libcrypt-dh-perl 0.07-3 source package in Ubuntu
Changelog
libcrypt-dh-perl (0.07-3) unstable; urgency=medium [ Dominic Hargreaves ] * Update Vcs-* to salsa/pkg-perl [ gregor herrmann ] * debian/*: update URLs from {search,www}.cpan.org to MetaCPAN. [ Laurent Baillet ] * fix lintian file-contains-trailing-whitespace warning [ gregor herrmann ] * debian/watch: use uscan version 4. [ Debian Janitor ] * Use versioned copyright format URI. * Update copyright file header to use current field names (Name => Upstream-Name, Maintainer => Upstream-Contact) * Bump debhelper from old 10 to 12. * Set debhelper-compat version in Build-Depends. * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository, Repository-Browse. * Remove constraints unnecessary since stretch: + Build-Depends-Indep: Drop versioned constraint on perl. * Bump debhelper from old 12 to 13. * Set Testsuite header for perl package. -- Jelmer Vernooij <email address hidden> Sun, 12 Jun 2022 22:20:13 +0100
Upload details
- Uploaded by:
- Debian Perl Group
- Uploaded to:
- Sid
- Original maintainer:
- Debian Perl Group
- Architectures:
- all
- Section:
- perl
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | perl | |
Noble | release | universe | perl | |
Mantic | release | universe | perl | |
Lunar | release | universe | perl |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libcrypt-dh-perl_0.07-3.dsc | 2.1 KiB | 3863083a36e4e20da2c79aab21851174c1bcd2a377e2b141627e871289573991 |
libcrypt-dh-perl_0.07.orig.tar.gz | 42.7 KiB | c88cf3423b01e6782e8986d7fe5304436ab84b0925c4498c6fdfa17ef9a37f5f |
libcrypt-dh-perl_0.07-3.debian.tar.xz | 3.0 KiB | e0f21776a2f34dfd7ab8f5dc2d3819673c373e1b5860bc8d27e7f58bdbbc3036 |
Available diffs
- diff from 0.07-2 to 0.07-3 (1.7 KiB)
No changes file available.
Binary packages built by this source
- libcrypt-dh-perl: Diffie-Hellman key exchange system implemented in Perl
Diffie-Hellman is an algorithm by which two parties can agree on a
shared secret key, known only to them. The secret is negotiated over an
insecure network without the two parties ever passing the actual shared
secret, or their private keys, between them.