TrueCrypt Collective License Version 1.0


The TrueCrypt Collective License consists of several distinct licenses, which
are contained in this document (separated by lines consisting of underscores)
and which are, in this section, referred to as component licenses. Each of the
component licenses applies only to (portions of) the source code file(s) in
which the component license is contained or in which it is explicitly
referenced, and to compiled or otherwise processed forms of such source code.
None of the component licenses applies to this product as a whole, even when it
uses the phrase "this product" or any other equivalent term/phrase. Unless
otherwise stated, graphics and files that are not part of the source code are
covered solely by the TrueCrypt License.
Note: The TrueCrypt License is one of the component licenses of which the
TrueCrypt Collective License consists.

Anyone who uses and/or reproduces and/or modifies and/or (re)distributes any
part(s) of work made available under this version of the TrueCrypt Collective
License, is, by such action(s), accepting in full the responsibilities and
obligations contained in the component licenses that apply to the corresponding
part(s) of such work.

If any term of this license is found to be invalid or unenforceable under
applicable law, it shall not affect the validity or enforceability of any other
terms of this license that are found to be valid and enforceable under
applicable law.

____________________________________________________________

TrueCrypt License Version 2.1


I. Definitions

1. "This Product" means the work (including, but not limited to, source code,
graphics, texts, and accompanying files) made available under and covered by
this version of this License, as indicated by a copyright notice attached to or
included in the work.

2. "You" (or "Your") means an individual or a legal entity (e.g., a non-profit
organization, commercial organization, government agency, etc.) exercising
rights under this License.

3. "Modification" means any alteration of This Product, including, but not
limited to, addition to or deletion from the substance or structure of This
Product, and translation into another language.

4. "Your Product" means This Product modified by You, any work You derive from
(or base on) This Product, any work in which You include This Product, or any
respective part(s) thereof.



II. Terms and Conditions for Use, Reproduction, and Distribution

1. You may copy and/or distribute This Product, provided that You do not modify
any part of This Product (for terms and conditions for reproduction and
distribution of modified versions of This Product, see Section III) and
provided that You ensure that all the legal notices and documents (containing,
e.g., the text of this License, references to this License, etc.) included with
This Product are included with every copy of This Product that you make and
distribute.

2. You may use This Product freely (see also Section III) on any number of
computers/systems for non-commercial and/or commercial purposes.



III. Terms and Conditions for Modification and Derivation of New Products

1. You may modify This Product (thus forming Your Product), derive new works
from This Product or portions thereof (thus forming Your Product), include This
Product or portions thereof in another product (thus forming Your Product), and
You may copy and/or distribute Your Product, only if the following conditions
are met (for exceptions, see Sections III.2 and III.3):

    a. The name of Your Product (or of Your modified version of This Product)
    must not contain the name TrueCrypt (for example, the following names are
    not allowed: TrueCrypt, TrueCrypt+, TrueCrypt Professional, iTrueCrypt,
    etc.) nor any of its variations that can be easily confused with the name
    TrueCrypt (e.g., True-Crypt, True Crypt, TrueKrypt, TruCrypt, etc.)

    Note: TrueCrypt is a trademark of the TrueCrypt Foundation. The goal is not
    to monetize the name or the product, but to protect the reputation of
    TrueCrypt, and to prevent support issues and other kinds of issues that
    might arise from the existence of similar products with the same or similar
    name. Even though TrueCrypt is a trademark, TrueCrypt is and will remain
    open-source and free software.

    b. The following phrases must be removed from Your Product:
    "A TrueCrypt Foundation Release"
    "Released by TrueCrypt Foundation"
    "This is a TrueCrypt Foundation release."

    c. Phrase "Based on TrueCrypt, freely available at
    http://www.truecrypt.org/" must be displayed by Your Product (if
    technically feasible) and contained in its documentation. Alternatively, if
    This Product or its portion You included in Your Product comprises only a
    minor portion of Your Product, phrase "Portions of this product are based
    in part on TrueCrypt, freely available at http://www.truecrypt.org/" may be
    displayed instead. In each of the cases mentioned above in this paragraph,
    "http://www.truecrypt.org/" must be a hyperlink (if technically feasible)
    pointing to http://www.truecrypt.org/ and you may freely choose the
    location within the user interface (if there is any) of Your Product (e.g.,
    an "About" window, etc.) and the way in which Your Product will display the
    respective phrase.

