Cryptlib.pmdoc/index.xml

Tue, 04 Aug 2009 23:07:46 +0200

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 04 Aug 2009 23:07:46 +0200
changeset 4
8202e35ba4e4
permissions
-rw-r--r--

Import new package spec for introduction into repository.

michael@4 1 <pkmkdoc spec="1.12"><properties><title>Cryptlib Ecryption Toolkit</title><build>/Users/username/proj/cryptlib-pkg/Cryptlib.pkg</build><certificate>Michael Schloh von Bennewitz</certificate><organization>com.europalab.dev</organization><userSees ui="easy"/><min-target os="3"/><domain anywhere="true"/></properties><distribution><versions min-spec="1.000000"/><scripts></scripts></distribution><description>CryptLib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high level interface Its cryptographic logic hides most of the implementation details and provides an operating system independent encoding method.</description><contents><choice title="Development Components" id="choice1" tooltip="Install components for development with Cryptlib." description="Headers and library archives installed to /usr/local subdirectories required for development with Cryptlib." starts_selected="true" starts_enabled="true" starts_hidden="false"><pkgref id="com.europalab.dev.cryptlib.fsrt.pkg"/></choice></contents><resources bg-scale="none" bg-align="topleft"><locale lang="de"><resource mime-type="text/rtf" kind="embedded" type="license"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 2 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 3 {\colortbl;\red255\green255\blue255;}
michael@4 4 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 5
michael@4 6 \f0\fs26 \cf0 Copyright 1992-2008 Peter Gutmann. All rights reserved.\
michael@4 7 \
michael@4 8 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:\
michael@4 9 \
michael@4 10 1. Redistributions of source code must retain the above\
michael@4 11 copyright notice, this list of conditions and the following\
michael@4 12 disclaimer.\
michael@4 13 \
michael@4 14 2. Redistributions in binary form must reproduce the above\
michael@4 15 copyright notice, this list of conditions and the following\
michael@4 16 disclaimer in the documentation and/or other materials\
michael@4 17 provided with the distribution.\
michael@4 18 \
michael@4 19 3. Redistributions in any form must be accompanied by\
michael@4 20 information on how to obtain complete source code for\
michael@4 21 the cryptlib software and any accompanying software\
michael@4 22 that uses the cryptlib software. The source code must\
michael@4 23 either be included in the distribution or be available\
michael@4 24 for no more than the cost of distribution, and must be\
michael@4 25 freely redistributable under reasonable conditions.\
michael@4 26 For an executable file, complete source code means the\
michael@4 27 source code for all modules it contains or uses. It does\
michael@4 28 not include source code for modules or files that typically\
michael@4 29 accompany the major components of the operating\
michael@4 30 system on which the executable file runs. Note that\
michael@4 31 decoupling the software from the user, for example by\
michael@4 32 running in a SaaS configuration, does not exempt you\
michael@4 33 from these requirements.\
michael@4 34 \
michael@4 35 THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\
michael@4 36 \
michael@4 37 If you're unable to comply with the above license then the following, alternate usage conditions apply:\
michael@4 38 \
michael@4 39 Any large-scale commercial use of cryptlib requires a license. "Large-scale commercial use" means any revenue-generating purpose such as use for company-internal purposes, or use of cryptlib in an application or product, with a total gross revenue of over US$5,000. This allows cryptlib to be used in freeware and shareware applications, for evaluation and research purposes, and for non-revenue-generating or personal use without charge. In addition the author reserves the right to grant free licenses for commercial use in special cases (for example where there is a general benefit to the public), contact the author for details if you think you qualify.}]]></resource><resource mime-type="text/rtf" kind="embedded" type="readme"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 40 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 41 {\colortbl;\red255\green255\blue255;}
michael@4 42 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 43
michael@4 44 \f0\fs26 \cf0 Cryptlib Encryption Toolkit\
michael@4 45 http://www.cs.auckland.ac.nz/~pgut001/cryptlib/\
michael@4 46 \
michael@4 47 CryptLib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high level interface Its cryptographic logic hides most of the implementation details and provides an operating system independent encoding method.\
michael@4 48 \
michael@4 49 Being a layered security toolkit, Cryptlib allows experienced and inexperienced programmers to easily add encryption and authentication services to their software. The high level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low level details which make the encryption or authentication work.}]]></resource></locale><locale lang="fr"><resource mime-type="text/rtf" kind="embedded" type="license"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 50 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 51 {\colortbl;\red255\green255\blue255;}
michael@4 52 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 53
michael@4 54 \f0\fs26 \cf0 Copyright 1992-2008 Peter Gutmann. All rights reserved.\
michael@4 55 \
michael@4 56 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:\
michael@4 57 \
