libcrypt-dh-perl 0.07-3 source package in Ubuntu

Changelog

libcrypt-dh-perl (0.07-3) unstable; urgency=medium

  [ Dominic Hargreaves ]
  * Update Vcs-* to salsa/pkg-perl

  [ gregor herrmann ]
  * debian/*: update URLs from {search,www}.cpan.org to MetaCPAN.

  [ Laurent Baillet ]
  * fix lintian file-contains-trailing-whitespace warning

  [ gregor herrmann ]
  * debian/watch: use uscan version 4.

  [ Debian Janitor ]
  * Use versioned copyright format URI.
  * Update copyright file header to use current field names (Name =>
    Upstream-Name, Maintainer => Upstream-Contact)
  * Bump debhelper from old 10 to 12.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository,
    Repository-Browse.
  * Remove constraints unnecessary since stretch:
    + Build-Depends-Indep: Drop versioned constraint on perl.
  * Bump debhelper from old 12 to 13.
  * Set Testsuite header for perl package.

 -- Jelmer Vernooij <email address hidden>  Sun, 12 Jun 2022 22:20:13 +0100

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe perl
Noble release universe perl
Mantic release universe perl
Lunar release universe perl

Builds

Kinetic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libcrypt-dh-perl_0.07-3.dsc 2.1 KiB 3863083a36e4e20da2c79aab21851174c1bcd2a377e2b141627e871289573991
libcrypt-dh-perl_0.07.orig.tar.gz 42.7 KiB c88cf3423b01e6782e8986d7fe5304436ab84b0925c4498c6fdfa17ef9a37f5f
libcrypt-dh-perl_0.07-3.debian.tar.xz 3.0 KiB e0f21776a2f34dfd7ab8f5dc2d3819673c373e1b5860bc8d27e7f58bdbbc3036

Available diffs

No changes file available.

Binary packages built by this source

libcrypt-dh-perl: Diffie-Hellman key exchange system implemented in Perl

 Diffie-Hellman is an algorithm by which two parties can agree on a
 shared secret key, known only to them. The secret is negotiated over an
 insecure network without the two parties ever passing the actual shared
 secret, or their private keys, between them.