Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Upstream-Name: rhash
Source: <url://example.com>
#
# Please double check copyright with the licensecheck(1) command.

Files:     .github/FUNDING.yml
           .gitignore
           INSTALL.md
           Makefile
           README.md
           bindings/Makefile
           bindings/java/.gitignore
           bindings/java/native/bindings.h
           bindings/java/test/RHashTest.java
           bindings/mono/.gitignore
           bindings/mono/RHash.sln
           bindings/mono/RHash.snk
           bindings/mono/test/12345.txt
           bindings/perl/.gitignore
           bindings/perl/MANIFEST
           bindings/perl/META.json
           bindings/perl/META.yml
           bindings/perl/Makefile.PL
           bindings/perl/Rhash.xs
           bindings/perl/t/1test_hash_calculation.t
           bindings/perl/t/2test_static_functions.t
           bindings/perl/t/3test_all_hash_functions.t
           bindings/perl/typemap
           bindings/php/config.m4
           bindings/php/tests/001.phpt
           bindings/php/tests/002.phpt
           bindings/php/tests/003.phpt
           bindings/python/.gitignore
           bindings/python/README.md
           bindings/python/pyproject.toml
           bindings/python/setup.cfg
           bindings/python/tests/__init__.py
           bindings/ruby/.gitignore
           bindings/ruby/extconf.rb
           bindings/ruby/test_rhash.rb
           bindings/version.properties
           build/vc-2010/rhash.vcxproj
           calc_sums.c
           calc_sums.h
           common_func.c
           common_func.h
           configure
           dist/MD5.bat
           dist/magnet.bat
           dist/rhash.1
           dist/rhash.1.win.sed
           dist/rhash.spec.in
           dist/rhashrc.sample
           docs/CONTRIBUTING.md
           docs/LIBRHASH.md
           file.c
           file.h
           file_mask.c
           file_mask.h
           file_set.c
           file_set.h
           find_file.c
           find_file.h
           hash_check.c
           hash_check.h
           hash_print.c
           hash_print.h
           hash_update.c
           hash_update.h
           librhash/Doxyfile
           librhash/Makefile
           librhash/aich.h
           librhash/algorithms.h
           librhash/blake2b.h
           librhash/blake2s.h
           librhash/byte_order.h
           librhash/crc32.h
           librhash/ed2k.h
           librhash/edonr.h
           librhash/gost12.h
           librhash/gost94.h
           librhash/has160.h
           librhash/hex.h
           librhash/md4.h
           librhash/md5.h
           librhash/plug_openssl.h
           librhash/rhash.h
           librhash/rhash_timing.h
           librhash/rhash_torrent.h
           librhash/ripemd-160.h
           librhash/sha1.h
           librhash/sha256.h
           librhash/sha3.h
           librhash/sha512.h
           librhash/snefru.h
           librhash/test_lib.h
           librhash/tiger.h
           librhash/torrent.h
           librhash/tth.h
           librhash/ustd.h
           librhash/util.h
           librhash/whirlpool.h
           output.c
           output.h
           parse_cmdline.c
           parse_cmdline.h
           platform.h
           rhash_main.c
           rhash_main.h
           tests/test1K.data
           tests/test_rhash.sh
           version.h
           win_utils.c
           win_utils.h
Copyright: __NO_COPYRIGHT_NOR_LICENSE__
License:   __NO_COPYRIGHT_NOR_LICENSE__

