File: control

package info (click to toggle)
libcrypt-pbkdf2-perl 0.161520-2
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, forky, sid, trixie
  • size: 148 kB
  • sloc: perl: 589; makefile: 2
file content (48 lines) | stat: -rw-r--r-- 1,716 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Source: libcrypt-pbkdf2-perl
Section: perl
Priority: optional
Maintainer: Debian Perl Group <pkg-perl-maintainers@lists.alioth.debian.org>
Uploaders:
 Russ Allbery <rra@debian.org>,
 Salvatore Bonaccorso <carnil@debian.org>
Build-Depends: debhelper-compat (= 13)
Build-Depends-Indep:
 libdigest-hmac-perl,
 libdigest-sha3-perl,
 libmodule-runtime-perl,
 libmoo-perl,
 libnamespace-autoclean-perl,
 libstrictures-perl,
 libtest-fatal-perl,
 libtry-tiny-perl,
 libtype-tiny-perl,
 perl
Standards-Version: 4.1.3
Vcs-Browser: https://salsa.debian.org/perl-team/modules/packages/libcrypt-pbkdf2-perl
Vcs-Git: https://salsa.debian.org/perl-team/modules/packages/libcrypt-pbkdf2-perl.git
Homepage: https://metacpan.org/release/Crypt-PBKDF2
Testsuite: autopkgtest-pkg-perl

Package: libcrypt-pbkdf2-perl
Architecture: all
Depends:
 libdigest-hmac-perl,
 libdigest-sha3-perl,
 libmodule-runtime-perl,
 libmoo-perl,
 libnamespace-autoclean-perl,
 libstrictures-perl,
 libtry-tiny-perl,
 libtype-tiny-perl,
 ${misc:Depends},
 ${perl:Depends}
Description: Perl implementation of PBKDF2 password hash
 PBKDF2 (part of the PKCS#5 standard) is a secure password hashing
 algorithm that uses the techniques of "key strengthening" to make the
 complexity of a brute-force attack arbitrarily high. The Crypt::PBKDF2
 module supports SHA-1, SHA-2 and SHA-3 as the underlying hash functions
 natively and can also use arbitrary Digest-compatible classes. It
 allows for an arbitrary number of iterations of the hashing function,
 and a nearly unlimited output hash size (up to 2**32 - 1 times the size
 of the output of the backend hash). The hash is salted, as any password
 hash should be, and the salt may also be of arbitrary size.