معرفی شرکت ها


libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Hackage security library; profiling libraries
ویژگی مقدار
سیستم عامل Linux
توزیع Ubuntu Bionic-18.04
مخزن Ubuntu universe i386
نام بسته libghc-hackage-security-prof
نام فایل بسته libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb
نسخه بسته 0.5.2.2
انتشار بسته 8build8
معماری بسته i386
نگهدارنده Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
تاریخ ساخت -
هاست سازنده -
نوع بسته .deb
آدرس صفحه اصلی https://github.com/well-typed/hackage-security
مجوز -
حجم دانلود 614036
حجم نصب 4948
The Hackage security library provides both server and client utilities for securing the Hackage package server. It is based on The Update Framework, a set of recommendations developed by security researchers at various universities in the US as well as developers on the Tor project. . The current implementation supports only index signing, thereby enabling untrusted mirrors. It does not yet provide facilities for author package signing. . This package provides a library for the Haskell programming language, compiled for profiling. See http://www.haskell.org/ for more information on Haskell.


جایگزین ها

بسته نسخه معماری مخزن
libghc-hackage-security-prof_0.5.2.2-8build8_amd64.deb 0.5.2.2 amd64 Ubuntu universe


نیازمندی

مقدار نام
= 0.5.2.2-8build8 libghc-hackage-security-dev
- libghc-cabal-prof-1.24.2.0-353fc
- libghc-base-prof-4.9.1.0-5a696
- libghc-base16-bytestring-prof-0.1.1.6-c8f62
- libghc-base64-bytestring-prof-1.0.0.1-caecc
- libghc-bytestring-prof-0.10.8.1-a98c5
- libghc-containers-prof-0.5.7.1-ed950
- libghc-cryptohash-prof-0.11.9-a67fe
- libghc-directory-prof-1.3.0.0-b5c22
- libghc-ed25519-prof-0.0.5.0-c0713
- libghc-filepath-prof-1.4.1.1-32f1a
- libghc-ghc-prim-prof-0.5.0.0-fcda7
- libghc-mtl-prof-2.2.1-93d32
- libghc-network-prof-2.6.3.2-67243
- libghc-network-uri-prof-2.6.1.0-5f962
- libghc-parsec-prof-3.1.11-fa71e
- libghc-pretty-prof-1.1.3.3-92eaa
- libghc-tar-prof-0.5.0.3-e6bb8
- libghc-template-haskell-prof-2.11.1.0-ae950
- libghc-time-prof-1.6.0.1-fbdf1
- libghc-transformers-prof-0.5.2.0-e204f
- libghc-zlib-prof-0.6.1.2-f6ce5


نحوه نصب


نصب پکیج deb libghc-hackage-security-prof:

    sudo apt-get install libghc-hackage-security-prof_0.5.2.2-8build8_i386.deb


فایل ها

مسیرها
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Formats.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Cache.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/HttpLib.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Local.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository/Remote.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Repository.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client/Verify.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Client.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/JSON.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Key/Env.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Key.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Server.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Common.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/FileInfo.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/FileMap.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Header.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Cache.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Index.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Layout/Repo.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Mirrors.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Paths.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Patterns.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Root.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Signed.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Snapshot.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Targets.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF/Timestamp.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/TUF.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Trusted/TCB.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Trusted.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Base64.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Checked.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/IO.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/JSON.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Lens.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Path.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Pretty.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Some.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/Stack.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Hackage/Security/Util/TypedEmbedded.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Prelude.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/Text/JSON/Canonical.p_hi
./usr/lib/haskell-packages/ghc/lib/i386-linux-ghc-8.0.2/hackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj/libHShackage-security-0.5.2.2-K2gTlE2ktRkLGmuecI19qj_p.a
./usr/share/doc/libghc-hackage-security-prof/copyright
./usr/share/doc/libghc-hackage-security-prof/changelog.Debian.gz -> ../libghc-hackage-security-dev/changelog.Debian.gz