Files:     bindings/java/Makefile
           bindings/java/native/Makefile
           bindings/java/native/bindings.c
           bindings/java/native/digest.c
           bindings/java/src/org/sf/rhash/Bindings.java
           bindings/java/src/org/sf/rhash/Digest.java
           bindings/java/src/org/sf/rhash/HashType.java
           bindings/java/src/org/sf/rhash/RHash.java
           bindings/mono/AssemblyInfo.cs
           bindings/mono/Bindings.cs
           bindings/mono/HashType.cs
           bindings/mono/Hasher.cs
           bindings/mono/Makefile
           bindings/mono/test/Makefile
           bindings/mono/test/Test.cs
           bindings/perl/README
           bindings/perl/Rhash.pm
           bindings/php/php_compatibility.h
           bindings/php/php_rhash.c
           bindings/php/php_rhash.h
           bindings/python/rhash/__init__.py
           bindings/python/rhash/rhash.py
           bindings/python/tests/rhash_test.py
           bindings/ruby/rhash.c
           librhash/algorithms.c
           librhash/blake2b.c
           librhash/blake2s.c
           librhash/byte_order.c
           librhash/crc32.c
           librhash/gost12.c
           librhash/gost94.c
           librhash/hex.c
           librhash/md4.c
           librhash/md5.c
           librhash/plug_openssl.c
           librhash/ripemd-160.c
           librhash/sha1.c
           librhash/sha256.c
           librhash/sha3.c
           librhash/sha512.c
           librhash/test_lib.c
           librhash/tiger.c
           librhash/tiger_sbox.c
           librhash/torrent.c
           librhash/tth.c
           librhash/util.c
           librhash/whirlpool_sbox.c
Copyright: 2006-2021 Aleksey Kravchenko <rhash.admin@gmail.com>
           2011 Aleksey Kravchenko
           2011 Sergey Basalaev <sbasalaev@gmail.com>
           2011 Sergey Basalaev <sbasalaev@gmail.com> and Aleksey Kravchenko <rhash.admin@gmail.com>
           2011 Sergey Basalaev <sbasalaev@gmail.com>, Aleksey Kravchenko <rhash.admin@gmail.com>
           2012 Samuel Neves <sneves@dei.uc.pt>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.

Files:     po/ca.po
           po/de.po
           po/en_AU.po
           po/es.po
           po/fr.po
           po/gl.po
           po/it.po
           po/ro.po
           po/uk.po
Copyright: 2011 Rosetta Contributors and Canonical Ltd 2011
           2019 Rosetta Contributors and Canonical Ltd 2019
License:   _SAME_
 This file is distributed under the same license as the rhash package.

Files:     po/rhash.pot
           po/ru.po
Copyright: 2011 RHash Software Corp.
           __NO_COPYRIGHT__ in: po/rhash.pot
License:   _SAME_
 This file is distributed under the same license as the RHash package.

Files:     librhash/rhash.c
           librhash/rhash_torrent.c
Copyright: 2008-2013 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 modifier for Windows DLL

Files:     bindings/java/src/org/sf/rhash/package-info.java
Copyright: 2011 Sergey Basalaev <sbasalaev@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Java bindings for LibRHash.
 LibRHash  is  a library for computing message digests  and magnet links
 for various hash functions. List of all supported hash functions can be
 found in {@link org.sf.rhash.HashType} class description.
 <p>
 In its simplest usage to calculate a hash for message or file
 you just need to use one of <code>RHash.computeHash()</code>
 methods:
 <pre>
 RHash.computeHash("Hello, world!");
 RHash.computeHash(new byte[] { 0, 1, 2, 3});
 RHash.computeHash(new File("SomeFile.txt"));</pre>
 These methods return value of type <code>Digest</code> which is
 a message digest. To convert <code>Digest</code> in human readable
 format you might use one of methods
 {@link org.sf.rhash.Digest#hex() hex()},
 {@link org.sf.rhash.Digest#base32() base32()},
 {@link org.sf.rhash.Digest#base64() base64()} or
 {@link org.sf.rhash.Digest#raw() raw()}.
 </p><p>
 Next, <code>RHash</code> allows you to do incremental hashing,
 processing data given in portions like it was one big byte sequence.
 To do this you first need to create <code>RHash</code> instance
 with a set of needed hash algorithms and then to fill it using
 <code>update()</code>:
 <pre>

Files:     librhash/whirlpool.c
Copyright: 2009 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Documentation:
 P. S. L. M. Barreto, V. Rijmen, ``The Whirlpool hashing function,''
 NESSIE submission, 2000 (tweaked version, 2001)
 .
 The algorithm is named after the Whirlpool Galaxy in Canes Venatici.

Files:     librhash/ed2k.c
Copyright: 2006 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 This file implements eMule-compatible version of algorithm.
 Note that eDonkey and eMule ed2k hashes are different only for
 files containing exactly multiple of 9728000 bytes.
 .
 The file data is divided into full chunks of 9500 KiB (9728000 bytes) plus
 a remainder chunk, and a separate 128-bit MD4 hash is computed for each.
 If the file length is an exact multiple of 9500 KiB, the remainder zero
 size chunk is still used at the end of the hash list. The ed2k hash is
 computed by concatenating the chunks' MD4 hashes in order and hashing the
 result using MD4. Although, if the file is composed of a single non-full
 chunk, its MD4 hash is returned with no further modifications.

