⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 license.txt

📁 一个提供档案及Partition作加解密的程式支援以下的加密演算法AESBlowfishCAST5SerpentTriple DESTwofishAES-BlowfishAES-TwofishAES-
💻 TXT
字号:
TRUECRYPT LICENSE

This product may be used free of charge by individuals, non-profit 
organizations, commercial organizations, and government agencies, on single or
multiple computers/systems for non-commercial and/or commercial uses. 

This product, including the source code and the documentation, may be copied
and/or distributed free of charge. 

This product contains no mechanism or facility that would allow partial or
complete recovery of your encrypted data without knowing the correct password
or the key used to encrypt the data.

AS THIS PRODUCT IS FREE, THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT 
PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED 
"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, 
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE 
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED BELOW, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER
OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.


You may modify this product and its source code, and distribute such
modifications, and you may derive new works based on this product, provided
that the following conditions are met:

  1. Any product which is simply derived from this product must not be called
     E4M, or Encryption for the Masses (see also section 3.a.)

  2. If you use any of the source code in your product, and your product is
     distributed with source code, you must include this notice with those
     portions of this source code that you use. 

     or

     If your product is distributed in binary form only and you use any part of
     the source code by Paul Le Roux in your product, you must display on any
     packaging, and marketing materials which reference your product, a notice
     which states: "This product uses components written by Paul Le Roux
     <pleroux@swprofessionals.com>"

  3. If you use any part of TrueCrypt (e.g., the source code, graphics, user
     interface, texts, etc.) created by the TrueCrypt Foundation and/or by the 
     TrueCrypt Team (with or without modification) in your product or if you
     modify any of these parts (including, but not limited to, translation into
     another language, localization, porting to another platform, or adding a
     new feature/functionality), then the following additional conditions must
     be met:

     a. The product or the modified version must not be called TrueCrypt and
        its name must not contain the name TrueCrypt (for example, the
        following names are not allowed: TrueCrypt+, TrueCrypt Professional,
        etc.) nor any of its variations that can be easily confused with the
        name TrueCrypt (e.g., Truecrypt, TrueKrypt, etc.)

     b. Complete source code of the product or of the modified version must be
        freely and publicly available.
 
     c. Phrase "Based on TrueCrypt" must be displayed by the product (if
        technically feasible) or by the modified version and contained in its
        documentation. Alternatively, if the used parts represent only a minor
        portion of your product, phrase "Portions of this software are based in
        part on TrueCrypt" may be used instead.

     d. TrueCrypt Foundation and TrueCrypt Team must be given attribution as 
        the authors of the parts used. This must be done in the way described
        in section 3.c. 

     e. The licence and distribution terms of these modified or unmodified
        parts must not be changed (i.e., none of these parts can be put under
        another distribution licence). The legal notices attached to parts of
        the source code must be retained in full. 

  4. If you use any part of the source code originally by Eric Young, you must
     in addition follow his terms and conditions.

  5. If you use any part of the source code by Dr. Brian Gladman in your
     product, you must in addition follow his terms and conditions.

  6. If you use any part of the source code by Markus Friedl in your product,
     you must in addition follow his terms and conditions.

  7. If you use any part of the source code by Dag Arne Osvik in your product,
     you must in addition follow his terms and conditions.


Where applicable, the specific licenses attached to parts of the source code
might take precedence over this general license. Each of the specific licenses
applies only to the part of the source code it is attached to.

If any of these license terms is found to be to broad in scope, and/or declared
invalid by any court or legal process, you agree that all other terms shall not
be so affected, and shall remain valid and enforceable.

Nothing requires that you accept this license. However, nothing else grants you
permission to use, modify, or distribute the product or its derivative works.
These actions are prohibited by law if you do not accept this license.

Portions of this software are:
Copyright (c) 2004-2005 TrueCrypt Foundation. All Rights Reserved.
Copyright (c) 1998-2000 Paul Le Roux. All Rights Reserved.
Copyright (c) 2004 TrueCrypt Team. All Rights Reserved.
Copyright (c) 1995-1997 Eric Young. All Rights Reserved.
Copyright (c) 1999-2004 Dr. Brian Gladman, Worcester, UK. All Rights Reserved.
Copyright (c) 2001 Markus Friedl. All Rights Reserved.
Copyright (c) 2000 Dag Arne Osvik. All Rights Reserved.

For more information, see the legal notices attached to parts of the source code.

This is a TrueCrypt Foundation release.


END OF GENERAL LICENSE 


Component Legal Notices:
____________________________________________________________

Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
All rights reserved.

This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as
the following conditions are aheared to.  The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code.  The SSL documentation
included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
   must display the following acknowledgement:
   "This product includes cryptographic software written by
    Eric Young (eay@cryptsoft.com)"
   The word 'cryptographic' can be left out if the rouines from the library
   being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from 
   the apps directory (application code) you must include an acknowledgement:
   "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.

The licence and distribution terms for any publically available version or
derivative of this code cannot be changed.  i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
____________________________________________________________

Copyright (c) 2003, Dr Brian Gladman, Worcester, UK.   All rights reserved.

LICENSE TERMS

The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:

  1. distributions of this source code include the above copyright
     notice, this list of conditions and the following disclaimer;

  2. distributions in binary form include the above copyright
     notice, this list of conditions and the following disclaimer
     in the documentation and/or other associated materials;

  3. the copyright holder's name is not used to endorse products
     built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER

This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
____________________________________________________________

This is an independent implementation of the encryption algorithm:  
                                                                    
        Twofish by Bruce Schneier and colleagues                    
                                                                    
which is a candidate algorithm in the Advanced Encryption Standard  
programme of the US National Institute of Standards and Technology. 
                                                                    
Copyright in this implementation is held by Dr B R Gladman but I    
hereby give permission for its free direct or derivative use subject
to acknowledgment of its origin and compliance with any conditions  
that the originators of the algorithm place on its exploitation.    
                                                                    
My thanks to Doug Whiting and Niels Ferguson for comments that led  
to improvements in this implementation.                             
                                                                    
Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999    
____________________________________________________________

Except as noted below copyright in this code is held by Dr B.R. Gladman 
but free direct or derivative use is permitted subject to acknowledgement
of its origin and subject to any constraints placed on the use of the 
algorithm by its designers (if such constraints may exist, this will be 
indicated below).  

Dr. B. R. Gladman (                            ). 25th January 2000.

This is an implementation of Serpent, an encryption algorithm designed
by Anderson, Biham and Knudsen and submitted as a candidate for the 
Advanced Encryption Standard programme of the US National Institute of 
Standards and Technology.  

The designers of Serpent have not placed any constraints on the use of
this algorithm. 

The S box expressions used below are Copyright (C) 2000 Dag Arne Osvik.
____________________________________________________________

Copyright (c) 2001 Markus Friedl.  All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -