Rev 16 | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 16 | Rev 24 | ||
---|---|---|---|
1 | This package was debianized by Marek Habersack <grendel@debian.org> on |
1 | This package was debianized by Marek Habersack <grendel@debian.org> on |
2 | Tue, 4 Nov 2003 18:23:07 +0100. |
2 | Tue, 4 Nov 2003 18:23:07 +0100. |
3 | The current Debian maintainer is Magnus Holmgren <magnus@kibibyte.se>. |
3 | The current Debian maintainer is Magnus Holmgren <magnus@kibibyte.se>. |
4 | 4 | ||
5 | It was downloaded from http://www.lysator.liu.se/~nisse/nettle/ |
5 | It was downloaded from http://www.lysator.liu.se/~nisse/nettle/ |
6 | 6 | ||
7 | Upstream Author: Niels Möller |
7 | Upstream Author: Niels Möller |
8 | 8 | ||
9 | Copyright: |
9 | Copyright: |
10 | 10 | ||
11 | Copyright © 2001-2006 Niels Möller |
11 | Copyright © 2001-2006 Niels Möller |
12 | 12 | ||
13 | Some parts are Copyright © the Free Software Foundation and various |
13 | Some parts are Copyright © the Free Software Foundation and various |
14 | people. See below and source code comments for details. |
14 | people. See below and source code comments for details. |
15 | 15 | ||
16 | 16 | ||
17 | This package is free software; you can redistribute it and/or modify |
17 | This package is free software; you can redistribute it and/or modify |
18 | it under the terms of the GNU General Public License as published by |
18 | it under the terms of the GNU General Public License as published by |
19 | the Free Software Foundation; version 2 dated June, 1991. |
19 | the Free Software Foundation; version 2 dated June, 1991. |
20 | 20 | ||
21 | This package is distributed in the hope that it will be useful, |
21 | This package is distributed in the hope that it will be useful, |
22 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
22 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
23 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
23 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
24 | GNU General Public License for more details. |
24 | GNU General Public License for more details. |
25 | 25 | ||
26 | You should have received a copy of the GNU General Public License |
26 | You should have received a copy of the GNU General Public License |
27 | along with this package; if not, write to the Free Software |
27 | along with this package; if not, write to the Free Software |
28 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA |
28 | Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA |
29 | 02110-1301, USA. |
29 | 02110-1301, USA. |
30 | 30 | ||
31 | 31 | ||
32 | Nettle is distributed under the GNU General Public License. However, |
32 | Nettle is distributed under the GNU General Public License. However, |
33 | most of the individual files are dual licensed under less restrictive |
33 | most of the individual files are dual licensed under less restrictive |
34 | licenses like the GNU Lesser General Public License (LGPL), or are in |
34 | licenses like the GNU Lesser General Public License (LGPL), or are in |
35 | the public domain. This means that if you don't use the parts of |
35 | the public domain. This means that if you don't use the parts of |
36 | nettle that are GPL-only, you have the option to use the Nettle |
36 | nettle that are GPL-only, you have the option to use the Nettle |
37 | library just as if it were licensed under the LGPL. To find the |
37 | library just as if it were licensed under the LGPL. To find the |
38 | current status of particular files, you have to read the copyright |
38 | current status of particular files, you have to read the copyright |
39 | notices at the top of the files. |
39 | notices at the top of the files. |
40 | 40 | ||
41 | A list of the supported algorithms, their origins and licenses (from |
41 | A list of the supported algorithms, their origins and licenses (from |
42 | the manual): |
42 | the manual): |
43 | 43 | ||
44 | AES |
44 | AES |
45 | The implementation of the AES cipher (also known as rijndael) is |
45 | The implementation of the AES cipher (also known as rijndael) is |
46 | written by Rafael Sevilla. Assembler for x86 by Rafael Sevilla and |
46 | written by Rafael Sevilla. Assembler for x86 by Rafael Sevilla and |
47 | Niels Möller, Sparc assembler by Niels Möller. Released under the |
47 | Niels Möller, Sparc assembler by Niels Möller. Released under the |
48 | LGPL. |
48 | LGPL. |
49 | 49 | ||
50 | ARCFOUR |
50 | ARCFOUR |
51 | The implementation of the ARCFOUR (also known as RC4) cipher is |
51 | The implementation of the ARCFOUR (also known as RC4) cipher is |
52 | written by Niels Möller. Released under the LGPL. |
52 | written by Niels Möller. Released under the LGPL. |
53 | 53 | ||
54 | ARCTWO |
54 | ARCTWO |
55 | The implementation of the ARCTWO (also known as RC2) cipher is |
55 | The implementation of the ARCTWO (also known as RC2) cipher is |
56 | written by Nikos Mavroyanopoulos and modified by Werner Koch and |
