bb3cea75482cc31d3e077a0847e84cccede8d601
After we merged some concepts from the compromise branch, we forgot to add for the hardcoded PKI that the adversary also should have access to (some) symmetric keys.
Description
Scyther with my modifications
Languages
C
42.9%
Python
28.8%
TeX
14.1%
C++
9.8%
Shell
1.2%
Other
3.1%