Rev 74 | Rev 88 | Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | RSS feed
Format: http://anonscm.debian.org/viewvc/dep/web/deps/dep5.mdwn?revision=174Upstream-Name: NettleUpstream-Contact: Niels Möller <nisse@lysator.liu.se>Source: http://www.lysator.liu.se/~nisse/nettle/Copyright: © 2001-2011 Niels MöllerSome parts are Copyright © the Free Software Foundation and variouspeople. See below and source code comments for details.License: LGPL-2.1+The nettle library is free software; you can redistribute it and/or modifyit under the terms of the GNU Lesser General Public License as published bythe Free Software Foundation; either version 2.1 of the License, or (at youroption) any later version..The nettle library is distributed in the hope that it will be useful, butWITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITYor FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General PublicLicense for more details..You should have received a copy of the GNU Lesser General PublicLicense along with this library; if not, write to the Free SoftwareFoundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.On Debian GNU/Linux systems, the complete text of the newest versionof the GNU Lesser General Public License can be found in/usr/share/common-licenses/LGPL.Comment:Nettle is distributed under the GNU Lesser General Public License(LGPL). A few of the individual files are in the public domain. Tofind the current status of particular files, you have to read thecopyright notices at the top of the files..A list of the supported algorithms, their origins and licenses (fromthe manual):.AESThe implementation of the AES cipher (also known as rijndael) iswritten by Rafael Sevilla. Assembler for x86 by Rafael Sevilla andNiels Möller, Sparc assembler by Niels Möller. Released under theLGPL..ARCFOURThe implementation of the ARCFOUR (also known as RC4) cipher iswritten by Niels Möller. Released under the LGPL..ARCTWOThe implementation of the ARCTWO (also known as RC2) cipher iswritten by Nikos Mavroyanopoulos and modified by Werner Koch andSimon Josefsson. Released under the LGPL..BLOWFISHThe implementation of the BLOWFISH cipher is written by WernerKoch, copyright owned by the Free Software Foundation. Also hackedby Simon Josefsson and Niels Möller. Released under the LGPL..CAMELLIAThe C implementation is by Nippon Telegraph and TelephoneCorporation (NTT), heavily modified by Niels Möller. Assembler forx86 and x86_64 by Niels Möller. Released under the LGPL..CAST128The implementation of the CAST128 cipher is written by Steve Reid.Released into the public domain..DESThe implementation of the DES cipher is written by Dana L. How, andreleased under the LGPL..MD2The implementation of MD2 is written by Andrew Kuchling, and hackedsome by Andreas Sigfridsson and Niels Möller. Python CryptographyToolkit license (essentially public domain)..MD4This is almost the same code as for MD5 below, with modificationsby Marcus Comstedt. Released into the public domain..MD5The implementation of the MD5 message digest is written by ColinPlumb. It has been hacked some more by Andrew Kuchling and NielsMöller. Released into the public domain..SERPENTThe implementation of the SERPENT is based on the code inlibgcrypt, copyright owned by the Free Software Foundation.Adapted to Nettle by Simon Josefsson and heavily modified byNiels Möller. Assembly for x86_64 by Niels Möller. Released underthe LGPL..SHA1The C implementation of the SHA1 message digest is written by PeterGutmann, and hacked some more by Andrew Kuchling and Niels Möller.Released into the public domain. Assembler for x86 by Niels Möller,released under the LGPL..SHA224, SHA256, SHA384, and SHA512Written by Niels Möller, using Peter Gutmann's SHA1 code as amodel. Released under the LGPL..TWOFISHThe implementation of the TWOFISH cipher is written by Ruud deRooij. Released under the LGPL..RSAWritten by Niels Möller, released under the LGPL. Uses the GMPlibrary for bignum operations..DSAWritten by Niels Möller, released under the LGPL. Uses the GMPlibrary for bignum operations.Files: *Copyright: © 2001-2011 Niels MöllerLicense: LGPL-2.1+Files: aes-set-*,Copyright: © 2000, 2001, 2002 Rafael R. Sevilla, Niels MöllerLicense: LGPL-2.1+Files: arctwo*Copyright: © 2003 Nikos Mavroyanopoulos© 2004 Simon Josefsson© 2004 Free Software Foundation, Inc.© 2002, 2004 Niels MöllerLicense: LGPL-2.1+Files: base64.h, base64-meta.cCopyright: © 2002 Dan Egnor© 2002 Niels MöllerLicense: LGPL-2.1+Files: blowfish.cCopyright: © 1998, 2001, 2002, 2003 Free Software Foundation, Inc.