56 | written by Nikos Mavroyanopoulos and modified by Werner Koch and |
57 | Simon Josefsson. Released under the LGPL. |
57 | Simon Josefsson. Released under the LGPL. |
58 | 58 | ||
59 | BLOWFISH |
59 | BLOWFISH |
60 | The implementation of the BLOWFISH cipher is written by Werner |
60 | The implementation of the BLOWFISH cipher is written by Werner |
61 | Koch, copyright owned by the Free Software Foundation. Also hacked |
61 | Koch, copyright owned by the Free Software Foundation. Also hacked |
62 | by Ray Dassen and Niels Möller. Released under the GPL. |
62 | by Ray Dassen and Niels Möller. Released under the GPL. |
63 | 63 | ||
64 | CAST128 |
64 | CAST128 |
65 | The implementation of the CAST128 cipher is written by Steve Reid. |
65 | The implementation of the CAST128 cipher is written by Steve Reid. |
66 | Released into the public domain. |
66 | Released into the public domain. |
67 | 67 | ||
68 | DES |
68 | DES |
69 | The implementation of the DES cipher is written by Dana L. How, and |
69 | The implementation of the DES cipher is written by Dana L. How, and |
70 | released under the LGPL. |
70 | released under the LGPL. |
71 | 71 | ||
72 | MD2 |
72 | MD2 |
73 | The implementation of MD2 is written by Andrew Kuchling, and hacked |
73 | The implementation of MD2 is written by Andrew Kuchling, and hacked |
74 | some by Andreas Sigfridsson and Niels Möller. Python Cryptography |
74 | some by Andreas Sigfridsson and Niels Möller. Python Cryptography |
75 | Toolkit license (essentially public domain). |
75 | Toolkit license (essentially public domain). |
76 | 76 | ||
77 | MD4 |
77 | MD4 |
78 | This is almost the same code as for MD5 below, with modifications |
78 | This is almost the same code as for MD5 below, with modifications |
79 | by Marcus Comstedt. Released into the public domain. |
79 | by Marcus Comstedt. Released into the public domain. |
80 | 80 | ||
81 | MD5 |
81 | MD5 |
82 | The implementation of the MD5 message digest is written by Colin |
82 | The implementation of the MD5 message digest is written by Colin |
83 | Plumb. It has been hacked some more by Andrew Kuchling and Niels |
83 | Plumb. It has been hacked some more by Andrew Kuchling and Niels |
84 | Möller. Released into the public domain. |
84 | Möller. Released into the public domain. |
85 | 85 | ||
86 | SERPENT |
86 | SERPENT |
87 | The implementation of the SERPENT cipher is written by Ross |
87 | The implementation of the SERPENT cipher is written by Ross |
88 | Anderson, Eli Biham, and Lars Knudsen, adapted to LSH by Rafael |
88 | Anderson, Eli Biham, and Lars Knudsen, adapted to LSH by Rafael |
89 | Sevilla, and to Nettle by Niels Möller. Released under the GPL. |
89 | Sevilla, and to Nettle by Niels Möller. Released under the GPL. |
90 | 90 | ||
91 | SHA1 |
91 | SHA1 |
92 | The C implementation of the SHA1 message digest is written by Peter |
92 | The C implementation of the SHA1 message digest is written by Peter |
93 | Gutmann, and hacked some more by Andrew Kuchling and Niels Möller. |
93 | Gutmann, and hacked some more by Andrew Kuchling and Niels Möller. |
94 | Released into the public domain. Assembler for x86 by Niels Möller, |
94 | Released into the public domain. Assembler for x86 by Niels Möller, |
95 | released under the LGPL. |
95 | released under the LGPL. |
96 | 96 | ||
97 | SHA256 |
97 | SHA256 |
98 | Written by Niels Möller, using Peter Gutmann's SHA1 code as a |
98 | Written by Niels Möller, using Peter Gutmann's SHA1 code as a |
99 | model. Released under the LGPL. |
99 | model. Released under the LGPL. |
100 | 100 | ||
101 | TWOFISH |
101 | TWOFISH |
102 | The implementation of the TWOFISH cipher is written by Ruud de |
102 | The implementation of the TWOFISH cipher is written by Ruud de |
103 | Rooij. Released under the LGPL. |
103 | Rooij. Released under the LGPL. |
104 | 104 | ||
105 | RSA |
105 | RSA |
106 | Written by Niels Möller, released under the LGPL. Uses the GMP |
106 | Written by Niels Möller, released under the LGPL. Uses the GMP |
107 | library for bignum operations. |
107 | library for bignum operations. |
108 | 108 | ||
109 | DSA |
109 | DSA |
110 | Written by Niels Möller, released under the LGPL. Uses the GMP |
110 | Written by Niels Möller, released under the LGPL. Uses the GMP |
111 | library for bignum operations. |
111 | library for bignum operations. |
112 | 112 | ||
113 | 113 | ||
114 | On Debian GNU/Linux systems, the complete texts of the GNU General |
114 | On Debian GNU/Linux systems, the complete texts of the GNU General |
115 | Public License and the GNU Lesser General Public License can be found |
115 | Public License and the GNU Lesser General Public License can be found |
116 | in /usr/share/common-licenses/GPL and /usr/share/common-licenses/LGPL, |
116 | in /usr/share/common-licenses/GPL and /usr/share/common-licenses/LGPL, |
117 | respectively. |
117 | respectively. |