TrueCrypt Collective License Version 1.2 The TrueCrypt Collective License consists of several distinct licenses, which are contained in this document (separated by lines consisting of underscores) and which are, in this section, referred to as component licenses. Each of the component licenses applies only to (portions of) the source code file(s) in which the component license is contained or in which it is explicitly referenced, and to compiled or otherwise processed forms of such source code. None of the component licenses applies to this product as a whole, even when it uses the phrase "this product" or any other equivalent term/phrase. Unless otherwise stated, graphics and files that are not part of the source code are covered solely by the TrueCrypt License. Note: The TrueCrypt License is one of the component licenses of which the TrueCrypt Collective License consists. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any part(s) of work made available under this version of the TrueCrypt Collective License, is, by such action(s), accepting in full the responsibilities and obligations contained in the component licenses that apply to the corresponding part(s) of such work. If any term of this license is found to be invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of any other terms of this license that are found to be valid and enforceable under applicable law. ____________________________________________________________ TrueCrypt License Version 2.3 I. Definitions 1. "This Product" means the work (including, but not limited to, source code, graphics, texts, and accompanying files) made available under and covered by this version of this License, as may be indicated by, but is not limited to, copyright notice(s) attached to or included in the work. 2. "You" means (and "Your" refers to) an individual or a legal entity (e.g., a non-profit organization, commercial organization, government agency, etc.) exercising rights under this License. 3. "Modification" means (and "modify" refers to) any alteration of This Product, including, but not limited to, addition to or deletion from the substance or structure of This Product, and translation into another language. 4. "Your Product" means This Product modified by You, any work You derive from (or base on) This Product, any work in which You include This Product, or any respective part(s) thereof. 5. "Distribution" means (and "distribute" refers to), regardless of means or methods, conveyance or transfer of This/Your Product or portions thereof to third parties, or making This/Your Product or portions thereof available for download to third parties, regardless of whether any third party downloads the product (or a portion thereof) made available for download or not. II. Terms and Conditions for Use, Reproduction, and Distribution 1. You may reproduce and/or distribute This Product, provided that You do not modify any part of This Product (for terms and conditions for reproduction and distribution of modified versions of This Product, see Section III) and provided that You ensure that all the legal notices and documents (containing, e.g., the text of this License, references to this License, etc.) included with This Product are included with every copy of This Product that you make and distribute, and provided that you comply with all applicable terms and conditions of this License. 2. Provided that you comply with all applicable terms and conditions of this License, You may use This Product freely (see also Section III) on any number of computers/systems for non-commercial and/or commercial purposes. III. Terms and Conditions for Modification and Derivation of New Products 1. If all conditions specified in the following paragraphs in this Section are met (for exceptions, see Sections III.2 and III.3), You may modify This Product (thus forming Your Product), derive new works from This Product or portions thereof (thus forming Your Product), include This Product or portions thereof in another product (thus forming Your Product), and You may copy and/or distribute Your Product. a. The name of Your Product (or of Your modified version of This Product) must not contain the name TrueCrypt (for example, the following names are not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt, etc.) nor any of its variations that can be easily confused with the name TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.) Note: TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation. The goal is not to monetize the name or the product, but to protect the reputation of TrueCrypt, and to prevent support issues and other kinds of issues that might arise from the existence of similar products with the same or similar name. Even though TrueCrypt and the TrueCrypt logos are trademarks, TrueCrypt is and will remain open-source and free software. All graphics files showing any TrueCrypt logo (including the non-textual logo consisting primarily of a key in stylized form) must be removed from Your Product (or from Your modified version of This Product) and from any associated materials. Logo(s) included in (or attached to) Your Product (or in/to associated materials) must not incorporate and must not be confusingly similar to any of the TrueCrypt logos or portion(s) thereof. b. The following phrases must be removed from Your Product and from any associated materials: "A TrueCrypt Foundation Release" "Released by TrueCrypt Foundation" "This is a TrueCrypt Foundation release." c. Phrase "Based on TrueCrypt, freely available at http://www.truecrypt.org/" must be displayed by Your Product (if technically feasible) and contained in its documentation. Alternatively, if This Product or its portion You included in Your Product comprises only a minor portion of Your Product, phrase "Portions of this