معرفی شرکت ها


libghc-hackage-security-prof_0.6.0.1-2+b2_i386.deb


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Hackage security library; profiling libraries
ویژگی مقدار
سیستم عامل Linux
توزیع Debian Bullseye-11
مخزن Debian main i386
نام بسته libghc-hackage-security-prof
نام فایل بسته libghc-hackage-security-prof_0.6.0.1-2+b2_i386.deb
نسخه بسته 0.6.0.1
انتشار بسته 2+b2
معماری بسته i386
نگهدارنده Debian Haskell Group <pkg-haskell-maintainers@lists.alioth.debian.org>
تاریخ ساخت -
هاست سازنده -
نوع بسته .deb
آدرس صفحه اصلی https://github.com/haskell/hackage-security
مجوز -
حجم دانلود 659252
حجم نصب 5323
The Hackage security library provides both server and client utilities for securing the Hackage package server. It is based on The Update Framework, a set of recommendations developed by security researchers at various universities in the US as well as developers on the Tor project. . The current implementation supports only index signing, thereby enabling untrusted mirrors. It does not yet provide facilities for author package signing. . This package provides a library for the Haskell programming language, compiled for profiling. See http://www.haskell.org/ for more information on Haskell.


جایگزین ها



نیازمندی

مقدار نام
= 0.6.0.1-2+b2 libghc-hackage-security-dev
- libghc-cabal-prof-3.0.1.0-a903f
- libghc-base-prof-4.13.0.0-3cd45
- libghc-base16-bytestring-prof-0.1.1.7-6b1f2
- libghc-base64-bytestring-prof-1.0.0.3-a8d1d
- libghc-bytestring-prof-0.10.10.1-2e27a
- libghc-containers-prof-0.6.2.1-67b24
- libghc-cryptohash-sha256-prof-0.11.101.0-c3c85
- libghc-directory-prof-1.3.6.0-61922
- libghc-ed25519-prof-0.0.5.0-55bb1
- libghc-filepath-prof-1.4.2.1-c7330
- libghc-ghc-prim-prof-0.5.3-00322
- libghc-mtl-prof-2.2.2-e0289
- libghc-network-prof-3.1.1.1-000ea
- libghc-network-uri-prof-2.6.3.0-7a4cb
- libghc-parsec-prof-3.1.14.0-62f23
- libghc-pretty-prof-1.1.3.6-eb7b6
- libghc-tar-prof-0.5.1.1-00a7b
- libghc-template-haskell-prof-2.15.0.0-f9a15
- libghc-time-prof-1.9.3-d12cd
- libghc-transformers-prof-0.5.6.2-65980
- libghc-zlib-prof-0.6.2.2-9d797


نحوه نصب


نصب پکیج deb libghc-hackage-security-prof:

    sudo apt-get install libghc-hackage-security-prof_0.6.0.1-2+b2_i386.deb


فایل ها

مسیرها
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Formats.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Repository/Cache.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Repository/HttpLib.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Repository/Local.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Repository/Remote.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Repository.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client/Verify.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Client.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/JSON.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Key/Env.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Key.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Server.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Common.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/FileInfo.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/FileMap.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Header.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Layout/Cache.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Layout/Index.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Layout/Repo.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Mirrors.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Paths.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Patterns.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Root.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Signed.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Snapshot.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Targets.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF/Timestamp.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/TUF.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Trusted/TCB.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Trusted.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Base64.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Checked.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Exit.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/IO.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/JSON.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Lens.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Path.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Pretty.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Some.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/Stack.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Hackage/Security/Util/TypedEmbedded.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Prelude.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/Text/JSON/Canonical.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.8.4/hackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso/libHShackage-security-0.6.0.1-CTUhYkOU6Kn15211rdUlso_p.a
./usr/share/doc/libghc-hackage-security-prof/buildinfo_i386.gz
./usr/share/doc/libghc-hackage-security-prof/changelog.Debian.gz
./usr/share/doc/libghc-hackage-security-prof/changelog.Debian.i386.gz
./usr/share/doc/libghc-hackage-security-prof/changelog.gz
./usr/share/doc/libghc-hackage-security-prof/copyright