Files:     librhash/has160.c
Copyright: 2009 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 HAS-160 is a cryptographic hash function designed for use with the
 Korean KCDSA digital signature algorithm. It derives from SHA-1,
 with assorted changes intended to increase its security.
 It produces a 160-bit message digest.
 .
 HAS-160 was developed in 1998 by KISA
 (Korea Information Security Agency) + Academic.

Files:     librhash/edonr.c
Copyright: 2011 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 This implementation is based on the article:
 D. Gligoroski, R. S. Odegard, M. Mihova, S. J. Knapskog, ...,
 Cryptographic Hash Function EDON-R - Submission to NIST, 2008
 .
 EDON-R has been designed to be much more efficient than SHA-2
 cryptographic hash functions, offering the same or better security.

Files:     librhash/rhash_timing.c
Copyright: 2010 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 modifier for Windows dll

Files:     librhash/snefru.c
Copyright: 2009 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 Specification: Ralph C. Merkle, A Fast Software One-Way Hash Function,
 J. Cryptology, Vol. 3, No 1, pp. 43-58, 1990
 .
 Info from wikipedia:  Snefru is a cryptographic hash function invented
 by Ralph Merkle in 1989 which supports 128-bit and 256-bit output.  It
 was named after the Egyptian Pharaoh Sneferu, continuing the tradition
 of the Khufu and Khafre block ciphers.
 .
 The original design of Snefru was shown to be insecure by Eli Biham and
 Adi Shamir who were able to use differential cryptanalysis to find hash
 collisions. The design was then modified by increasing the number of
 iterations of the main pass of the algorithm from two to eight. Although
 differential cryptanalysis can break the revised version with less
 complexity than brute force search (a certificational weakness), the attack
 requires 2^88.5 operations and is thus not currently feasible in practice.
 .
 The algorithm can also be run with a variable number of "rounds" of the
 internal algorithm. However, analysis by several cryptographers has shown
 that SNEFRU has weaknesses that can be exploited, and that you can find
 arbitrary messages that hash to a given 128-bit value if the 4-round
 version is used. Dr. Merkle currently recommends that only 8-round SNEFRU
 be used, but this algorithm is significantly slower than the MD5 or HAVAL
 algorithms.

Files:     librhash/aich.c
Copyright: 2008 Aleksey Kravchenko <rhash.admin@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 The AICH Algorithm:
 .
 Each ed2k chunk (9728000 bytes) is divided into 53 parts (52x 180KB and
 1x 140KB) and each of these parts are hashed using the SHA1 algorithm.
 Each of these hashes is called a Block Hash. By combining pairs of Block
 Hashes (i.e. each part with the part next to it) algorithm will get a whole
 tree of hashes (this tree which is therefore a hashset made of all of the
 other Block Hashes is called the AICH Hashset). Each hash which is neither
 a Block Hash nor the Root Hash, is a Verifying Hash. The hash at the top
 level is the Root Hash and it is supposed to be provided by the ed2k link
 when releasing.

Files:     bindings/java/native/digest.h
Copyright: 2011 Sergey Basalaev <sbasalaev@gmail.com>
License:   __UNKNOWN__
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
 .
 This is convenient structure to hold message digest.

#----------------------------------------------------------------------------
# xml and html files (skipped):
#         bindings/mono/RHash.dll.config
#         bindings/mono/RHash.csproj
#         bindings/mono/doc/index.xml
#         bindings/mono/doc/ns-RHash.xml
#         bindings/mono/doc/RHash/HashType.xml
#         bindings/mono/doc/RHash/Hasher.xml

#----------------------------------------------------------------------------
# Files marked as NO_LICENSE_TEXT_FOUND may be covered by the following
# license/copyright files.

#----------------------------------------------------------------------------
# License file: COPYING
 .
                            BSD Zero Clause License
 .
 Copyright (c) 2005, Aleksey Kravchenko <rhash.admin@gmail.com>
 .
 Permission to use, copy, modify, and/or distribute this software for any
 purpose with or without fee is hereby granted.
 .
 THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
 AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
 LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
 OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
 PERFORMANCE OF THIS SOFTWARE.