product are based in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be displayed instead. In each of the cases mentioned above in this paragraph, "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ and you may freely choose the location within the user interface (if there is any) of Your Product (e.g., an "About" window, etc.) and the way in which Your Product will display the respective phrase. Your Product (and any associated materials, e.g., the documentation, the content of the official web site of Your Product, etc.) must not present any Internet address containing the domain name truecrypt.org (or any domain name that forwards to the domain name truecrypt.org) in a manner that suggests that it is where information about Your Product may be obtained or where bugs found in Your Product may be reported or where support for Your Product may be available or otherwise attempt to indicate that the domain name truecrypt.org is associated with Your Product. d. The complete source code of Your Product must be freely and publicly available (for exceptions, see Sections III.2 and III.3) at least until you cease to distribute Your Product. To meet this condition, it is sufficient that You merely include the source code with every copy of Your Product that you make and distribute; it is also sufficient that You merely include information (valid and correct at least until you cease to distribute Your Product) about where the source code can be freely obtained (e.g., an Internet address, etc.) with every copy of Your Product that you make and distribute. The source code must be available under license(s) that are/is compatible with this version of the TrueCrypt License (however, see also Section III.1.e) and that allow(s) anyone to modify and derive new works from Your Product (and portions thereof) and to use, reproduce, and redistribute such modifications and/or derived works. The license(s) must be non-exclusive, royalty-free, no-charge, perpetual, and world-wide. The text of the license(s) must be included with every copy of Your Product that you make and distribute. The source code must not be deliberately obfuscated, and it must not be in an intermediate form (e.g., the output of a preprocessor). Source code means the preferred form in which a programmer would usually modify the program. Note: If you cannot comply with the above requirements, we may grant an exception under certain conditions. You may request an exception at: licensing@truecrypt.org e. You must not change the license and distribution terms of This Product in any way (i.e., no part of This Product may be put under another license). You must keep intact all the legal notices contained in the source code files. You must include the following items with every copy of Your Product that you make and distribute: a clear and conspicuous notice stating that Your Product or portion(s) thereof is/are distributed under this version of the TrueCrypt License, a verbatim copy of this version of the TrueCrypt License (as contained herein), a clear and conspicuous notice containing information about where the included copy of the License can be found, and an appropriate copyright notice. f. Without specific prior written permission from the authors of This Product (or from their common representative), you must not use the name of This Product, the names of the authors of This Product, or the names of the legal entities (or informal groups) of which the authors were/are members/employees, to endorse or promote Your Product, or in a way that suggests that Your Product is endorsed by one or more authors of This Product, or in a way that suggests that one or more authors of This Product directly participated in the creation of Your Product. 2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c, and III.1.d, if all conditions specified in one of the two following paragraphs are met: a. Your Product is an operating system distribution, or other aggregate software distribution (such as a cover CD-ROM of a magazine) containing products from different sources, in which You include either This Product without any modifications or file(s) which You obtain by compiling the unmodified source code of This Product. b. You include This Product in its entirety and without any modifications (You may omit the source code of This Product) as non-integral part of Your Product (i.e., none of the main functionalities of Your Product will be affected if such non-integral part is removed) and phrase "This product utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or phrase "This product includes TrueCrypt, freely available at http://www.truecrypt.org/" is displayed by Your Product (if technically feasible) and contained in its documentation. In each of the cases mentioned above in this paragraph, "http://www.truecrypt.org/" must be a hyperlink (if technically feasible) pointing to http://www.truecrypt.org/ and you may freely choose the location within the user interface (if there is any) of Your Product (e.g., an "About" window, etc.) and the way in which Your Product will display the respective phrase. 3. You are not obligated to comply with Section III.1.d if Your Product is not distributed (i.e., Your Product is available only to You). IV. Disclaimer of Warranties and Liabilities; Indemnification You expressly acknowledge and agree to the following: 1. IN NO EVENT WILL ANY (CO)AUTHOR OF THIS PRODUCT, OR ANY APPLICABLE COPYRIGHT/TRADEMARK OWNER, OR ANY OTHER PARTY WHO MAY REPRODUCE AND/OR (RE)DISTRIBUTE THIS PRODUCT OR PORTIONS THEREOF, AS MAY BE PERMITTED HEREIN, BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE, REPRODUCTION, MODIFICATION, OR (RE)DISTRIBUTION OF THIS PRODUCT (OR A PORTION THEREOF), OR INABILITY TO USE THIS PRODUCT (OR A PORTION THEREOF), INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, LOSSES SUSTAINED BY YOU OR THIRD PARTIES, OR A FAILURE OF THIS PRODUCT TO OPERATE WITH ANY OTHER PRODUCT, EVEN IF SUCH (CO)AUTHOR, COPYRIGHT/TRADEMARK OWNER, AND/OR ANY OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2. THIS PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRODUCT IS WITH YOU. SHOULD THIS PRODUCT PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 3. THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH REGULATIONS/RESTRICTIONS. 