txt new file mode 100644 index 0000000..b2103ab --- /dev/null +++ b/doc/License-v3.0.txt @@ -0,0 +1,503 @@ +TrueCrypt License Version 3.0 + +Software distributed under this license is distributed on an "AS +IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND +DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO +USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE +SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE +BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT +ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE +SOFTWARE, NOR ANY PART(S) THEREOF. + + +I. Definitions + +1. "This Product" means the work (including, but not limited to, +source code, graphics, texts, and accompanying files) made +available under and governed by this version of this license +("License"), as may be indicated by, but is not limited to, +copyright notice(s) attached to or included in the work. + +2. "You" means (and "Your" refers to) an individual or a legal +entity (e.g., a non-profit organization, commercial +organization, government agency, etc.) exercising permissions +granted by this License. + +3. "Modification" means (and "modify" refers to) any alteration +of This Product, including, but not limited to, addition to or +deletion from the substance or structure of This Product, +translation into another language, repackaging, alteration or +removal of any file included with This Product, and addition of +any new files to This Product. + +4. "Your Product" means This Product modified by You, or any +work You derive from (or base on) any part of This Product. In +addition, "Your Product" means any work in which You include any +(modified or unmodified) portion of This Product. However, if +the work in which you include it is an aggregate software +distribution (such as an operating system distribution or a +cover CD-ROM of a magazine) containing multiple separate +products, then the term "Your Product" includes only those +products (in the aggregate software distribution) that use, +include, or depend on a modified or unmodified version of This +Product (and the term "Your Product" does not include the whole +aggregate software distribution). For the purposes of this +License, a product suite consisting of two or more products is +considered a single product (operating system distributions and +cover media of magazines are not considered product suites). + +5. "Distribution" means (and "distribute" refers to), regardless +of means or methods, conveyance, transfer, providing, or making +available of This/Your Product or portions thereof to third +parties (including, but not limited to, making This/Your +Product, or portions thereof, available for download to third +parties, whether or not any third party has downloaded the +product, or any portion thereof, made available for download). + + + +II. Use, Copying, and Distribution of This Product + +1. Provided that You comply with all applicable terms and +conditions of this License, You may make copies of This Product +(unmodified) and distribute copies of This Product (unmodified) +that are not included in another product forming Your Product +(except as permitted under Chapter III). Note: For terms and +conditions for copying and distribution of modified versions of +This Product, see Chapter III. + +2. Provided that You comply with all applicable terms and +conditions of this License, You may use This Product freely (see +also Chapter III) on any number of computers/systems for non- +commercial and/or commercial purposes. + + + +III. Modification, Derivation, and Inclusion in Other Products + +1. If all conditions specified in the following paragraphs in +this Chapter (III) are met (for exceptions, see Section III.2) +and if You comply with all other applicable terms and conditions +of this License, You may modify This Product (thus forming Your +Product), derive new works from This Product or portions thereof +(thus forming Your Product), include This Product or portions +thereof in another product (thus forming Your Product, unless +defined otherwise in Chapter I), and You may use (for non- +commercial and/or commercial purposes), copy, and/or distribute +Your Product. + + a. The name of Your Product (or of Your modified version of + This Product) must not contain the name TrueCrypt (for + example, the following names are not allowed: TrueCrypt, + TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor + any other names confusingly similar to the name TrueCrypt + (e.g., True-Crypt, True Crypt, TruKrypt, etc.) + + All occurrences of the name TrueCrypt that could reasonably + be considered to identify Your Product must be removed from + Your Product and from any associated materials. Logo(s) + included in (or attached to) Your Product (and in/to + associated materials) must not incorporate and must not be + confusingly similar to any of the TrueCrypt logos + (including, but not limited to, the non-textual logo + consisting primarily of a key in stylized form) or + portion(s) thereof. All graphics contained in This Product + (logos, icons, etc.) must be removed from Your Product (or + from Your modified version of This Product) and from any + associated materials. + + b. The following phrases must be removed from Your Product + and from any associated materials, except the text of this + License: "A TrueCrypt Foundation Release", "Released by + TrueCrypt Foundation", "This is a TrueCrypt Foundation + release." + + c. Phrase "Based on TrueCrypt, freely available at + http://www.truecrypt.org/" must be displayed by Your Product + (if technically feasible) and contained in its + documentation. Alternatively, if This Product or its portion + You included in Your Product constitutes only a minor + portion of Your Product, phrase "Portions of this product + are based in part on TrueCrypt, freely available at + http://www.truecrypt.org/" may be displayed instead. In each + of the cases mentioned above in this paragraph, + "http://www.truecrypt.org/" must be a hyperlink (if + technically feasible) pointing to http://www.truecrypt.org/ + and You may freely choose the location within the user + interface (if there is any) of Your Product (e.g., an + "About" window, etc.) and the way in which Your Product will + display the respective phrase. + + Your Product (and any associated materials, e.g., the + documentation, the content of the official web site of Your + Product, etc.) must not present any Internet address + containing the domain name truecrypt.org (or any domain name + that forwards to the domain name truecrypt.org) in a manner + that might suggest that it is where information about Your + Product may be obtained or where bugs found in Your Product + may be reported or where support for Your Product may be + available or otherwise attempt to indicate that the domain + name truecrypt.org is associated with Your Product. + + d. The complete source code of Your Product must be freely + and publicly available (for exceptions, see Section III.2) + at least until You cease to distribute Your Product. This + condition can be met in one or both of the following ways: + (i) You include the complete source code of Your Product + with every copy of Your Product that You make and distribute + and You make all such copies of Your Product available to + the general public free of charge, and/or (ii) You include + information (valid and correct at least until You cease to + distribute Your Product) about where the complete source + code of Your Product can be obtained free of charge (e.g., + an Internet address) or for a reasonable reproduction fee + with every copy of Your Product that You make and distribute + and, if there is a web site officially associated with Your + Product, You include the aforementioned information about + the source code on a freely and publicly accessible web + page to which such web site links via an easily viewable + hyperlink (at least until You cease to distribute Your + Product). + + The source code of Your Product must not be deliberately + obfuscated and it must not be in an intermediate form (e.g., + the output of a preprocessor). Source code means the + preferred form in which a programmer would usually modify + the program. + + Portions of the source code of Your Product not contained in + This Product (e.g., portions added by You in creating Your + Product, whether created by You or by third parties) must be + available under license(s) that (however, see also + Subsection III.1.e) allow(s) anyone to modify and derive new + works from the portions of the source code that are not + contained in This Product and to use, copy, and redistribute + such modifications and/or derivative works. The license(s) + must be perpetual, non-exclusive, royalty-free, no-charge, + and worldwide, and must not invalidate, weaken, restrict, + interpret, amend, modify, interfere with or otherwise affect + any part, term, provision, or clause of this License. The + text(s) of the license(s) must be included with every copy + of Your Product that You make and distribute. + + e. You must not change the license terms of This Product in + any way (adding any new terms is considered changing the + license terms even if the original terms are retained), + which means, e.g., that no part of This Product may be put + under another license. You must keep intact all the legal + notices contained in the source code files. You must include + the following items with every copy of Your Product that You + make and distribute: a clear and conspicuous notice stating + that Your Product or portion(s) thereof is/are governed by + this version of the TrueCrypt License, a verbatim copy of + this version of the TrueCrypt License (as contained herein), + a clear and conspicuous notice containing information about + where the included copy of the License can be found, and an + appropriate copyright notice. + + +2. You are not obligated to comply with Subsection III.1.d if +Your Product is not distributed (i.e., Your Product is available +only to You). + + + +IV. Disclaimer of Liability, Disclaimer of Warranty, +Indemnification + +You expressly acknowledge and agree to the following: + +1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY +APPLICABLE INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY WHO +MAY COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, +AS MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER +PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY +DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, +EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED +TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR +THIRD PARTIES, A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY +OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR +BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, +TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, +ARISING OUT OF THE USE, COPYING, MODIFICATION, OR +(RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF +YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS +PRODUCT (OR A PORTION THEREOF), EVEN IF SUCH DAMAGES (OR THE +POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO +ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY. + +2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY +KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT +LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A +PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO +THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD +THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL +NECESSARY SERVICING, REPAIR, OR CORRECTION. + +3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC +ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT +CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY +YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR +(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN +COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND +TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT +IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE +REGULATIONS, RESTRICTIONS, AND LAWS. + +4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS +PRODUCT, AND APPLICABLE INTELLECTUAL-PROPERTY OWNERS, HARMLESS +FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, +SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING +REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, +ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING +OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, +IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) +AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. + + + +V. Trademarks + +This License does not grant permission to use trademarks +associated with (or applying to) This Product, except for fair +use as defined by applicable law and except for use expressly +permitted or required by this License. Any attempt otherwise to +use trademarks associated with (or applying to) This Product +automatically and immediately terminates Your rights under This +License and may constitute trademark infringement (which may be +prosecuted). + + + +VI. General Terms and Conditions, Miscellaneous Provisions + +1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES +DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY +PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND +BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND +THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). +IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND +CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, +(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) +THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF +APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF +PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, +CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS +PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY +TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE +COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS +AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS +ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR +RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY +APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND +IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN +CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE +PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED +AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT +OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS +AND CONDITIONS OF THIS LICENSE. + +3. This License does not constitute or imply a waiver of any +intellectual property rights except as may be otherwise +expressly provided in this License. This License does not +transfer, assign, or convey any intellectual property rights +(e.g., it does not transfer ownership of copyrights or +trademarks). + +4. Subject to the terms and conditions of this License, You may +allow a third party to use Your copy of This Product (or a copy +that You make and distribute, or Your Product) provided that the +third party explicitly accepts and agrees to be bound by all +terms and conditions of this License and the third party is not +prohibited from using This Product (or portions thereof) by this +License (see, e.g., Section VI.7) or by applicable law. However, +You are not obligated to ensure that the third party accepts +(and agrees to be bound by all terms of) this License if You +distribute only the self-extracting package (containing This +Product) that does not allow the user to install (nor extract) +the files contained in the package until he or she accepts and +agrees to be bound by all terms and conditions of this License. + +5. Without specific prior written permission from the authors of +This Product (or from their common representative), You must not +use the name of This Product, the names of the authors of This +Product, or the names of the legal entities (or informal groups) +of which the authors were/are members/employees, to endorse or +promote Your Product or any work in which You include a modified +or unmodified version of This Product, or to endorse or promote +You or Your affiliates, or in a way that might suggest that Your +Product (or any work in which You include a modified or +unmodified version of This Product), You, or Your affiliates +is/are endorsed by one or more authors of This Product, or in a +way that might suggest that one or more authors of This Product +is/are affiliated with You (or Your affiliates) or directly +participated in the creation of Your Product or of any work in +which You include a modified or unmodified version of This +Product. + +6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS +LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL +TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, +MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS +PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A +LAWYER. + +7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS +LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER +APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER +THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE +DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY +PORTION(S) THEREOF. + +8. Except as otherwise provided in this License, if any +provision of this License, or a portion thereof, is found to be +invalid or unenforceable under applicable law, it shall not +affect the validity or enforceability of the remainder of this +License, and such invalid or unenforceable provision shall be +construed to reflect the original intent of the provision and +shall be enforced to the maximum extent permitted by applicable +law so as to effect the original intent of the provision as +closely as possible. + +____________________________________________________________ + + +Third-Party Licenses + +This Product contains components that were created by third +parties and that are governed by third-party licenses, which are +contained hereinafter (separated by lines consisting of +underscores). Each of the third-party licenses applies only to +(portions of) the source code file(s) in which the third-party +license is contained or in which it is explicitly referenced, +and to compiled or otherwise processed forms of such source +code. None of the third-party licenses applies to This Product +as a whole, even when it uses terms such as "product", +"program", or any other equivalent terms/phrases. This Product +as a whole is governed by the TrueCrypt License (see above). +Some of the third-party components have been modified by the +authors of This Product. Unless otherwise stated, such +modifications and additions are governed by the TrueCrypt +License (see above). Note: Unless otherwise stated, graphics and +files that are not part of the source code are governed by the +TrueCrypt License. + +____________________________________________________________ + +License agreement for Encryption for the Masses. + +Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. + +This product can be copied and distributed free of charge, +including source code. + +You may modify this product and source code, and distribute such +modifications, and you may derive new works based on this +product, provided that: + +1. Any product which is simply derived from this product cannot +be called E4M, or Encryption for the Masses. + +2. If you use any of the source code in your product, and your +product is distributed with source code, you must include this +notice with those portions of this source code that you use. + +Or, + +If your product is distributed in binary form only, you must +display on any packaging, and marketing materials which +reference your product, a notice which states: + +"This product uses components written by Paul Le Roux +" + +3. If you use any of the source code originally by Eric Young, +you must in addition follow his terms and conditions. + +4. Nothing requires that you accept this License, as you have +not signed it. However, nothing else grants you permission to +modify or distribute the product or its derivative works. + +These actions are prohibited by law if you do not accept this +License. + +5. If any of these license terms is found to be to broad in +scope, and declared invalid by any court or legal process, you +agree that all other terms shall not be so affected, and shall +remain valid and enforceable. + +6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE +IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED +"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR +IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES +OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE +ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS +WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE +COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + +7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN +WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY +MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE +LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, +INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR +INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS +OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY +YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH +ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD +PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. +____________________________________________________________ + +Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. +All rights reserved. + +LICENSE TERMS + +The free distribution and use of this software is allowed (with +or without changes) provided that: + + 1. source code distributions include the above copyright + notice, this list of conditions and the following + disclaimer; + + 2. binary distributions include the above copyright notice, + this list of conditions and the following disclaimer in + their documentation; + + 3. the name of the copyright holder is not used to endorse + products built using this software without specific written + permission. + +DISCLAIMER + +This software is provided 'as is' with no explicit or implied +warranties in respect of its properties, including, but not +limited to, correctness and/or fitness for purpose. +____________________________________________________________ + +Copyright (C) 2002-2004 Mark Adler, all rights reserved +version 1.8, 9 Jan 2004 + +This software is provided 'as-is', without any express or +implied warranty. In no event will the author be held liable +for any damages arising from the use of this software. + +Permission is granted to anyone to use this software for any +purpose, including commercial applications, and to alter it and +redistribute it freely, subject to the following restrictions: + +1. The origin of this software must not be misrepresented; you + must not claim that you wrote the original software. If you + use this software in a product, an acknowledgment in the + product documentation would be appreciated but is not + required. +2. Altered source versions must be plainly marked as such, and + must not be misrepresented as being the original software. +3. This notice may not be removed or altered from any source + distribution. +____________________________________________________________ diff --git a/doc/Trademark.md b/doc/Trademark.md new file mode 100644 index 0000000..c199c10 --- /dev/null +++ b/doc/Trademark.md @@ -0,0 +1,23 @@ +From [uspto.gov](http://tess2.uspto.gov/bin/gate.exe?f=login&p_lang=english&p_d=trmk). + +![](https://github.com/stefansundin/truecrypt-archive/raw/master/truecrypt-trademark-image.jpg) + + Word Mark TRUECRYPT + Goods and Services IC 009. US 021 023 026 036 038. G & S: Computer software for encryption. FIRST USE: 20031122. FIRST USE IN COMMERCE: 20040202 + Standard Characters Claimed + Mark Drawing Code (4) STANDARD CHARACTER MARK + Serial Number 78860644 + Filing Date April 13, 2006 + Current Basis 1A + Original Filing Basis 1A + Published for Opposition November 28, 2006 + Registration Number 3208626 + Registration Date February 13, 2007 + Owner (REGISTRANT) Tesarik, David INDIVIDUAL CZECH REPUBLIC 2972 Columbia St. Suite 7914 Torrance CALIFORNIA 90503 + (LAST LISTED OWNER) TRUECRYPT DEVELOPERS ASSOCIATION, LC LIMITED LIABILITY COMPANY NEVADA 375 N. STEPHANIE ST. SUITE 1411 HENDERSON NEVADA 890148909 + Assignment Recorded ASSIGNMENT RECORDED + Type of Mark TRADEMARK + Register PRINCIPAL + Affidavit Text SECT 15. SECT 8 (6-YR). + Live/Dead Indicator LIVE + diff --git a/doc/Version-History.md b/doc/Version-History.md new file mode 100644 index 0000000..47ad6b6 --- /dev/null +++ b/doc/Version-History.md @@ -0,0 +1,771 @@ +This is basically a copy of [the version history page](http://www.truecrypt.org/docs/version-history) on truecrypt.org. + +The versions that have been released are: 1.0, 1.0a, 2.0, 2.1, 2.1a, 3.0, 3.0a, 3.1, 3.1a, 4.0, 4.1, 4.2, 4.2a, 4.3, 4.3a, 5.0, 5.0a, 5.1, 5.1a, 6.0, 6.0a, 6.1, 6.1a, 6.2, 6.2a, 6.3, 6.3a, 7.0, 7.0a, 7.1, 7.1a. + +# 7.1a +February 7, 2012 + +Improvements and bug fixes: + +* Minor improvements and bug fixes. (Windows, Mac OS X, and Linux) + + +# 7.1 +September 1, 2011 + +New features: + +* Full compatibility with 64-bit and 32-bit Mac OS X 10.7 Lion + +Improvements and bug fixes: + +* Minor improvements and bug fixes. (Windows, Mac OS X, and Linux) + + +# 7.0a +September 6, 2010 + +Improvements: + +* Workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash when initiating hibernation on TrueCrypt-encrypted operating systems. (Windows 7/Vista/2008/2008R2) +* Other minor improvements. (Windows, Mac OS X, and Linux) + +Bug fixes: + +* Minor bug fixes. (Windows, Mac OS X, and Linux) + + +# 7.0 +July 19, 2010 + +New features: + +* Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration). + Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the AES instructions of the processor'. +* A volume can now be configured to be automatically mounted whenever its host device gets connected to the computer (provided that the correct password and/or keyfiles are supplied). (Windows) + * Note: For example, if you have a TrueCrypt container on a USB flash drive and you want to configure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mount the volume. 2. Right-click the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favorites'. 3. The Favorites Organizer window should appear. In it, enable the option 'Mount selected volume when its host device gets connected' and click OK. + * Also note that TrueCrypt will not prompt you for a password if you have enabled caching of the pre-boot authentication password (Settings > 'System Encryption') and the volume uses the same password as the system partition/drive. The same applies to cached non-system volume passwords. +* Partition/device-hosted volumes can now be created on drives that use a sector size of 4096, 2048, or 1024 bytes (Windows, Linux). Note: Previously only file-hosted volumes were supported on such drives. +* Favorite Volumes Organizer (Favorites > 'Organize Favorite Volumes' or 'Organize System Favorite Volumes'), which allows you to set various options for each favorite volume. For example, any of them can be mounted upon logon, as read-only or removable medium, can be assigned a special label (which is shown within the user interface instead of the volume path), excluded from hotkey mount, etc. The order in which favorite volumes are displayed in the Favorites Organizer window can be changed and it is the order in which the volumes are mounted (e.g. when Windows starts or by pressing the 'Mount Favorite Volumes' hotkey). For more information, see the chapters Favorite Volumes and System Favorite Volumes. (Windows) +* The Favorites menu now contains a list of your non-system favorite volumes. When you select a volume from the list, you are asked for its password (and/or keyfiles) (unless it is cached) and if it is correct, the volume is mounted. (Windows) +Security improvements: +* In response to our public complaint regarding the missing API for encryption of Windows hibernation files, Microsoft began providing a public API for encryption of hibernation files on Windows Vista and later versions of Windows (for more information, see the section TrueCrypt 5.1a in this version history). Starting with this version 7.0, TrueCrypt uses this API to encrypt hibernation and crash dump files in a safe documented way. (Windows 7/Vista/2008/2008R2) + * Note: As Windows XP and Windows 2003 do not provide any API for encryption of hibernation files, TrueCrypt has to modify undocumented components of Windows XP/2003 in order to allow users to encrypt hibernation files. Therefore, TrueCrypt cannot guarantee that Windows XP/2003 hibernation files will always be encrypted. Therefore, if you use Windows XP/2003 and want the hibernation file to be safely encrypted, we strongly recommend that you upgrade to Windows Vista or later and to TrueCrypt 7.0 or later. For more information, see the section Hibernation File. + +Improvements: + +* Many minor improvements. (Windows, Mac OS X, and Linux) + +Bug fixes: + +* Minor bug fixes. (Windows, Mac OS X, and Linux) + +Removed features: + +* TrueCrypt no longer supports device-hosted volumes located on floppy disks. Note: You can still create file-hosted TrueCrypt volumes on floppy disks. + + +# 6.3a +November 23, 2009 + +Improvements and bug fixes: + +* Minor improvements and bug fixes. (Windows, Mac OS X, and Linux) + + +# 6.3 +October 21, 2009 + +Improvements, bug fixes: + +* Full support for Windows 7. +* Full support for Mac OS X 10.6 Snow Leopard. +* The ability to configure selected volumes as 'system favorite volumes'. This is useful, for example, when you have volumes that need to be mounted before system and application services start and before users start logging on. It is also useful when there are network-shared folders located on a TrueCrypt volume and you need to ensure that the network shares will be restored by the system each time it is restarted. For more information, see the chapter System Favorite Volumes. (Windows) + +Improvements and bug fixes: + +* 'Favorite' volumes residing within partitions or dynamic volumes will no longer be affected by changes in disk device numbers, which may occur, e.g., when a drive is removed or added. Note: If you use a favorite volume list saved by TrueCrypt 6.2a or earlier and you want to take advantage of this improvement, you need to resave the list using TrueCrypt 6.3. (Windows) +* Many other minor improvements and bug fixes. (Windows, Mac OS X, and Linux) + + +# 6.2a +June 15, 2009 + +Improvements and bug fixes: + +* Improved file container creation speed on systems having issues with write block sizes greater than 64 KB. (Windows) +* The 'Device not ready' error will no longer occur when the process of decryption of a system partition/drive is finished. (Windows) +* Other minor improvements and bug fixes. (Windows, Mac OS X, and Linux) + + +# 6.2 +May 11, 2009 + +New features: + +* The I/O pipeline now uses read-ahead buffering, which improves read performance especially on solid-state drives, typically by 30-50%. (Windows) + +Improvements, bug fixes, and security enhancements: + +* The boot loader now supports motherboards with BIOSes that reserve large amounts of base memory (typically for onboard RAID controllers). Note: In order to be able to take advantage of this improvement under Windows Vista, you will have to install Service Pack 1 or higher first. Service Pack 1 for Windows Vista resolved an issue causing a shortage of free base memory during system boot. (Windows Vista/XP/2008/2003) +* Mounting using the 'Auto-Mount Devices' feature may take significantly less time as partitions containing unencrypted filesystems are now skipped. (Windows) +* When volumes that are mounted as read-only or removable are saved as favorite volumes, they are mounted as read-only and/or removable when 'Mount Favorite Volumes' is used. +* When a multiple-pass wipe algorithm is selected when performing in-place encryption of a non-system volume, the header areas will be wiped before the encrypted headers are written to the disk. Note: On an existing volume, you can perform such an operation by changing its password and/or keyfiles. (Windows Vista/2008) +* Many other minor improvements, bug fixes and security enhancements. (Windows, Mac OS X, and Linux) + + +# 6.1a +December 1, 2008 + +Improvements, bug fixes, and security enhancements: + +* Minor improvements, bug fixes, and security enhancements. (Windows, Mac OS X, and Linux) + + +# 6.1 +October 31, 2008 + +New features: + +* Ability to encrypt a non-system partition without losing existing data on the partition. (Windows Vista/2008) +Note: To encrypt a non-system partition in place, click 'Create Volume' > 'Encrypt a non-system partition' > 'Standard volume' > 'Select Device' > 'Encrypt partition in place' and then follow the instructions in the wizard. Please note that this is not supported on Windows XP/2000/2003 as these versions of Windows do not natively support shrinking of a filesystem (the filesystem needs to be shrunk to make space for the volume header and backup header). +* Support for security tokens and smart cards (for more information, see section Security Tokens and Smart Cards in chapter Keyfiles). +* The TrueCrypt boot loader can be prevented from displaying any texts (by selecting Settings > System Encryption and enabling the option 'Do not show any texts in the pre-boot authentication screen'). +* The TrueCrypt boot loader can now display a custom message (select Settings > System Encryption and enter the message in the corresponding field) either without any other texts or along with the standard TrueCrypt boot loader texts. +* Pre-boot authentication passwords can now be cached in the driver memory, which allows them to be used for mounting of non-system TrueCrypt volumes (select Settings > System Encryption and enable the option 'Cache pre-boot authentication password'). +* Linux and Mac OS X versions: The ability to mount a Windows system partition encrypted by TrueCrypt and to mount a partition located on a Windows system drive that is fully encrypted by a Windows version of TrueCrypt. + +Improvements: + +* Protection against memory corruption caused by bugs in certain versions of some BIOSes, which prevented the TrueCrypt boot loader from working properly. (Windows Vista/XP/2008/2003) +* During the process of creation of a hidden operating system, TrueCrypt now securely erases the entire content of the partition where the original system resides after the hidden system has been created. The user is then prompted to install a new system on the partition and encrypt it using TrueCrypt (thus the decoy system is created). + * Note: Although we are not aware of any security issues (connected with decoy systems) affecting the previous versions of TrueCrypt, we have implemented this change to prevent any such undiscovered security issues (if there are any). Otherwise, in the future, a vulnerability might be discovered that could allow an attacker to find out that the TrueCrypt wizard was used in the hidden-system-creation mode (which might indicate the existence of a hidden operating system on the computer) e.g. by analyzing files, such as log files created by Windows, on the partition where the original system (of which the hidden system is a clone) resides. In addition, due to this change, it is no longer required that the paging file is disabled and hibernation prevented when creating a hidden operating system. +* Many other improvements. (Windows, Mac OS X, and Linux) + +Bug fixes: + +* Many minor bug fixes and security improvements. (Windows, Mac OS X, and Linux) + + +# 6.0a +July 8, 2008 + +Resolved incompatibilities / bug fixes: + +* On systems where certain inappropriately designed chipset drivers were installed, it was impossible to encrypt the system partition/drive. This will no longer occur. (Windows Vista/XP/2008/2003) +* Other minor bug fixes. (Windows, Mac OS X, and Linux) + + +# 6.0 +July 4, 2008 + +New features: + +* Parallelized encryption/decryption on multi-core processors (or multi-processor systems). Increase in encryption/decryption speed is directly proportional to the number of cores and/or processors. + * For example, if your computer has a quad-core processor, encryption and decryption will be four times faster than on a single-core processor with equivalent specifications (likewise, it will be twice faster on dual-core processors, etc.) + * [View benchmark results](http://www.truecrypt.org/screenshots2) +* Ability to create and run an encrypted hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed). For more information, see the section Hidden Operating System. (Windows Vista/XP/2008/2003) + * For security reasons, when a hidden operating system is running, TrueCrypt ensures that all local unencrypted filesystems and non-hidden TrueCrypt volumes are read-only. (Data is allowed to be written to filesystems within hidden TrueCrypt volumes.) + * Note: We recommend that hidden volumes are mounted only when a hidden operating system is running. For more information, see the subsection Security Requirements and Precautions Pertaining to Hidden Volumes. +* On Windows Vista and Windows 2008, it is now possible to encrypt an entire system drive even if it contains extended/logical partitions. (Note that on Windows XP you can encrypt an entire system drive too, but it must contain only primary partitions.) +* New volume format that increases reliability, performance and expandability: + * Each volume created by this or later versions of TrueCrypt will contain an embedded backup header (located at the end of the volume). Note that it is impossible to mount a volume when its header is damaged (the header contains an encrypted master key). Therefore, embedded backup headers significantly reduce this risk. Also note that a backup header is not a copy of the original volume header because it is encrypted with a different header key derived using a different salt. For more information, see the subsection Tools > Restore Volume Header. + * Note: If the user fails to supply the correct password (and/or keyfiles) twice in a row when trying to mount a volume, TrueCrypt will automatically try to mount the volume using the embedded backup header (in addition to trying to mount it using the primary header) each subsequent time that the user attempts to mount the volume (until he or she clicks Cancel). If TrueCrypt fails to decrypt the primary header but it successfully decrypts the embedded backup header at the same time, the volume is mounted and the user is warned that the volume header is damaged (and informed as to how to repair it). + * The size of the volume header area has been increased to 128 KB. This will allow implementation of new features and improvements in future versions and ensures that performance will not be impaired when a TrueCrypt volume is stored on a file system or device that uses a sector size greater than 512 bytes (the start of the data area will always be aligned with the start of a host-filesystem/physical sector). + * For more information about the new volume format, see the section TrueCrypt Volume Format Specification. + * Note: Volumes created by previous versions of TrueCrypt can be mounted using this version of TrueCrypt. +* Parallelized header key derivation on multi-core processors (one algorithm per core/thread). As a result, mounting is several times faster on multi-core processors. (Windows) +* Ability to create hidden volumes under Mac OS X and Linux. +* On Linux, TrueCrypt now uses native kernel cryptographic services (by default) for volumes encrypted in XTS mode. This increases read/write speed in most cases. However, the FUSE driver must still be used when the volume is encrypted in a deprecated mode of operation (LRW or CBC), or when mounting an outer volume with hidden-volume protection, or when using an old version of the Linux kernel that does not support XTS mode. + +Improvements: + +* Up to 20% faster resuming from hibernation when the system partition/drive is encrypted. (Windows Vista/XP/2008/2003) +* Many other improvements. (Windows, Mac OS X, and Linux) + +Removed features: + +* Encrypted system partitions/drives can no longer be permanently decrypted using the TrueCrypt Boot Loader (however, it is still possible using the TrueCrypt Rescue Disk). (Windows Vista/XP/2008/2003) + * Note: This was done in order to reduce the memory requirements for the TrueCrypt Boot Loader, which was necessary to enable the implementation of support for hidden operating systems. + +Bug fixes: + +* When Windows XP was installed on a FAT16 or FAT32 partition (as opposed to an NTFS partition) and the user attempted to encrypt the system partition (or system drive), the system encryption pretest failed. This will no longer occur. +* Many other minor bug fixes and security improvements (preventing e.g. denial-of-service attacks). (Windows, Mac OS X, and Linux) + +**Note:** TrueCrypt 4.3a and 5.1a have been repackaged to contain the latest version of the TrueCrypt License introduced with TrueCrypt 6.0 (the original application and driver binaries of those old versions have not been modified; however, the installer used for those new packages was compiled using the source code of TrueCrypt 6.0, not TrueCrypt 5.1a). + + +# 5.1a +March 17, 2008 + +Improvements: + +* Faster booting when the system partition/drive is encrypted (typically by 10%). (Windows Vista/XP/2008/2003) +* Other minor improvements. (Windows, Mac OS X, and Linux) + +Resolved incompatibilities: + +* On computers with certain hardware configurations, resuming from hibernation failed when the system partition was encrypted. Note: If you encountered this problem, the content of RAM may have been saved unencrypted to the hibernation file. You can erase such data, for example, by decrypting the system partition/drive (select System > Permanently Decrypt System Partition/Drive) and then encrypting it again. (Windows Vista/XP/2008/2003) + * Remark: As Microsoft does not provide any API for handling hibernation, non-Microsoft developers of disk encryption software are forced to modify undocumented components of Windows in order to allow users to encrypt hibernation files. Therefore, no disk encryption software (except for Microsoft's BitLocker) can guarantee that hibernation files will always be encrypted. At anytime, Microsoft can arbitrarily modify components of Windows (using the auto-update feature of Windows) that are not publicly documented or accessible via a public API. Any such change, or the use of an untypical or custom storage device driver, may cause any non-Microsoft disk encryption software to fail to encrypt the hibernation file. We plan to file a complaint with Microsoft (and if rejected, with the European Commission) about this issue, also due to the fact that Microsoft's disk encryption software, BitLocker, is not disadvantaged by this. + * [Update 2008-04-02: Although we have not filed any complaint with Microsoft yet, we were contacted (on March 27) by Scott Field, a lead Architect in the Windows Client Operating System Division at Microsoft, who stated that he would like to investigate our requirements and look at possible solutions. We responded on March 31 providing details of the issues and suggested solutions.] + * [Update 2009-05-10: Since April 2008, we have been working with Microsoft to explore possible ways to solve this issue. We have private access to a draft version of a document specifying the future API, which should allow us to solve the issue on Windows Vista and later versions of Windows. Note: We have been asked not to disclose the content of the document to any third parties, so please do not ask us to send you a copy of the document.] + * [Update 2010-07-19: Microsoft began providing a public API for encryption of hibernation files on Windows Vista and later versions of Windows. Since version 7.0, TrueCrypt has used this API and therefore has been able to safely encrypt hibernation files under Windows Vista and later versions of Windows. Therefore, if you use Windows XP/2003 and want the hibernation file to be safely encrypted, we strongly recommend that you upgrade to Windows Vista or later and to TrueCrypt 7.0 or later.] +* Workaround for a bug in the BIOS of some Apple computers that prevented users from entering pre-boot authentication passwords and controlling the TrueCrypt Boot Loader. (Windows Vista/XP/2008/2003) + +Bug fixes: + +* When the system partition/drive is decrypted under Windows, the original partition table will not be restored. Note: This issue affected users who repartitioned an encrypted system drive and then decrypted it under Windows. (Windows Vista/XP/2008/2003) +* Other minor bug fixes. (Windows, Mac OS X, and Linux) + + +# 5.1 +March 10, 2008 + +New features: + +* Support for hibernation on computers where the system partition is encrypted (previous versions of TrueCrypt prevented the system from hibernating when the system partition was encrypted). (Windows Vista/XP/2008/2003) +* Ability to mount a partition that is within the key scope of system encryption without pre-boot authentication (for example, a partition located on the encrypted system drive of another operating system that is not running). (Windows Vista/XP/2008/2003) +Note: This can be useful e.g. when there is a need to back up or repair an operating system encrypted by TrueCrypt (from within another operating system). +* Command line options for creating new volumes. (Linux and Mac OS X) + +Improvements: + +* Increased speed of AES encryption/decryption (depending on the hardware platform, by 30-140%). (Windows) +* Faster booting when the system partition/drive is encrypted. (Windows Vista/XP/2008/2003) +* When the system partition/drive is encrypted, the TrueCrypt Boot Loader is now stored in a compressed form and is, therefore, smaller. If a non-cascade encryption algorithm is used (i.e., AES, Serpent, or Twofish), the TrueCrypt Boot Loader is now small enough so that a backup of the TrueCrypt Boot Loader can be (and is) stored in the first drive track. Whenever the TrueCrypt Boot Loader is damaged, its backup copy is run automatically instead. + * As a result of this improvement, the following problem will no longer occur: Certain inappropriately designed activation software (used for activation of some third-party software) writes data to the first drive track, thus damaging the TrueCrypt Boot Loader. The affected users had to use the TrueCrypt Rescue Disk to repair the TrueCrypt Boot Loader. This will no longer be necessary after upgrading to this version of TrueCrypt (provided that the system partition/drive is encrypted using a non-cascade encryption algorithm, i.e., AES, Serpent, or Twofish). + * Note: If your system partition/drive is currently encrypted using a non-cascade encryption algorithm (i.e., AES, Serpent, or Twofish), a backup copy of the TrueCrypt Boot Loader will be automatically stored in the first drive track when you upgrade to this version of TrueCrypt. +* The minimum memory requirements for the TrueCrypt Boot Loader (AES) have been reduced from 42 KB to 27 KB (twenty-seven kilobytes). This allows users to encrypt system partitions/drives on computers where the BIOS reserves a large amount of memory (provided that the AES encryption algorithm is used). (Windows Vista/XP/2008/2003) +* Many other minor improvements. (Windows, Mac OS X, and Linux) + +Resolved incompatibilities: + +* On some computers, when performing the system encryption pretest, Windows failed to display the log-on screen. This will no longer occur. (Windows Vista/XP/2008/2003) + +Bug fixes: + +* On some systems, drive letters were not correctly assigned to newly mounted non-system volumes. This will no longer occur. (Windows) +* Many other minor bug fixes. (Windows, Mac OS X, and Linux) + + +# 5.0a +February 12, 2008 + +Improvements: + +* The memory requirements for the TrueCrypt Boot Loader have been reduced by 18 KB (eighteen kilobytes). As a result of this improvement, the following problem will no longer occur on most of the affected computers: The memory requirements of the TrueCrypt Boot Loader 5.0 prevented users of some computers from encrypting system partitions/drives (when performing the system encryption pretest, the TrueCrypt Boot Loader displayed the following error message: Insufficient memory for encryption). + +Bug fixes: + +* On computers equipped with certain brands of audio cards, when performing the system encryption pretest or when the system partition/drive is encrypted, the sound card drivers failed to load. This will no longer occur. (Windows Vista/XP/2003) +* It is possible to access mounted TrueCrypt volumes over a network. (Windows) +* TrueCrypt Rescue Disks created by the previous version could not be booted on some computers. This will no longer occur. (Windows Vista/XP/2003) + * Note: If your TrueCrypt Rescue Disk created by TrueCrypt 5.0 cannot be booted on your computer, please upgrade to this version of TrueCrypt and then create a new TrueCrypt Rescue Disk (select 'System' > 'Create Rescue Disk'). +* Many other minor bug fixes. (Windows, Mac OS X, and Linux) + + +# 5.0 +February 5, 2008 + +New features: + +* Ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts). For more information, see the chapter System Encryption. (Windows Vista/XP/2003) +* Pipelined operations increasing read/write speed by up to 100%. (Windows) +* Mac OS X version. +* Graphical user interface for the Linux version of TrueCrypt. +* The TrueCrypt Volume Creation Wizard now allows creation of hidden volumes within NTFS volumes. (Windows Vista/XP/2003/2008) +* XTS mode of operation, which was designed by Phillip Rogaway in 2003 and which was recently approved as the IEEE 1619 standard for cryptographic protection of data on block-oriented storage devices. XTS is faster and more secure than LRW mode (for more information on XTS mode, see the section Modes of Operation). + * Note: New volumes created by this version of TrueCrypt can be encrypted only in XTS mode. However, volumes created by previous versions of TrueCrypt can still be mounted using this version of TrueCrypt. +* SHA-512 hash algorithm (replacing SHA-1, which is no longer available when creating new volumes). +Note: To re-encrypt the header of an existing volume with a header key derived using HMAC-SHA-512 (PRF), select 'Volumes' > 'Set Header Key Derivation Algorithm'. + +Improvements, bug fixes, and security enhancements: + +* The Linux version of TrueCrypt has been redesigned so that it will no longer be affected by changes to the Linux kernel (kernel upgrades/updates). +* Many other minor improvements, bug fixes, and security enhancements. (Windows and Linux) + +If you are using an older version of TrueCrypt, it is strongly recommended that you upgrade to this version. + + +# 4.3a +May 3, 2007 + +Improvements: + +* Full support for custom screen DPI settings. (Windows, GUI) +* Other minor improvements. (Windows and Linux) + +Bug fixes: + +* Fixed bug that in some cases caused the 'Safely Remove Hardware' function to fail. +* In Windows Vista, it is now possible to read data from file-hosted TrueCrypt volumes located on UDF-formatted media mounted in read-only mode. +* All Volume Creation Wizard GUI elements are now correctly displayed on systems with custom DPI settings. (Windows, GUI) +* Other minor bug fixes. (Windows and Linux) + +Security improvements: + +* Linux: When running without administrator privileges, TrueCrypt automatically attempts to elevate its access rights (if necessary) using the sudo command. The Linux version of TrueCrypt no longer supports the set-euid root mode of execution. These changes also prevent all discovered and undiscovered (if any) security issues related to the set-euid root mode of execution, including an issue affecting all previous Linux versions of TrueCrypt where a local non-administrator user could cause a denial of service or gain administrator privileges. + +Miscellaneous: + +* If dismount is forced on a TrueCrypt volume when TrueCrypt runs in portable mode, the TrueCrypt driver will not be unloaded when TrueCrypt exits (it will be unloaded only when the system is restarted or shut down). This prevents various problems caused by a bug in Windows (for instance, it would be impossible to start TrueCrypt again as long as there are applications using the dismounted volume). (Windows) + + +# 4.3 +March 19, 2007 + +New features: + +* Full compatibility with 32-bit and 64-bit Windows Vista: + * Support for User Account Control (UAC). + * All .sys and .exe files of TrueCrypt are now digitally signed with the digital certificate of the TrueCrypt Foundation, which was issued by the certification authority GlobalSign. + * When moving the mouse on a single-CPU computer while reading or writing data to a TrueCrypt volume, the mouse pointer stopped moving for a second every few seconds. This will no longer occur. (Windows Vista issue) + * Other minor compatibility-related changes. +* TrueCrypt volume is automatically dismounted if its host device is inadvertently removed. + * Important: Before you physically remove a device (such as a USB flash drive) where a mounted TrueCrypt volume resides, you should always dismount the volume in TrueCrypt first, and then perform the 'Eject' operation (right-click the host device in the 'Computer' or 'My Computer' list) or use the 'Safely Remove Hardware' function (built in Windows, accessible via the taskbar notification area). +* Ability to write data to file-hosted volumes located on devices that use a sector size other than 512 bytes (e.g., new hard drives, DVD-RAM, some MP3 players and USB flash drives, etc.) +* Support for devices with a GPT partition table (GUID partitions). (Windows Vista/2003/XP) +* After a partition is successfully encrypted, the drive letter assigned to it (if any) is automatically removed. (Windows) +* Volume name (label) is displayed in device/partition selector. (Windows) +* New hotkey: 'Wipe Cache'. (Windows) +* New command line switch '/q background' for launching the TrueCrypt Background Task. (Windows) + +Improvements: + +* Portions of the TrueCrypt device driver redesigned. +* Maximum allowed size of FAT32 volumes increased to 2 TB (note that NTFS volumes can be larger than 2 TB). +* Traveler Disk Setup improved. (Windows) +* Volumes hosted on read-only media will always be mounted in read-only mode. (Windows Vista/2003/XP) +* Improved support for big-endian platforms. +* Other minor improvements. (Windows and Linux) + +Bug fixes: + +* The built-in FAT format facility now functions correctly on big-endian platforms. +* Improved handling of partitions and devices during volume creation. (Windows) +* Improved handling of low-memory conditions. (Windows) +* Fixed bug that rarely caused system errors when dismounting all volumes. (Windows) +* Tray icon is recreated when Windows Explorer is restarted (e.g. after a system crash). +* Other minor bug fixes. (Windows and Linux) + +Security improvements: + +* Improved security of set-euid root mode of execution. Volume can be dismounted only by the user who mounted it or by an administrator (root). (Linux) + +Miscellaneous: + +* The option 'Cache passwords and keyfiles in memory' in the password prompt dialog window no longer sets the default setting (to set the default setting, select Settings > Preferences and enable or disable the option 'Cache passwords in driver memory'). (Windows) + +Removed features: + +* 64-bit block ciphers are being phased out. It is no longer possible to create new volumes encrypted with 64-bit-block encryption algorithms (Blowfish, CAST-128, and Triple DES). Note that it is still possible to mount such volumes. + + +# 4.2a +July 3, 2006 + +Bug fixes: + +* Writing to a TrueCrypt volume under Linux no longer causes the system to stop responding under certain conditions. +* Occasional application errors no longer occur when selecting a file. (Windows XP SP2 issue) +* Fixed bug that caused installation of the TrueCrypt driver to fail under certain configurations of 64-bit Windows. +* TrueCrypt volumes mounted in a remote session under Windows 2000 can now be accessed. +* TrueCrypt Volume Creation Wizard no longer blocks hot keys of certain applications. (Windows) +* Other minor bug fixes. (Windows and Linux) + +Improvements: + +* It will not be required to reinstall the TrueCrypt kernel module after every minor Linux kernel update. +* Other minor improvements. (Windows and Linux) + +Security improvements: + +* The Linux version of TrueCrypt now uses the TrueCrypt Random Number Generator (ported from the Windows version of TrueCrypt) instead of using only the Linux built-in random number generator. (This change was necessary due to a flaw in the Linux built-in random number generator: Data from the mouse and keyboard, which are the most important sources of random data, are not read by the Linux built-in random number generator when the user has only a USB mouse/keyboard.) + * Note: The Linux version of TrueCrypt still uses the Linux built-in random number generator. However, it is now merely one of the data sources used by the TrueCrypt random number generator. +* Interactive mount mode, which allows the user to avoid passing sensitive parameters via command line. (Linux) +* TrueCrypt volume is unmapped if mounting it to a directory fails. (Linux) +* When the 'Never Save History' option is enabled, TrueCrypt sets its "current directory" to the user's home directory (in portable mode, to the directory from which TrueCrypt was launched) after a container or keyfile is selected via the Windows file selector. Therefore, the Windows file selector will not "remember" the path of the last selected container or keyfile. (Windows) + + +# 4.2 +April 17, 2006 + +New features: + +* TrueCrypt volumes can now be created under Linux. +* Ability to create a 'dynamic' container whose physical size (actual disk space used) grows as new data is added to it. (Dynamic containers are pre-allocated NTFS sparse files.) +* Volume passwords/keyfiles can be changed under Linux. +* Keyfiles can be created under Linux. +* Volume headers can be backed up and restored under Linux. +* Multiple keyfiles can be selected in the file selector by holding the Control (Ctrl) or Shift key. (Windows) +* It is now possible to enable and directly set keyfiles by dragging the icon of keyfile(s) or of keyfile search path(s) to the password entry window (Windows only). +* New Linux command line option: -u, --user-mount, which can be used to set default user and group ID of the file system being mounted to the user and group ID of the parent process. Some file systems (such as FAT) do not support user permissions and, therefore, it is necessary to supply a default user and group ID to the system when mounting such file systems. +* The build.sh script can now perform automatic configuration of the Linux kernel source code, which is necessary in order to compile TrueCrypt on Linux. Note that this works only if the installed version of the kernel enables/supports it. +* TrueCrypt volume properties can be viewed under Linux. + +Improvements: + +* It is now possible to mount a single TrueCrypt volume from multiple operating systems at once (for example, a volume shared over network), provided that the volume is mounted as read-only under each system. (Windows) +* Current directory is never left set to a removable device after a file (e.g., a container, keyfile, header backup) stored on it is selected via file selector in TrueCrypt. Therefore, it will be possible to 'Safely Remove' the device in such cases. (Windows) +* Improved security of set-euid root mode of execution. (Linux) +* Other minor improvements. + +Bug fixes: + +* It is now possible to dismount volumes that cannot be opened (for example, after disconnecting and reconnecting a USB flash drive formatted as NTFS containing a mounted TrueCrypt volume). +* Fixed bug that sometimes caused the mount process to fail under Linux when one or more TrueCrypt volumes were already mounted. +* Command line argument buffer is now wiped upon exit. (Windows, command line usage) +* Other minor bug fixes. + + +# 4.1 +November 25, 2005 + +New features: + +* New mode of operation implemented: LRW. + * LRW mode is more secure than CBC mode and is suitable for disk encryption. LRW mode is to become an IEEE standard for sector-based storage encryption. (For more information on LRW mode, see chapter Technical Details, section Modes of Operation in the documentation). + * Volumes created by this version of TrueCrypt can be encrypted only in LRW mode. However, volumes created by previous versions of TrueCrypt can still be mounted by this version of TrueCrypt. + * To prevent a recently discovered attack, which affects plausible deniability, we strongly recommend that you move data from your TrueCrypt volume to a new volume created by this version. Description of the attack: If a series of certain plaintext blocks is written to a mounted volume (i.e., if it is correctly encrypted), it is, with a very high probability, possible to distinguish the volume from random data. This affects volumes created by all versions of TrueCrypt prior to 4.1, except volumes encrypted with AES-Blowfish or AES-Blowfish-Serpent. +* The encryption algorithm test facility (Tools -> Test Vectors) now supports LRW mode. + +Improvements: + +* AES routines by Dr. Brian Gladman updated to the latest version. +* Improved support for using TrueCrypt under non-administrator accounts on Linux (set-euid root). +* A new instance of TrueCrypt will be created only if necessary. +* Other minor improvements. + +Bug fixes: + +* Password input field will be correctly wiped after each mount attempt. +* Hidden volume protection now works if set via 'Mount with Options'. +* Containers located on volumes that are accessible only in local user name space can now be mounted. +* The option /keyfile now works if specified with '/auto devices' or '/auto favorites' (command line usage). +* Volumes whose paths contain spaces can be mounted. (Linux) +* Several localization issues fixed. +* Other minor bug fixes. + + +# 4.0 +November 1, 2005 + +New features: + +* TrueCrypt volumes can now be mounted on Linux. The Linux version of TrueCrypt is available at http://www.truecrypt.org/downloads +* It is now possible to write to outer volume without risking that a hidden volume within it will get damaged (overwritten): + * When mounting an outer volume, the user can now enter two passwords: One for the outer volume, and the other for a hidden volume within it, which he/she wants to protect. In this mode, TrueCrypt does not actually mount the hidden volume. It only decrypts its header and retrieves information about the size of the hidden volume (from the decrypted header). Then, the outer volume is mounted and any attempt to save data to the area of the hidden volume will be rejected by the driver (until the outer volume is dismounted). For further details, please see the section 'Protection of Hidden Volumes Against Damage' in the documentation. +* Support for the x86-64 (64-bit) platform. +* TrueCrypt now runs on Windows XP x64 Edition (64-bit) and Windows Server 2003 x64. +* Support for big-endian hardware platforms (PowerPC, SPARC, Motorola, etc). +* Full support for keyfiles. Keyfiles provide protection against keystroke loggers and may strengthen protection against brute force attacks. Keyfile is a file whose content is combined with a password. Until correct keyfile is provided, no volume that uses the keyfile can be mounted. Any number of, and any kind of files (for example, .mp3, .jpg, .exe, .avi) may be used as TrueCrypt keyfiles. TrueCrypt never modifies the keyfile contents. Therefore, it is possible to use, for example, five files in your large mp3 collection as TrueCrypt keyfiles (and inspection of the files will not reveal that they are used as keyfiles). TrueCrypt can also generate a file with random content, which can be used as a keyfile. For more information on keyfiles, see the chapter Keyfiles in the documentation. +* Support for language packs (localizations). Language packs may be downloaded at: http://www.truecrypt.org/localizations +* Whirlpool hash algorithm added. + * The size of the output of this hash algorithm is 512 bits. It was designed by Vincent Rijmen (co-designer of the AES encryption algorithm) and Paulo S. L. M. Barreto. The first version of Whirlpool was published in November 2000. The second version, now called Whirlpool-T, was selected for the NESSIE ("New European Schemes for Signatures, Integrity and Encryption") portfolio of cryptographic primitives (a project organized by the European Union, similar to the AES contest). TrueCrypt uses the third (final) version of Whirlpool, which was adopted by the International Organization for Standardization (ISO) and the IEC in the ISO/IEC 10118-3:2004 international standard. +* Auto-Dismount facility, which can be set to dismount a volume after no data has been written/read to/from it for specified number minutes. + * It can also be set to dismount all mounted TrueCrypt volumes when: + * user logs off + * entering power saving mode + * screen saver is launched + * Auto-dismount can be configured and activated in the Preferences (select Settings -> Preferences) +* TrueCrypt settings are not saved to the Windows registry file. Instead, they are stored in XML files in the folder where application data are saved on the system (for example, in C:\Documents and Settings\YourUserName\Application Data\TrueCrypt). In portable mode, the configuration XML files are saved to the folder from which you run the file TrueCrypt.exe. +Note: When you install this version of TrueCrypt, all TrueCrypt settings that were stored by previous versions in the registry file will be automatically removed. +* Tray icon. Right-clicking the tray icon opens a popup menu with the most used functions. Left-clicking the tray icon opens the main TrueCrypt window and puts it into the foreground. +* Optionally, TrueCrypt can now continue running in the background after its main window is closed. This is referred to as TrueCrypt Background Task. + * When the main TrueCrypt window is closed, the TrueCrypt Background Task handles the following tasks/functions: + 1) Hot keys + 2) Auto-dismount + 3) Notifications (e.g., when damage to hidden volume is prevented) + 4) Tray icon + * For more information, see the chapter TrueCrypt Background Task in the documentation. +* When a mounted volume is right-clicked in the drive list (in the main TrueCrypt window), a context menu is opened. From this menu, the user can select functions such as 'Repair Filesystem' or 'Check Filesystem' (front-end to the 'chkdsk' tool). +* Containers stored on a locally mapped network drive can now be mounted. +* Container stored on a remote server can be mounted via UNC path (e.g., \\server\share\volume). +* Option to display password (typed in input field). +* 'Favorite Volumes' facility, which is useful if you often work with more than one TrueCrypt volume at a time and you need each of them to be mounted as the same drive letter every time. For more information, see the chapter 'Main Program Window', section 'Program Menu' in the documentation. +* Functions 'Backup Volume Header' and 'Restore Volume Header' added to the Tools menu. Both the standard volume header and the hidden volume header area are always backed up (copied to the backup file) even if there is no hidden volume within the volume (to preserve plausible deniability of hidden volumes). +Note: If you do not have enough free space to backup all files, we highly recommend that you at least use this facility to backup the volume header, which contains the master key (size of the backup file will be 1024 bytes). If the volume header is damaged, the volume is, in most cases, impossible to mount. +* System-wide hot keys (which can be used, for example, to dismount all TrueCrypt volumes, etc). +* Users can now set actions to perform upon logon to Windows. + * The actions can be any of the following: + - Start TrueCrypt + - Mount all device-hosted TrueCrypt volumes + - Mount favorite volumes + * These actions can be enabled in the Preferences (select Settings -> Preferences). +* Title bar of the password prompt dialog window now displays path to volume being mounted. +* When the 'Never save history' option is enabled, TrueCrypt clears the registry entries created by the Windows file selector for TrueCrypt. Therefore, the Windows file selector will not remember the path of the last mounted container after you exit TrueCrypt. Note that even when this option is enabled, the file selector will still remember the path, but only until you exit TrueCrypt. +* 'Set Header Key Derivation Algorithm' added to the Volumes menu. It allows the user to re-encrypt a volume header with a header key derived using a different PRF function (e.g., instead of HMAC-SHA-1 you could use HMAC-Whirlpool). Note: Volume header contains master encryption key with which volume is encrypted. Therefore, data stored on the volume will not be lost after this function is used. +* Number of bytes read/written from/to a volume since it was mounted is displayed in the Volume Properties window. +* Preserving container timestamps can now disabled in the Preferences (Settings -> Preferences). +* Command line usage: + * If '/silent' is specified, interaction with user (prompts, error messages, warnings, etc.) is suppressed. + * If '/m timestamp' is specified, volume/keyfile timestamps are not preserved. + * '/keyfile' can be used to specify a keyfile or a keyfile search path. + * '/auto favorites' can be used to mount favorite volumes. + * '/auto' is implicit if '/quit' and '/volume' are specified. + * If '/q preferences' is specified, TrueCrypt loads/saves settings. +* Auto-Mount Devices keeps prompting for a password until a volume is successfully mounted or until cancelled. Warning is displayed after each unsuccessful mount. +* If the Shift key is down when clicking 'Auto-Mount Devices' and if there are cached passwords, then password prompt will be bypassed (mounting will be attempted only with cached passwords). +* It is now possible to run multiple instances of the TrueCrypt application simultaneously. + +Improvements: + +* Mounting of fragmented file-hosted volumes (containers) takes significantly less time. +* New SHA-1 routines by Brian Gladman, which are approx. three times faster than the original ones (speeds up mounting). +* Enhancements to the random number generator: + * Hash function output is XORed into the pool (in E4M and the previous versions of TrueCrypt the values produced by a hash function replaced the original values in the pool). + * Input to hash function will always be the entire pool. + * Position of the pool cursor does not change when the FastPoll function is applied. This ensures that mouse coordinates are always evenly distributed in the pool (significant particularly when moving the mouse uninterruptedly). + * Event delta/absolute time will be added modulo 2^32 to the pool at the same position as the event data. (In the previous versions, event delta times were added separately modulo 2^32 to the pool. Delta times provide only a small amount of entropy, particularly when moving the mouse uninterruptedly.) + * For more information see the chapter Technical Details, section Random Number Generator in the documentation. + * Important: That we made these enhancements to the random number generator does NOT mean that volumes created using previous versions of TrueCrypt are insecure. +* File-hosted volumes are pre-allocated before they are formatted. Therefore, containers are created faster and less fragmented. +* When TrueCrypt re-encrypts a volume header (for example, when changing a password), the original volume header is first overwritten 35 times with random data to prevent adversaries from using techniques such as magnetic force microscopy to recover the overwritten header. +* Traveler disk can be created when TrueCrypt is running in portable mode. +* TrueCrypt warns if automatic mounting of new volumes is disabled in Windows and informs the user how to enable this functionality. +* Other minor improvements. + +Bug fixes: + +* Hidden volume password can now be changed on all types of removable media (e.g., all types of USB memory sticks). +* When changing a password and an error occurs during the creation of a new volume header, the header will not be written and the error will be reported. +* FAT file system created by TrueCrypt will have the same properties as FAT file system created by Windows. +* Drive list will be updated