Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 16 | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 16 Rev 30
1
This package was debianized by Marek Habersack <grendel@debian.org> on
1
This package was debianized by Marek Habersack <grendel@debian.org> on
2
Tue,  4 Nov 2003 18:23:07 +0100.
2
Tue,  4 Nov 2003 18:23:07 +0100.
3
The current Debian maintainer is Magnus Holmgren <magnus@kibibyte.se>.
3
The current Debian maintainer is Magnus Holmgren <magnus@kibibyte.se>.
4
4
5
It was downloaded from http://www.lysator.liu.se/~nisse/nettle/
5
It was downloaded from http://www.lysator.liu.se/~nisse/nettle/
6
6
7
Upstream Author: Niels Möller
7
Upstream Author: Niels Möller
8
8
9
Copyright:
9
Copyright:
10
10
11
Copyright © 2001-2006 Niels Möller
11
Copyright © 2001-2006 Niels Möller
12
12
13
Some parts are Copyright © the Free Software Foundation and various
13
Some parts are Copyright © the Free Software Foundation and various
14
people. See below and source code comments for details.
14
people. See below and source code comments for details.
15
15
16
16
17
   This package is free software; you can redistribute it and/or modify
17
   This package is free software; you can redistribute it and/or modify
18
   it under the terms of the GNU General Public License as published by
18
   it under the terms of the GNU General Public License as published by
19
   the Free Software Foundation; version 2 dated June, 1991.
19
   the Free Software Foundation; version 2 dated June, 1991.
20
20
21
   This package is distributed in the hope that it will be useful,
21
   This package is distributed in the hope that it will be useful,
22
   but WITHOUT ANY WARRANTY; without even the implied warranty of
22
   but WITHOUT ANY WARRANTY; without even the implied warranty of
23
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
23
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
24
   GNU General Public License for more details.
24
   GNU General Public License for more details.
25
25
26
   You should have received a copy of the GNU General Public License
26
   You should have received a copy of the GNU General Public License
27
   along with this package; if not, write to the Free Software
27
   along with this package; if not, write to the Free Software
28
   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
28
   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
29
   02110-1301, USA.
29
   02110-1301, USA.
30
30
31
31
32
Nettle is distributed under the GNU General Public License. However,
32
Nettle is distributed under the GNU General Public License. However,
33
most of the individual files are dual licensed under less restrictive
33
most of the individual files are dual licensed under less restrictive
34
licenses like the GNU Lesser General Public License (LGPL), or are in
34
licenses like the GNU Lesser General Public License (LGPL), or are in
35
the public domain. This means that if you don't use the parts of
35
the public domain. This means that if you don't use the parts of
36
nettle that are GPL-only, you have the option to use the Nettle
36
nettle that are GPL-only, you have the option to use the Nettle
37
library just as if it were licensed under the LGPL. To find the
37
library just as if it were licensed under the LGPL. To find the
38
current status of particular files, you have to read the copyright
38
current status of particular files, you have to read the copyright
39
notices at the top of the files.
39
notices at the top of the files.
40
40
41
   A list of the supported algorithms, their origins and licenses (from
41
   A list of the supported algorithms, their origins and licenses (from
42
   the manual):
42
   the manual):
43
43
44
AES
44
AES
45
     The implementation of the AES cipher (also known as rijndael) is
45
     The implementation of the AES cipher (also known as rijndael) is
46
     written by Rafael Sevilla. Assembler for x86 by Rafael Sevilla and
46
     written by Rafael Sevilla. Assembler for x86 by Rafael Sevilla and
47
     Niels Möller, Sparc assembler by Niels Möller. Released under the
47
     Niels Möller, Sparc assembler by Niels Möller. Released under the
48
     LGPL.
48
     LGPL.
49
49
50
ARCFOUR
50
ARCFOUR
51
     The implementation of the ARCFOUR (also known as RC4) cipher is
51
     The implementation of the ARCFOUR (also known as RC4) cipher is
52
     written by Niels Möller. Released under the LGPL.
52
     written by Niels Möller. Released under the LGPL.
53
53
54
ARCTWO
54
ARCTWO
55
     The implementation of the ARCTWO (also known as RC2) cipher is
55
     The implementation of the ARCTWO (also known as RC2) cipher is
56
     written by Nikos Mavroyanopoulos and modified by Werner Koch and
56
     written by Nikos Mavroyanopoulos and modified by Werner Koch and
57
     Simon Josefsson. Released under the LGPL.
57
     Simon Josefsson. Released under the LGPL.
58
58
59
BLOWFISH
59
BLOWFISH
60
     The implementation of the BLOWFISH cipher is written by Werner
60
     The implementation of the BLOWFISH cipher is written by Werner
61
     Koch, copyright owned by the Free Software Foundation. Also hacked
61
     Koch, copyright owned by the Free Software Foundation. Also hacked
62
     by Ray Dassen and Niels Möller. Released under the GPL.
62
     by Ray Dassen and Niels Möller. Released under the GPL.
63
63
64
CAST128
64
CAST128
65
     The implementation of the CAST128 cipher is written by Steve Reid.
65
     The implementation of the CAST128 cipher is written by Steve Reid.
66
     Released into the public domain.
66
     Released into the public domain.
67
67
68
DES
68
DES
69
     The implementation of the DES cipher is written by Dana L. How, and
69
     The implementation of the DES cipher is written by Dana L. How, and
70
     released under the LGPL.
70
     released under the LGPL.
71
71
72
MD2
72
MD2
73
     The implementation of MD2 is written by Andrew Kuchling, and hacked
73
     The implementation of MD2 is written by Andrew Kuchling, and hacked
74
     some by Andreas Sigfridsson and Niels Möller. Python Cryptography
74
     some by Andreas Sigfridsson and Niels Möller. Python Cryptography
75
     Toolkit license (essentially public domain).
75
     Toolkit license (essentially public domain).
76
76
77
MD4
77
MD4
78
     This is almost the same code as for MD5 below, with modifications
78
     This is almost the same code as for MD5 below, with modifications
79
     by Marcus Comstedt. Released into the public domain.
79
     by Marcus Comstedt. Released into the public domain.
80
80
81
MD5
81
MD5
82
     The implementation of the MD5 message digest is written by Colin
82
     The implementation of the MD5 message digest is written by Colin
83
     Plumb.  It has been hacked some more by Andrew Kuchling and Niels
83
     Plumb.  It has been hacked some more by Andrew Kuchling and Niels
84
     Möller.  Released into the public domain.
84
     Möller.  Released into the public domain.
85
85
86
SERPENT
86
SERPENT
87
     The implementation of the SERPENT cipher is written by Ross
87
     The implementation of the SERPENT cipher is written by Ross
88
     Anderson, Eli Biham, and Lars Knudsen, adapted to LSH by Rafael
88
     Anderson, Eli Biham, and Lars Knudsen, adapted to LSH by Rafael
89
     Sevilla, and to Nettle by Niels Möller. Released under the GPL.
89
     Sevilla, and to Nettle by Niels Möller. Released under the GPL.
90
90
91
SHA1
91
SHA1
92
     The C implementation of the SHA1 message digest is written by Peter
92
     The C implementation of the SHA1 message digest is written by Peter
93
     Gutmann, and hacked some more by Andrew Kuchling and Niels Möller.
93
     Gutmann, and hacked some more by Andrew Kuchling and Niels Möller.
94
     Released into the public domain. Assembler for x86 by Niels Möller,
94
     Released into the public domain. Assembler for x86 by Niels Möller,
95
     released under the LGPL.
95
     released under the LGPL.
96
96
97
SHA256
97
SHA256
98
     Written by Niels Möller, using Peter Gutmann's SHA1 code as a
98
     Written by Niels Möller, using Peter Gutmann's SHA1 code as a
99
     model.  Released under the LGPL.
99
     model.  Released under the LGPL.
100
100
101
TWOFISH
101
TWOFISH
102
     The implementation of the TWOFISH cipher is written by Ruud de
102
     The implementation of the TWOFISH cipher is written by Ruud de
103
     Rooij.  Released under the LGPL.
103
     Rooij.  Released under the LGPL.
104
104
105
RSA
105
RSA
106
     Written by Niels Möller, released under the LGPL. Uses the GMP
106
     Written by Niels Möller, released under the LGPL. Uses the GMP
107
     library for bignum operations.
107
     library for bignum operations.
108
108
109
DSA
109
DSA
110
     Written by Niels Möller, released under the LGPL. Uses the GMP
110
     Written by Niels Möller, released under the LGPL. Uses the GMP
111
     library for bignum operations.
111
     library for bignum operations.
112
112
113
113
114
On Debian GNU/Linux systems, the complete texts of the GNU General
114
On Debian GNU/Linux systems, the complete texts of the GNU General
115
Public License and the GNU Lesser General Public License can be found
115
Public License and the GNU Lesser General Public License can be found
116
in /usr/share/common-licenses/GPL and /usr/share/common-licenses/LGPL,
116
in /usr/share/common-licenses/GPL and /usr/share/common-licenses/LGPL,
117
respectively.
117
respectively.