michael@4 58 1. Redistributions of source code must retain the above\
michael@4 59 copyright notice, this list of conditions and the following\
michael@4 60 disclaimer.\
michael@4 61 \
michael@4 62 2. Redistributions in binary form must reproduce the above\
michael@4 63 copyright notice, this list of conditions and the following\
michael@4 64 disclaimer in the documentation and/or other materials\
michael@4 65 provided with the distribution.\
michael@4 66 \
michael@4 67 3. Redistributions in any form must be accompanied by\
michael@4 68 information on how to obtain complete source code for\
michael@4 69 the cryptlib software and any accompanying software\
michael@4 70 that uses the cryptlib software. The source code must\
michael@4 71 either be included in the distribution or be available\
michael@4 72 for no more than the cost of distribution, and must be\
michael@4 73 freely redistributable under reasonable conditions.\
michael@4 74 For an executable file, complete source code means the\
michael@4 75 source code for all modules it contains or uses. It does\
michael@4 76 not include source code for modules or files that typically\
michael@4 77 accompany the major components of the operating\
michael@4 78 system on which the executable file runs. Note that\
michael@4 79 decoupling the software from the user, for example by\
michael@4 80 running in a SaaS configuration, does not exempt you\
michael@4 81 from these requirements.\
michael@4 82 \
michael@4 83 THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\
michael@4 84 \
michael@4 85 If you're unable to comply with the above license then the following, alternate usage conditions apply:\
michael@4 86 \
michael@4 87 Any large-scale commercial use of cryptlib requires a license. "Large-scale commercial use" means any revenue-generating purpose such as use for company-internal purposes, or use of cryptlib in an application or product, with a total gross revenue of over US$5,000. This allows cryptlib to be used in freeware and shareware applications, for evaluation and research purposes, and for non-revenue-generating or personal use without charge. In addition the author reserves the right to grant free licenses for commercial use in special cases (for example where there is a general benefit to the public), contact the author for details if you think you qualify.}]]></resource><resource mime-type="text/rtf" kind="embedded" type="readme"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 88 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 89 {\colortbl;\red255\green255\blue255;}
michael@4 90 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 91
michael@4 92 \f0\fs26 \cf0 Cryptlib Encryption Toolkit\
michael@4 93 http://www.cs.auckland.ac.nz/~pgut001/cryptlib/\
michael@4 94 \
michael@4 95 CryptLib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high level interface Its cryptographic logic hides most of the implementation details and provides an operating system independent encoding method.\
michael@4 96 \
michael@4 97 Being a layered security toolkit, Cryptlib allows experienced and inexperienced programmers to easily add encryption and authentication services to their software. The high level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low level details which make the encryption or authentication work.}]]></resource></locale><locale lang="es"><resource mime-type="text/rtf" kind="embedded" type="license"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 98 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 99 {\colortbl;\red255\green255\blue255;}
michael@4 100 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 101
michael@4 102 \f0\fs26 \cf0 Copyright 1992-2008 Peter Gutmann. All rights reserved.\
michael@4 103 \
michael@4 104 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:\
michael@4 105 \
michael@4 106 1. Redistributions of source code must retain the above\
michael@4 107 copyright notice, this list of conditions and the following\
michael@4 108 disclaimer.\
michael@4 109 \
michael@4 110 2. Redistributions in binary form must reproduce the above\
michael@4 111 copyright notice, this list of conditions and the following\
michael@4 112 disclaimer in the documentation and/or other materials\
michael@4 113 provided with the distribution.\
michael@4 114 \
michael@4 115 3. Redistributions in any form must be accompanied by\
michael@4 116 information on how to obtain complete source code for\
michael@4 117 the cryptlib software and any accompanying software\
michael@4 118 that uses the cryptlib software. The source code must\
michael@4 119 either be included in the distribution or be available\
michael@4 120 for no more than the cost of distribution, and must be\
michael@4 121 freely redistributable under reasonable conditions.\
michael@4 122 For an executable file, complete source code means the\
michael@4 123 source code for all modules it contains or uses. It does\
michael@4 124 not include source code for modules or files that typically\
michael@4 125 accompany the major components of the operating\
michael@4 126 system on which the executable file runs. Note that\
michael@4 127 decoupling the software from the user, for example by\
michael@4 128 running in a SaaS configuration, does not exempt you\
michael@4 129 from these requirements.\
michael@4 130 \
michael@4 131 THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\
michael@4 132 \
michael@4 133 If you're unable to comply with the above license then the following, alternate usage conditions apply:\
michael@4 134 \