© 2010 Simon JosefssonLicense: LGPL-2.1+Files: blowfish.hCopyright: © 1998, 2001 Free Software Foundation, Inc.© 1998, 2001 Ray Dassen© 1998, 2001 Niels MöllerLicense: LGPL-2.1+Files: camellia-table.c, camellia-crypt-internal.cCopyright: © 2006, 2007 NTT (Nippon Telegraph and Telephone Corporation)© 2010 Niels MöllerLicense: LGPL-2.1+Files: der2dsa.cCopyright: © 2005, 2009 Niels Möller© 2009 Magnus HolmgrenLicense: LGPL-2.1+Files: desCode.h, descode.README, desdata.c, desinfo.cCopyright: © 2002 Dana L. HowLicense: LGPL-2+Files: des.c, des.hCopyright: © 1992 Dana L. How© 1997, 2001 Niels MöllerLicense: LGPL-2.1+Files: gcm.c, gcm.hCopyright: © 2011 Katholieke Universiteit Leuven© 2011 Niels MöllerLicense: LGPG-2.1+Files: md2.cCopyright: © ? Andrew Kuchling© 2003 Andreas Sigfridsson© 2003 Niels MöllerLicense: LGPL-2.1+Files: md4.cCopyright: © 2003 Marcus Comstedt© 2003 Niels MöllerLicense: LGPL-2.1+Files: md5.c, md5-compress.cCopyright: © Colin Plumb, Andrew Kuchling© 2001 Niels MöllerLicense: LGPL-2.1+Files: memxor.cCopyright: © 1991,1993, 1995 Free Software Foundation, Inc.© 2010 Niels MöllerLicense: LGPL-2.1+Files: serpent-encrypt.c, serpent-decrypt.c, serpent-set-key.cCopyright: © 1998 Ross Anderson, Eli Biham, Lars Knudsen© 2003, 2004, 2005 Free Software Foundation, Inc.© 2010, 2011 Simon Josefsson© 2011 Niels MöllerLicense: LGPL-2.1+Files: sha*Copyright: © 2001, 2004 Peter Gutmann, Andrew Kuchling, Niels MöllerLicense: LGPL-2.1+Files: twofish*Copyright: © 1999 Ruud de Rooij <ruud@debian.org>© 1999 J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>© 2001 Niels MöllerLicense: LGPL-2.1+Files: testsuite/*, examples/*, aesdata.c, sha-example.cCopyright: © 2001-2006 Niels MöllerLicense: GPL-2Files: dsa2sexp.cCopyright: © 2002, 2009 Niels Möller© 2009 Magnus HolmgrenFiles: testsuite/des-compat-test.cCopyright: © 1995-1997 Eric Young (eay@cryptsoft.com)License: otherRedistribution and use in source and binary forms, with or withoutmodification, are permitted provided that the following conditionsare met:1. Redistributions of source code must retain the copyrightnotice, this list of conditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyrightnotice, this list of conditions and the following disclaimer in thedocumentation and/or other materials provided with the distribution.3. All advertising materials mentioning features or use of this softwaremust display the following acknowledgement:"This product includes cryptographic software written byEric Young (eay@cryptsoft.com)"The word 'cryptographic' can be left out if the rouines from the librarybeing used are not cryptographic related :-).4. If you include any Windows specific code (or a derivative thereof) fromthe apps directory (application code) you must include an acknowledgement:"This product includes software written by Tim Hudson (tjh@cryptsoft.com)".THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' ANDANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSEARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLEFOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIALDAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODSOR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OFSUCH DAMAGE.Files: tools/pkcs1-conv.cCopyright: © 2005, 2009 Niels Möller© 2009 Magnus HolmgrenLicense: LGPL-2.1+Files: x86*/aes-*-internal.asmCopyright: © 2001, 2002, 2005, 2008 Rafael R. Sevilla© 2001, 2002, 2005, 2008 Niels MöllerLicense: LGPL-2.1+Files: getopt*Copyright: © 1987-2001 Free Software Foundation, Inc.License: GPL-2+Files: config.guess, config.subCopyright: © 1992-2003 Free Software Foundation, Inc.License: GPL-2+As a special exception to the GNU General Public License, if youdistribute this file as part of a program that contains aconfiguration script generated by Autoconf, you may include it underthe same distribution terms that you use for the rest of that program.Files: debian/*License: public-domainI believe that most files in debian/ hardly contains any creativeexpression eligible for copyright.Files: debian/sexp-conv.1Copyright: © 2002 Timshel Knoll <timshel@debian.org>© 2007 Magnus HolmgrenLicense: GPL-2This manpage was copied from the lsh-utils package. Timshel didn'texplicitly select a license for his packaging work, but I think thatit can be considered released under the same license as LSH itself.Files: debian/pkcs1-conv.1, debian/nettle-lfib-stream.1Copyright: © 2007 Magnus HolmgrenLicense: GAP