whenever drive letter assignments change. +* If an error occurs, TrueCrypt returns exit code 1, otherwise it returns 0 (command line usage). +* Password specified on command line (/p) now also works with '/a devices' (command line usage). +* Other minor bug fixes. + +Miscellaneous: + +* Size of the random number generator pool increased from 256 to 320 bytes. +* The command line option '/quiet' has been renamed to '/quit'. +* The Serpent routines written in assembly have been replaced with routines written in C, so that the whole source code is more portable. + + +# 3.1a +February 7, 2005 + +Bug fixes: + +* Volumes mounted as removable media can now be checked/repaired ('chkdsk.exe'), defragmented, formatted, etc. +* Volume Creation Wizard now respects default mount options set via Tools > Preferences. +* Fixed bug that caused mount/dismount to fail on some systems. +* The TrueCrypt uninstaller is now always installed during installation. +* Relative paths can be used with the /volume option (command line usage). +* Drive A: will no longer disappear from Windows Explorer (e.g., 'My Computer' list) after 'Dismount All'. +* Other minor bug fixes. + +Improvements: + +* When running in portable mode, the TrueCrypt driver will be unloaded when no longer needed (e.g., when the main application and/or the last instance of the Volume Creation Wizard is closed and no TrueCrypt volumes are mounted). +* Access mode (read-only or read-write) is now displayed in the volume properties dialog. +* Other minor improvements. + + +# 3.1 +January 22, 2005 + +Improvements: + +* Partitions/devices that are already in use by another driver (usually an anti-virus utility) can now be mounted. +* It is now possible to run multiple instances of the TrueCrypt Volume Creation Wizard. + +New features: + +* TrueCrypt can now run in portable mode, which means that it does not have to be installed on the operating system under which it is run. There are two ways to run TrueCrypt in portable mode: + 1) After you unpack the binary distribution archive, you can directly run 'TrueCrypt.exe'. + 2) You can use the new 'Traveler Disk Setup' facility (accessible from the 'Tools' menu) to prepare a special traveler disk and launch TrueCrypt from it. This facility can also configure a traveler disk in a way that when it is inserted, TrueCrypt is automatically started or a specified volume is mounted (note that this works only when the traveler disk is a removable medium such as a CD or DVD; Windows XP SP2 is required in case of USB memory sticks). +* Volumes can now be mounted as read-only. This can be set in the newly implemented 'Mount Options' dialog, which can be opened from the password entry dialog or by holding Control while clicking 'Mount'. (Command line usage: '/mountoption ro') +* Volumes can now be mounted as removable media (for example to prevent Windows from creating the 'Recycled' and/or 'System Volume Information' folders on the volume). This can be set in the newly implemented 'Mount Options' dialog, which can be opened from the password entry dialog or by holding Control while clicking 'Mount'. (Command line usage: '/mountoption rm') +* Default mount options can be configured in the main program preferences (Tools -> Preferences). +* 'Refresh Drive Letters' function added to the tools menu. It can be used when Windows Explorer fails to register a newly mounted volume (for example when it is not shown in the 'My Computer' list). +* Volume can now be selected by dragging its icon to the TrueCrypt program window (this also allows to avoid the Windows file selector). +* '/auto devices' auto-mounts all device/partition-hosted TrueCrypt volumes (command line usage). + +Bug fixes: + +* The 'Auto-Mount Devices' facility will not mount 'phantom' partitions on some removable media (e.g. USB memory sticks). +* In some cases TrueCrypt did not use all available space on some removable media (such as USB memory sticks). + * Remark: This bug was inherited from E4M, so it applies also to volumes created by E4M. + * Warning: Note that this means it will not be possible to mount hidden volumes (does not apply to file-hosted containers) created with TrueCrypt 3.0 or 3.0a that are located on some removable media, e.g., some USB memory sticks, (because the expected position of a hidden volume changes with the size of its host volume). If that is the case, please before upgrading to TrueCrypt 3.1, move your files to a temporary TrueCrypt volume on a non-removable medium or to a non-hidden volume on a removable medium and move the data from the old hidden volume to this temporary one. Then install TrueCrypt 3.1, create a new hidden volume and move your files from the temporary volume to it. +* Freezing caused by applications not responding to drive change messages when mounting/dismounting TrueCrypt volumes will no longer occur. +* Users are now prevented from setting a too small cluster size when creating a FAT volume (which caused various problems). +* The command line parser no longer causes TrueCrypt to crash. +* Other minor bug fixes. + + +# 3.0a +December 11, 2004 + +Bug fixes: + +* Data corruption will not occur when data is written to a volume encrypted with Twofish or Serpent while another TrueCrypt volume is mounted (applies also to volumes encrypted using a cascade of ciphers, out of which one is Twofish or Serpent). +* Other minor bug fixes. + + +# 3.0 +December 10, 2004 + +New features: + +* Ability to create and mount a hidden TrueCrypt volume (file container or partition/device). This allows solving situations where the user is forced by an adversary to reveal the password and cannot refuse to do so (for example, due to extortion). + * The principle is that a TrueCrypt volume is created within another TrueCrypt volume (within the free space on the volume). Even when the outer volume is mounted, it is impossible to tell whether there is a hidden volume within it or not, because free space on any TrueCrypt volume is always filled with random data when the volume is created and no part of the hidden volume can be distinguished from random data. + * The password for the hidden volume must be different from the password for the outer volume. To the outer volume, (before creating the hidden volume within it) you should copy some sensitive-looking files that you do NOT really want to hide. These files will be there for anyone who would force you to hand over the password. You will reveal only the password for the outer volume, not for the hidden one. Files that are really sensitive will be stored on the hidden volume. + * As it is very difficult or even impossible for an inexperienced user to set the size of the hidden volume such that the hidden volume does not overwrite any data on the outer volume, the Volume Creation Wizard automatically scans the cluster bitmap of the outer volume (before the hidden volume is created within it) and determines the maximum possible size of the hidden volume. + * For more information, refer to http://www.truecrypt.org/hiddenvolume +* Serpent encryption algorithm (256-bit key) +* Twofish encryption algorithm (256-bit key) +* Forced/"brutal" dismount (allows dismounting a volume containing files being used by the system or an application). +* Cascades of ciphers added (e.g., AES-Twofish-Serpent, AES-Blowfish, etc.) Each of the ciphers in a cascade uses its own encryption key (the keys are mutually independent). +* Ability to mount a TrueCrypt volume that is being used by the system or an application (shared access mode). +* Ability to encrypt devices/partitions that are being used by the system or an application. +* The 'Select Device' dialog and the 'Auto-Mount Partitions' facility now support devices that do not contain any partitions. +* Encryption Algorithm Benchmark facility added to the Tools menu and to the Volume Creation Wizard. +* A warning is displayed if Caps Lock is on when creating a new volume or changing a password. +* When /l is omitted and /a is used, the first free drive letter is used (command line usage) +* New command line option: /force or /f enables forced ("brutal") dismount or mounting in shared mode (i.e., without exclusive access). +* Drive letters are now displayed in the 'Select Device' window. + +Bug fixes: + +* 'Blue screen' errors (system crashes) will not occur when dismounting a volume (remark: this bug also affects E4M). +* The 'Select Device' dialog will display also partitions being used by the system or an application. +* If the size of a partition/device was not a multiple of 1024 bytes, its last sector (512 bytes) was not used for TrueCrypt volume (the volume was 512 bytes shorter than the partition/device). + * Remark: This bug was inherited from E4M, so it applies also to encrypted partitions/devices created by E4M. +* FAT volumes that are exactly 129 MB in size will not have zero size of free space (129-MB FAT volumes created by the previous versions had no free space available). +* Users without administrator privileges can now create file containers under Windows Server 2003. +* Other minor bug fixes. + +Improvements: + +* The timestamp of a container (the date and time that the container was last modified) will not be updated when TrueCrypt accesses the container (i.e., after dismounting, creating a hidden volume within it, or changing the password). +* The TrueCrypt Service is no longer necessary and has been removed because its functions are now handled by the TrueCrypt driver. +* When 'Never save history' is checked, Windows is prevented from saving the file names of the last accessed file containers to the 'Recent Documents' and File Selector history. +* Other minor improvements. + +Miscellaneous: + +* TrueCrypt has been successfully tested on the Windows "Longhorn" operating system (beta version of the future successor to Windows XP). + + +# 2.1a +October 1, 2004 + +Removed Features: + +* IDEA encryption algorithm removed. This allows non-profit and profit organizations to use TrueCrypt without having to obtain a separate license for IDEA (according to the IDEA license, any use of software containing the IDEA algorithm by a non-profit or profit organization is considered as use for commercial purposes, and is subject to a license from MediaCrypt AG). + * Important: TrueCrypt volumes encrypted using the IDEA encryption algorithm cannot be mounted using TrueCrypt 2.1a. If you have such a volume, before upgrading to TrueCrypt 2.1a, please create a new TrueCrypt volume using a cipher other than IDEA and move your files to this new volume. + + +# 2.1 +June 21, 2004 + +New features: + +* RIPEMD-160 hash algorithm added. The user can now select which hash algorithm TrueCrypt will use (SHA-1 or RIPEMD-160). + * Note: RIPEMD-160, which was designed by an open academic community, represents a valuable alternative to SHA-1 designed by the NSA and NIST. In the previous versions there was a risk that the whole program would be practically useless, should a major weakness be found in SHA-1. The user-selected hash algorithm is used by the random number generator when creating new volumes, and by the header key derivation function (HMAC based on a hash function, as specified in PKCS #5 v2.0). The random number generator generates the master encryption key, salt, and the values used to create IV and 'whitening' values. +* When changing a volume password, the user can now select the HMAC hash algorithm that will be used in deriving the new volume header key. +* It is now possible to create NTFS TrueCrypt volumes and unformatted TrueCrypt volumes. This enhancement also removes the 2048 GB volume size limit. (Only FAT volumes can be created using the previous versions of TrueCrypt. Any FAT volume, encrypted or not, cannot be over 2048 GB.) +* Header key content is now displayed in the Volume Creation Wizard window (instead of salt). +* Random pool, master key, and header key contents can be prevented from being displayed in the Volume Creation Wizard window. + +Bug fixes: + +* When there is a mounted TrueCrypt container that is stored in another TrueCrypt container, it will be possible to dismount both of them using the 'Dismount All' function, and 'blue screen' errors will not occur upon system shutdown. +* Minor bug fixes to command line handling. + +Improvements: + +* Several minor improvements to the driver. + + +# 2.0 +June 7, 2004 + +Bug fixes: + +* Data corruption will no longer occur when a TrueCrypt partition is subjected to heavy parallel usage (usually when copying files to or from a TrueCrypt partition). This also fixes the problem with temporarily inaccessible files stored in TrueCrypt partitions. + * Note: File-hosted volumes were not affected by this bug. +* After dismounting and remounting a volume, its file system will be correctly recognized by the operating system and it will be possible to reuse the same drive letter (Windows 2000 issue). +* The main program window will not be displayed when run in quiet mode (command line usage). +* Two password entry attempts are no longer necessary to be able to mount a volume (command line usage). +* All partitions will be visible to TrueCrypt even if one of them is inaccessible to the operating system (an inaccessible partition made all successive partitions on the hard disk unavailable to TrueCrypt). +* Relative path can be specified when mounting a file-hosted volume (command line usage). +* Incorrect passwords are reported when auto-mounting (command line usage). + +New features: + +* AES-256 (Rijndael) encryption algorithm. +* The command line option /dismountall was renamed to /dismount which can now be also used to dismount a single volume by specifying its drive letter. + +Improvements: + +* Memory pages containing TrueCrypt volume encryption keys and whitening seeds are now locked to prevent them from being swapped to the Windows page file. +* The state of the random pool will never be exported directly so the pool contents will not be leaked (remark: this bug also affects E4M). + + +# 1.0a +February 3, 2004 + +Removed features: + +* TrueCrypt no longer supports Windows 98/ME. + + +# 1.0 +February 2, 2004 + +Note: TrueCrypt 1.0 is based on E4M (Encryption for the Masses). Therefore, the following list contains differences between E4M 2.02a and TrueCrypt 1.0 (minor differences have been omitted). + +Improvements: + +* Windows XP/2000 support. +* The maximum volume size is 18,446,744,073 GB. + * Note: File system, hardware connection standard, and operating system limitations have to be taken into account when determining maximum volume size. +* Plausible deniability. It is impossible to identify a TrueCrypt container or partition. Until decrypted, a TrueCrypt volume appears to consist of nothing more than random data (it does not contain any "signature"). Therefore, it should be impossible to prove that a file, a partition or a device is a TrueCrypt volume and/or that it has been encrypted. To achieve plausible deniability, the format of the volume and the encryption process had to be significantly changed. +* The salt is 64 bytes long now. +* The iteration count of the key derivation function increased to 2,000. +* Free space is filled with random data during volume creation, instead of filling it with zeroes. This reduces the amount of predictable plaintext and, in future, will increase the level of plausible deniability of hidden volumes. +* Up to 32 partitions per physical disk drive can be encrypted now. (Windows XP/2000) +* The minimum volume password length has been increased to 12 characters. +* The maximum volume password length has been decreased from 100 to 64 characters. This was necessary to avoid the following: When a password longer than 64 characters was passed to HMAC-SHA-1, the whole password was first hashed using SHA-1 and the resultant 160-bit value was then used instead of the original password (which complies with HMAC-SHA-1 specification), thus the password length was in fact reduced. + +Bug fixes: + +* Sector scrambling algorithm flaw fixed. Two or more disk sectors to be encrypted consisting of the same values (e.g. filled with zeroes), after being encrypted by E4M, start with the same 8-byte sequence of values (i.e. the first eight bytes of any of these encrypted sectors contain the same values as the first eight bytes of any other of these encrypted sectors). If this had not been fixed, the plausible deniability would not have been possible. +* TrueCrypt volumes can be dismounted (Windows XP issue). +* "Blue screen" errors no longer occur during Windows shutdown when there is one or more mounted TrueCrypt volumes. +* Drive geometry is calculated correctly now (chkdsk.exe and format.exe do not fail anymore). +* A TrueCrypt volume can be reformatted as FAT32 or NTFS using the Windows built-in format tool (Windows XP/2000 issue). +* Windows Check Disk can now be used on TrueCrypt volumes (Windows XP/2000 issue). +* Windows Disk Defragmenter can now be used on encrypted volumes (Windows XP/2000 issue). + +New features: + +* New IV (initialization vector) generation algorithm (see the documentation for more information). +* Every 8 bytes of each sector (after the sector is encrypted) are XORed with a random 64-bit value, which is unique to each sector and volume (sector is 512 bytes long). This makes obtaining a plaintext/ciphertext pair a bit more difficult. +* New function to clear the volume history. +* When selecting a partition/device, the sizes and file system types of available partitions/devices are displayed. (Windows XP/2000) +* List of mounted TrueCrypt volumes now contains their sizes and encryption algorithms used. (Windows XP/2000) +* Free volume space is reported (in 'My Computer' list etc.) +* Windows XP format facilities do not support formatting volumes larger than 32 GB as FAT32. However, with TrueCrypt Volume Creation Wizard it is now possible to create FAT32 volumes larger than 32 GB. +* New function that allows multiple TrueCrypt partitions to be mounted provided that their correct password(s) has/have been entered (this includes the cached passwords, if there are any). +* Quick format (partitions/devices only) +* Cluster size selection (when creating new volumes) +* Volume properties can now be examined (encryption algorithm, volume creation time, last password change time etc.) +* New function to dismount all mounted TrueCrypt volumes. +* New command line options to dismount all mounted TrueCrypt volumes: /d and /dismountall +* HMAC-SHA1 and CRC-32 algorithm tests are now included in the self-test facility. +* Program menu and Preferences window added. +* Custom user interface fonts supported. +* Optionally, the TrueCrypt installer can now create System Restore points (Windows XP/ME). +* Password input field is wiped after a correct volume password has been entered. +* New graphics, icons, user interface. +* New documentation. + +Removed features: + +* E4M and SFS volumes are no longer supported. +* DES cipher removed. +* HMAC-MD5 removed (to be replaced by HMAC-RIPEMD-160). diff --git a/doc/ennead-interview.md b/doc/ennead-interview.md new file mode 100644 index 0000000..2cfcfb1 --- /dev/null +++ b/doc/ennead-interview.md @@ -0,0 +1,107 @@ +I found [an interview with ennead](http://www.wolfmanzbytes.com/windows/70-truecrypt-encryption.html) (one of the TrueCrypt developers) while I was googling around. It's very interesting and I haven't been able to find anything like it. + +--- + +## TrueCrypt Encryption + +Saturday, 10 September 2005 23:22 | Written by WolfManz611 + +This program i picked up a few days ago off of SourceForge . + +Some encryption programs i have tried out have been single file encryption of they could do a folder of files. TrueCrypt does that as well as it can do entire hard drives. Along with being able to encrypt drives on the fly it can also basicly emulate a drive in a single file. So for example i may only have a few text files or the like that need encrypting and to encrypt a small section of my drive isn't worth doing. However with TrueCrypt not only can i encrypt my hard drive i can also setup what is known as a container. + +This container or file however you want to look at it gets mounted when you take the file and drop it on the TrueCrypt icon. When i say mounted i mean mounted as in a virtual drive. You will see the new drive/file mounted in your explorer. You can do all the same things with this virtual drive that you can do with a real drive except with this one when you close down TrueCrypt.exe file the drive is unmounted and is no longer there to be accessed. This file over time under heavy use will need to be defragmented just as you would a normal drive. + +Once you have a encrypted drive setup you can also put hidden encrypted files into it. These encrypted files have a different password then the main encrypted file they are sitting in. This allows you to setup up a dummy encrypted drive that is made to look good with fake secrete files while you have the real file in the same encrypted drive but is unseen and does not show up. + +The program it self is really easy to use , in fact i doubt you could get something easier to use then this program. This program does not have a password recovery option witch means if you loose your password to a encrypted drive or container your shit out of luck. For this very reason make sure you make a password you will not forget. It should also go without saying that with any encryption program its only as strong as your password. So if you have a easy to to guess password or one thats not very random it wont take long for that to be cracked if your files end up in the wrong hands. + +Also unlike some programs that are based of a single encryption routine this program has several that you can pick from. If you look in the documentation for this program you will see a run down of the various encryption routines. I choose the default one.. + +Note: With any encryption program you use you have to make sure your machine is clean prior to you using the software. If you have a trojan on your machine or a key logger then this program or any encryption program will be of no use to you. Same goes for a encryption programs using keyfiles if you have a trojan on your machine you can bet the attacker will have full access to your hard drive and your system. + +If any of you users out there do know of a encryption program that takes keyloggers and trojans into account please let me know i would like to see the software. I think the trojan / key logger is a serious problem that needs to be addressed in any encryption program. Its to easy now a days to have virus scanners and the like and yet still be infected with some unknown trojan do to the latest hole in a IE. + +Overall though this program is a nice program and really easy to use below is a interview i had with one of the lead developers of the program enjoy.. + +--- + +**WolfManz611:** Whats your position in the TrueCrypt project? + +**Ennead:** I'm 29 and my main project roles are the following: Project Administrator, Developer, and Designer. I am also responsible for the documentation and the website. + +**WolfManz611:** How much time have you spent on the TrueCrypt project getting it to where it is today and how many developers are working on it? + +**Ennead:** There are currently two main developers (who are also the project administrators) working on TrueCrypt. As for how much time we have spent on the project, I think quite a lot. We usually take a short break after a major release (unless there are major issues that need to be resolved immediately) and then begin working on a new version. A considerable portion of our time is devoted to the work on the project. + +**WolfManz611:** What types of users is a program like this aimed at? + +**Ennead:** That's a good question. We're constantly trying to balance things out. On one side you have inexperienced users who require maximum ease of use, simplicity and nice user interface, and on the other side you have "power" users who require sometimes very obscure features, which can scare or confuse inexperienced users. What we're trying to do is find some compromise to satisfy both sides. + +Furthermore, there are single-user (home) vs. multi-user (corporations) issues. For instance, corporations ask us to implement "back-door" access capability in case an employee forgets his or her passphrase, etc. In this respect, our software is aimed more at single users. Despite this, from the emails we receive we know that there are many corporations and government organizations that use TrueCrypt. + +**WolfManz611:** Does this program take any kind of counter measures to foil things like keyboard loggers looking for passwords? + +**Ennead:** TrueCrypt currently does not offer any active protection against malevolent software. We believe that is the role of anti-virus software. As for keyloggers, the best protection against them will be to use keyfiles. We have already implemented support for keyfiles and the new version should be released soon. + +**WolfManz611:** To give the average user a idea of how good the encryption routines are the program uses under the default encryption and assuming the user had used a 20 char mixed password how long would it take to break the encryption with a room full of high end computers? + +**Ennead:** I won't tell you exact figures but I can give you an estimate. 20 randomly chosen ASCII characters are roughly equal to a 128-bit key. Let's assume that a single high-end computer is capable of testing 100 TrueCrypt passwords per second. If we link 10,000 such computers together, we will be able to test 1,000,000 passwords per second. Hence, it would take 5395141535403007094485264 years on average to find the correct password. + +Note that the above figure is only valid if the password is truly random. If it consisted of words found in a dictionary, pet names, dates of birth, phone numbers, and so forth, it might take less time to find the correct password (brute force attack can be optimized). It is very important to choose a good password. + +**WolfManz611:** I noticed you can save passwords to driver memory why save passwords their as opposed to normal memory? + +**Ennead:** One of the reasons for that was to allow passwords to be cached even when the TrueCrypt application exits. The driver is independent of the TrueCrypt.exe application. + +**WolfManz611:** Is the password in the driver memory retained after a computer restart or power off? + +**Ennead:** No, the TrueCrypt driver is shut down when you restart Windows. + +**WolfManz611:** Do you think more programs today such as say e-mail clients and the like should use some sort of encryption on their settings and any messages they may keep around? + +**Ennead:** Yes, of course. More and more people are beginning to realize that their privacy is something they should safeguard. If your favorite e-mail client does not support encryption, it should at least allow you to configure it in a way that all sensitive files it works with are stored on a TrueCrypt volume (i.e. encrypted on-the-fly). + +**WolfManz611:** What are the minimum requirements for your program to work properly? + +**Ennead:** I don't think that TrueCrypt is very demanding in this respect. It requires only a few megabytes of free memory and about one megabyte of free disk space. + +**WolfManz611:** Do you think do to the way people are getting hacked now a days that the majority of people should employ a program like TrueCrypt to keep their information out of hackers hands? + +**Ennead:** Well, if the operating system is infected, then TrueCrypt will not prevent hackers from gaining access to files on a TrueCrypt volume that you mount under the OS. Using some decent anti-virus software is definitely recommended. + +**WolfManz611:** Are you guys working on a Linux version and if so hows that coming along? will it be the same as in features as the windows one or better? + +**Ennead:** Yes, while I am currently working on the Windows version, Syncon is finishing the work on a Linux version. It has been in alpha testing for several weeks and it appears to be very stable. + +Initially, the two versions will not be equal. For instance, there will be no GUI for the Linux version. However, in future, both versions should be pretty much equal. + +**WolfManz611:** How popular is this program and how many users as a guess do you think use the program or have downloaded it? + +**Ennead:** According to SourceForge.net statistics and our server logs, about a quarter million people have downloaded TrueCrypt 3.1a so far. There are also many entities, such as the Chip magazine, that host our files on their own servers, so it is actually impossible to estimate how many people have downloaded TrueCrypt. + +**WolfManz611:** What programing language is the program in? + +**Ennead:** The entire source code is in C except the Serpent routines, which are in assembly. As our aim is to make the source code cross-platform, we plan to replace the assembly code with code written in C entirely. + +**WolfManz611:** Do you have any big features you want to implement in the future if so what are they? + +**Ennead:** Yes, we do. But it wouldn't be a surprise if we told you! + +**WolfManz611:** How problematic is the windows swap file for a program like this? Does the windows swap file only come into play when witting a file back to the encrypted container or drive or does the swap file compromise files even when reading files from a container or encrypted drive? + +**Ennead:** Whenever you open a file stored on a TrueCrypt volume in a program (for example, in a text editor), portion of the file is decrypted in RAM and passed to the program who requested it. TrueCrypt uses the non-paged pool to store cached passwords, encryption keys, IVs and other sensitive volume data, so this data cannot be leaked to paging files. However, TrueCrypt cannot prevent the contents of sensitive files that are opened in RAM from being saved unencrypted to a paging file. Therefore, we strongly recommend that users disable the paging file feature, at least for each session during which they work with sensitive data. + +**WolfManz611:** Do you plan on doing other projects that involve encryption such as a e-mail plug in that are easy to use? + +**Ennead:** As regards encryption software, we will probably stay with the on-the-fly disk encryption model, which we consider the most effective. + +**WolfManz611:** How does source forge do for your program? does it give you lots of downloads and exposure? + +**Ennead:** Well, I estimate that about 5% of TrueCrypt users might have discovered TrueCrypt via SourceForge.net. Overall, SourceForge services are great, but there are things that could be improved. For instance, the security of their web services and performance of their MySQL servers, which were among the reasons why we decided to move the site and forums to our own dedicated server. + +--- + +That was a good interview , i would like to thank Ennead for his time to do this interview. Now if you want to download the latest version of TrueCrypt head on over to their web site and grab a copy. The program by the way is open source and is free. + +WolfManz611.. \ No newline at end of file diff --git a/licenses/License-E4M.TXT b/licenses/License-E4M.TXT deleted file mode 100644 index 6c63a92..0000000 --- a/licenses/License-E4M.TXT +++ /dev/null @@ -1,56 +0,0 @@ -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. - diff --git a/licenses/License-v1.0.txt b/licenses/License-v1.0.txt deleted file mode 100644 index 58bc27f..0000000 --- a/licenses/License-v1.0.txt +++ /dev/null @@ -1,194 +0,0 @@ -TRUECRYPT LICENSE - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. - -8. Where applicable, the specific licenses attached to parts of the source -code might take precedence over this general license. - -9. The IDEA cipher described in U.S. patent number 5,214,703 requires a -separate license from Ascom Tech AG for commercial use. IDEA is a trademark -of Ascom Tech AG. - -10. If you use any part of the source code by Dr. Brian Gladman in your -project, you must follow his terms and conditions. - -11. If you use any part of the source code by Markus Friedl in your project, -you must follow his terms and conditions. - -12. This product contains no mechanism or facility that would allow partial -or complete recovery of your data without knowing the correct password or -the key used to encrypt the data. - -Portions of this software are: -Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved. -Copyright (c) 2004 TrueCrypt Team. All Rights Reserved. -Copyright (c) 2004 TrueCrypt Foundation. All Rights Reserved. -Copyright (c) 1995-1997 Eric Young. All Rights Reserved. -Copyright (c) 1992-1999 Masayasu Kumagai, Paulo Barreto, Peter Gutmann. -Copyright (c) 2003 Dr. Brian Gladman, Worcester, UK. All Rights Reserved. -Copyright (c) 2001 Markus Friedl. All Rights Reserved. -For more information, see the legal notices attached to parts of the source code. -This is a TrueCrypt Foundation release. - -END OF GENERAL LICENSE - - -Component Legal Notices: -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.0.txt b/licenses/License-v2.0.txt deleted file mode 100644 index 3d1e94e..0000000 --- a/licenses/License-v2.0.txt +++ /dev/null @@ -1,385 +0,0 @@ -TrueCrypt License Version 2.0 - - -I. Definitions - -1. "This product" means the parts of the computer software, including, but not -limited to, source code, texts, graphics, and any accompanying files, released -under and covered by this version of this License. - -2. "You" (or "your") means an individual or a legal entity (e.g., a non-profit -organization, commercial organization, government agency, etc.) exercising -permissions granted by this License. - - - -II. Terms and Conditions for Copying, Distribution, and Use - -1. You may copy and/or distribute this product without any restrictions, -provided that the product is not modified and that it is not repackaged (for -terms and conditions for copying and distribution of modified or repackaged -versions of this product, see Section III.) - -2. You may use this product freely (see also Section III.) on single or -multiple computers/systems for non-commercial and/or commercial uses. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. You may modify this product (this also covers implementation of new -features/functionalities, translation into another language, and porting to -another platform), derive new works from this product, include/use this product -or its portion in (or as part of) your product, and you may copy and distribute -such modifications, derivative or aggregated works as your product, provided -that the following conditions are met (for exceptions, see Sections III.2. -and III.3.): - - a. Your product or the modified version must not be called TrueCrypt and - its name must not contain the name TrueCrypt (for example, the following - names are not allowed: TrueCrypt+, TrueCrypt Professional, etc.) nor any of - its variations that can be easily confused with the name TrueCrypt (e.g., - Truecrypt, True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) - - Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not - to monetize the name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of issues that - might arise from the existence of similar products with the same or similar - name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain - open-source and free software. - - b. The following phrases must be removed from the "About" dialog (the - credits), from this License (Section VI.), and from any other accompanying - materials: - "A TrueCrypt Foundation Release" - "Released by TrueCrypt Foundation" - "This is a TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt" must be displayed by your product (if - technically feasible) or by the modified version and contained in its - documentation. Alternatively, if this product or its portion you included - in your product comprise only a minor portion of your product, phrase - "Portions of this product are based in part on TrueCrypt" may be used - instead. - - d. Complete source code of your product or of the modified version must be - freely and publicly available. If the source code is not included with - every copy of your product/modifications, there must be a well-publicized - means of obtaining the source code, preferably, downloading via the - Internet without charge. The source code must not be deliberately - obfuscated, and it must not be in an intermediate form (e.g., the output of - a preprocessor). Source code means the preferred form in which a programmer - would usually modify the program. - - e. The license and distribution terms of no part of this product may be - changed (i.e., no part of this product can be put under another license), - except as expressly permitted or required by this License. The legal - notices contained in the source code files must be retained. It must be - clearly declared that this product or its parts are distributed under the - TrueCrypt License (contained herein), and it must be clearly and visibly - stated in the distribution where the text of the TrueCrypt License can be - found (you may amend the references to the file 'License.txt' in the source - code accordingly). The text of the TrueCrypt License must accompany (be - distributed along with) your product/modifications. (Any of the Component - Legal Notices contained below in this file may be omitted if the component - to which it pertains is not used. If no cryptographic components of this - product are used, Section IV.3. may be omitted as well.) - - -2. You are not obligated to comply with Sections III.1.a., III.1.b., III.1.c., -and III.1.d. if at least one of the following conditions is met: - - a. You include this product in its entirety and without any modifications - in an operating system distribution (i.e., you include binaries obtained by - compiling the unmodified source code of this product and/or you include the - unmodified contents of the source code distribution archive and/or of the - binary distribution archive). - - b. You include this product in its entirety (the contents of either the - source code distribution archive and/or of the binary distribution archive) - and without any modifications as non-integral part of your product (i.e., - the main functionality of your product will not be affected if such - non-integral part is removed) and phrase "This product utilizes TrueCrypt" - or "This product includes TrueCrypt" is displayed by your product (if - technically feasible) and contained in its documentation. - - -3. You are not obligated to comply with Section III.1.d. if at least one of the -following conditions is met: - - a. Your product/modifications (as defined in Section III.1.) are not - distributed (i.e., your product/modifications are available only to you). - - b. Your product/modifications (as defined in Section III.1.) are - distributed and used only internally within the organization and only by - members/employees of the organization for which you created the - product/modifications and of which you were a member/employee when you - created the product/modifications. (Here the word "organization" means - a non-commercial or commercial organization, or a government agency.) - - - -IV. Disclaimer of Warranties and Liabilities - -1. AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT -PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED -"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, -BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR -A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE -PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL -ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR DISTRIBUTE THE -PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR -INABILITY TO USE THE PROGRAM, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR -DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A -FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER -OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -3. THIS PRODUCT INCORPORATES CRYPTOGRAPHIC ALGORITHMS THAT MAY BE REGULATED OR -ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT -IS LEGAL TO IMPORT AND/OR EXPORT AND/OR USE THIS PRODUCT IN COUNTRIES WHERE YOU -INTEND TO USE THIS PRODUCT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM -WHICH YOU INTEND TO EXPORT IT. - - - -V. General Terms - -1. Where applicable, the component licenses contained in parts of the source -code and quoted below herein (Section "Component Legal Notices") might take -precedence over the TrueCrypt License. - -2. This product is provided under the terms of this license (agreement). Any -use, reproduction, distribution, or modification of this product or any of its -parts constitutes recipient's acceptance of this agreement. - -3. You may not modify, copy, distribute, or sublicense this product except as -expressly provided under this License. Any attempt otherwise to modify, copy, -distribute, or sublicense this product automatically terminates your rights -under this License. - -4. If any of the license terms is found to be too broad in scope, and/or -declared invalid by any court or legal process, you agree that all other terms -shall not be so affected, and shall remain valid and enforceable. - - - -VI. Copyright and Trademark Information - -TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not to -monetize the name or the product, but to protect the reputation of TrueCrypt, -and to prevent support issues and other kinds of issues that might arise from -the existence of similar products with the same or similar name. Even though -TrueCrypt is a trademark, TrueCrypt is and will remain open-source and free -software. All other trademarks are the sole property of their respective -owners. - -Portions of this software are: -Copyright (c) TrueCrypt Foundation. All Rights Reserved. -Copyright (c) Paul Le Roux. All Rights Reserved. -Copyright (c) TrueCrypt Team. All Rights Reserved. -Copyright (c) Eric Young. All Rights Reserved. -Copyright (c) Dr. Brian Gladman, Worcester, UK. All Rights Reserved. -Copyright (c) Markus Friedl. All Rights Reserved. - -For more information, please see the legal notices attached to parts of the -source code. - -Graphics (logos, icons, etc.) are Copyright (c) TrueCrypt Foundation - - - -COMPONENT LEGAL NOTICES - -Each of the following component licenses applies only to (portions of) the -source code file(s) in which the component license is contained or in which it -is explicitly referenced, and to compiled or otherwise processed forms of such -source code. In other words, none of the following licenses applies to this -product as a whole, even when it uses the term "this product" or any other -equivalent term. -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -This is an independent implementation of the encryption algorithm: - - Twofish by Bruce Schneier and colleagues - -which is a candidate algorithm in the Advanced Encryption Standard -programme of the US National Institute of Standards and Technology. - -Copyright in this implementation is held by Dr B R Gladman but I -hereby give permission for its free direct or derivative use subject -to acknowledgment of its origin and compliance with any conditions -that the originators of the algorithm place on its exploitation. - -My thanks to Doug Whiting and Niels Ferguson for comments that led -to improvements in this implementation. - -Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.1.txt b/licenses/License-v2.1.txt deleted file mode 100644 index f88aad8..0000000 --- a/licenses/License-v2.1.txt +++ /dev/null @@ -1,411 +0,0 @@ -TrueCrypt Collective License Version 1.0 - - -The TrueCrypt Collective License consists of several distinct licenses, which -are contained in this document (separated by lines consisting of underscores) -and which are, in this section, referred to as component licenses. Each of the -component licenses applies only to (portions of) the source code file(s) in -which the component license is contained or in which it is explicitly -referenced, and to compiled or otherwise processed forms of such source code. -None of the component licenses applies to this product as a whole, even when it -uses the phrase "this product" or any other equivalent term/phrase. Unless -otherwise stated, graphics and files that are not part of the source code are -covered solely by the TrueCrypt License. -Note: The TrueCrypt License is one of the component licenses of which the -TrueCrypt Collective License consists. - -Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any -part(s) of work made available under this version of the TrueCrypt Collective -License, is, by such action(s), accepting in full the responsibilities and -obligations contained in the component licenses that apply to the corresponding -part(s) of such work. - -If any term of this license is found to be invalid or unenforceable under -applicable law, it shall not affect the validity or enforceability of any other -terms of this license that are found to be valid and enforceable under -applicable law. - -____________________________________________________________ - -TrueCrypt License Version 2.1 - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, source code, -graphics, texts, and accompanying files) made available under and covered by -this version of this License, as indicated by a copyright notice attached to or -included in the work. - -2. "You" (or "Your") means an individual or a legal entity (e.g., a non-profit -organization, commercial organization, government agency, etc.) exercising -rights under this License. - -3. "Modification" means any alteration of This Product, including, but not -limited to, addition to or deletion from the substance or structure of This -Product, and translation into another language. - -4. "Your Product" means This Product modified by You, any work You derive from -(or base on) This Product, any work in which You include This Product, or any -respective part(s) thereof. - - - -II. Terms and Conditions for Use, Reproduction, and Distribution - -1. You may copy and/or distribute This Product, provided that You do not modify -any part of This Product (for terms and conditions for reproduction and -distribution of modified versions of This Product, see Section III) and -provided that You ensure that all the legal notices and documents (containing, -e.g., the text of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that you make and -distribute. - -2. You may use This Product freely (see also Section III) on any number of -computers/systems for non-commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. You may modify This Product (thus forming Your Product), derive new works -from This Product or portions thereof (thus forming Your Product), include This -Product or portions thereof in another product (thus forming Your Product), and -You may copy and/or distribute Your Product, only if the following conditions -are met (for exceptions, see Sections III.2 and III.3): - - a. The name of Your Product (or of Your modified version of This Product) - must not contain the name TrueCrypt (for example, the following names are - not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, - etc.) nor any of its variations that can be easily confused with the name - TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) - - Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not - to monetize the name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of issues that - might arise from the existence of similar products with the same or similar - name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain - open-source and free software. - - b. The following phrases must be removed from Your Product: - "A TrueCrypt Foundation Release" - "Released by TrueCrypt Foundation" - "This is a TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product (if - technically feasible) and contained in its documentation. Alternatively, if - This Product or its portion You included in Your Product comprises only a - minor portion of Your Product, phrase "Portions of this product are based - in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be - displayed instead. In each of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) - pointing to http://www.truecrypt.org/ and you may freely choose the - location within the user interface (if there is any) of Your Product (e.g., - an "About" window, etc.) and the way in which Your Product will display the - respective phrase. - - d. The complete source code of Your Product must be freely and publicly - available (for exceptions, see Section III.3) at least until you cease to - distribute Your Product. To meet this condition, it is sufficient that You - merely include the source code with every copy of Your Product that you - make and distribute; it is also sufficient that You merely include - information (valid and correct at least until you cease to distribute Your - Product) about where the source code can be freely obtained (e.g., an - Internet URL, etc.) with every copy of Your Product that you make and - distribute. The source code must not be deliberately obfuscated, and it - must not be in an intermediate form (e.g., the output of a preprocessor). - Source code means the preferred form in which a programmer would usually - modify the program. - - e. You must not change the license and distribution terms of This Product - (i.e., no part of This Product may be put under another license), except as - expressly permitted or required by this License. You must keep intact all - the legal notices contained in the source code files. You must include the - following items with every copy of Your Product that you make and - distribute: a clear and conspicuous notice stating that Your Product or - portion(s) thereof is/are distributed under this version of the TrueCrypt - License, a verbatim copy of this version of the TrueCrypt License (as - contained herein), a clear and conspicuous notice containing information - about where the included copy of the License can be found, and an - appropriate copyright notice. - - f. You must not use the name of This Product, names of its authors, or the - names of the legal entities (or informal groups) of which the authors - were/are members/employees, to endorse or promote Your Product without - specific prior written permission from the authors of This Product. - - -2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, -III.1.d, and III.1.f, if all conditions specified in one of the two following -paragraphs are met: - - a. Your Product is an operating system distribution, or other aggregate - software distribution (such as a cover CD-ROM of a magazine) containing - products from different sources, in which You include either This Product - without any modifications or file(s) which You obtain by compiling the - unmodified source code of This Product. - - b. You include This Product in its entirety and without any modifications - (You may omit the source code of This Product) as non-integral part of Your - Product (i.e., none of the main functionalities of Your Product will be - affected if such non-integral part is removed) and phrase "This product - utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or - phrase "This product includes TrueCrypt, freely available at - http://www.truecrypt.org/" is displayed by Your Product (if technically - feasible) and contained in its documentation. In each of the cases - mentioned above in this paragraph, "http://www.truecrypt.org/" must be a - hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ - and you may freely choose the location within the user interface (if there - is any) of Your Product (e.g., an "About" window, etc.) and the way in - which Your Product will display the respective phrase. - - -3. You are not obligated to comply with Section III.1.d if Your Product is not -distributed (i.e., Your Product is available only to You). - - - -IV. Disclaimer of Warranties and Liabilities - -1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE -LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. -SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY -SERVICING, REPAIR OR CORRECTION. - -2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL -ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR -ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR -CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, -INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE -OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO -OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -3. THIS PRODUCT INCORPORATES IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT -MAY BE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR -ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS -SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT -AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE -IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO -EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH -REGULATIONS/RESTRICTIONS. - - - -V. Trademarks - -This License does not grant permission to use trademarks associated with (or -applying to) This Product, except for fair use as defined by applicable law and -except for use expressly permitted or required by this License. - -TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. -Note: The goal is not to monetize the name or the product, but to protect the -reputation of TrueCrypt. TrueCrypt is and will remain open-source and free -software. - - - -VI. General Terms - -1. You may not modify, copy, distribute, or sublicense This Product except as -expressly provided under this License. Any attempt otherwise to modify, copy, -distribute, or sublicense This Product automatically terminates Your rights -under this License. - -2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes -This Product, or any part(s) thereof, is, by such action(s), accepting in full -the responsibilities and obligations contained in this License. - -3. If any term of this License is found to be invalid or unenforceable under -applicable law, You agree that it shall not affect the validity or -enforceability of any other terms of this License that are found to be valid -and enforceable under applicable law. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 2003, Dr Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -This is an independent implementation of the encryption algorithm: - - Twofish by Bruce Schneier and colleagues - -which is a candidate algorithm in the Advanced Encryption Standard -programme of the US National Institute of Standards and Technology. - -Copyright in this implementation is held by Dr B R Gladman but I -hereby give permission for its free direct or derivative use subject -to acknowledgment of its origin and compliance with any conditions -that the originators of the algorithm place on its exploitation. - -My thanks to Doug Whiting and Niels Ferguson for comments that led -to improvements in this implementation. - -Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.2.txt b/licenses/License-v2.2.txt deleted file mode 100644 index 461cdbb..0000000 --- a/licenses/License-v2.2.txt +++ /dev/null @@ -1,440 +0,0 @@ -TrueCrypt Collective License Version 1.1 - - -The TrueCrypt Collective License consists of several distinct licenses, which -are contained in this document (separated by lines consisting of underscores) -and which are, in this section, referred to as component licenses. Each of the -component licenses applies only to (portions of) the source code file(s) in -which the component license is contained or in which it is explicitly -referenced, and to compiled or otherwise processed forms of such source code. -None of the component licenses applies to this product as a whole, even when it -uses the phrase "this product" or any other equivalent term/phrase. Unless -otherwise stated, graphics and files that are not part of the source code are -covered solely by the TrueCrypt License. -Note: The TrueCrypt License is one of the component licenses of which the -TrueCrypt Collective License consists. - -Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any -part(s) of work made available under this version of the TrueCrypt Collective -License, is, by such action(s), accepting in full the responsibilities and -obligations contained in the component licenses that apply to the corresponding -part(s) of such work. - -If any term of this license is found to be invalid or unenforceable under -applicable law, it shall not affect the validity or enforceability of any other -terms of this license that are found to be valid and enforceable under -applicable law. - -____________________________________________________________ - -TrueCrypt License Version 2.2 - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, source code, -graphics, texts, and accompanying files) made available under and covered by -this version of this License, as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., -a non-profit organization, commercial organization, government agency, etc.) -exercising rights under this License. - -3. "Modification" means (and "modify" refers to) any alteration of This -Product, including, but not limited to, addition to or deletion from the -substance or structure of This Product, and translation into another language. - -4. "Your Product" means This Product modified by You, any work You derive from -(or base on) This Product, any work in which You include This Product, or any -respective part(s) thereof. - -5. "Distribution" means (and "distribute" refers to), regardless of means or -methods, conveyance or transfer of This/Your Product or portions thereof to -third parties, or making This/Your Product or portions thereof available for -download to third parties, regardless of whether any third party downloads the -product (or a portion thereof) made available for download or not. - - - -II. Terms and Conditions for Use, Reproduction, and Distribution - -1. You may copy and/or distribute This Product, provided that You do not modify -any part of This Product (for terms and conditions for reproduction and -distribution of modified versions of This Product, see Section III) and -provided that You ensure that all the legal notices and documents (containing, -e.g., the text of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that you make and -distribute. - -2. You may use This Product freely (see also Section III) on any number of -computers/systems for non-commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. You may modify This Product (thus forming Your Product), derive new works -from This Product or portions thereof (thus forming Your Product), include This -Product or portions thereof in another product (thus forming Your Product), and -You may copy and/or distribute Your Product, only if the following conditions -are met (for exceptions, see Sections III.2 and III.3): - - a. The name of Your Product (or of Your modified version of This Product) - must not contain the name TrueCrypt (for example, the following names are - not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, - etc.) nor any of its variations that can be easily confused with the name - TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) - - Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not - to monetize the name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of issues that - might arise from the existence of similar products with the same or similar - name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain - open-source and free software. - - b. The following phrases must be removed from Your Product and from any - associated materials: - "A TrueCrypt Foundation Release" - "Released by TrueCrypt Foundation" - "This is a TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product (if - technically feasible) and contained in its documentation. Alternatively, if - This Product or its portion You included in Your Product comprises only a - minor portion of Your Product, phrase "Portions of this product are based - in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be - displayed instead. In each of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) - pointing to http://www.truecrypt.org/ and you may freely choose the - location within the user interface (if there is any) of Your Product (e.g., - an "About" window, etc.) and the way in which Your Product will display the - respective phrase. - - Your Product (and any associated materials, e.g., the documentation, the - content of the official web site of Your Product, etc.) must not present - any Internet address containing the domain name truecrypt.org (or any - domain name that forwards to the domain name truecrypt.org) in a manner - that suggests that it is where information about Your Product may be - obtained or where bugs found in Your Product may be reported or where - support for Your Product may be available or otherwise attempt to indicate - that the domain name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely and publicly - available (for exceptions, see Sections III.2 and III.3) at least until you - cease to distribute Your Product. To meet this condition, it is sufficient - that You merely include the source code with every copy of Your Product - that you make and distribute; it is also sufficient that You merely include - information (valid and correct at least until you cease to distribute Your - Product) about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that you make and - distribute. The source code must be available under license(s) that are/is - compatible with this version of the TrueCrypt License and that allow(s) - anyone to modify and derive new works from Your Product (and portions - thereof) and to redistribute such modifications and/or derived works. The - license(s) must be non-exclusive, royalty-free, no-charge, perpetual, and - world-wide. The text of the license(s) must be included with every copy of - Your Product that you make and distribute. The source code must not be - deliberately obfuscated, and it must not be in an intermediate form (e.g., - the output of a preprocessor). Source code means the preferred form in - which a programmer would usually modify the program. - - Note: If you cannot comply with the above requirements, we may grant an - exception under certain conditions. You may request an exception at: - licensing@truecrypt.org - - e. You must not change the license and distribution terms of This Product - in any way (i.e., no part of This Product may be put under another - license). You must keep intact all the legal notices contained in the - source code files. You must include the following items with every copy of - Your Product that you make and distribute: a clear and conspicuous notice - stating that Your Product or portion(s) thereof is/are distributed under - this version of the TrueCrypt License, a verbatim copy of this version of - the TrueCrypt License (as contained herein), a clear and conspicuous notice - containing information about where the included copy of the License can be - found, and an appropriate copyright notice. - - f. Without specific prior written permission from the authors of This - Product (or from their common representative), you must not use the name of - This Product, the names of the authors of This Product, or the names of the - legal entities (or informal groups) of which the authors were/are - members/employees, to endorse or promote Your Product, or in a way that - suggests that Your Product is endorsed by one or more authors of This - Product, or in a way that suggests that one or more authors of This Product - directly participated in the creation of Your Product. - - -2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and -III.1.d, if all conditions specified in one of the two following paragraphs are -met: - - a. Your Product is an operating system distribution, or other aggregate - software distribution (such as a cover CD-ROM of a magazine) containing - products from different sources, in which You include either This Product - without any modifications or file(s) which You obtain by compiling the - unmodified source code of This Product. - - b. You include This Product in its entirety and without any modifications - (You may omit the source code of This Product) as non-integral part of Your - Product (i.e., none of the main functionalities of Your Product will be - affected if such non-integral part is removed) and phrase "This product - utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or - phrase "This product includes TrueCrypt, freely available at - http://www.truecrypt.org/" is displayed by Your Product (if technically - feasible) and contained in its documentation. In each of the cases - mentioned above in this paragraph, "http://www.truecrypt.org/" must be a - hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ - and you may freely choose the location within the user interface (if there - is any) of Your Product (e.g., an "About" window, etc.) and the way in - which Your Product will display the respective phrase. - - -3. You are not obligated to comply with Section III.1.d if Your Product is not -distributed (i.e., Your Product is available only to You). - - - -IV. Disclaimer of Warranties and Liabilities - -1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE -LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. -SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY -SERVICING, REPAIR OR CORRECTION. - -2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL -ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR -ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR -CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, -INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE -OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO -OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS -THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR -ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS -SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT -AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE -IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO -EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH -REGULATIONS/RESTRICTIONS. - - - -V. Trademarks - -This License does not grant permission to use trademarks associated with (or -applying to) This Product, except for fair use as defined by applicable law and -except for use expressly permitted or required by this License. - -TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. -Note: The goal is not to monetize the name or the product, but to protect the -reputation of TrueCrypt. TrueCrypt is and will remain open-source and free -software. - - - -VI. General Terms - -1. You may not use, modify, reproduce, (re)distribute, or sublicense This -Product except as expressly provided under this License. Any attempt otherwise -to use, modify, reproduce, (re)distribute, or sublicense This Product -automatically terminates Your rights under this License. - -2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes -This Product, or any part(s) thereof, is, by such action(s), accepting in full -the responsibilities and obligations contained in this License. - -3. If any term of this License is found to be invalid or unenforceable under -applicable law, You agree that it shall not affect the validity or -enforceability of any other terms of this License that are found to be valid -and enforceable under applicable law. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -This is an independent implementation of the encryption algorithm: - - Twofish by Bruce Schneier and colleagues - -which is a candidate algorithm in the Advanced Encryption Standard -programme of the US National Institute of Standards and Technology. - -Copyright in this implementation is held by Dr B R Gladman but I -hereby give permission for its free direct or derivative use subject -to acknowledgment of its origin and compliance with any conditions -that the originators of the algorithm place on its exploitation. - -My thanks to Doug Whiting and Niels Ferguson for comments that led -to improvements in this implementation. - -Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.3.txt b/licenses/License-v2.3.txt deleted file mode 100644 index 582a808..0000000 --- a/licenses/License-v2.3.txt +++ /dev/null @@ -1,474 +0,0 @@ -TrueCrypt Collective License Version 1.2 - - -The TrueCrypt Collective License consists of several distinct licenses, which -are contained in this document (separated by lines consisting of underscores) -and which are, in this section, referred to as component licenses. Each of the -component licenses applies only to (portions of) the source code file(s) in -which the component license is contained or in which it is explicitly -referenced, and to compiled or otherwise processed forms of such source code. -None of the component licenses applies to this product as a whole, even when it -uses the phrase "this product" or any other equivalent term/phrase. Unless -otherwise stated, graphics and files that are not part of the source code are -covered solely by the TrueCrypt License. -Note: The TrueCrypt License is one of the component licenses of which the -TrueCrypt Collective License consists. - -Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any -part(s) of work made available under this version of the TrueCrypt Collective -License, is, by such action(s), accepting in full the responsibilities and -obligations contained in the component licenses that apply to the corresponding -part(s) of such work. - -If any term of this license is found to be invalid or unenforceable under -applicable law, it shall not affect the validity or enforceability of any other -terms of this license that are found to be valid and enforceable under -applicable law. - -____________________________________________________________ - -TrueCrypt License Version 2.3 - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, source code, -graphics, texts, and accompanying files) made available under and covered by -this version of this License, as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., -a non-profit organization, commercial organization, government agency, etc.) -exercising rights under this License. - -3. "Modification" means (and "modify" refers to) any alteration of This -Product, including, but not limited to, addition to or deletion from the -substance or structure of This Product, and translation into another language. - -4. "Your Product" means This Product modified by You, any work You derive from -(or base on) This Product, any work in which You include This Product, or any -respective part(s) thereof. - -5. "Distribution" means (and "distribute" refers to), regardless of means or -methods, conveyance or transfer of This/Your Product or portions thereof to -third parties, or making This/Your Product or portions thereof available for -download to third parties, regardless of whether any third party downloads the -product (or a portion thereof) made available for download or not. - - - -II. Terms and Conditions for Use, Reproduction, and Distribution - -1. You may reproduce and/or distribute This Product, provided that You do not -modify any part of This Product (for terms and conditions for reproduction and -distribution of modified versions of This Product, see Section III) and -provided that You ensure that all the legal notices and documents (containing, -e.g., the text of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that you make and -distribute, and provided that you comply with all applicable terms and -conditions of this License. - -2. Provided that you comply with all applicable terms and conditions of this -License, You may use This Product freely (see also Section III) on any number -of computers/systems for non-commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. If all conditions specified in the following paragraphs in this Section are -met (for exceptions, see Sections III.2 and III.3), You may modify This Product -(thus forming Your Product), derive new works from This Product or portions -thereof (thus forming Your Product), include This Product or portions thereof -in another product (thus forming Your Product), and You may copy and/or -distribute Your Product. - - a. The name of Your Product (or of Your modified version of This Product) - must not contain the name TrueCrypt (for example, the following names are - not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, - etc.) nor any of its variations that can be easily confused with the name - TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt - Foundation. The goal is not to monetize the name or the product, but to - protect the reputation of TrueCrypt, and to prevent support issues and - other kinds of issues that might arise from the existence of similar - products with the same or similar name. Even though TrueCrypt and the - TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source - and free software. - - All graphics files showing any TrueCrypt logo (including the non-textual - logo consisting primarily of a key in stylized form) must be removed from - Your Product (or from Your modified version of This Product) and from any - associated materials. Logo(s) included in (or attached to) Your Product - (or in/to associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos or portion(s) thereof. - - b. The following phrases must be removed from Your Product and from any - associated materials: - "A TrueCrypt Foundation Release" - "Released by TrueCrypt Foundation" - "This is a TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product (if - technically feasible) and contained in its documentation. Alternatively, if - This Product or its portion You included in Your Product comprises only a - minor portion of Your Product, phrase "Portions of this product are based - in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be - displayed instead. In each of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) - pointing to http://www.truecrypt.org/ and you may freely choose the - location within the user interface (if there is any) of Your Product (e.g., - an "About" window, etc.) and the way in which Your Product will display the - respective phrase. - - Your Product (and any associated materials, e.g., the documentation, the - content of the official web site of Your Product, etc.) must not present - any Internet address containing the domain name truecrypt.org (or any - domain name that forwards to the domain name truecrypt.org) in a manner - that suggests that it is where information about Your Product may be - obtained or where bugs found in Your Product may be reported or where - support for Your Product may be available or otherwise attempt to indicate - that the domain name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely and publicly - available (for exceptions, see Sections III.2 and III.3) at least until you - cease to distribute Your Product. To meet this condition, it is sufficient - that You merely include the source code with every copy of Your Product - that you make and distribute; it is also sufficient that You merely include - information (valid and correct at least until you cease to distribute Your - Product) about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that you make and - distribute. The source code must be available under license(s) that are/is - compatible with this version of the TrueCrypt License (however, see also - Section III.1.e) and that allow(s) anyone to modify and derive new works - from Your Product (and portions thereof) and to use, reproduce, and - redistribute such modifications and/or derived works. The license(s) must - be non-exclusive, royalty-free, no-charge, perpetual, and world-wide. The - text of the license(s) must be included with every copy of Your Product - that you make and distribute. The source code must not be deliberately - obfuscated, and it must not be in an intermediate form (e.g., the output of - a preprocessor). Source code means the preferred form in which a programmer - would usually modify the program. - - Note: If you cannot comply with the above requirements, we may grant an - exception under certain conditions. You may request an exception at: - licensing@truecrypt.org - - e. You must not change the license and distribution terms of This Product - in any way (i.e., no part of This Product may be put under another - license). You must keep intact all the legal notices contained in the - source code files. You must include the following items with every copy of - Your Product that you make and distribute: a clear and conspicuous notice - stating that Your Product or portion(s) thereof is/are distributed under - this version of the TrueCrypt License, a verbatim copy of this version of - the TrueCrypt License (as contained herein), a clear and conspicuous notice - containing information about where the included copy of the License can be - found, and an appropriate copyright notice. - - f. Without specific prior written permission from the authors of This - Product (or from their common representative), you must not use the name of - This Product, the names of the authors of This Product, or the names of the - legal entities (or informal groups) of which the authors were/are - members/employees, to endorse or promote Your Product, or in a way that - suggests that Your Product is endorsed by one or more authors of This - Product, or in a way that suggests that one or more authors of This Product - directly participated in the creation of Your Product. - - -2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and -III.1.d, if all conditions specified in one of the two following paragraphs are -met: - - a. Your Product is an operating system distribution, or other aggregate - software distribution (such as a cover CD-ROM of a magazine) containing - products from different sources, in which You include either This Product - without any modifications or file(s) which You obtain by compiling the - unmodified source code of This Product. - - b. You include This Product in its entirety and without any modifications - (You may omit the source code of This Product) as non-integral part of Your - Product (i.e., none of the main functionalities of Your Product will be - affected if such non-integral part is removed) and phrase "This product - utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or - phrase "This product includes TrueCrypt, freely available at - http://www.truecrypt.org/" is displayed by Your Product (if technically - feasible) and contained in its documentation. In each of the cases - mentioned above in this paragraph, "http://www.truecrypt.org/" must be a - hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ - and you may freely choose the location within the user interface (if there - is any) of Your Product (e.g., an "About" window, etc.) and the way in - which Your Product will display the respective phrase. - - -3. You are not obligated to comply with Section III.1.d if Your Product is not -distributed (i.e., Your Product is available only to You). - - - -IV. Disclaimer of Warranties and Liabilities; Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE -COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY REPRODUCE AND/OR -(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE -LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED -TO, ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF -THE USE, REPRODUCTION, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A -PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), -INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, LOSSES SUSTAINED BY -YOU OR THIRD PARTIES, OR A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER -PRODUCT, EVEN IF SUCH (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, AND/OR ANY OTHER -PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF -MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. -SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY -SERVICING, REPAIR OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS -THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR -ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT -IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS -THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO -IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND THAT IT IS SOLELY YOUR -RESPONSIBILITY TO COMPLY WITH ANY SUCH REGULATIONS/RESTRICTIONS. - -4. You shall indemnify, defend and hold all (co)authors of This Product, their -agents and associates, and applicable copyright/trademark owners, harmless -from/against any liability, loss, expense, damages, claims or causes of action, -arising out of Your use, inability to use, reproduction, (re)distribution, -import and/or (re)export of This Product (or portions thereof) and/or Your -breach of any term of this License. - - - -V. Trademarks - -This License does not grant permission to use trademarks associated with (or -applying to) This Product, except for fair use as defined by applicable law and -except for use expressly permitted or required by this License. - -TrueCrypt and the TrueCrypt logos (including the non-textual logo consisting -primarily of a key in stylized form) are trademarks of the TrueCrypt -Foundation. - -Note: The goal is not to monetize the name or the product, but to protect the -reputation of TrueCrypt. TrueCrypt is and will remain open-source and free -software. - - - -VI. General Terms - -1. You may not use, modify, reproduce, derive from, (re)distribute, or -sublicense This Product, or portion(s) thereof, except as expressly provided -under this License. Any attempt (even if permitted by applicable law) otherwise -to use, modify, reproduce, derive from, (re)distribute, or sublicense This -Product, or portion(s) thereof, automatically and immediately terminates Your -rights under this License. - -2. ANYONE WHO USES AND/OR REPRODUCES AND/OR MODIFIES AND/OR DERIVES FROM AND/OR -(RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S), -ACCEPTING ALL TERMS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS -CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT THEM, DO NOT USE, MODIFY, -REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) -THEREOF. - -3. IF ANY PROVISION OF SECTION IV OF THIS LICENSE IS UNENFORCEABLE, PROHIBITED, -OR INVALID UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU MAY NOT USE, MODIFY, -REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) -THEREOF. - -4. If any term of this License is found to be invalid or unenforceable under -applicable law, You agree that it shall not affect the validity or -enforceability of any other terms of this License that are found to be valid -and enforceable under applicable law. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -This is an independent implementation of the encryption algorithm: - - Twofish by Bruce Schneier and colleagues - -which is a candidate algorithm in the Advanced Encryption Standard -programme of the US National Institute of Standards and Technology. - -Copyright in this implementation is held by Dr B R Gladman but I -hereby give permission for its free direct or derivative use subject -to acknowledgment of its origin and compliance with any conditions -that the originators of the algorithm place on its exploitation. - -My thanks to Doug Whiting and Niels Ferguson for comments that led -to improvements in this implementation. - -Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.4.txt b/licenses/License-v2.4.txt deleted file mode 100644 index 7d29e71..0000000 --- a/licenses/License-v2.4.txt +++ /dev/null @@ -1,530 +0,0 @@ -TrueCrypt Collective License Version 1.3 - -Software distributed under this license is distributed on an "AS IS" BASIS -WITHOUT WARRANTIES OF ANY KIND. THE LIABILITY OF THE AUTHORS AND DISTRIBUTORS -OF THE SOFTWARE IS LIMITED. - -ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART(S) OF A WORK -MADE AVAILABLE UNDER THIS VERSION OF THE TRUECRYPT COLLECTIVE LICENSE, IS, BY -SUCH ACTION(S), ACCEPTING ALL TERMS OF THE COMPONENT LICENSES (SEE BELLOW) THAT -APPLY TO THE CORRESPONDING PART(S) OF THE WORK. IF YOU DO NOT ACCEPT THEM, DO -NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE WORK, NOR ANY PART(S) THEREOF. - -The TrueCrypt Collective License consists of several distinct licenses, which -are contained in this document (separated by lines consisting of underscores) -and which are, in this section, referred to as component licenses. Each of the -component licenses applies only to (portions of) the source code file(s) in -which the component license is contained or in which it is explicitly -referenced, and to compiled or otherwise processed forms of such source code. -None of the component licenses applies to this product as a whole, even when it -uses the phrase "this product" or any other equivalent term/phrase. Unless -otherwise stated, graphics and files that are not part of the source code are -governed solely by the TrueCrypt License. Note: The TrueCrypt License is one of -the component licenses of which the TrueCrypt Collective License consists. - -____________________________________________________________ - -This software is copyright (c) 2003-2008 TrueCrypt Foundation - -TrueCrypt License Version 2.4 - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, source code, -graphics, texts, and accompanying files) made available under and governed by -this version of this license ("License"), as may be indicated by, but is not -limited to, copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., -a non-profit organization, commercial organization, government agency, etc.) -exercising permissions granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration of This -Product, including, but not limited to, addition to or deletion from the -substance or structure of This Product, and translation into another language. - -4. "Your Product" means This Product modified by You, any work You derive from -(or base on) This Product, any work in which You include This Product, or any -respective part(s) thereof. - -5. "Distribution" means (and "distribute" refers to), regardless of means or -methods, conveyance, transfer, providing, or making available of This/Your -Product or portions thereof to third parties (including, but not limited to, -making This/Your Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the product, or any -portion thereof, made available for download). - - - -II. Terms and Conditions for Use, Copying, and Distribution - -1. You may copy and/or distribute This Product, provided that You do not modify -This Product (for terms and conditions for copying and distribution of modified -versions of This Product, see Chapter III) and provided that You do not include -This Product in another product (except as permitted under Chapter III), and -provided that You ensure that all the legal notices and documents (containing, -e.g., the text of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that You make and -distribute, and provided that You comply with all other applicable terms and -conditions of this License. - -2. Provided that You comply with all applicable terms and conditions of this -License, You may use This Product freely (see also Chapter III) on any number -of computers/systems for non-commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. If all conditions specified in the following paragraphs in this Chapter -(III) are met (for exceptions, see Sections III.2 and III.3) and if You comply -with all other applicable terms and conditions of this License, You may modify -This Product (thus forming Your Product), derive new works from This Product or -portions thereof (thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product), and You may copy and/or -distribute Your Product. - - a. The name of Your Product (or of Your modified version of This Product) - must not contain the name TrueCrypt (for example, the following names are - not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, - etc.) nor any other names confusingly similar to the name TrueCrypt (e.g., - True-Crypt, True Crypt, TruKrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt - Foundation. The goal is not to monetize the name or the product, but to - protect the reputation of TrueCrypt, and to prevent support issues and - other kinds of issues that might arise from the existence of similar - products with the same or similar name. Even though TrueCrypt and the - TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source - and free software. - - All occurrences of the name TrueCrypt that could reasonably be considered - to identify Your Product must be removed from Your Product and from any - associated materials. Logo(s) included in (or attached to) Your Product - (and in/to associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos (including the - non-textual logo consisting primarily of a key in stylized form) or - portion(s) thereof. All graphics contained in This Product (logos, icons, - etc.) must be removed from Your Product (or from Your modified version of - This Product) and from any associated materials. - - b. The following phrases must be removed from Your Product and from any - associated materials, except the text of this License: "A TrueCrypt - Foundation Release", "Released by TrueCrypt Foundation", "This is a - TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product (if - technically feasible) and contained in its documentation. Alternatively, if - This Product or its portion You included in Your Product constitutes only a - minor portion of Your Product, phrase "Portions of this product are based - in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be - displayed instead. In each of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) - pointing to http://www.truecrypt.org/ and You may freely choose the - location within the user interface (if there is any) of Your Product (e.g., - an "About" window, etc.) and the way in which Your Product will display the - respective phrase. - - Your Product (and any associated materials, e.g., the documentation, the - content of the official web site of Your Product, etc.) must not present - any Internet address containing the domain name truecrypt.org (or any - domain name that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your Product may be - obtained or where bugs found in Your Product may be reported or where - support for Your Product may be available or otherwise attempt to indicate - that the domain name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely and publicly - available (for exceptions, see Sections III.2 and III.3) at least until You - cease to distribute Your Product. To meet this condition, it is sufficient - that You merely include the source code with every copy of Your Product - that You make and distribute; it is also sufficient that You merely include - information (valid and correct at least until You cease to distribute Your - Product) about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that You make and - distribute. Portions of the source code that were created by You (e.g. Your - additions to This Product) must be available under license(s) that are/is - compatible with this version of the TrueCrypt License (however, see also - Subsection III.1.e) and that allow(s) anyone to modify and derive new works - from Your Product (and portions thereof) and to use, copy, and redistribute - such modifications and/or derivative works. The license(s) must be - perpetual, non-exclusive, royalty-free, no-charge, and worldwide, and must - not invalidate, weaken, restrict, interpret, amend, modify, interfere with - or otherwise affect any part, term, provision, or clause of this License. - The text of the license(s) must be included with every copy of Your Product - that You make and distribute. The source code must not be deliberately - obfuscated, and it must not be in an intermediate form (e.g., the output of - a preprocessor). Source code means the preferred form in which a programmer - would usually modify the program. - - Note: If you cannot comply with the above requirements, we may grant an - exception under certain conditions. You may request an exception at: - licensing@truecrypt.org - - e. You must not change the license terms of This Product in any way (adding - any new terms is considered changing the license terms even if the original - terms are retained), which means, e.g., that no part of This Product may be - put under another license. You must keep intact all the legal notices - contained in the source code files. You must include the following items - with every copy of Your Product that You make and distribute: a clear and - conspicuous notice stating that Your Product or portion(s) thereof is/are - distributed under this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), a clear and - conspicuous notice containing information about where the included copy of - the License can be found, and an appropriate copyright notice. - - f. Without specific prior written permission from the authors of This - Product (or from their common representative), You must not use the name of - This Product, the names of the authors of This Product, or the names of the - legal entities (or informal groups) of which the authors were/are - members/employees, to endorse or promote Your Product (or You, or Your - affiliates), or in a way that might suggest that Your Product (or You, or - Your affiliates) is/are endorsed by one or more authors of This Product, or - in a way that might suggest that one or more authors of This Product is/are - affiliated with You or directly participated in the creation of Your - Product. - - -2. You are not obligated to comply with Subsections III.1.a, III.1.b, III.1.c, -and III.1.d, if all conditions specified in one of the two following -Subsections (III.2.a or III.2.b) are met: - - a. Your Product is an operating system distribution, or other aggregate - software distribution (such as a cover CD-ROM of a magazine) containing - products from different sources, in which You include either This Product - without any modifications or file(s) which You obtain by compiling the - unmodified source code of This Product. - - b. You include This Product in its entirety and without any modifications - (You may omit the source code of This Product) as non-integral part of Your - Product (i.e., none of the main functionalities of Your Product will be - affected if such non-integral part is removed) and phrase "This product - utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or - phrase "This product includes TrueCrypt, freely available at - http://www.truecrypt.org/" is displayed by Your Product (if technically - feasible) and contained in its documentation. In each of the cases - mentioned above in this paragraph, "http://www.truecrypt.org/" must be a - hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user interface (if there - is any) of Your Product (e.g., an "About" window, etc.) and the way in - which Your Product will display the respective phrase. - - -3. You are not obligated to comply with Subsection III.1.d if Your Product is -not distributed (i.e., Your Product is available only to You). - - - -IV. Limitation of Liability, Disclaimer of Warranty, Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE -COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR -(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE -LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED -TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR -CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF -DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT -TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, -OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT -(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, -MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF -YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A -PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY -OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER -EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES -OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. -SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY -SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS -THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR -ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT -IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS -THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO -IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR -RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND -LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, THEIR -AGENTS AND ASSOCIATES, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS -FROM/AGAINST ANY LIABILITY, LOSS, EXPENSE, DAMAGES, CLAIMS OR CAUSES OF ACTION, -ARISING OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT -AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF -ANY TERM OF THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks associated with (or -applying to) This Product, except for fair use as defined by applicable law and -except for use expressly permitted or required by this License. Any attempt -otherwise to use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This License and may -constitute trademark infringement (which may be prosecuted). - -TrueCrypt is a registered trademark of the TrueCrypt Foundation registered with -the World Intellectual Property Organization, an agency of the United Nations, -(international trademark registration), in the U.S. Patent and Trademark -Office, and in the trademark offices of other countries. All TrueCrypt logos -(including the non-textual logo consisting primarily of a key in stylized form) -are trademarks of the TrueCrypt Foundation. - -Note: The goal is not to monetize the name or the product, but to protect the -reputation of TrueCrypt. TrueCrypt is and will remain open-source and free -software. - - - -VI. General Terms - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE -WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY -SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS OF THIS LICENSE -(AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). IF YOU DO -NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS OF THIS LICENSE, DO NOT USE, -COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR -ANY PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, -OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED -IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT -(EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE -DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS -LICENSE AND CAN CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). -ANY RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF -THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR -FAILURE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO -PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE -CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). NOTHING IN THIS -LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT -TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT. - -3. This license does not constitute or imply a waiver of any intellectual -property rights. This license does not transfer, assign, or convey any -intellectual property rights (e.g., it does not transfer ownership of -copyrights or trademarks). - -4. Subject to the terms of this License, You may allow a third party to use -Your copy of This Product (or a copy that you make and distribute, or Your -Product, or respective parts thereof) provided that the third party explicitly -accepts and agrees to be bound by all terms of this License and the third party -is not prohibited from using This Product (or portions thereof) by this License -(see, e.g., Section VI.6) or by applicable law. However, You are not obligated -to ensure that the third party accepts (and agrees to be bound by all terms of) -this License if You distribute only the self-extracting package (containing -This Product) that does not allow the user to install (nor extract) the files -contained in the package until he or she accepts and agrees to be bound by all -terms of this License. - -5. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF -YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS OF THIS LICENSE, YOU -MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS -PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A LAWYER. - -6. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS -UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR -JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -7. If any provision of this License, or a portion thereof, is found to be -invalid or unenforceable under applicable law, it shall not affect the validity -or enforceability of the remainder of this License, and such invalid or -unenforceable provision shall be construed to reflect the original intent of -such provision and shall be enforced to the maximum extent permitted by -applicable law so as to effect the original intent of such provision as closely -as possible. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software in both source and binary -form is allowed (with or without changes) provided that: - - 1. distributions of this source code include the above copyright - notice, this list of conditions and the following disclaimer; - - 2. distributions in binary form include the above copyright - notice, this list of conditions and the following disclaimer - in the documentation and/or other associated materials; - - 3. the copyright holder's name is not used to endorse products - built using this software without specific written permission. - -ALTERNATIVELY, provided that this notice is retained in full, this product -may be distributed under the terms of the GNU General Public License (GPL), -in which case the provisions of the GPL apply INSTEAD OF those given above. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -This is an independent implementation of the encryption algorithm: - - Twofish by Bruce Schneier and colleagues - -which is a candidate algorithm in the Advanced Encryption Standard -programme of the US National Institute of Standards and Technology. - -Copyright in this implementation is held by Dr B R Gladman but I -hereby give permission for its free direct or derivative use subject -to acknowledgment of its origin and compliance with any conditions -that the originators of the algorithm place on its exploitation. - -My thanks to Doug Whiting and Niels Ferguson for comments that led -to improvements in this implementation. - -Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.5.txt b/licenses/License-v2.5.txt deleted file mode 100644 index f7f2036..0000000 --- a/licenses/License-v2.5.txt +++ /dev/null @@ -1,542 +0,0 @@ -TrueCrypt Collective License Version 1.4 - -Software distributed under this license is distributed on an "AS IS" BASIS -WITHOUT WARRANTIES OF ANY KIND. THE LIABILITY OF THE AUTHORS AND DISTRIBUTORS -OF THE SOFTWARE IS LIMITED. - -ANYONE WHO USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART(S) OF A WORK -MADE AVAILABLE UNDER THIS VERSION OF THE TRUECRYPT COLLECTIVE LICENSE, IS, BY -SUCH ACTION(S), ACCEPTING ALL TERMS AND CONDITIONS OF THE COMPONENT LICENSES -(SEE BELOW) THAT APPLY TO THE CORRESPONDING PART(S) OF THE WORK. IF YOU DO NOT -ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE WORK, NOR ANY -PART(S) THEREOF. - -The TrueCrypt Collective License consists of several distinct licenses, which -are contained in this document (separated by lines consisting of underscores) -and which are, in this section, referred to as component licenses. Each of the -component licenses applies only to (portions of) the source code file(s) in -which the component license is contained or in which it is explicitly -referenced, and to compiled or otherwise processed forms of such source code. -None of the component licenses applies to this product as a whole, even when it -uses the phrase "this product" or any other equivalent term/phrase. Unless -otherwise stated, graphics and files that are not part of the source code are -governed solely by the TrueCrypt License. Note: The TrueCrypt License is one of -the component licenses of which the TrueCrypt Collective License consists. - -____________________________________________________________ - -This software is copyright (c) 2003-2008 TrueCrypt Foundation - -TrueCrypt License Version 2.5 - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, source code, -graphics, texts, and accompanying files) made available under and governed by -this version of this license ("License"), as may be indicated by, but is not -limited to, copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., -a non-profit organization, commercial organization, government agency, etc.) -exercising permissions granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration of This -Product, including, but not limited to, addition to or deletion from the -substance or structure of This Product, and translation into another language. - -4. "Your Product" means This Product modified by You, any work You derive from -(or base on) This Product, any work in which You include This Product, or any -respective part(s) thereof. - -5. "Distribution" means (and "distribute" refers to), regardless of means or -methods, conveyance, transfer, providing, or making available of This/Your -Product or portions thereof to third parties (including, but not limited to, -making This/Your Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the product, or any -portion thereof, made available for download). - - - -II. Terms and Conditions for Use, Copying, and Distribution - -1. You may copy and/or distribute This Product, provided that You do not modify -This Product (for terms and conditions for copying and distribution of modified -versions of This Product, see Chapter III) and provided that You do not include -This Product in another product (except as permitted under Chapter III), and -provided that You ensure that all the legal notices and documents (containing, -e.g., the text of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that You make and -distribute, and provided that You comply with all other applicable terms and -conditions of this License. - -2. Provided that You comply with all applicable terms and conditions of this -License, You may use This Product freely (see also Chapter III) on any number -of computers/systems for non-commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New Products - -1. If all conditions specified in the following paragraphs in this Chapter -(III) are met (for exceptions, see Sections III.2 and III.3) and if You comply -with all other applicable terms and conditions of this License, You may modify -This Product (thus forming Your Product), derive new works from This Product or -portions thereof (thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product), and You may copy and/or -distribute Your Product. - - a. The name of Your Product (or of Your modified version of This Product) - must not contain the name TrueCrypt (for example, the following names are - not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, - etc.) nor any other names confusingly similar to the name TrueCrypt (e.g., - True-Crypt, True Crypt, TruKrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt - Foundation. The goal is not to monetize the name or the product, but to - protect the reputation of TrueCrypt, and to prevent support issues and - other kinds of issues that might arise from the existence of similar - products with the same or similar name. Even though TrueCrypt and the - TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source - and free software. - - All occurrences of the name TrueCrypt that could reasonably be considered - to identify Your Product must be removed from Your Product and from any - associated materials. Logo(s) included in (or attached to) Your Product - (and in/to associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos (including the - non-textual logo consisting primarily of a key in stylized form) or - portion(s) thereof. All graphics contained in This Product (logos, icons, - etc.) must be removed from Your Product (or from Your modified version of - This Product) and from any associated materials. - - b. The following phrases must be removed from Your Product and from any - associated materials, except the text of this License: "A TrueCrypt - Foundation Release", "Released by TrueCrypt Foundation", "This is a - TrueCrypt Foundation release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product (if - technically feasible) and contained in its documentation. Alternatively, if - This Product or its portion You included in Your Product constitutes only a - minor portion of Your Product, phrase "Portions of this product are based - in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be - displayed instead. In each of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) - pointing to http://www.truecrypt.org/ and You may freely choose the - location within the user interface (if there is any) of Your Product (e.g., - an "About" window, etc.) and the way in which Your Product will display the - respective phrase. - - Your Product (and any associated materials, e.g., the documentation, the - content of the official web site of Your Product, etc.) must not present - any Internet address containing the domain name truecrypt.org (or any - domain name that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your Product may be - obtained or where bugs found in Your Product may be reported or where - support for Your Product may be available or otherwise attempt to indicate - that the domain name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely and publicly - available (for exceptions, see Sections III.2 and III.3) at least until You - cease to distribute Your Product. To meet this condition, it is sufficient - that You merely include the source code with every copy of Your Product - that You make and distribute (see also below in this Subsection III.1.d for - conditions that licenses governing the source code must meet) provided that - You make the copies available to the general public free of charge; it is - also sufficient that You merely include information (valid and correct at - least until You cease to distribute Your Product) about where the source - code can be freely obtained (e.g., an Internet address, etc.) with every - copy of Your Product that You make and distribute (see also below in this - Subsection III.1.d for conditions that licenses governing the source code - must meet) provided that You make the copies available to the general - public free of charge. - - Portions of the source code that were created by You (e.g. Your additions - to This Product) must be available under license(s) that are/is compatible - with this version of the TrueCrypt License (however, see also Subsection - III.1.e) and that allow(s) anyone to modify and derive new works from the - portions of the source code that were created by You and to use, copy, and - redistribute such modifications and/or derivative works. The license(s) - must be perpetual, non-exclusive, royalty-free, no-charge, and worldwide, - and must not invalidate, weaken, restrict, interpret, amend, modify, - interfere with or otherwise affect any part, term, provision, or clause of - this License. The text of the license(s) must be included with every copy - of Your Product that You make and distribute. The source code must not be - deliberately obfuscated, and it must not be in an intermediate form (e.g., - the output of a preprocessor). Source code means the preferred form in - which a programmer would usually modify the program. - - Note: If you cannot comply with the above requirements, we may grant an - exception under certain conditions. You may request an exception at: - licensing@truecrypt.org - - e. You must not change the license terms of This Product in any way (adding - any new terms is considered changing the license terms even if the original - terms are retained), which means, e.g., that no part of This Product may be - put under another license. You must keep intact all the legal notices - contained in the source code files. You must include the following items - with every copy of Your Product that You make and distribute: a clear and - conspicuous notice stating that Your Product or portion(s) thereof is/are - distributed under this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), a clear and - conspicuous notice containing information about where the included copy of - the License can be found, and an appropriate copyright notice. - - f. Without specific prior written permission from the authors of This - Product (or from their common representative), You must not use the name of - This Product, the names of the authors of This Product, or the names of the - legal entities (or informal groups) of which the authors were/are - members/employees, to endorse or promote Your Product (or You, or Your - affiliates), or in a way that might suggest that Your Product (or You, or - Your affiliates) is/are endorsed by one or more authors of This Product, or - in a way that might suggest that one or more authors of This Product is/are - affiliated with You or directly participated in the creation of Your - Product. - - -2. You are not obligated to comply with Subsections III.1.a, III.1.b, III.1.c, -and III.1.d, if all conditions specified in one of the two following -Subsections (III.2.a or III.2.b) are met: - - a. Your Product is an operating system distribution, or other aggregate - software distribution (such as a cover CD-ROM of a magazine) containing - products from different sources, in which You include either This Product - without any modifications or file(s) which You obtain by compiling the - unmodified source code of This Product (see also Section VI.4). - - b. You include This Product in its entirety and without any modifications - (You may omit the source code of This Product) as non-integral part of Your - Product (i.e., none of the main functionalities of Your Product will be - affected if such non-integral part is removed) and phrase "This product - utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or - phrase "This product includes TrueCrypt, freely available at - http://www.truecrypt.org/" is displayed by Your Product (if technically - feasible) and contained in its documentation. In each of the cases - mentioned above in this paragraph, "http://www.truecrypt.org/" must be a - hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user interface (if there - is any) of Your Product (e.g., an "About" window, etc.) and the way in - which Your Product will display the respective phrase. - - Note: If you cannot comply with Subsection III.1.d, we may grant an - exception under certain conditions. You may request an exception at: - licensing@truecrypt.org - - -3. You are not obligated to comply with Subsection III.1.d if Your Product is -not distributed (i.e., Your Product is available only to You). - - - -IV. Limitation of Liability, Disclaimer of Warranty, Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE -COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR -(RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE -LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED -TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR -CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF -DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS PRODUCT -TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, -OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT -(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, -MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF -YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A -PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY -OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER -EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES -OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. -SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY -SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS -THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR -ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT -IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS -THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO -IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR -RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND -LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, THEIR -AGENTS AND ASSOCIATES, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS FROM -AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, -FINES, COSTS, EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES -OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, RELATED TO OR ARISING OUT -OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT AND/OR -(RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF ANY TERM -OF THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks associated with (or -applying to) This Product, except for fair use as defined by applicable law and -except for use expressly permitted or required by this License. Any attempt -otherwise to use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This License and may -constitute trademark infringement (which may be prosecuted). - -TrueCrypt is a registered trademark of the TrueCrypt Foundation registered with -the World Intellectual Property Organization, an agency of the United Nations, -(international trademark registration), in the U.S. Patent and Trademark -Office, and in the trademark offices of other countries. All TrueCrypt logos -(including the non-textual logo consisting primarily of a key in stylized form) -are trademarks of the TrueCrypt Foundation. - -Note: The goal is not to monetize the name or the product, but to protect the -reputation of TrueCrypt. TrueCrypt is and will remain open-source and free -software. - - - -VI. General Terms and Conditions, Miscellaneous Provisions - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES DERIVATIVE -WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY -SUCH ACTION(S), AGREEING TO BE BOUND BY AND ACCEPTING ALL TERMS AND CONDITIONS -OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS -LICENSE). IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND -CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS -OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, -OR SUBLICENSE THIS PRODUCT, OR PORTION(S) THEREOF, EXCEPT AS EXPRESSLY PROVIDED -IN THIS LICENSE (EVEN IF APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT -(EVEN IF PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, CREATE -DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, AUTOMATICALLY AND IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS -LICENSE AND CAN CONSTITUTE COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). -ANY RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON THE SCOPE OF -THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR RIGHTS UNDER THIS LICENSE. YOUR -FAILURE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS LICENSE OR FAILURE TO -PERFORM ANY APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CAUSE OR BE -CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). NOTHING IN THIS -LICENSE SHALL IMPLY OR BE CONSTRUED AS A PROMISE, OBLIGATION, OR COVENANT NOT -TO SUE FOR COPYRIGHT OR TRADEMARK INFRINGEMENT. - -3. This license does not constitute or imply a waiver of any intellectual -property rights. This license does not transfer, assign, or convey any -intellectual property rights (e.g., it does not transfer ownership of -copyrights or trademarks). - -4. Subject to the terms and conditions of this License, You may allow a third -party to use Your copy of This Product (or a copy that you make and distribute, -or Your Product, or respective parts thereof) provided that the third party -overtly accepts and agrees to be bound by all terms and conditions of this -License and the third party is not prohibited from using This Product (or -portions thereof) by this License (see, e.g., Section VI.6) or by applicable -law. However, You are not obligated to ensure that the third party accepts (and -agrees to be bound by all terms of) this License if You distribute only the -self-extracting package (containing This Product) that does not allow the user -to install (nor extract) the files contained in the package until he or she -accepts and agrees to be bound by all terms and conditions of this License. - -5. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF -YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS AND CONDITIONS OF THIS -LICENSE, YOU MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR -(RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH -A LAWYER. - -6. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS LICENSE IS -UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR -JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -7. If any provision of this License, or a portion thereof, is found to be -invalid or unenforceable under applicable law, it shall not affect the validity -or enforceability of the remainder of this License, and such invalid or -unenforceable provision shall be construed to reflect the original intent of -the provision and shall be enforced to the maximum extent permitted by -applicable law so as to effect the original intent of the provision as closely -as possible. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, including -source code. - -You may modify this product and source code, and distribute such modifications, -and you may derive new works based on this product, provided that: - -1. Any product which is simply derived from this product cannot be -called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your product -is distributed with source code, you must include this notice with -those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must display -on any packaging, and marketing materials which reference -your product, a notice which states: - -"This product uses components written by Paul Le Roux " - -3. If you use any of the source code originally by Eric Young, you must -in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have not -signed it. However, nothing else grants you permission to modify or -distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this License. - -5. If any of these license terms is found to be to broad in scope, and -declared invalid by any court or legal process, you agree that all other -terms shall not be so affected, and shall remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE -STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER -EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE -QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE -DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software is allowed (with or without -changes) provided that: - - 1. source code distributions include the above copyright notice, this - list of conditions and the following disclaimer; - - 2. binary distributions include the above copyright notice, this list - of conditions and the following disclaimer in their documentation; - - 3. the name of the copyright holder is not used to endorse products - built using this software without specific written permission. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied warranties -in respect of its properties, including, but not limited to, correctness -and/or fitness for purpose. -____________________________________________________________ - -Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) -All rights reserved. - -This package is an SSL implementation written -by Eric Young (eay@cryptsoft.com). -The implementation was written so as to conform with Netscapes SSL. - -This library is free for commercial and non-commercial use as long as -the following conditions are aheared to. The following conditions -apply to all code found in this distribution, be it the RC4, RSA, -lhash, DES, etc., code; not just the SSL code. The SSL documentation -included with this distribution is covered by the same copyright terms -except that the holder is Tim Hudson (tjh@cryptsoft.com). - -Copyright remains Eric Young's, and as such any Copyright notices in -the code are not to be removed. -If this package is used in a product, Eric Young should be given attribution -as the author of the parts of the library used. -This can be in the form of a textual message at program startup or -in documentation (online or textual) provided with the package. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. -3. All advertising materials mentioning features or use of this software - must display the following acknowledgement: - "This product includes cryptographic software written by - Eric Young (eay@cryptsoft.com)" - The word 'cryptographic' can be left out if the rouines from the library - being used are not cryptographic related :-). -4. If you include any Windows specific code (or a derivative thereof) from - the apps directory (application code) you must include an acknowledgement: - "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" - -THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND -ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE -FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -SUCH DAMAGE. - -The licence and distribution terms for any publically available version or -derivative of this code cannot be changed. i.e. this code cannot simply be -copied and put under another distribution licence -[including the GNU Public Licence.] -____________________________________________________________ - -Copyright (C) 2002-2004 Mark Adler, all rights reserved -version 1.8, 9 Jan 2004 - -This software is provided 'as-is', without any express or implied -warranty. In no event will the author be held liable for any damages -arising from the use of this software. - -Permission is granted to anyone to use this software for any purpose, -including commercial applications, and to alter it and redistribute it -freely, subject to the following restrictions: - -1. The origin of this software must not be misrepresented; you must not - claim that you wrote the original software. If you use this software - in a product, an acknowledgment in the product documentation would be - appreciated but is not required. -2. Altered source versions must be plainly marked as such, and must not be - misrepresented as being the original software. -3. This notice may not be removed or altered from any source distribution. -____________________________________________________________ - -Copyright (c) 2001 Markus Friedl. All rights reserved. - -Redistribution and use in source and binary forms, with or without -modification, are permitted provided that the following conditions -are met: -1. Redistributions of source code must retain the above copyright - notice, this list of conditions and the following disclaimer. -2. Redistributions in binary form must reproduce the above copyright - notice, this list of conditions and the following disclaimer in the - documentation and/or other materials provided with the distribution. - -THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR -IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. -IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, -INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT -NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, -DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY -THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT -(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF -THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/licenses/License-v2.6.txt b/licenses/License-v2.6.txt deleted file mode 100644 index 85c5a02..0000000 --- a/licenses/License-v2.6.txt +++ /dev/null @@ -1,531 +0,0 @@ -TrueCrypt License Version 2.6 - -Software distributed under this license is distributed on an "AS -IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND -DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO -USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE -SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE -BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT -ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE -SOFTWARE, NOR ANY PART(S) THEREOF. - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, -source code, graphics, texts, and accompanying files) made -available under and governed by this version of this license -("License"), as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal -entity (e.g., a non-profit organization, commercial -organization, government agency, etc.) exercising permissions -granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration -of This Product, including, but not limited to, addition to or -deletion from the substance or structure of This Product, and -translation into another language. - -4. "Your Product" means This Product modified by You, any work -You derive from (or base on) This Product, or any respective -part(s) thereof. In addition, "Your Product" means any work in -which You include any portion of This Product (unless the work -in which you include it is an aggregate software distribution, -such as an operating system distribution or a cover CD-ROM of a -magazine, containing separate and independent products from -different sources, provided that the license governing the -aggregate software distribution does not invalidate, weaken, -restrict, interpret, amend, modify, interfere with or otherwise -affect any part, term, provision, or clause of this License) or -any respective part(s) thereof. - -5. "Distribution" means (and "distribute" refers to), regardless -of means or methods, conveyance, transfer, providing, or making -available of This/Your Product or portions thereof to third -parties (including, but not limited to, making This/Your -Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the -product, or any portion thereof, made available for download). - - - -II. Terms and Conditions for Use, Copying, and Distribution - -1. You may copy and/or distribute This Product, provided that -You do not modify This Product (for terms and conditions for -copying and distribution of modified versions of This Product, -see Chapter III) and provided that You do not include This -Product in another product forming Your Product (except as -permitted under Chapter III), and provided that You ensure that -all the legal notices and documents (containing, e.g., the text -of this License, references to this License, etc.) included with -This Product are included with every copy of This Product that -You make and distribute, and provided that You comply with all -other applicable terms and conditions of this License. - -2. Provided that You comply with all applicable terms and -conditions of this License, You may use This Product freely (see -also Chapter III) on any number of computers/systems for non- -commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New -Products - -1. If all conditions specified in the following paragraphs in -this Chapter (III) are met (for exceptions, see Section III.2) -and if You comply with all other applicable terms and conditions -of this License, You may modify This Product (thus forming Your -Product), derive new works from This Product or portions thereof -(thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product, unless -defined otherwise in Chapter I), and You may use (for non- -commercial and/or commercial purposes), copy, and/or distribute -Your Product. - - a. The name of Your Product (or of Your modified version of - This Product) must not contain the name TrueCrypt (for - example, the following names are not allowed: TrueCrypt, - TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor - any other names confusingly similar to the name TrueCrypt - (e.g., True-Crypt, True Crypt, TruKrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of - the TrueCrypt Foundation. The goal is not to monetize the - name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of - issues that might arise from the existence of similar - products with the same or similar name. Even though - TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt - is and will remain open-source and free software. - - All occurrences of the name TrueCrypt that could reasonably - be considered to identify Your Product must be removed from - Your Product and from any associated materials. Logo(s) - included in (or attached to) Your Product (and in/to - associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos (including - the non-textual logo consisting primarily of a key in - stylized form) or portion(s) thereof. All graphics contained - in This Product (logos, icons, etc.) must be removed from - Your Product (or from Your modified version of This Product) - and from any associated materials. - - b. The following phrases must be removed from Your Product - and from any associated materials, except the text of this - License: "A TrueCrypt Foundation Release", "Released by - TrueCrypt Foundation", "This is a TrueCrypt Foundation - release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product - (if technically feasible) and contained in its - documentation. Alternatively, if This Product or its portion - You included in Your Product constitutes only a minor - portion of Your Product, phrase "Portions of this product - are based in part on TrueCrypt, freely available at - http://www.truecrypt.org/" may be displayed instead. In each - of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if - technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user - interface (if there is any) of Your Product (e.g., an - "About" window, etc.) and the way in which Your Product will - display the respective phrase. - - Your Product (and any associated materials, e.g., the - documentation, the content of the official web site of Your - Product, etc.) must not present any Internet address - containing the domain name truecrypt.org (or any domain name - that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your - Product may be obtained or where bugs found in Your Product - may be reported or where support for Your Product may be - available or otherwise attempt to indicate that the domain - name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely - and publicly available (for exceptions, see Section III.2) - at least until You cease to distribute Your Product and - there must be a well-publicized means of obtaining the - source code free of charge or for a reasonable reproduction - fee (at least until You cease to distribute Your Product). - Examples of possible ways to meet these conditions: (i) You - include the source code with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee, or (ii) You include information (valid and - correct at least until You cease to distribute Your Product) - about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee. - - Portions of the source code that were created by You (e.g. - Your additions to This Product) must be available under - license(s) that are/is compatible with this version of the - TrueCrypt License (however, see also Subsection III.1.e) and - that allow(s) anyone to modify and derive new works from the - portions of the source code that were created by You and to - use, copy, and redistribute such modifications and/or - derivative works. The license(s) must be perpetual, non- - exclusive, royalty-free, no-charge, and worldwide, and must - not invalidate, weaken, restrict, interpret, amend, modify, - interfere with or otherwise affect any part, term, - provision, or clause of this License. The text of the - license(s) must be included with every copy of Your Product - that You make and distribute. The source code must not be - deliberately obfuscated, and it must not be in an - intermediate form (e.g., the output of a preprocessor). - Source code means the preferred form in which a programmer - would usually modify the program. - - Note: If you cannot comply with the above requirements, we - may grant an exception under certain conditions. You may - request an exception at: licensing@truecrypt.org - - e. You must not change the license terms of This Product in - any way (adding any new terms is considered changing the - license terms even if the original terms are retained), - which means, e.g., that no part of This Product may be put - under another license. You must keep intact all the legal - notices contained in the source code files. You must include - the following items with every copy of Your Product that You - make and distribute: a clear and conspicuous notice stating - that Your Product or portion(s) thereof is/are governed by - this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), - a clear and conspicuous notice containing information about - where the included copy of the License can be found, and an - appropriate copyright notice. - - -2. You are not obligated to comply with Subsection III.1.d if -Your Product is not distributed (i.e., Your Product is available -only to You). - -Note: If you cannot comply with Subsection III.1.d, we may grant -an exception under certain conditions. You may request an -exception at: licensing@truecrypt.org - - - -IV. Disclaimer of Liability, Disclaimer of Warranty, -Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY -APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY -COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS -MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY -FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, -INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR -CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION -OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A -FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, -PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS -INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT -(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, -COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A -PORTION THEREOF) OR OF YOUR PRODUCT (OR A PORTION THEREOF), OR -INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), EVEN IF -ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY -HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY -KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT -LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A -PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO -THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD -THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL -NECESSARY SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC -ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT -CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY -YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR -(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN -COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND -TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT -IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE -REGULATIONS, RESTRICTIONS, AND LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS -PRODUCT, THEIR AGENTS AND ASSOCIATES, AND APPLICABLE -COPYRIGHT/TRADEMARK OWNERS, HARMLESS FROM AND AGAINST ANY AND -ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, FINES, -COSTS, EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, -CAUSES OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, -RELATED TO OR ARISING OUT OF YOUR USE, INABILITY TO USE, -COPYING, (RE)DISTRIBUTION, IMPORT AND/OR (RE)EXPORT OF THIS -PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF ANY TERM OF -THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks -associated with (or applying to) This Product, except for fair -use as defined by applicable law and except for use expressly -permitted or required by this License. Any attempt otherwise to -use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This -License and may constitute trademark infringement (which may be -prosecuted). - -TrueCrypt is a registered trademark of the TrueCrypt Foundation -registered with the World Intellectual Property Organization, an -agency of the United Nations, (international trademark -registration), in the U.S. Patent and Trademark Office, and in -the trademark offices of other countries. All TrueCrypt logos -(including the non-textual logo consisting primarily of a key in -stylized form) are trademarks of the TrueCrypt Foundation. - -Note: The goal is not to monetize the name or the product, but -to protect the reputation of TrueCrypt. TrueCrypt is and will -remain open-source and free software. - - - -VI. General Terms and Conditions, Miscellaneous Provisions - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES -DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY -PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND -BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND -THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). -IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND -CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, -(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF -APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF -PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, -CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS -PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY -TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE -COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY -RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON -THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR -RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY -APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN -CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE -PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED -AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT -OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE. - -3. This license does not constitute or imply a waiver of any -intellectual property rights except as may be otherwise -expressly provided in this License. This license does not -transfer, assign, or convey any intellectual property rights -(e.g., it does not transfer ownership of copyrights or -trademarks). - -4. Subject to the terms and conditions of this License, You may -allow a third party to use Your copy of This Product (or a copy -that you make and distribute, or Your Product, or respective -parts thereof) provided that the third party overtly accepts and -agrees to be bound by all terms and conditions of this License -and the third party is not prohibited from using This Product -(or portions thereof) by this License (see, e.g., Section VI.7) -or by applicable law. However, You are not obligated to ensure -that the third party accepts (and agrees to be bound by all -terms of) this License if You distribute only the self- -extracting package (containing This Product) that does not allow -the user to install (nor extract) the files contained in the -package until he or she accepts and agrees to be bound by all -terms and conditions of this License. - -5. Without specific prior written permission from the authors of -This Product (or from their common representative), You must not -use the name of This Product, the names of the authors of This -Product, or the names of the legal entities (or informal groups) -of which the authors were/are members/employees, to endorse or -promote Your Product or any work in which You include a modified -or unmodified version of This Product, or to endorse or promote -You or Your affiliates, or in a way that might suggest that Your -Product (or any work in which You include a modified or -unmodified version of This Product), You, or Your affiliates -is/are endorsed by one or more authors of This Product, or in a -way that might suggest that one or more authors of This Product -is/are affiliated with You (or Your affiliates) or directly -participated in the creation of Your Product or of any work in -which You include a modified or unmodified version of This -Product. - -6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS -LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL -TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS -PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A -LAWYER. - -7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS -LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER -APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER -THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -8. If any provision of this License, or a portion thereof, is -found to be invalid or unenforceable under applicable law, it -shall not affect the validity or enforceability of the remainder -of this License, and such invalid or unenforceable provision -shall be construed to reflect the original intent of the -provision and shall be enforced to the maximum extent permitted -by applicable law so as to effect the original intent of the -provision as closely as possible. - -____________________________________________________________ - - -Third-Party Licenses - -This Product contains components that were created by third -parties and that are governed by third-party licenses, which are -contained hereinafter (separated by lines consisting of -underscores). Each of the third-party licenses applies only to -(portions of) the source code file(s) in which the third-party -license is contained or in which it is explicitly referenced, -and to compiled or otherwise processed forms of such source -code. None of the third-party licenses applies to This Product -as a whole, even when it uses terms such as "product", -"program", or any other equivalent terms/phrases. This Product -as a whole is governed by the TrueCrypt License (see above). -Some of the third-party components have been modified by the -authors of This Product. Unless otherwise stated, such -modifications and additions are governed by the TrueCrypt -License (see above). Note: Unless otherwise stated, graphics and -files that are not part of the source code are governed by the -TrueCrypt License. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, -including source code. - -You may modify this product and source code, and distribute such -modifications, and you may derive new works based on this -product, provided that: - -1. Any product which is simply derived from this product cannot -be called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your -product is distributed with source code, you must include this -notice with those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must -display on any packaging, and marketing materials which -reference your product, a notice which states: - -"This product uses components written by Paul Le Roux -" - -3. If you use any of the source code originally by Eric Young, -you must in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have -not signed it. However, nothing else grants you permission to -modify or distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this -License. - -5. If any of these license terms is found to be to broad in -scope, and declared invalid by any court or legal process, you -agree that all other terms shall not be so affected, and shall -remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE -IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED -"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR -IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS -WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE -COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN -WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE -LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, -INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR -INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS -OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH -ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. -All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software is allowed (with -or without changes) provided that: - - 1. source code distributions include the above copyright - notice, this list of conditions and the following - disclaimer; - - 2. binary distributions include the above copyright notice, - this list of conditions and the following disclaimer in - their documentation; - - 3. the name of the copyright holder is not used to endorse - products built using this software without specific written - permission. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied -warranties in respect of its properties, including, but not -limited to, correctness and/or fitness for purpose. -____________________________________________________________ - -Copyright (C) 2002-2004 Mark Adler, all rights reserved -version 1.8, 9 Jan 2004 - -This software is provided 'as-is', without any express or -implied warranty. In no event will the author be held liable -for any damages arising from the use of this software. - -Permission is granted to anyone to use this software for any -purpose, including commercial applications, and to alter it and -redistribute it freely, subject to the following restrictions: - -1. The origin of this software must not be misrepresented; you - must not claim that you wrote the original software. If you - use this software in a product, an acknowledgment in the - product documentation would be appreciated but is not - required. -2. Altered source versions must be plainly marked as such, and - must not be misrepresented as being the original software. -3. This notice may not be removed or altered from any source - distribution. -____________________________________________________________ diff --git a/licenses/License-v2.7.txt b/licenses/License-v2.7.txt deleted file mode 100644 index 0bb3c64..0000000 --- a/licenses/License-v2.7.txt +++ /dev/null @@ -1,531 +0,0 @@ -TrueCrypt License Version 2.7 - -Software distributed under this license is distributed on an "AS -IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND -DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO -USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE -SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE -BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT -ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE -SOFTWARE, NOR ANY PART(S) THEREOF. - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, -source code, graphics, texts, and accompanying files) made -available under and governed by this version of this license -("License"), as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal -entity (e.g., a non-profit organization, commercial -organization, government agency, etc.) exercising permissions -granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration -of This Product, including, but not limited to, addition to or -deletion from the substance or structure of This Product, -translation into another language, repackaging, alteration or -removal of any file included with This Product, and addition of -any new files to This Product. - -4. "Your Product" means This Product modified by You, or any -work You derive from (or base on) any part of This Product. In -addition, "Your Product" means any work in which You include any -(modified or unmodified) portion of This Product. However, if -the work in which you include it is an aggregate software -distribution (such as an operating system distribution or a -cover CD-ROM of a magazine) containing multiple separate -products, then the term "Your Product" includes only those -products (in the aggregate software distribution) that use, -include, or depend on a modified or unmodified version of This -Product (and the term "Your Product" does not include the whole -aggregate software distribution). For the purposes of this -License, a product suite consisting of two or more products is -considered a single product (operating system distributions and -cover media of magazines are not considered product suites). - -5. "Distribution" means (and "distribute" refers to), regardless -of means or methods, conveyance, transfer, providing, or making -available of This/Your Product or portions thereof to third -parties (including, but not limited to, making This/Your -Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the -product, or any portion thereof, made available for download). - - - -II. Terms and Conditions for Use, Copying, and Distribution - -1. Provided that You comply with all applicable terms and -conditions of this License, You may make copies of This Product -(unmodified) and distribute copies of This Product (unmodified) -that are not included in another product forming Your Product -(except as permitted under Chapter III). Note: For terms and -conditions for copying and distribution of modified versions of -This Product, see Chapter III. - -2. Provided that You comply with all applicable terms and -conditions of this License, You may use This Product freely (see -also Chapter III) on any number of computers/systems for non- -commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New -Products - -1. If all conditions specified in the following paragraphs in -this Chapter (III) are met (for exceptions, see Section III.2) -and if You comply with all other applicable terms and conditions -of this License, You may modify This Product (thus forming Your -Product), derive new works from This Product or portions thereof -(thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product, unless -defined otherwise in Chapter I), and You may use (for non- -commercial and/or commercial purposes), copy, and/or distribute -Your Product. - - a. The name of Your Product (or of Your modified version of - This Product) must not contain the name TrueCrypt (for - example, the following names are not allowed: TrueCrypt, - TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor - any other names confusingly similar to the name TrueCrypt - (e.g., True-Crypt, True Crypt, TruKrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of - the TrueCrypt Foundation. The goal is not to monetize the - name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of - issues that might arise from the existence of similar - products with the same or similar name. Even though - TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt - is and will remain open-source and free software. - - All occurrences of the name TrueCrypt that could reasonably - be considered to identify Your Product must be removed from - Your Product and from any associated materials. Logo(s) - included in (or attached to) Your Product (and in/to - associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos (including - the non-textual logo consisting primarily of a key in - stylized form) or portion(s) thereof. All graphics contained - in This Product (logos, icons, etc.) must be removed from - Your Product (or from Your modified version of This Product) - and from any associated materials. - - b. The following phrases must be removed from Your Product - and from any associated materials, except the text of this - License: "A TrueCrypt Foundation Release", "Released by - TrueCrypt Foundation", "This is a TrueCrypt Foundation - release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product - (if technically feasible) and contained in its - documentation. Alternatively, if This Product or its portion - You included in Your Product constitutes only a minor - portion of Your Product, phrase "Portions of this product - are based in part on TrueCrypt, freely available at - http://www.truecrypt.org/" may be displayed instead. In each - of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if - technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user - interface (if there is any) of Your Product (e.g., an - "About" window, etc.) and the way in which Your Product will - display the respective phrase. - - Your Product (and any associated materials, e.g., the - documentation, the content of the official web site of Your - Product, etc.) must not present any Internet address - containing the domain name truecrypt.org (or any domain name - that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your - Product may be obtained or where bugs found in Your Product - may be reported or where support for Your Product may be - available or otherwise attempt to indicate that the domain - name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely - and publicly available (for exceptions, see Section III.2) - at least until You cease to distribute Your Product and - there must be a well-publicized means of obtaining the - source code free of charge or for a reasonable reproduction - fee (at least until You cease to distribute Your Product). - Examples of possible ways to meet these conditions: (i) You - include the source code with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee, or (ii) You include information (valid and - correct at least until You cease to distribute Your Product) - about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee. - - Portions of the source code of Your Product not contained in - This Product (e.g., portions added by You in creating Your - Product, whether created by You or by third parties) must be - available under license(s) that (however, see also - Subsection III.1.e) allow(s) anyone to modify and derive new - works from the portions of the source code that are not - contained in This Product and to use, copy, and redistribute - such modifications and/or derivative works. The license(s) - must be perpetual, non-exclusive, royalty-free, no-charge, - and worldwide, and must not invalidate, weaken, restrict, - interpret, amend, modify, interfere with or otherwise affect - any part, term, provision, or clause of this License. The - text(s) of the license(s) must be included with every copy - of Your Product that You make and distribute. The source - code must not be deliberately obfuscated, and it must not be - in an intermediate form (e.g., the output of a - preprocessor). Source code means the preferred form in which - a programmer would usually modify the program. - - Note: If you cannot comply with the above requirements, we - may grant an exception under certain conditions. You may - request an exception at: licensing@truecrypt.org - - e. You must not change the license terms of This Product in - any way (adding any new terms is considered changing the - license terms even if the original terms are retained), - which means, e.g., that no part of This Product may be put - under another license. You must keep intact all the legal - notices contained in the source code files. You must include - the following items with every copy of Your Product that You - make and distribute: a clear and conspicuous notice stating - that Your Product or portion(s) thereof is/are governed by - this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), - a clear and conspicuous notice containing information about - where the included copy of the License can be found, and an - appropriate copyright notice. - - -2. You are not obligated to comply with Subsection III.1.d if -Your Product is not distributed (i.e., Your Product is available -only to You). - -Note: If you cannot comply with Subsection III.1.d, we may grant -an exception under certain conditions. You may request an -exception at: licensing@truecrypt.org - - - -IV. Disclaimer of Liability, Disclaimer of Warranty, -Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY -APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY -COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS -MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY -FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, -INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR -CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION -OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A -FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, -PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS -INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT -(INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, -COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A -PORTION THEREOF) OR OF YOUR PRODUCT (OR A PORTION THEREOF), OR -INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), EVEN IF -ANY (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY -HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY -KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT -LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A -PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO -THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD -THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL -NECESSARY SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC -ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT -CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY -YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR -(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN -COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND -TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT -IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE -REGULATIONS, RESTRICTIONS, AND LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS -PRODUCT, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS -FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, -SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING -REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, -ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING -OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, -IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) -AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks -associated with (or applying to) This Product, except for fair -use as defined by applicable law and except for use expressly -permitted or required by this License. Any attempt otherwise to -use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This -License and may constitute trademark infringement (which may be -prosecuted). - -TrueCrypt is a registered trademark of the TrueCrypt Foundation -registered with the World Intellectual Property Organization, an -agency of the United Nations, (international trademark -registration), in the U.S. Patent and Trademark Office, and in -the trademark offices of other countries. All TrueCrypt logos -(including the non-textual logo consisting primarily of a key in -stylized form) are trademarks of the TrueCrypt Foundation. - -Note: The goal is not to monetize the name or the product, but -to protect the reputation of TrueCrypt. TrueCrypt is and will -remain open-source and free software. - - - -VI. General Terms and Conditions, Miscellaneous Provisions - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES -DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY -PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND -BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND -THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). -IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND -CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, -(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF -APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF -PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, -CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS -PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY -TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE -COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY -RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS ON -THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR -RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY -APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN -CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE -PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED -AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT -OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE. - -3. This license does not constitute or imply a waiver of any -intellectual property rights except as may be otherwise -expressly provided in this License. This license does not -transfer, assign, or convey any intellectual property rights -(e.g., it does not transfer ownership of copyrights or -trademarks). - -4. Subject to the terms and conditions of this License, You may -allow a third party to use Your copy of This Product (or a copy -that You make and distribute, or Your Product) provided that the -third party overtly accepts and agrees to be bound by all terms -and conditions of this License and the third party is not -prohibited from using This Product (or portions thereof) by this -License (see, e.g., Section VI.7) or by applicable law. However, -You are not obligated to ensure that the third party accepts -(and agrees to be bound by all terms of) this License if You -distribute only the self-extracting package (containing This -Product) that does not allow the user to install (nor extract) -the files contained in the package until he or she accepts and -agrees to be bound by all terms and conditions of this License. - -5. Without specific prior written permission from the authors of -This Product (or from their common representative), You must not -use the name of This Product, the names of the authors of This -Product, or the names of the legal entities (or informal groups) -of which the authors were/are members/employees, to endorse or -promote Your Product or any work in which You include a modified -or unmodified version of This Product, or to endorse or promote -You or Your affiliates, or in a way that might suggest that Your -Product (or any work in which You include a modified or -unmodified version of This Product), You, or Your affiliates -is/are endorsed by one or more authors of This Product, or in a -way that might suggest that one or more authors of This Product -is/are affiliated with You (or Your affiliates) or directly -participated in the creation of Your Product or of any work in -which You include a modified or unmodified version of This -Product. - -6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS -LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL -TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS -PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A -LAWYER. - -7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS -LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER -APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER -THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -8. Except as otherwise provided in this License, if any -provision of this License, or a portion thereof, is found to be -invalid or unenforceable under applicable law, it shall not -affect the validity or enforceability of the remainder of this -License, and such invalid or unenforceable provision shall be -construed to reflect the original intent of the provision and -shall be enforced to the maximum extent permitted by applicable -law so as to effect the original intent of the provision as -closely as possible. - -____________________________________________________________ - - -Third-Party Licenses - -This Product contains components that were created by third -parties and that are governed by third-party licenses, which are -contained hereinafter (separated by lines consisting of -underscores). Each of the third-party licenses applies only to -(portions of) the source code file(s) in which the third-party -license is contained or in which it is explicitly referenced, -and to compiled or otherwise processed forms of such source -code. None of the third-party licenses applies to This Product -as a whole, even when it uses terms such as "product", -"program", or any other equivalent terms/phrases. This Product -as a whole is governed by the TrueCrypt License (see above). -Some of the third-party components have been modified by the -authors of This Product. Unless otherwise stated, such -modifications and additions are governed by the TrueCrypt -License (see above). Note: Unless otherwise stated, graphics and -files that are not part of the source code are governed by the -TrueCrypt License. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, -including source code. - -You may modify this product and source code, and distribute such -modifications, and you may derive new works based on this -product, provided that: - -1. Any product which is simply derived from this product cannot -be called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your -product is distributed with source code, you must include this -notice with those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must -display on any packaging, and marketing materials which -reference your product, a notice which states: - -"This product uses components written by Paul Le Roux -" - -3. If you use any of the source code originally by Eric Young, -you must in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have -not signed it. However, nothing else grants you permission to -modify or distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this -License. - -5. If any of these license terms is found to be to broad in -scope, and declared invalid by any court or legal process, you -agree that all other terms shall not be so affected, and shall -remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE -IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED -"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR -IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS -WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE -COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN -WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE -LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, -INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR -INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS -OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH -ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. -All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software is allowed (with -or without changes) provided that: - - 1. source code distributions include the above copyright - notice, this list of conditions and the following - disclaimer; - - 2. binary distributions include the above copyright notice, - this list of conditions and the following disclaimer in - their documentation; - - 3. the name of the copyright holder is not used to endorse - products built using this software without specific written - permission. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied -warranties in respect of its properties, including, but not -limited to, correctness and/or fitness for purpose. -____________________________________________________________ - -Copyright (C) 2002-2004 Mark Adler, all rights reserved -version 1.8, 9 Jan 2004 - -This software is provided 'as-is', without any express or -implied warranty. In no event will the author be held liable -for any damages arising from the use of this software. - -Permission is granted to anyone to use this software for any -purpose, including commercial applications, and to alter it and -redistribute it freely, subject to the following restrictions: - -1. The origin of this software must not be misrepresented; you - must not claim that you wrote the original software. If you - use this software in a product, an acknowledgment in the - product documentation would be appreciated but is not - required. -2. Altered source versions must be plainly marked as such, and - must not be misrepresented as being the original software. -3. This notice may not be removed or altered from any source - distribution. -____________________________________________________________ diff --git a/licenses/License-v2.8.txt b/licenses/License-v2.8.txt deleted file mode 100644 index df8ef78..0000000 --- a/licenses/License-v2.8.txt +++ /dev/null @@ -1,533 +0,0 @@ -TrueCrypt License Version 2.8 - -Software distributed under this license is distributed on an "AS -IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND -DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO -USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE -SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE -BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT -ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE -SOFTWARE, NOR ANY PART(S) THEREOF. - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, -source code, graphics, texts, and accompanying files) made -available under and governed by this version of this license -("License"), as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal -entity (e.g., a non-profit organization, commercial -organization, government agency, etc.) exercising permissions -granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration -of This Product, including, but not limited to, addition to or -deletion from the substance or structure of This Product, -translation into another language, repackaging, alteration or -removal of any file included with This Product, and addition of -any new files to This Product. - -4. "Your Product" means This Product modified by You, or any -work You derive from (or base on) any part of This Product. In -addition, "Your Product" means any work in which You include any -(modified or unmodified) portion of This Product. However, if -the work in which you include it is an aggregate software -distribution (such as an operating system distribution or a -cover CD-ROM of a magazine) containing multiple separate -products, then the term "Your Product" includes only those -products (in the aggregate software distribution) that use, -include, or depend on a modified or unmodified version of This -Product (and the term "Your Product" does not include the whole -aggregate software distribution). For the purposes of this -License, a product suite consisting of two or more products is -considered a single product (operating system distributions and -cover media of magazines are not considered product suites). - -5. "Distribution" means (and "distribute" refers to), regardless -of means or methods, conveyance, transfer, providing, or making -available of This/Your Product or portions thereof to third -parties (including, but not limited to, making This/Your -Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the -product, or any portion thereof, made available for download). - - - -II. Terms and Conditions for Use, Copying, and Distribution - -1. Provided that You comply with all applicable terms and -conditions of this License, You may make copies of This Product -(unmodified) and distribute copies of This Product (unmodified) -that are not included in another product forming Your Product -(except as permitted under Chapter III). Note: For terms and -conditions for copying and distribution of modified versions of -This Product, see Chapter III. - -2. Provided that You comply with all applicable terms and -conditions of this License, You may use This Product freely (see -also Chapter III) on any number of computers/systems for non- -commercial and/or commercial purposes. - - - -III. Terms and Conditions for Modification and Derivation of New -Products - -1. If all conditions specified in the following paragraphs in -this Chapter (III) are met (for exceptions, see Section III.2) -and if You comply with all other applicable terms and conditions -of this License, You may modify This Product (thus forming Your -Product), derive new works from This Product or portions thereof -(thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product, unless -defined otherwise in Chapter I), and You may use (for non- -commercial and/or commercial purposes), copy, and/or distribute -Your Product. - - a. The name of Your Product (or of Your modified version of - This Product) must not contain the name TrueCrypt (for - example, the following names are not allowed: TrueCrypt, - TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor - any other names confusingly similar to the name TrueCrypt - (e.g., True-Crypt, True Crypt, TruKrypt, etc.) - - Note: TrueCrypt and the TrueCrypt logos are trademarks of - the TrueCrypt Foundation. The goal is not to monetize the - name or the product, but to protect the reputation of - TrueCrypt, and to prevent support issues and other kinds of - issues that might arise from the existence of similar - products with the same or similar name. Even though - TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt - is and will remain open-source and free software. - - All occurrences of the name TrueCrypt that could reasonably - be considered to identify Your Product must be removed from - Your Product and from any associated materials. Logo(s) - included in (or attached to) Your Product (and in/to - associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos - (including, but not limited to, the non-textual logo - consisting primarily of a key in stylized form) or - portion(s) thereof. All graphics contained in This Product - (logos, icons, etc.) must be removed from Your Product (or - from Your modified version of This Product) and from any - associated materials. - - b. The following phrases must be removed from Your Product - and from any associated materials, except the text of this - License: "A TrueCrypt Foundation Release", "Released by - TrueCrypt Foundation", "This is a TrueCrypt Foundation - release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product - (if technically feasible) and contained in its - documentation. Alternatively, if This Product or its portion - You included in Your Product constitutes only a minor - portion of Your Product, phrase "Portions of this product - are based in part on TrueCrypt, freely available at - http://www.truecrypt.org/" may be displayed instead. In each - of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if - technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user - interface (if there is any) of Your Product (e.g., an - "About" window, etc.) and the way in which Your Product will - display the respective phrase. - - Your Product (and any associated materials, e.g., the - documentation, the content of the official web site of Your - Product, etc.) must not present any Internet address - containing the domain name truecrypt.org (or any domain name - that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your - Product may be obtained or where bugs found in Your Product - may be reported or where support for Your Product may be - available or otherwise attempt to indicate that the domain - name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely - and publicly available (for exceptions, see Section III.2) - at least until You cease to distribute Your Product and - there must be a well-publicized means of obtaining the - source code free of charge or for a reasonable reproduction - fee (at least until You cease to distribute Your Product). - Examples of possible ways to meet these conditions: (i) You - include the source code with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee, or (ii) You include information (valid and - correct at least until You cease to distribute Your Product) - about where the source code can be freely obtained (e.g., an - Internet address, etc.) with every copy of Your Product that - You make and distribute (see also below in this Subsection - III.1.d for conditions that licenses governing the source - code must meet) provided that You make the copies available - to the general public free of charge or for a reasonable - reproduction fee. - - Portions of the source code of Your Product not contained in - This Product (e.g., portions added by You in creating Your - Product, whether created by You or by third parties) must be - available under license(s) that (however, see also - Subsection III.1.e) allow(s) anyone to modify and derive new - works from the portions of the source code that are not - contained in This Product and to use, copy, and redistribute - such modifications and/or derivative works. The license(s) - must be perpetual, non-exclusive, royalty-free, no-charge, - and worldwide, and must not invalidate, weaken, restrict, - interpret, amend, modify, interfere with or otherwise affect - any part, term, provision, or clause of this License. The - text(s) of the license(s) must be included with every copy - of Your Product that You make and distribute. The source - code must not be deliberately obfuscated, and it must not be - in an intermediate form (e.g., the output of a - preprocessor). Source code means the preferred form in which - a programmer would usually modify the program. - - Note: If you cannot comply with the above requirements, we - may grant an exception under certain conditions. You may - request an exception at: licensing@truecrypt.org - - e. You must not change the license terms of This Product in - any way (adding any new terms is considered changing the - license terms even if the original terms are retained), - which means, e.g., that no part of This Product may be put - under another license. You must keep intact all the legal - notices contained in the source code files. You must include - the following items with every copy of Your Product that You - make and distribute: a clear and conspicuous notice stating - that Your Product or portion(s) thereof is/are governed by - this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), - a clear and conspicuous notice containing information about - where the included copy of the License can be found, and an - appropriate copyright notice. - - -2. You are not obligated to comply with Subsection III.1.d if -Your Product is not distributed (i.e., Your Product is available -only to You). - -Note: If you cannot comply with Subsection III.1.d, we may grant -an exception under certain conditions. You may request an -exception at: licensing@truecrypt.org - - - -IV. Disclaimer of Liability, Disclaimer of Warranty, -Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY -APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY -COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS -MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY -FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, -INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR -CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION -OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A -FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, -PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS -INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT -(INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, -ARISING OUT OF THE USE, COPYING, MODIFICATION, OR -(RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF -YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS -PRODUCT (OR A PORTION THEREOF), EVEN IF ANY (CO)AUTHOR, -COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY HAS BEEN ADVISED -OF THE POSSIBILITY OF SUCH DAMAGES. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY -KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT -LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A -PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO -THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD -THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL -NECESSARY SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC -ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT -CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY -YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR -(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN -COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND -TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT -IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE -REGULATIONS, RESTRICTIONS, AND LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS -PRODUCT, AND APPLICABLE COPYRIGHT/TRADEMARK OWNERS, HARMLESS -FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, -SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING -REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, -ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING -OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, -IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) -AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks -associated with (or applying to) This Product, except for fair -use as defined by applicable law and except for use expressly -permitted or required by this License. Any attempt otherwise to -use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This -License and may constitute trademark infringement (which may be -prosecuted). - -TrueCrypt is a registered trademark of the TrueCrypt Foundation -registered with the World Intellectual Property Organization, an -agency of the United Nations, (international trademark -registration), in the U.S. Patent and Trademark Office, and in -the trademark offices of other countries. All TrueCrypt logos -(including the non-textual logo consisting primarily of a key in -stylized form) are trademarks of the TrueCrypt Foundation. - -Note: The goal is not to monetize the name or the product, but -to protect the reputation of TrueCrypt. TrueCrypt is and will -remain open-source and free software. - - - -VI. General Terms and Conditions, Miscellaneous Provisions - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES -DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY -PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND -BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND -THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). -IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND -CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, -(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF -APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF -PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, -CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS -PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY -TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE -COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS -AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS -ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR -RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY -APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN -CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE -PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED -AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT -OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE. - -3. This license does not constitute or imply a waiver of any -intellectual property rights except as may be otherwise -expressly provided in this License. This license does not -transfer, assign, or convey any intellectual property rights -(e.g., it does not transfer ownership of copyrights or -trademarks). - -4. Subject to the terms and conditions of this License, You may -allow a third party to use Your copy of This Product (or a copy -that You make and distribute, or Your Product) provided that the -third party overtly accepts and agrees to be bound by all terms -and conditions of this License and the third party is not -prohibited from using This Product (or portions thereof) by this -License (see, e.g., Section VI.7) or by applicable law. However, -You are not obligated to ensure that the third party accepts -(and agrees to be bound by all terms of) this License if You -distribute only the self-extracting package (containing This -Product) that does not allow the user to install (nor extract) -the files contained in the package until he or she accepts and -agrees to be bound by all terms and conditions of this License. - -5. Without specific prior written permission from the authors of -This Product (or from their common representative), You must not -use the name of This Product, the names of the authors of This -Product, or the names of the legal entities (or informal groups) -of which the authors were/are members/employees, to endorse or -promote Your Product or any work in which You include a modified -or unmodified version of This Product, or to endorse or promote -You or Your affiliates, or in a way that might suggest that Your -Product (or any work in which You include a modified or -unmodified version of This Product), You, or Your affiliates -is/are endorsed by one or more authors of This Product, or in a -way that might suggest that one or more authors of This Product -is/are affiliated with You (or Your affiliates) or directly -participated in the creation of Your Product or of any work in -which You include a modified or unmodified version of This -Product. - -6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS -LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL -TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS -PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A -LAWYER. - -7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS -LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER -APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER -THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -8. Except as otherwise provided in this License, if any -provision of this License, or a portion thereof, is found to be -invalid or unenforceable under applicable law, it shall not -affect the validity or enforceability of the remainder of this -License, and such invalid or unenforceable provision shall be -construed to reflect the original intent of the provision and -shall be enforced to the maximum extent permitted by applicable -law so as to effect the original intent of the provision as -closely as possible. - -____________________________________________________________ - - -Third-Party Licenses - -This Product contains components that were created by third -parties and that are governed by third-party licenses, which are -contained hereinafter (separated by lines consisting of -underscores). Each of the third-party licenses applies only to -(portions of) the source code file(s) in which the third-party -license is contained or in which it is explicitly referenced, -and to compiled or otherwise processed forms of such source -code. None of the third-party licenses applies to This Product -as a whole, even when it uses terms such as "product", -"program", or any other equivalent terms/phrases. This Product -as a whole is governed by the TrueCrypt License (see above). -Some of the third-party components have been modified by the -authors of This Product. Unless otherwise stated, such -modifications and additions are governed by the TrueCrypt -License (see above). Note: Unless otherwise stated, graphics and -files that are not part of the source code are governed by the -TrueCrypt License. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, -including source code. - -You may modify this product and source code, and distribute such -modifications, and you may derive new works based on this -product, provided that: - -1. Any product which is simply derived from this product cannot -be called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your -product is distributed with source code, you must include this -notice with those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must -display on any packaging, and marketing materials which -reference your product, a notice which states: - -"This product uses components written by Paul Le Roux -" - -3. If you use any of the source code originally by Eric Young, -you must in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have -not signed it. However, nothing else grants you permission to -modify or distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this -License. - -5. If any of these license terms is found to be to broad in -scope, and declared invalid by any court or legal process, you -agree that all other terms shall not be so affected, and shall -remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE -IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED -"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR -IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS -WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE -COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN -WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE -LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, -INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR -INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS -OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH -ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. -All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software is allowed (with -or without changes) provided that: - - 1. source code distributions include the above copyright - notice, this list of conditions and the following - disclaimer; - - 2. binary distributions include the above copyright notice, - this list of conditions and the following disclaimer in - their documentation; - - 3. the name of the copyright holder is not used to endorse - products built using this software without specific written - permission. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied -warranties in respect of its properties, including, but not -limited to, correctness and/or fitness for purpose. -____________________________________________________________ - -Copyright (C) 2002-2004 Mark Adler, all rights reserved -version 1.8, 9 Jan 2004 - -This software is provided 'as-is', without any express or -implied warranty. In no event will the author be held liable -for any damages arising from the use of this software. - -Permission is granted to anyone to use this software for any -purpose, including commercial applications, and to alter it and -redistribute it freely, subject to the following restrictions: - -1. The origin of this software must not be misrepresented; you - must not claim that you wrote the original software. If you - use this software in a product, an acknowledgment in the - product documentation would be appreciated but is not - required. -2. Altered source versions must be plainly marked as such, and - must not be misrepresented as being the original software. -3. This notice may not be removed or altered from any source - distribution. -____________________________________________________________ diff --git a/licenses/License-v3.0.txt b/licenses/License-v3.0.txt deleted file mode 100644 index b2103ab..0000000 --- a/licenses/License-v3.0.txt +++ /dev/null @@ -1,503 +0,0 @@ -TrueCrypt License Version 3.0 - -Software distributed under this license is distributed on an "AS -IS" BASIS WITHOUT WARRANTIES OF ANY KIND. THE AUTHORS AND -DISTRIBUTORS OF THE SOFTWARE DISCLAIM ANY LIABILITY. ANYONE WHO -USES, COPIES, MODIFIES, OR (RE)DISTRIBUTES ANY PART OF THE -SOFTWARE IS, BY SUCH ACTION(S), ACCEPTING AND AGREEING TO BE -BOUND BY ALL TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT -ACCEPT THEM, DO NOT USE, COPY, MODIFY, NOR (RE)DISTRIBUTE THE -SOFTWARE, NOR ANY PART(S) THEREOF. - - -I. Definitions - -1. "This Product" means the work (including, but not limited to, -source code, graphics, texts, and accompanying files) made -available under and governed by this version of this license -("License"), as may be indicated by, but is not limited to, -copyright notice(s) attached to or included in the work. - -2. "You" means (and "Your" refers to) an individual or a legal -entity (e.g., a non-profit organization, commercial -organization, government agency, etc.) exercising permissions -granted by this License. - -3. "Modification" means (and "modify" refers to) any alteration -of This Product, including, but not limited to, addition to or -deletion from the substance or structure of This Product, -translation into another language, repackaging, alteration or -removal of any file included with This Product, and addition of -any new files to This Product. - -4. "Your Product" means This Product modified by You, or any -work You derive from (or base on) any part of This Product. In -addition, "Your Product" means any work in which You include any -(modified or unmodified) portion of This Product. However, if -the work in which you include it is an aggregate software -distribution (such as an operating system distribution or a -cover CD-ROM of a magazine) containing multiple separate -products, then the term "Your Product" includes only those -products (in the aggregate software distribution) that use, -include, or depend on a modified or unmodified version of This -Product (and the term "Your Product" does not include the whole -aggregate software distribution). For the purposes of this -License, a product suite consisting of two or more products is -considered a single product (operating system distributions and -cover media of magazines are not considered product suites). - -5. "Distribution" means (and "distribute" refers to), regardless -of means or methods, conveyance, transfer, providing, or making -available of This/Your Product or portions thereof to third -parties (including, but not limited to, making This/Your -Product, or portions thereof, available for download to third -parties, whether or not any third party has downloaded the -product, or any portion thereof, made available for download). - - - -II. Use, Copying, and Distribution of This Product - -1. Provided that You comply with all applicable terms and -conditions of this License, You may make copies of This Product -(unmodified) and distribute copies of This Product (unmodified) -that are not included in another product forming Your Product -(except as permitted under Chapter III). Note: For terms and -conditions for copying and distribution of modified versions of -This Product, see Chapter III. - -2. Provided that You comply with all applicable terms and -conditions of this License, You may use This Product freely (see -also Chapter III) on any number of computers/systems for non- -commercial and/or commercial purposes. - - - -III. Modification, Derivation, and Inclusion in Other Products - -1. If all conditions specified in the following paragraphs in -this Chapter (III) are met (for exceptions, see Section III.2) -and if You comply with all other applicable terms and conditions -of this License, You may modify This Product (thus forming Your -Product), derive new works from This Product or portions thereof -(thus forming Your Product), include This Product or portions -thereof in another product (thus forming Your Product, unless -defined otherwise in Chapter I), and You may use (for non- -commercial and/or commercial purposes), copy, and/or distribute -Your Product. - - a. The name of Your Product (or of Your modified version of - This Product) must not contain the name TrueCrypt (for - example, the following names are not allowed: TrueCrypt, - TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor - any other names confusingly similar to the name TrueCrypt - (e.g., True-Crypt, True Crypt, TruKrypt, etc.) - - All occurrences of the name TrueCrypt that could reasonably - be considered to identify Your Product must be removed from - Your Product and from any associated materials. Logo(s) - included in (or attached to) Your Product (and in/to - associated materials) must not incorporate and must not be - confusingly similar to any of the TrueCrypt logos - (including, but not limited to, the non-textual logo - consisting primarily of a key in stylized form) or - portion(s) thereof. All graphics contained in This Product - (logos, icons, etc.) must be removed from Your Product (or - from Your modified version of This Product) and from any - associated materials. - - b. The following phrases must be removed from Your Product - and from any associated materials, except the text of this - License: "A TrueCrypt Foundation Release", "Released by - TrueCrypt Foundation", "This is a TrueCrypt Foundation - release." - - c. Phrase "Based on TrueCrypt, freely available at - http://www.truecrypt.org/" must be displayed by Your Product - (if technically feasible) and contained in its - documentation. Alternatively, if This Product or its portion - You included in Your Product constitutes only a minor - portion of Your Product, phrase "Portions of this product - are based in part on TrueCrypt, freely available at - http://www.truecrypt.org/" may be displayed instead. In each - of the cases mentioned above in this paragraph, - "http://www.truecrypt.org/" must be a hyperlink (if - technically feasible) pointing to http://www.truecrypt.org/ - and You may freely choose the location within the user - interface (if there is any) of Your Product (e.g., an - "About" window, etc.) and the way in which Your Product will - display the respective phrase. - - Your Product (and any associated materials, e.g., the - documentation, the content of the official web site of Your - Product, etc.) must not present any Internet address - containing the domain name truecrypt.org (or any domain name - that forwards to the domain name truecrypt.org) in a manner - that might suggest that it is where information about Your - Product may be obtained or where bugs found in Your Product - may be reported or where support for Your Product may be - available or otherwise attempt to indicate that the domain - name truecrypt.org is associated with Your Product. - - d. The complete source code of Your Product must be freely - and publicly available (for exceptions, see Section III.2) - at least until You cease to distribute Your Product. This - condition can be met in one or both of the following ways: - (i) You include the complete source code of Your Product - with every copy of Your Product that You make and distribute - and You make all such copies of Your Product available to - the general public free of charge, and/or (ii) You include - information (valid and correct at least until You cease to - distribute Your Product) about where the complete source - code of Your Product can be obtained free of charge (e.g., - an Internet address) or for a reasonable reproduction fee - with every copy of Your Product that You make and distribute - and, if there is a web site officially associated with Your - Product, You include the aforementioned information about - the source code on a freely and publicly accessible web - page to which such web site links via an easily viewable - hyperlink (at least until You cease to distribute Your - Product). - - The source code of Your Product must not be deliberately - obfuscated and it must not be in an intermediate form (e.g., - the output of a preprocessor). Source code means the - preferred form in which a programmer would usually modify - the program. - - Portions of the source code of Your Product not contained in - This Product (e.g., portions added by You in creating Your - Product, whether created by You or by third parties) must be - available under license(s) that (however, see also - Subsection III.1.e) allow(s) anyone to modify and derive new - works from the portions of the source code that are not - contained in This Product and to use, copy, and redistribute - such modifications and/or derivative works. The license(s) - must be perpetual, non-exclusive, royalty-free, no-charge, - and worldwide, and must not invalidate, weaken, restrict, - interpret, amend, modify, interfere with or otherwise affect - any part, term, provision, or clause of this License. The - text(s) of the license(s) must be included with every copy - of Your Product that You make and distribute. - - e. You must not change the license terms of This Product in - any way (adding any new terms is considered changing the - license terms even if the original terms are retained), - which means, e.g., that no part of This Product may be put - under another license. You must keep intact all the legal - notices contained in the source code files. You must include - the following items with every copy of Your Product that You - make and distribute: a clear and conspicuous notice stating - that Your Product or portion(s) thereof is/are governed by - this version of the TrueCrypt License, a verbatim copy of - this version of the TrueCrypt License (as contained herein), - a clear and conspicuous notice containing information about - where the included copy of the License can be found, and an - appropriate copyright notice. - - -2. You are not obligated to comply with Subsection III.1.d if -Your Product is not distributed (i.e., Your Product is available -only to You). - - - -IV. Disclaimer of Liability, Disclaimer of Warranty, -Indemnification - -You expressly acknowledge and agree to the following: - -1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY -APPLICABLE INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY WHO -MAY COPY AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, -AS MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER -PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY -DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, -EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED -TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR -THIRD PARTIES, A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY -OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR -BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, -TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, -ARISING OUT OF THE USE, COPYING, MODIFICATION, OR -(RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF) OR OF -YOUR PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS -PRODUCT (OR A PORTION THEREOF), EVEN IF SUCH DAMAGES (OR THE -POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO -ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY. - -2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY -KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT -LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A -PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO -THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD -THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL -NECESSARY SERVICING, REPAIR, OR CORRECTION. - -3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC -ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT -CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY -YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR -(RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN -COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND -TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT -IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE -REGULATIONS, RESTRICTIONS, AND LAWS. - -4. YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS -PRODUCT, AND APPLICABLE INTELLECTUAL-PROPERTY OWNERS, HARMLESS -FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, -SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING -REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, -ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING -OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, -IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) -AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE. - - - -V. Trademarks - -This License does not grant permission to use trademarks -associated with (or applying to) This Product, except for fair -use as defined by applicable law and except for use expressly -permitted or required by this License. Any attempt otherwise to -use trademarks associated with (or applying to) This Product -automatically and immediately terminates Your rights under This -License and may constitute trademark infringement (which may be -prosecuted). - - - -VI. General Terms and Conditions, Miscellaneous Provisions - -1. ANYONE WHO USES AND/OR COPIES AND/OR MODIFIES AND/OR CREATES -DERIVATIVE WORKS OF AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY -PORTION(S) THEREOF, IS, BY SUCH ACTION(S), AGREEING TO BE BOUND -BY AND ACCEPTING ALL TERMS AND CONDITIONS OF THIS LICENSE (AND -THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). -IF YOU DO NOT ACCEPT (AND AGREE TO BE BOUND BY) ALL TERMS AND -CONDITIONS OF THIS LICENSE, DO NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -2. YOU MAY NOT USE, MODIFY, COPY, CREATE DERIVATIVE WORKS OF, -(RE)DISTRIBUTE, OR SUBLICENSE THIS PRODUCT, OR PORTION(S) -THEREOF, EXCEPT AS EXPRESSLY PROVIDED IN THIS LICENSE (EVEN IF -APPLICABLE LAW GIVES YOU MORE RIGHTS). ANY ATTEMPT (EVEN IF -PERMITTED BY APPLICABLE LAW) OTHERWISE TO USE, MODIFY, COPY, -CREATE DERIVATIVE WORKS OF, (RE)DISTRIBUTE, OR SUBLICENSE THIS -PRODUCT, OR PORTION(S) THEREOF, AUTOMATICALLY AND IMMEDIATELY -TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN CONSTITUTE -COPYRIGHT INFRINGEMENT (WHICH MAY BE PROSECUTED). ANY CONDITIONS -AND RESTRICTIONS CONTAINED IN THIS LICENSE ARE ALSO LIMITATIONS -ON THE SCOPE OF THIS LICENSE AND ALSO DEFINE THE SCOPE OF YOUR -RIGHTS UNDER THIS LICENSE. YOUR FAILURE TO COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE OR FAILURE TO PERFORM ANY -APPLICABLE OBLIGATION IMPOSED BY THIS LICENSE AUTOMATICALLY AND -IMMEDIATELY TERMINATES YOUR RIGHTS UNDER THIS LICENSE AND CAN -CAUSE OR BE CONSIDERED COPYRIGHT INFRINGEMENT (WHICH MAY BE -PROSECUTED). NOTHING IN THIS LICENSE SHALL IMPLY OR BE CONSTRUED -AS A PROMISE, OBLIGATION, OR COVENANT NOT TO SUE FOR COPYRIGHT -OR TRADEMARK INFRINGEMENT IF YOU DO NOT COMPLY WITH THE TERMS -AND CONDITIONS OF THIS LICENSE. - -3. This License does not constitute or imply a waiver of any -intellectual property rights except as may be otherwise -expressly provided in this License. This License does not -transfer, assign, or convey any intellectual property rights -(e.g., it does not transfer ownership of copyrights or -trademarks). - -4. Subject to the terms and conditions of this License, You may -allow a third party to use Your copy of This Product (or a copy -that You make and distribute, or Your Product) provided that the -third party explicitly accepts and agrees to be bound by all -terms and conditions of this License and the third party is not -prohibited from using This Product (or portions thereof) by this -License (see, e.g., Section VI.7) or by applicable law. However, -You are not obligated to ensure that the third party accepts -(and agrees to be bound by all terms of) this License if You -distribute only the self-extracting package (containing This -Product) that does not allow the user to install (nor extract) -the files contained in the package until he or she accepts and -agrees to be bound by all terms and conditions of this License. - -5. Without specific prior written permission from the authors of -This Product (or from their common representative), You must not -use the name of This Product, the names of the authors of This -Product, or the names of the legal entities (or informal groups) -of which the authors were/are members/employees, to endorse or -promote Your Product or any work in which You include a modified -or unmodified version of This Product, or to endorse or promote -You or Your affiliates, or in a way that might suggest that Your -Product (or any work in which You include a modified or -unmodified version of This Product), You, or Your affiliates -is/are endorsed by one or more authors of This Product, or in a -way that might suggest that one or more authors of This Product -is/are affiliated with You (or Your affiliates) or directly -participated in the creation of Your Product or of any work in -which You include a modified or unmodified version of This -Product. - -6. IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS -LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL -TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, -MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS -PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A -LAWYER. - -7. IF (IN RELEVANT CONTEXT) ANY PROVISION OF CHAPTER IV OF THIS -LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER -APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER -THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE -DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY -PORTION(S) THEREOF. - -8. Except as otherwise provided in this License, if any -provision of this License, or a portion thereof, is found to be -invalid or unenforceable under applicable law, it shall not -affect the validity or enforceability of the remainder of this -License, and such invalid or unenforceable provision shall be -construed to reflect the original intent of the provision and -shall be enforced to the maximum extent permitted by applicable -law so as to effect the original intent of the provision as -closely as possible. - -____________________________________________________________ - - -Third-Party Licenses - -This Product contains components that were created by third -parties and that are governed by third-party licenses, which are -contained hereinafter (separated by lines consisting of -underscores). Each of the third-party licenses applies only to -(portions of) the source code file(s) in which the third-party -license is contained or in which it is explicitly referenced, -and to compiled or otherwise processed forms of such source -code. None of the third-party licenses applies to This Product -as a whole, even when it uses terms such as "product", -"program", or any other equivalent terms/phrases. This Product -as a whole is governed by the TrueCrypt License (see above). -Some of the third-party components have been modified by the -authors of This Product. Unless otherwise stated, such -modifications and additions are governed by the TrueCrypt -License (see above). Note: Unless otherwise stated, graphics and -files that are not part of the source code are governed by the -TrueCrypt License. - -____________________________________________________________ - -License agreement for Encryption for the Masses. - -Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. - -This product can be copied and distributed free of charge, -including source code. - -You may modify this product and source code, and distribute such -modifications, and you may derive new works based on this -product, provided that: - -1. Any product which is simply derived from this product cannot -be called E4M, or Encryption for the Masses. - -2. If you use any of the source code in your product, and your -product is distributed with source code, you must include this -notice with those portions of this source code that you use. - -Or, - -If your product is distributed in binary form only, you must -display on any packaging, and marketing materials which -reference your product, a notice which states: - -"This product uses components written by Paul Le Roux -" - -3. If you use any of the source code originally by Eric Young, -you must in addition follow his terms and conditions. - -4. Nothing requires that you accept this License, as you have -not signed it. However, nothing else grants you permission to -modify or distribute the product or its derivative works. - -These actions are prohibited by law if you do not accept this -License. - -5. If any of these license terms is found to be to broad in -scope, and declared invalid by any court or legal process, you -agree that all other terms shall not be so affected, and shall -remain valid and enforceable. - -6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE -IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED -"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR -IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES -OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE -ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS -WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE -COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - -7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN -WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY -MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE -LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, -INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR -INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS -OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH -ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD -PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -____________________________________________________________ - -Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. -All rights reserved. - -LICENSE TERMS - -The free distribution and use of this software is allowed (with -or without changes) provided that: - - 1. source code distributions include the above copyright - notice, this list of conditions and the following - disclaimer; - - 2. binary distributions include the above copyright notice, - this list of conditions and the following disclaimer in - their documentation; - - 3. the name of the copyright holder is not used to endorse - products built using this software without specific written - permission. - -DISCLAIMER - -This software is provided 'as is' with no explicit or implied -warranties in respect of its properties, including, but not -limited to, correctness and/or fitness for purpose. -____________________________________________________________ - -Copyright (C) 2002-2004 Mark Adler, all rights reserved -version 1.8, 9 Jan 2004 - -This software is provided 'as-is', without any express or -implied warranty. In no event will the author be held liable -for any damages arising from the use of this software. - -Permission is granted to anyone to use this software for any -purpose, including commercial applications, and to alter it and -redistribute it freely, subject to the following restrictions: - -1. The origin of this software must not be misrepresented; you - must not claim that you wrote the original software. If you - use this software in a product, an acknowledgment in the - product documentation would be appreciated but is not - required. -2. Altered source versions must be plainly marked as such, and - must not be misrepresented as being the original software. -3. This notice may not be removed or altered from any source - distribution. -____________________________________________________________