libauthen-oath-perl 2.0.1-2 source package in Ubuntu
Changelog
libauthen-oath-perl (2.0.1-2) unstable; urgency=medium [ Damyan Ivanov ] * declare conformance with Policy 4.1.3 (no changes needed) [ Salvatore Bonaccorso ] * Update Vcs-* headers for switch to salsa.debian.org [ gregor herrmann ] * debian/watch: use uscan version 4. [ Debian Janitor ] * Bump debhelper from old 9 to 12. * Set debhelper-compat version in Build-Depends. * Set upstream metadata fields: Bug-Submit. * Remove obsolete fields Contact, Name from debian/upstream/metadata (already present in machine-readable debian/copyright). * Remove constraints unnecessary since stretch: + Build-Depends-Indep: Drop versioned constraint on libmoo-perl. + libauthen-oath-perl: Drop versioned constraint on libmoo-perl in Depends. -- Jelmer Vernooij <email address hidden> Wed, 08 Jun 2022 17:40:26 +0100
Upload details
- Uploaded by:
- Debian Perl Group
- Uploaded to:
- Sid
- Original maintainer:
- Debian Perl Group
- Architectures:
- all
- Section:
- perl
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | perl | |
Noble | release | universe | perl | |
Mantic | release | universe | perl | |
Lunar | release | universe | perl |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libauthen-oath-perl_2.0.1-2.dsc | 2.2 KiB | 00b81d5d33818cc7ada8ebcfc2725b4adb6384b9aff0120e25029a11c8f81575 |
libauthen-oath-perl_2.0.1.orig.tar.gz | 13.0 KiB | 1a813dbdc05c3fbd9dd39dbcfd85e2cfb0ba3d0f652cf6b26ec83ab8146ddc77 |
libauthen-oath-perl_2.0.1-2.debian.tar.xz | 2.4 KiB | d2d050769472072f8d4d76bb667d79843ba7b7ce0604fa0b8f33fdcb277a3360 |
Available diffs
- diff from 2.0.1-1 to 2.0.1-2 (1.4 KiB)
No changes file available.
Binary packages built by this source
- libauthen-oath-perl: Perl module for OATH One Time Passwords
Authen::OATH is an implementation of the HOTP and TOTP One Time Password
algorithms as defined by OATH (http://www.openauthent ication. org).
.
All necessary parameters are set by default, though these can be overridden.
Both totp() and htop() have passed all of the test vectors defined in the RFC
documents for TOTP and HOTP.
.
totp() and hotp() both default to returning 6 digits and using SHA. As such,
both can be called by passing only the secret key and a valid OTP will be
returned.