    d. The complete source code of Your Product must be freely and publicly
    available (for exceptions, see Section III.3) at least until you cease to
    distribute Your Product. To meet this condition, it is sufficient that You
    merely include the source code with every copy of Your Product that you
    make and distribute; it is also sufficient that You merely include
    information (valid and correct at least until you cease to distribute Your
    Product) about where the source code can be freely obtained (e.g., an
    Internet URL, etc.) with every copy of Your Product that you make and
    distribute. The source code must not be deliberately obfuscated, and it
    must not be in an intermediate form (e.g., the output of a preprocessor).
    Source code means the preferred form in which a programmer would usually
    modify the program.

    e. You must not change the license and distribution terms of This Product
    (i.e., no part of This Product may be put under another license), except as
    expressly permitted or required by this License. You must keep intact all
    the legal notices contained in the source code files. You must include the
    following items with every copy of Your Product that you make and
    distribute: a clear and conspicuous notice stating that Your Product or
    portion(s) thereof is/are distributed under this version of the TrueCrypt
    License, a verbatim copy of this version of the TrueCrypt License (as
    contained herein), a clear and conspicuous notice containing information
    about where the included copy of the License can be found, and an
    appropriate copyright notice.

    f. You must not use the name of This Product, names of its authors, or the
    names of the legal entities (or informal groups) of which the authors
    were/are members/employees, to endorse or promote Your Product without
    specific prior written permission from the authors of This Product.


2. You are not obligated to comply with Sections III.1.a, III.1.b, III.1.c,
III.1.d, and III.1.f, if all conditions specified in one of the two following
paragraphs are met:

    a. Your Product is an operating system distribution, or other aggregate
    software distribution (such as a cover CD-ROM of a magazine) containing
    products from different sources, in which You include either This Product
    without any modifications or file(s) which You obtain by compiling the
    unmodified source code of This Product.

    b. You include This Product in its entirety and without any modifications
    (You may omit the source code of This Product) as non-integral part of Your
    Product (i.e., none of the main functionalities of Your Product will be
    affected if such non-integral part is removed) and phrase "This product
    utilizes TrueCrypt, freely available at http://www.truecrypt.org/" or
    phrase "This product includes TrueCrypt, freely available at
    http://www.truecrypt.org/" is displayed by Your Product (if technically
    feasible) and contained in its documentation. In each of the cases
    mentioned above in this paragraph, "http://www.truecrypt.org/" must be a
    hyperlink (if technically feasible) pointing to http://www.truecrypt.org/
    and you may freely choose the location within the user interface (if there
    is any) of Your Product (e.g., an "About" window, etc.) and the way in
    which Your Product will display the respective phrase.


3. You are not obligated to comply with Section III.1.d if Your Product is not
distributed (i.e., Your Product is available only to You).



IV. Disclaimer of Warranties and Liabilities

1. THERE IS NO WARRANTY FOR THE PRODUCT, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. UNLESS OTHERWISE STATED, THE PRODUCT IS PROVIDED "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.
SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.

2. IN NO EVENT, UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING, WILL
ANY COPYRIGHT HOLDER, OR (CO)AUTHOR OF THIS PRODUCT, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR DISTRIBUTE THE PROGRAM AS PERMITTED HEREIN, BE LIABLE TO YOU OR
ANY OTHER PARTY FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM,
INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO
OPERATE WITH ANY OTHER PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD
PREVIOUSLY BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

3. THIS PRODUCT INCORPORATES IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT
MAY BE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR
ILLEGAL IN SOME COUNTRIES. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT IT IS
SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR EXPORT
AND/OR USE THIS PRODUCT (OR PARTS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE
IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO
EXPORT IT, AND THAT IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY SUCH
REGULATIONS/RESTRICTIONS.



V. Trademarks

This License does not grant permission to use trademarks associated with (or
applying to) This Product, except for fair use as defined by applicable law and
except for use expressly permitted or required by this License.

TrueCrypt and the TrueCrypt logos are trademarks of the TrueCrypt Foundation.
Note: The goal is not to monetize the name or the product, but to protect the
reputation of TrueCrypt. TrueCrypt is and will remain open-source and free
software.



