Skip to content

Commit

Permalink
Merge pull request #68 from GaloisInc/license
Browse files Browse the repository at this point in the history
Chhange all specs to use one common LICSENSE file based on the BSD3 license
  • Loading branch information
Eddy Westbrook authored Dec 20, 2023
2 parents 1366ccf + 72c1426 commit 8d8c707
Show file tree
Hide file tree
Showing 59 changed files with 34 additions and 145 deletions.
1 change: 0 additions & 1 deletion Common/bv.cry
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
/*
* Copyright (c) 2013-2016 Galois, Inc.
* Distributed under the terms of the BSD3 license
*/
module Common::bv where

Expand Down
1 change: 0 additions & 1 deletion Common/mod_arith.cry
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
/*
* Copyright (c) 2013-2016 Galois, Inc.
* Distributed under the terms of the BSD3 license
*/
module Common::mod_arith where

Expand Down
30 changes: 30 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
Copyright (c) 2013-2019 Galois Inc.
All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:

* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the
distribution.

* Neither the name of Galois, Inc. nor the names of its contributors
may be used to endorse or promote products derived from this
software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
18 changes: 0 additions & 18 deletions McEliece_KEM/high-level/Keccak.cry
Original file line number Diff line number Diff line change
@@ -1,23 +1,5 @@
/*
* Copyright (c) 2013 David Lazar <lazard@galois.com>
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE.
*/

// Specification of the Keccak (SHA-3) hash function
Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Cipher/RSA.cry
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/


Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Cipher/testRSADP.cry
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/compon

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

Author: Ajay Kumar Eeralla
*/
Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Scheme/RSAES_OAEP.cry
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Asymmetric::Scheme::RSAES_OAEP where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Scheme/RSAES_PKCS1_v1_5.cry
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Asymmetric::Scheme::RSAES_PKCS1_v1_5 where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Signature/DSA/DSA.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/* Cryptol DSA Implementation
Copyright (c) 2010-2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
Author: Ajay Kumar Eeralla
source: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf */

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

*/

module Primitive::Asymmetric::Signature::Dilithium::Round1::DilithiumBitVec where
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

*/

module Primitive::Asymmetric::Signature::Dilithium::Round1::DilithiumInteger where
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Asymmetric::Signature::Dilithium::Round1::DilithiumMedium=Primitive::Asymmetric::Signature::Dilithium::Round1::DilithiumBitVec where
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
See https://pq-crystals.org/dilithium/data/dilithium-specification.pdf
Copyright (c) 2021, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
Author: Ajay Kumar Eeralla
*/

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
See https://pq-crystals.org/dilithium/data/dilithium-specification.pdf
Copyright (c) 2018-2021, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

/* From now on, I follow the following naming conventions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
See https://pq-crystals.org/dilithium/data/dilithium-specification.pdf
Copyright (c) 2021, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
Author: Ajay Kumar Eeralla
*/

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
See https://pq-crystals.org/dilithium/data/dilithium-specification.pdf
Copyright (c) 2021, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
Author: Ajay Kumar Eeralla
*/

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
See https://pq-crystals.org/dilithium/data/dilithium-specification.pdf
Copyright (c) 2021, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
Author: Ajay Kumar Eeralla
*/

Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Signature/RSA.cry
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/


Expand Down
1 change: 0 additions & 1 deletion Primitive/Asymmetric/Signature/ecdsa.cry
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Asymmetric::Signature::ecdsa where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Generator/DRBG.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Generator::DRBG where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/Blake2b.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2015-2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

Author: Thomas M. DuBuisson
*/
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/Blake2s.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2013-2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::Blake2s where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/FNV.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2014-2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::FNV where
Expand Down
2 changes: 0 additions & 2 deletions Primitive/Keyless/Hash/SHA1.cry
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,6 @@

Copyright (c) 2004, 2013-2018 Galois, Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

*/


Expand Down
10 changes: 0 additions & 10 deletions Primitive/Keyless/Hash/SHA2/SHA.cry
Original file line number Diff line number Diff line change
@@ -1,16 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

module Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/SHA2/SHA224.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::SHA2::SHA224 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/SHA2/SHA256.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::SHA2::SHA256 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
10 changes: 0 additions & 10 deletions Primitive/Keyless/Hash/SHA2/SHA384.cry
Original file line number Diff line number Diff line change
@@ -1,16 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

module Primitive::Keyless::Hash::SHA2::SHA384 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/SHA2/SHA512.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::SHA2::SHA512 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/SHA2/SHA512_224.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::SHA2::SHA512_224 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
1 change: 0 additions & 1 deletion Primitive/Keyless/Hash/SHA2/SHA512_256.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/

module Primitive::Keyless::Hash::SHA2::SHA512_256 = Primitive::Keyless::Hash::SHA2::SHA where
Expand Down
18 changes: 0 additions & 18 deletions Primitive/Keyless/Hash/keccak.cry
Original file line number Diff line number Diff line change
@@ -1,23 +1,5 @@
/*
* Copyright (c) 2013 David Lazar <lazard@galois.com>
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE.
*/

// Specification of the Keccak (SHA-3) hash function
Expand Down
1 change: 0 additions & 1 deletion Primitive/Symmetric/Cipher/Authenticated/AES_GCM.cry
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
// Cryptol AES GCM test vectors
// Copyright (c) 2010-2018, Galois Inc.
// www.cryptol.net
// You can freely use this source code for educational purposes.
// Author: Ajay Kumar Eeralla

//Test vectors from http://luca-giuzzi.unibs.it/corsi/Support/papers-cryptography/gcm-spec.pdf
Expand Down
1 change: 0 additions & 1 deletion Primitive/Symmetric/Cipher/Authenticated/AES_GCM_SIV.cry
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@

Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.

*/

Expand Down
10 changes: 0 additions & 10 deletions Primitive/Symmetric/Cipher/Authenticated/GCM.cry
Original file line number Diff line number Diff line change
Expand Up @@ -2,16 +2,6 @@
Galois Counter Mode in Cryptol
Copyright (c) 2017-2018, Galois, Inc.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This implementation follows:
"The Galois/Counter Mode of Operation (GCM)"
paper by McGrew and Viega.
Expand Down
1 change: 0 additions & 1 deletion Primitive/Symmetric/Cipher/Authenticated/MEE_CBC.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
/*
Copyright (c) 2018, Galois Inc.
www.cryptol.net
You can freely use this source code for educational purposes.
*/


Expand Down
12 changes: 0 additions & 12 deletions Primitive/Symmetric/Cipher/Block/AES.cry
Original file line number Diff line number Diff line change
Expand Up @@ -2,18 +2,6 @@
// Copyright (c) 2010-2018, Galois Inc.
// www.cryptol.net

/*
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

// This is a fairly close implementation of the FIPS-197 standard:
// http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

Expand Down
1 change: 0 additions & 1 deletion Primitive/Symmetric/Cipher/Block/AES/Algorithm.cry
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
// Cryptol AES Implementation
// Copyright (c) 2010-2018, Galois Inc.
// www.cryptol.net
// You can freely use this source code for educational purposes.

// This is a fairly close implementation of the FIPS-197 standard:
// http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Expand Down
Loading

0 comments on commit 8d8c707

Please sign in to comment.