1 | Source: i2p |
---|
2 | Maintainer: zzz <zzz@i2pmail.org> |
---|
3 | Section: net |
---|
4 | Standards-Version: 4.3.0 |
---|
5 | Priority: optional |
---|
6 | Bugs: mailto:zzz@i2pmail.org |
---|
7 | Homepage: https://geti2p.net/ |
---|
8 | Vcs-Browser: https://salsa.debian.org/debian/i2p |
---|
9 | Vcs-Git: https://salsa.debian.org/debian/i2p.git |
---|
10 | Build-Depends: debhelper (>= 9.20160709) |
---|
11 | ,ant (>= 1.8) |
---|
12 | ,debconf |
---|
13 | ,default-jdk |
---|
14 | ,libjetty9-java |
---|
15 | ,libtaglibs-standard-jstlel-java |
---|
16 | ,libtomcat9-java |
---|
17 | ,dh-apparmor |
---|
18 | ,bash-completion |
---|
19 | ,gettext |
---|
20 | ,libgetopt-java |
---|
21 | ,libjson-simple-java (<< 3) |
---|
22 | ,libgmp-dev (>= 2:5.0.5) |
---|
23 | ,libservice-wrapper-java |
---|
24 | ,po-debconf |
---|
25 | |
---|
26 | Package: i2p |
---|
27 | Architecture: all |
---|
28 | Section: net |
---|
29 | Priority: optional |
---|
30 | Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, |
---|
31 | adduser, |
---|
32 | apparmor, |
---|
33 | debconf, |
---|
34 | i2p-router (>= 0.8.6-5), |
---|
35 | libjbigi-jni, |
---|
36 | lsb-base, |
---|
37 | service-wrapper, |
---|
38 | ucf (>= 0.28) |
---|
39 | Description: Invisible Internet Project (I2P) - anonymous network |
---|
40 | I2P is an anonymizing network, offering a simple layer that identity-sensitive |
---|
41 | applications can use to securely communicate. All data is wrapped with several |
---|
42 | layers of encryption, and the network is both distributed and dynamic, with no |
---|
43 | trusted parties. |
---|
44 | . |
---|
45 | This package depends on the router, jbigi, the java service wrapper, and |
---|
46 | includes support to run I2P as a daemon. |
---|
47 | |
---|
48 | Package: libjbigi-jni |
---|
49 | Architecture: any |
---|
50 | Section: java |
---|
51 | Priority: optional |
---|
52 | Depends: ${misc:Depends}, ${shlibs:Depends}, i2p-router |
---|
53 | Homepage: https://geti2p.net/ |
---|
54 | Description: Invisible Internet Project (I2P) - libjbigi library |
---|
55 | This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid). |
---|
56 | . |
---|
57 | libjbigi is a math library that is part of the I2P installation. Use of this |
---|
58 | library greatly enhances the efficiency of cryptographic algorithms, such as |
---|
59 | the ones used by I2P. You can expect to see a 5-7x speed improvement on certain |
---|
60 | tasks, such as elGamal encryption/decryption. |
---|
61 | |
---|
62 | Package: i2p-doc |
---|
63 | Architecture: all |
---|
64 | Section: doc |
---|
65 | Priority: extra |
---|
66 | Depends: ${misc:Depends} |
---|
67 | Suggests: i2p, default-jdk-doc |
---|
68 | Description: Invisible Internet Project (I2P) - developer documentation |
---|
69 | I2P is an anonymizing network, offering a simple layer that identity-sensitive |
---|
70 | applications can use to securely communicate. All data is wrapped with several |
---|
71 | layers of encryption, and the network is both distributed and dynamic, with no |
---|
72 | trusted parties. |
---|
73 | . |
---|
74 | This package contains the Javadoc files. |
---|
75 | |
---|
76 | Package: i2p-router |
---|
77 | Architecture: all |
---|
78 | Section: net |
---|
79 | Priority: optional |
---|
80 | Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends}, |
---|
81 | openjdk-11-jre-headless | java11-runtime-headless, |
---|
82 | geoip-database, |
---|
83 | gettext-base, |
---|
84 | libgetopt-java, |
---|
85 | libjson-simple-java (<< 3), |
---|
86 | libjetty9-java, |
---|
87 | libtaglibs-standard-jstlel-java, |
---|
88 | libtomcat9-java, |
---|
89 | famfamfam-flag-png, |
---|
90 | sensible-utils |
---|
91 | Replaces: i2p ( << 0.8.6-5) |
---|
92 | Breaks: i2p (<< 0.8.6-5) |
---|
93 | Recommends: libjbigi-jni, fonts-dejavu |
---|
94 | Suggests: apparmor |
---|
95 | ,privoxy |
---|
96 | ,syndie |
---|
97 | Description: Invisible Internet Project (I2P) - Router |
---|
98 | I2P is an anonymizing network, offering a simple layer that identity-sensitive |
---|
99 | applications can use to securely communicate. All data is wrapped with several |
---|
100 | layers of encryption, and the network is both distributed and dynamic, with no |
---|
101 | trusted parties. |
---|
102 | . |
---|
103 | TrueType fonts (such as those provided in the package fonts-dejavu) are required |
---|
104 | in order to generate graphs. |
---|