1 | Copyright (c) 2005 - 2006 Swiss Federal Institute of Technology (ETH Zurich),
|
---|
2 | Department of Computer Science (http://www.inf.ethz.ch),
|
---|
3 | Christian Plattner. All rights reserved.
|
---|
4 |
|
---|
5 | Redistribution and use in source and binary forms, with or without
|
---|
6 | modification, are permitted provided that the following conditions
|
---|
7 | are met:
|
---|
8 |
|
---|
9 | a.) Redistributions of source code must retain the above copyright
|
---|
10 | notice, this list of conditions and the following disclaimer.
|
---|
11 | b.) Redistributions in binary form must reproduce the above copyright
|
---|
12 | notice, this list of conditions and the following disclaimer in the
|
---|
13 | documentation and/or other materials provided with the distribution.
|
---|
14 | c.) Neither the name of ETH Zurich nor the names of its contributors may
|
---|
15 | be used to endorse or promote products derived from this software
|
---|
16 | without specific prior written permission.
|
---|
17 |
|
---|
18 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
---|
19 | AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
---|
20 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
---|
21 | ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
|
---|
22 | LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
---|
23 | CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
---|
24 | SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
---|
25 | INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
---|
26 | CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
---|
27 | ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
---|
28 | POSSIBILITY OF SUCH DAMAGE.
|
---|
29 |
|
---|
30 |
|
---|
31 | The Java implementations of the AES, Blowfish and 3DES ciphers have been
|
---|
32 | taken (and slightly modified) from the cryptography package released by
|
---|
33 | "The Legion Of The Bouncy Castle".
|
---|
34 |
|
---|
35 | Their license states the following:
|
---|
36 |
|
---|
37 | Copyright (c) 2000 - 2004 The Legion Of The Bouncy Castle
|
---|
38 | (http://www.bouncycastle.org)
|
---|
39 |
|
---|
40 | Permission is hereby granted, free of charge, to any person obtaining a copy
|
---|
41 | of this software and associated documentation files (the "Software"), to deal
|
---|
42 | in the Software without restriction, including without limitation the rights
|
---|
43 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
---|
44 | copies of the Software, and to permit persons to whom the Software is
|
---|
45 | furnished to do so, subject to the following conditions:
|
---|
46 |
|
---|
47 | The above copyright notice and this permission notice shall be included in
|
---|
48 | all copies or substantial portions of the Software.
|
---|
49 |
|
---|
50 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
---|
51 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
---|
52 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
---|
53 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
---|
54 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
---|
55 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
---|
56 | THE SOFTWARE.
|
---|
57 |
|
---|