mirror of
https://github.com/pmai/sha3.git
synced 2025-12-21 23:34:29 +01:00
Update docs and copyrights for 1.1.1 release
This commit is contained in:
@ -13,10 +13,6 @@ env:
|
|||||||
- LISP=clisp32
|
- LISP=clisp32
|
||||||
- LISP=ecl
|
- LISP=ecl
|
||||||
|
|
||||||
matrix:
|
|
||||||
allow_failures:
|
|
||||||
- env: LISP=allegro
|
|
||||||
|
|
||||||
install:
|
install:
|
||||||
- curl -L https://github.com/luismbo/cl-travis/raw/master/install.sh | sh
|
- curl -L https://github.com/luismbo/cl-travis/raw/master/install.sh | sh
|
||||||
- git clone https://github.com/gvanas/KeccakCodePackage.git
|
- git clone https://github.com/gvanas/KeccakCodePackage.git
|
||||||
|
|||||||
2
COPYING
2
COPYING
@ -1,4 +1,4 @@
|
|||||||
Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai
|
Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining
|
Permission is hereby granted, free of charge, to any person obtaining
|
||||||
a copy of this software and associated documentation files (the
|
a copy of this software and associated documentation files (the
|
||||||
|
|||||||
8
NEWS
8
NEWS
@ -1,3 +1,11 @@
|
|||||||
|
Release 1.1.1
|
||||||
|
=============
|
||||||
|
|
||||||
|
* Fix a bug in pad-message-to-width on ACL, which would lead to
|
||||||
|
completely erroneous results being calculated for all inputs
|
||||||
|
due to differences in the result of adjust-array between ACL
|
||||||
|
and all other currently supported implementations.
|
||||||
|
|
||||||
Release 1.1.0
|
Release 1.1.0
|
||||||
=============
|
=============
|
||||||
|
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
4
sha3.asd
4
sha3.asd
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
@ -42,7 +42,7 @@
|
|||||||
:author "Pierre R. Mai <pmai@pmsf.de>"
|
:author "Pierre R. Mai <pmai@pmsf.de>"
|
||||||
:maintainer "Pierre R. Mai <pmai@pmsf.de>"
|
:maintainer "Pierre R. Mai <pmai@pmsf.de>"
|
||||||
:licence "MIT/X11"
|
:licence "MIT/X11"
|
||||||
:version "1.1.0"
|
:version "1.1.1"
|
||||||
#+sbcl :depends-on #+sbcl ("sb-rotate-byte")
|
#+sbcl :depends-on #+sbcl ("sb-rotate-byte")
|
||||||
:components ((:file "pkgdef")
|
:components ((:file "pkgdef")
|
||||||
(:file "common" :depends-on ("pkgdef"))
|
(:file "common" :depends-on ("pkgdef"))
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
;;;; SHA3 --- Secure Hash Algorithm 3 (Keccak) Implementation
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Copyright (C) 2012 -- 2016 PMSF IT Consulting Pierre R. Mai.
|
;;;; Copyright (C) 2012 -- 2018 PMSF IT Consulting Pierre R. Mai.
|
||||||
;;;;
|
;;;;
|
||||||
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
;;;; Permission is hereby granted, free of charge, to any person obtaining
|
||||||
;;;; a copy of this software and associated documentation files (the
|
;;;; a copy of this software and associated documentation files (the
|
||||||
|
|||||||
Reference in New Issue
Block a user