GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for
software and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based
on the Program.
To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.
The Corresponding Source for a work in source code form is that
same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the state
没有合适的资源?快使用搜索试试~ 我知道了~
tplockbox,RSA加密
共132个文件
pas:58个
dproj:18个
res:18个
3星 · 超过75%的资源 需积分: 10 19 下载量 82 浏览量
2011-12-13
21:35:40
上传
评论
收藏 1.93MB ZIP 举报
温馨提示
LockBox 3 is a Delphi library for cryptography. Currently supported Delphi 7, 2005, 2007, 2009 and 2010. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and verific...
资源推荐
资源详情
资源评论
收起资源包目录
tplockbox,RSA加密 (132个子文件)
Leaf.bmp 2KB
pipe.bmp 2KB
signature.bmp 2KB
Book.bmp 2KB
acorn16x16.bmp 822B
dclTP_LockBox3.dcr 7KB
uTPLb_ComponentAbout.dfm 203KB
umfmLockbox3_Demo.dfm 42KB
umfmMakeSampleKey.dfm 3KB
umfmPrecompute.dfm 2KB
umfmLockboxTests.dfm 2KB
TP_LockBox3.dpk 3KB
TP_LockBox3.dpk 3KB
TP_LockBox3.dpk 3KB
TP_LockBox3.dpk 3KB
dclTP_LockBox3.dpk 963B
dclTP_LockBox3.dpk 963B
dclTP_LockBox3.dpk 963B
dclTP_LockBox3.dpk 963B
LockBox_DUnit_Tests.dpr 642B
LockBox_DUnit_Tests.dpr 560B
LockBox_DUnit_Tests.dpr 560B
Lockbox3_Demo.dpr 412B
MakeSampleKey.dpr 386B
MakeSampleKey.dpr 346B
Precompute.dpr 325B
Precompute.dpr 325B
Precompute.dpr 287B
Precompute.dpr 287B
TP_LockBox3.dproj 11KB
TP_LockBox3.dproj 11KB
TP_LockBox3.dproj 9KB
TP_LockBox3.dproj 8KB
LockBox_DUnit_Tests.dproj 6KB
dclTP_LockBox3.dproj 6KB
LockBox_DUnit_Tests.dproj 6KB
Lockbox3_Demo.dproj 6KB
dclTP_LockBox3.dproj 6KB
dclTP_LockBox3.dproj 6KB
LockBox_DUnit_Tests.dproj 6KB
MakeSampleKey.dproj 5KB
MakeSampleKey.dproj 5KB
Precompute.dproj 5KB
Precompute.dproj 5KB
Precompute.dproj 5KB
dclTP_LockBox3.dproj 5KB
Precompute.dproj 4KB
TP_LockBox3_d2010.groupproj 3KB
TP_LockBox3_d2010.groupproj 3KB
TP_LockBox3_d2009.groupproj 3KB
TP_LockBox3_d2007.groupproj 2KB
Lock Box 9524.jpg 1.48MB
LockBox3_Logo.jpg 65KB
uTPLb_DES.pas 52KB
uTPLb_Codec.pas 50KB
umfmLockbox3_Demo.pas 41KB
uTPLb_CryptographicLibrary.pas 41KB
uTPLb_HugeCardinal.pas 39KB
uTPLb_RSA_Primitives.pas 36KB
uTPLb_StreamToBlock.pas 33KB
uTPLb_BlowFish.pas 26KB
uTPLb_AES.pas 25KB
uLockBox_CipherTestCases.pas 25KB
uTPLb_HugeCardinalUtils.pas 20KB
DCPtwofish_LB3Modified.pas 20KB
uTPLb_Asymetric.pas 17KB
uTPLb_RSA_Engine.pas 16KB
uTPLb_Hash.pas 16KB
uLockBox_HugeCardinalTestCases.pas 14KB
uTPLb_ComponentAbout.pas 14KB
uTPLb_XXTEA.pas 14KB
umfmPrecompute.pas 13KB
uTPLb_StreamUtils.pas 12KB
uTPLb_ComponentEditors.pas 12KB
uLockBox_RSA_TestCases.pas 11KB
uTPLb_MemoryStreamPool.pas 9KB
uTPLb_TwoFish.pas 8KB
uTPLb_MD5.pas 8KB
uTPLb_StreamCipher.pas 7KB
uTPLb_SHA1.pas 7KB
uTPLb_Base64.pas 6KB
uTPLb_3DES.pas 6KB
uTPLb_SimpleBlockCipher.pas 6KB
uTPLb_BlockCipher.pas 6KB
umfmMakeSampleKey.pas 6KB
uTPLb_Signatory.pas 6KB
uTPLb_Random.pas 5KB
uTPLb_CFB_8Bit.pas 5KB
uTPLb_I18n.pas 5KB
uTPLb_IntegerUtils.pas 5KB
uTPLb_PCBC.pas 5KB
uTPLb_CodecIntf.pas 4KB
uTPLb_CTR.pas 4KB
uTPLb_CBC.pas 4KB
uTPLb_CFB_Block.pas 4KB
uTPLb_PointerArithmetic.pas 4KB
uTPLb_OFB.pas 4KB
uLockBox_Signatory_TestCases.pas 4KB
uTPLb_Crypto_BlockCipher.pas 3KB
uTPLb_ECB.pas 3KB
共 132 条
- 1
- 2
资源评论
- 肥胖番薯仔2020-07-19感谢分享!
- 江子jiangzi2014-06-01官网没有很好的代理,从这里找到,谢谢。
fzdyj
- 粉丝: 0
- 资源: 4
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功