9605d5e772
Passing the '--all-attacks' switch to the backend was not working. The reason was the hack to get Vista working hardcoded cutting to the last attack found. In the long term, this needs to be cleaned up, and cutting should be moved back nicely to the Scyther C code where it used to work. Once done, switches.useAttackBuffer can be set back to true. BUGFIX: When cutting attacks/patterns, counts are no longer exact. |
||
---|---|---|
.. | ||
Gui | ||
Images | ||
Protocols | ||
Scripts | ||
Scyther | ||
Time | ||
.gitignore | ||
Changelog.txt | ||
GNU-General-Public-License.txt | ||
INSTALL.txt | ||
mpa.py | ||
mpa.spdl | ||
ns3.spdl | ||
nsl3-broken.spdl | ||
nsl3.spdl | ||
README.txt | ||
scyther-gui.py | ||
scyther-gui.rc | ||
scyther.py | ||
todo.txt |
------------------------------------------------------------------------ Scyther an automatic verification tool for security protocols by Cas Cremers ------------------------------------------------------------------------ Note: This is a BETA release, and therefore the usual warnings apply. 1. More information ======================================================================== For more information, see: http://people.inf.ethz.ch/cremersc/scyther/index.html 2. Starting out ======================================================================== Start the graphical user interface by starting scyther-gui.py Some protocol description files (with extension .spdl) can be found in the base directory. Many other protocol input files can be found in the 'Protocols' directory. 3. Citing Scyther =========================== @phdthesis{cremers06, Author = "Cas Cremers", Title = "Scyther - Semantics and Verification of Security Protocols", school = "Eindhoven University of Technology", publisher = "University Press Eindhoven", year = "2006", }