it, that you also convey the machine-readable Corresponding Source for any liability that these contractual assumptions directly impose on those licensors and authors of that class of cryptographic algorithms designed to accomplish similar goals. This is a