Debian updates (ticket #2027, PR #15)

This commit is contained in:
zzz
2018-04-14 12:15:28 +00:00
parent b374b1136e
commit 2f53f25580
9 changed files with 24 additions and 25 deletions

10
debian/control vendored
View File

@@ -1,7 +1,7 @@
Source: i2p
Maintainer: zzz <zzz@i2pmail.org>
Section: net
Standards-Version: 3.9.6
Standards-Version: 3.9.8
Priority: optional
Bugs: mailto:zzz@i2pmail.org
Homepage: https://geti2p.net/
@@ -31,7 +31,7 @@ Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
libjbigi-jni,
lsb-base,
service-wrapper
Description: Anonymous network (I2P)
Description: Invisible Internet Project (I2P) - anonymous network
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@@ -46,7 +46,7 @@ Section: java
Priority: optional
Depends: ${misc:Depends}, ${shlibs:Depends}, i2p-router
Homepage: https://geti2p.net/
Description: I2P libjbigi library
Description: Invisible Internet Project (I2P) - libjbigi library
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
.
libjbigi is a math library that is part of the I2P installation. Use of this
@@ -60,7 +60,7 @@ Section: doc
Priority: extra
Depends: ${misc:Depends}
Suggests: i2p, default-jdk-doc
Description: I2P developer documentation
Description: Invisible Internet Project (I2P) - developer documentation
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@@ -86,7 +86,7 @@ Recommends: libjbigi-jni, ttf-dejavu
Suggests: apparmor
,privoxy
,syndie
Description: Router for I2P
Description: Invisible Internet Project (I2P) - Router
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no