diff --git a/Makefile b/Makefile index 55eb8c6a..1544d3ec 100644 --- a/Makefile +++ b/Makefile @@ -188,9 +188,12 @@ PKG_EXFUNSTUFF_FILES := examples/funstuff/Coins.cry \ examples/funstuff/NQueens.cry \ examples/funstuff/marble.cry \ +PKG_MINILOCK_FILES := $(shell find examples/MiniLock) + ${PKG}: ${CRYPTOL_EXE} \ docs/*.md docs/*.pdf LICENSE LICENSE.rtf \ - ${PKG_EXAMPLE_FILES} ${PKG_EXCONTRIB_FILES} ${PKG_EXFUNSTUFF_FILES} + ${PKG_EXAMPLE_FILES} ${PKG_EXCONTRIB_FILES} ${PKG_EXFUNSTUFF_FILES} \ + ${PKG_MINILOCK_FILES} $(CABAL) copy ${DESTDIR_ARG} mkdir -p ${PKG_CRY} mkdir -p ${PKG_DOC} @@ -204,6 +207,8 @@ ${PKG}: ${CRYPTOL_EXE} \ cp $$EXAMPLE ${PKG_EXCONTRIB}; done for EXAMPLE in ${PKG_EXFUNSTUFF_FILES}; do \ cp $$EXAMPLE ${PKG_EXFUNSTUFF}; done + cp -r examples/MiniLock ${PKG_EXAMPLES} + # cleanup unwanted files # don't want to bundle the cryptol library in the binary distribution rm -rf ${PKG_PREFIX}/lib; rm -rf ${PKG_PREFIX}/*windows-ghc* diff --git a/examples/MiniLock/File.md b/examples/MiniLock/File.md index f7b0bf45..d6cc66bd 100644 --- a/examples/MiniLock/File.md +++ b/examples/MiniLock/File.md @@ -1,3 +1,6 @@ +Copyright (c) 2013-2016 Galois, Inc. +Distributed under the terms of the BSD3 license (see LICENSE file) + Define the minilock file format, encoding only. ```cryptol diff --git a/examples/MiniLock/Keys.cry b/examples/MiniLock/Keys.cry index 32c2a30d..dcbe03e8 100644 --- a/examples/MiniLock/Keys.cry +++ b/examples/MiniLock/Keys.cry @@ -1,3 +1,7 @@ +/* + * Copyright (c) 2013-2016 Galois, Inc. + * Distributed under the terms of the BSD3 license (see LICENSE file) + */ module Keys where import CfrgCurves diff --git a/examples/MiniLock/README.md b/examples/MiniLock/README.md index 1ca8ff37..cac3da66 100644 --- a/examples/MiniLock/README.md +++ b/examples/MiniLock/README.md @@ -36,3 +36,8 @@ miniLock [(theirID, nonceA)] filename contents (myPrivKey, myPubKey) key nonceF Note SCrypt, and thus miniLock ID and key derivation from user passwords, is too expensive for the Cryptol interpreter to compute on all but todays more powerful computers. The ID generation can be done using `mkID` from `Keys.cry`. + +# License + +Copyright (c) 2013-2016 Galois, Inc. +Distributed under the terms of the BSD3 license (see LICENSE file) diff --git a/examples/MiniLock/prim/SHA256.cry b/examples/MiniLock/prim/SHA256.cry index 2eefa033..22c9202c 100644 --- a/examples/MiniLock/prim/SHA256.cry +++ b/examples/MiniLock/prim/SHA256.cry @@ -1,4 +1,7 @@ /* + * Copyright (c) 2013-2016 Galois, Inc. + * Distributed under the terms of the BSD3 license (see LICENSE file) + * * @tmd - 24 April 2015 - took Ian's SHA512, converted to SHA256 * @ian - 15 August 2015 - he lies, probably ment 2014. * diff --git a/examples/MiniLock/prim/TestHMAC.cry b/examples/MiniLock/prim/TestHMAC.cry index c2c21795..7641882c 100644 --- a/examples/MiniLock/prim/TestHMAC.cry +++ b/examples/MiniLock/prim/TestHMAC.cry @@ -1,3 +1,7 @@ +/* + * Copyright (c) 2013-2016 Galois, Inc. + * Distributed under the terms of the BSD3 license (see LICENSE file) + */ module TestHMAC where import HMAC