2019-04-19 13:55:38 +00:00
|
|
|
Source: i2p
|
|
|
|
Maintainer: zzz <zzz@i2pmail.org>
|
|
|
|
Section: net
|
|
|
|
Standards-Version: 3.9.8
|
|
|
|
Priority: optional
|
|
|
|
Bugs: mailto:zzz@i2pmail.org
|
|
|
|
Homepage: https://geti2p.net/
|
|
|
|
Build-Depends: debhelper (>= 9.20160709)
|
2020-10-07 13:33:41 +00:00
|
|
|
,ant (>= 1.9.8)
|
2019-04-19 13:55:38 +00:00
|
|
|
,debconf
|
|
|
|
,openjdk-8-jdk
|
|
|
|
,libjetty9-java (>= 9.4)
|
|
|
|
,libtaglibs-standard-jstlel-java
|
2020-05-31 15:35:18 +00:00
|
|
|
,libtomcat9-java
|
2019-04-19 13:55:38 +00:00
|
|
|
,dh-apparmor
|
|
|
|
,bash-completion
|
|
|
|
,gettext
|
|
|
|
,libgetopt-java
|
2020-05-31 12:37:37 +00:00
|
|
|
,libjson-simple-java (>= 2),libjson-simple-java (<< 3)
|
2019-04-19 13:55:38 +00:00
|
|
|
,libgmp-dev (>= 2:5.0.5)
|
|
|
|
,libservice-wrapper-java
|
|
|
|
,po-debconf
|
|
|
|
|
|
|
|
Package: i2p
|
|
|
|
Architecture: all
|
|
|
|
Section: net
|
|
|
|
Priority: optional
|
|
|
|
Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
|
|
|
|
adduser,
|
|
|
|
debconf,
|
|
|
|
i2p-router (>= 0.8.6-5),
|
|
|
|
libjbigi-jni,
|
|
|
|
lsb-base,
|
|
|
|
service-wrapper
|
|
|
|
Description: Invisible Internet Project (I2P) - anonymous network
|
|
|
|
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no
|
|
|
|
trusted parties.
|
|
|
|
.
|
|
|
|
This package depends on the router, jbigi, the java service wrapper, and
|
|
|
|
includes support to run I2P as a daemon.
|
|
|
|
|
|
|
|
Package: libjbigi-jni
|
|
|
|
Architecture: any
|
|
|
|
Section: java
|
|
|
|
Priority: optional
|
|
|
|
Depends: ${misc:Depends}, ${shlibs:Depends}, i2p-router
|
|
|
|
Homepage: https://geti2p.net/
|
|
|
|
Description: Invisible Internet Project (I2P) - libjbigi library
|
|
|
|
This Package contains the libjbigi JNI library (and on x86 platforms, jcpuid).
|
|
|
|
.
|
|
|
|
libjbigi is a math library that is part of the I2P installation. Use of this
|
|
|
|
library greatly enhances the efficiency of cryptographic algorithms, such as
|
|
|
|
the ones used by I2P. You can expect to see a 5-7x speed improvement on certain
|
|
|
|
tasks, such as elGamal encryption/decryption.
|
|
|
|
|
|
|
|
Package: i2p-doc
|
|
|
|
Architecture: all
|
|
|
|
Section: doc
|
|
|
|
Priority: extra
|
|
|
|
Depends: ${misc:Depends}
|
|
|
|
Suggests: i2p, default-jdk-doc
|
|
|
|
Description: Invisible Internet Project (I2P) - developer documentation
|
|
|
|
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no
|
|
|
|
trusted parties.
|
|
|
|
.
|
|
|
|
This package contains the Javadoc files.
|
|
|
|
|
|
|
|
Package: i2p-router
|
|
|
|
Architecture: all
|
|
|
|
Section: net
|
|
|
|
Priority: optional
|
|
|
|
Depends: ${misc:Depends}, ${java:Depends}, ${shlibs:Depends},
|
|
|
|
openjdk-9-jre-headless | openjdk-8-jre-headless | default-jre-headless | java9-runtime-headless | java8-runtime-headless,
|
|
|
|
geoip-database,
|
|
|
|
gettext-base,
|
|
|
|
libgetopt-java,
|
2020-05-31 12:37:37 +00:00
|
|
|
libjson-simple-java (>= 2),libjson-simple-java (<< 3),
|
2019-04-19 13:55:38 +00:00
|
|
|
libjetty9-java (>= 9.4),
|
|
|
|
libtaglibs-standard-jstlel-java,
|
2020-05-31 15:35:18 +00:00
|
|
|
libtomcat9-java,
|
2019-04-19 13:55:38 +00:00
|
|
|
famfamfam-flag-png
|
|
|
|
Replaces: i2p ( << 0.8.6-5)
|
|
|
|
Breaks: i2p (<< 0.8.6-5)
|
2020-02-28 16:59:07 +00:00
|
|
|
Recommends: libjbigi-jni
|
2019-04-19 13:55:38 +00:00
|
|
|
Suggests: apparmor
|
|
|
|
,privoxy
|
|
|
|
,syndie
|
|
|
|
Description: Invisible Internet Project (I2P) - Router
|
|
|
|
I2P is an anonymizing network, offering a simple layer that identity-sensitive
|
|
|
|
applications can use to securely communicate. All data is wrapped with several
|
|
|
|
layers of encryption, and the network is both distributed and dynamic, with no
|
|
|
|
trusted parties.
|