VI. General Terms

1. You may not modify, copy, distribute, or sublicense This Product except as
expressly provided under this License. Any attempt otherwise to modify, copy,
distribute, or sublicense This Product automatically terminates Your rights
under this License.

2. Anyone who uses and/or reproduces and/or modifies and/or (re)distributes
This Product, or any part(s) thereof, is, by such action(s), accepting in full
the responsibilities and obligations contained in this License.

3. If any term of this License is found to be invalid or unenforceable under
applicable law, You agree that it shall not affect the validity or
enforceability of any other terms of this License that are found to be valid
and enforceable under applicable law.

____________________________________________________________

License agreement for Encryption for the Masses.

Copyright (C) 1998-2000 Paul Le Roux. All Rights Reserved.

This product can be copied and distributed free of charge, including
source code.

You may modify this product and source code, and distribute such modifications,
and you may derive new works based on this product, provided that:

1. Any product which is simply derived from this product cannot be
called E4M, or Encryption for the Masses.

2. If you use any of the source code in your product, and your product
is distributed with source code, you must include this notice with
those portions of this source code that you use.

Or,

If your product is distributed in binary form only, you must display
on any packaging, and marketing materials which reference
your product, a notice which states:

"This product uses components written by Paul Le Roux <pleroux@swprofessionals.com>"

3. If you use any of the source code originally by Eric Young, you must
in addition follow his terms and conditions.

4. Nothing requires that you accept this License, as you have not
signed it. However, nothing else grants you permission to modify or
distribute the product or its derivative works.

These actions are prohibited by law if you do not accept this License.

5. If any of these license terms is found to be to broad in scope, and
declared invalid by any court or legal process, you agree that all other
terms shall not be so affected, and shall remain valid and enforceable.

6. THIS PROGRAM IS DISTRIBUTED FREE OF CHARGE, THEREFORE THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. UNLESS OTHERWISE
STATED THE PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

7. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM, INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS, EVEN IF SUCH HOLDER OR OTHER PARTY HAD PREVIOUSLY BEEN ADVISED
OF THE POSSIBILITY OF SUCH DAMAGES.
____________________________________________________________

Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
All rights reserved.

This package is an SSL implementation written
by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as
the following conditions are aheared to.  The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code.  The SSL documentation
included with this distribution is covered by the same copyright terms
except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young's, and as such any Copyright notices in
the code are not to be removed.
If this package is used in a product, Eric Young should be given attribution
as the author of the parts of the library used.
This can be in the form of a textual message at program startup or
in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software
   must display the following acknowledgement:
   "This product includes cryptographic software written by
    Eric Young (eay@cryptsoft.com)"
   The word 'cryptographic' can be left out if the rouines from the library
   being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
   the apps directory (application code) you must include an acknowledgement:
   "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.

The licence and distribution terms for any publically available version or
derivative of this code cannot be changed.  i.e. this code cannot simply be
copied and put under another distribution licence
[including the GNU Public Licence.]
____________________________________________________________

Copyright (c) 2003, Dr Brian Gladman, Worcester, UK.   All rights reserved.

LICENSE TERMS

The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:

  1. distributions of this source code include the above copyright
     notice, this list of conditions and the following disclaimer;

  2. distributions in binary form include the above copyright
     notice, this list of conditions and the following disclaimer
     in the documentation and/or other associated materials;

  3. the copyright holder's name is not used to endorse products
     built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER

This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
____________________________________________________________

This is an independent implementation of the encryption algorithm:

        Twofish by Bruce Schneier and colleagues

which is a candidate algorithm in the Advanced Encryption Standard
programme of the US National Institute of Standards and Technology.

Copyright in this implementation is held by Dr B R Gladman but I
hereby give permission for its free direct or derivative use subject
to acknowledgment of its origin and compliance with any conditions
that the originators of the algorithm place on its exploitation.

My thanks to Doug Whiting and Niels Ferguson for comments that led
to improvements in this implementation.

Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999
____________________________________________________________

Copyright (c) 2001 Markus Friedl.  All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
   notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
   notice, this list of conditions and the following disclaimer in the
   documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.