4. You shall indemnify, defend and hold all (co)authors of This Product, their agents and associates, and applicable copyright/trademark owners, harmless from/against any liability, loss, expense, damages, claims or causes of action, arising out of Your use, inability to use, reproduction, (re)distribution, import and/or (re)export of This Product (or portions thereof) and/or Your breach of any term of this License. V. Trademarks This License does not grant permission to use trademarks associated with (or applying to) This Product, except for fair use as defined by applicable law and except for use expressly permitted or required by this License. TrueCrypt and the TrueCrypt logos (including the non-textual logo consisting primarily of a key in stylized form) are trademarks of the TrueCrypt Foundation. Note: The goal is not to monetize the name or the product, but to protect the reputation of TrueCrypt. TrueCrypt is and will remain open-source and free software. VI. General Terms 1. You may not use, modify, reproduce, derive from, (re)distribute, or sublicense This Product, or portion(s) thereof, except as expressly provided under this License. Any attempt (even if permitted by applicable law) otherwise to use, modify, reproduce, derive from, (re)distribute, or sublicense This Product, or portion(s) thereof, automatically and immediately terminates Your rights under this License. 2. ANYONE WHO USES AND/OR REPRODUCES AND/OR MODIFIES AND/OR DERIVES FROM AND/OR (RE)DISTRIBUTES THIS PRODUCT, OR ANY PORTION(S) THEREOF, IS, BY SUCH ACTION(S), ACCEPTING ALL TERMS OF THIS LICENSE (AND THE RESPONSIBILITIES AND OBLIGATIONS CONTAINED IN THIS LICENSE). IF YOU DO NOT ACCEPT THEM, DO NOT USE, MODIFY, REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF. 3. IF ANY PROVISION OF SECTION IV OF THIS LICENSE IS UNENFORCEABLE, PROHIBITED, OR INVALID UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU MAY NOT USE, MODIFY, REPRODUCE, DERIVE FROM, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF. 4. If any term of this License is found to be invalid or unenforceable under applicable law, You agree that it shall not affect the validity or enforceability of any other terms of this License that are found to be valid and enforceable under applicable law. ____________________________________________________________ License agreement for Encryption for the Masses. Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved. This product can be copied and distributed free of charge, including source code. You may modify this product and source code, and distribute such modifications, and you may derive new works based on this product, provided that: 1. Any product which is simply derived from this product cannot be called E4M, or Encryption for the Masses. 2. If you use any of the source code in your product, and your product is distributed with source code, you must include this notice with those portions of this source code that you use. Or, If your product is distributed in binary form only, you must display on any packaging, and marketing materials which reference your product, a notice which states: "This product uses components written by Paul Le Roux " 3. If you use any of the source code originally by Eric Young, you must in addition follow his terms and conditions. 4. Nothing requires that you accept this License, as you have not signed it. However, nothing else grants you permission to modify or distribute the product or its derivative works. These actions are prohibited by law if you do not accept this License. 5. If any of these license terms is found to be to broad in scope, and declared invalid by any court or legal process, you agree that all other terms shall not be so affected, and shall remain valid and enforceable. 6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ____________________________________________________________ Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] ____________________________________________________________ Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that: 1. distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer; 2. distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials; 3. the copyright holder's name is not used to endorse products built using this software without specific written permission. ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above. DISCLAIMER This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. ____________________________________________________________ This is an independent implementation of the encryption algorithm: Twofish by Bruce Schneier and colleagues which is a candidate algorithm in the Advanced Encryption Standard programme of the US National Institute of Standards and Technology. Copyright in this implementation is held by Dr B R Gladman but I hereby give permission for its free direct or derivative use subject to acknowledgment of its origin and compliance with any conditions that the originators of the algorithm place on its exploitation. My thanks to Doug Whiting and Niels Ferguson for comments that led to improvements in this implementation. Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 ____________________________________________________________ Copyright (c) 2001 Markus Friedl. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.