You are on page 1of 2

COPYRIGHT NOTICE AND WARRANTY DESCLAIMER

This product include free softwares owned by:


1.
/*
blowfish.c: C implementation of the Blowfish algorithm.

Copyright (C) 1997 by Paul Kocher

This library is free software; you can redistribute it and/or


modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

COMMENTS ON USING THIS CODE:

Normal usage is as follows:


[1] Allocate a BLOWFISH_CTX. (It may be too big for the stack.)
[2] Call Blowfish_Init with a pointer to your BLOWFISH_CTX, a pointer to
the key, and the number of bytes in the key.
[3] To encrypt a 64-bit block, call Blowfish_Encrypt with a pointer to
BLOWFISH_CTX, a pointer to the 32-bit left half of the plaintext
and a pointer to the 32-bit right half. The plaintext will be
overwritten with the ciphertext.
[4] Decryption is the same as encryption except that the plaintext and
ciphertext are reversed.

Warning #1: The code does not check key lengths. (Caveat encryptor.)
Warning #2: Beware that Blowfish keys repeat such that "ab" = "abab".
Warning #3: It is normally a good idea to zeroize the BLOWFISH_CTX before
freeing it.
Warning #4: Endianness conversions are the responsibility of the caller.
(To encrypt bytes on a little-endian platforms, you'll probably want
to swap bytes around instead of just casting.)
Warning #5: Make sure to use a reasonable mode of operation for your
application. (If you don't know what CBC mode is, see Warning #7.)
Warning #6: This code is susceptible to timing attacks.
Warning #7: Security engineering is risky and non-intuitive. Have someone
check your work. If you don't know what you are doing, get help.

This is code is fast enough for most applications, but is not optimized for
speed.

If you require this code under a license other than LGPL, please ask. (I
can be located using your favorite search engine.) Unfortunately, I do not
have time to provide unpaid support for everyone who uses this code.

-- Paul Kocher
*/

2.
// MD5.CC - source code for the C++/object oriented translation and
// modification of MD5.

// Translation and modification (c) 1995 by Mordechai T. Abzug

// This translation/ modification is provided "as is," without express or


// implied warranty of any kind.

// The translator/ modifier does not claim (1) that MD5 will do what you think
// it does; (2) that this translation/ modification is accurate; or (3) that
// this software is "merchantible." (Language for this disclaimer partially
// copied from the disclaimer below).

/* based on:

MD5.H - header file for MD5C.C


MDDRIVER.C - test driver for MD2, MD4 and MD5

Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
rights reserved.

License to copy and use this software is granted provided that it


is identified as the "RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing this software
or this function.

License is also granted to make and use derivative works provided


that such works are identified as "derived from the RSA Data
Security, Inc. MD5 Message-Digest Algorithm" in all material
mentioning or referencing the derived work.

RSA Data Security, Inc. makes no representations concerning either


the merchantability of this software or the suitability of this
software for any particular purpose. It is provided "as is"
without express or implied warranty of any kind.

These notices must be retained in any copies of any part of this


documentation and/or software.

*/

You might also like