libauthen-oath-perl 2.0.1-2 source package in Ubuntu

Changelog

libauthen-oath-perl (2.0.1-2) unstable; urgency=medium

  [ Damyan Ivanov ]
  * declare conformance with Policy 4.1.3 (no changes needed)

  [ Salvatore Bonaccorso ]
  * Update Vcs-* headers for switch to salsa.debian.org

  [ gregor herrmann ]
  * debian/watch: use uscan version 4.

  [ Debian Janitor ]
  * Bump debhelper from old 9 to 12.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Bug-Submit.
  * Remove obsolete fields Contact, Name from debian/upstream/metadata
    (already present in machine-readable debian/copyright).
  * Remove constraints unnecessary since stretch:
    + Build-Depends-Indep: Drop versioned constraint on libmoo-perl.
    + libauthen-oath-perl: Drop versioned constraint on libmoo-perl in Depends.

 -- Jelmer Vernooij <email address hidden>  Wed, 08 Jun 2022 17:40:26 +0100

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe perl
Noble release universe perl
Mantic release universe perl
Lunar release universe perl

Builds

Kinetic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libauthen-oath-perl_2.0.1-2.dsc 2.2 KiB 00b81d5d33818cc7ada8ebcfc2725b4adb6384b9aff0120e25029a11c8f81575
libauthen-oath-perl_2.0.1.orig.tar.gz 13.0 KiB 1a813dbdc05c3fbd9dd39dbcfd85e2cfb0ba3d0f652cf6b26ec83ab8146ddc77
libauthen-oath-perl_2.0.1-2.debian.tar.xz 2.4 KiB d2d050769472072f8d4d76bb667d79843ba7b7ce0604fa0b8f33fdcb277a3360

Available diffs

No changes file available.

Binary packages built by this source

libauthen-oath-perl: Perl module for OATH One Time Passwords

 Authen::OATH is an implementation of the HOTP and TOTP One Time Password
 algorithms as defined by OATH (http://www.openauthentication.org).
 .
 All necessary parameters are set by default, though these can be overridden.
 Both totp() and htop() have passed all of the test vectors defined in the RFC
 documents for TOTP and HOTP.
 .
 totp() and hotp() both default to returning 6 digits and using SHA. As such,
 both can be called by passing only the secret key and a valid OTP will be
 returned.