michael@4 135 Any large-scale commercial use of cryptlib requires a license. "Large-scale commercial use" means any revenue-generating purpose such as use for company-internal purposes, or use of cryptlib in an application or product, with a total gross revenue of over US$5,000. This allows cryptlib to be used in freeware and shareware applications, for evaluation and research purposes, and for non-revenue-generating or personal use without charge. In addition the author reserves the right to grant free licenses for commercial use in special cases (for example where there is a general benefit to the public), contact the author for details if you think you qualify.}]]></resource><resource mime-type="text/rtf" kind="embedded" type="readme"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 136 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 137 {\colortbl;\red255\green255\blue255;}
michael@4 138 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 139
michael@4 140 \f0\fs26 \cf0 Cryptlib Encryption Toolkit\
michael@4 141 http://www.cs.auckland.ac.nz/~pgut001/cryptlib/\
michael@4 142 \
michael@4 143 CryptLib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high level interface Its cryptographic logic hides most of the implementation details and provides an operating system independent encoding method.\
michael@4 144 \
michael@4 145 Being a layered security toolkit, Cryptlib allows experienced and inexperienced programmers to easily add encryption and authentication services to their software. The high level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low level details which make the encryption or authentication work.}]]></resource></locale><locale lang="en"><resource mime-type="text/rtf" kind="embedded" type="license"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 146 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 147 {\colortbl;\red255\green255\blue255;}
michael@4 148 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 149
michael@4 150 \f0\fs26 \cf0 Copyright 1992-2008 Peter Gutmann. All rights reserved.\
michael@4 151 \
michael@4 152 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:\
michael@4 153 \
michael@4 154 1. Redistributions of source code must retain the above\
michael@4 155 copyright notice, this list of conditions and the following\
michael@4 156 disclaimer.\
michael@4 157 \
michael@4 158 2. Redistributions in binary form must reproduce the above\
michael@4 159 copyright notice, this list of conditions and the following\
michael@4 160 disclaimer in the documentation and/or other materials\
michael@4 161 provided with the distribution.\
michael@4 162 \
michael@4 163 3. Redistributions in any form must be accompanied by\
michael@4 164 information on how to obtain complete source code for\
michael@4 165 the cryptlib software and any accompanying software\
michael@4 166 that uses the cryptlib software. The source code must\
michael@4 167 either be included in the distribution or be available\
michael@4 168 for no more than the cost of distribution, and must be\
michael@4 169 freely redistributable under reasonable conditions.\
michael@4 170 For an executable file, complete source code means the\
michael@4 171 source code for all modules it contains or uses. It does\
michael@4 172 not include source code for modules or files that typically\
michael@4 173 accompany the major components of the operating\
michael@4 174 system on which the executable file runs. Note that\
michael@4 175 decoupling the software from the user, for example by\
michael@4 176 running in a SaaS configuration, does not exempt you\
michael@4 177 from these requirements.\
michael@4 178 \
michael@4 179 THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\
michael@4 180 \
michael@4 181 If you're unable to comply with the above license then the following, alternate usage conditions apply:\
michael@4 182 \
michael@4 183 Any large-scale commercial use of cryptlib requires a license. "Large-scale commercial use" means any revenue-generating purpose such as use for company-internal purposes, or use of cryptlib in an application or product, with a total gross revenue of over US$5,000. This allows cryptlib to be used in freeware and shareware applications, for evaluation and research purposes, and for non-revenue-generating or personal use without charge. In addition the author reserves the right to grant free licenses for commercial use in special cases (for example where there is a general benefit to the public), contact the author for details if you think you qualify.}]]></resource><resource mime-type="text/rtf" kind="embedded" type="readme"><![CDATA[{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf460
michael@4 184 {\fonttbl\f0\fnil\fcharset0 LucidaGrande;}
michael@4 185 {\colortbl;\red255\green255\blue255;}
michael@4 186 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural
michael@4 187
michael@4 188 \f0\fs26 \cf0 Cryptlib Encryption Toolkit\
michael@4 189 http://www.cs.auckland.ac.nz/~pgut001/cryptlib/\
michael@4 190 \
michael@4 191 CryptLib provides a standardised interface to a number of popular encryption algorithms, as well as providing a high level interface Its cryptographic logic hides most of the implementation details and provides an operating system independent encoding method.\
michael@4 192 \
michael@4 193 Being a layered security toolkit, Cryptlib allows experienced and inexperienced programmers to easily add encryption and authentication services to their software. The high level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low level details which make the encryption or authentication work.}]]></resource></locale></resources><flags/><item type="file">01fsrt.xml</item><mod>description</mod><mod>properties.title</mod></pkmkdoc>

mercurial