[libdancer2-plugin-passphrase-perl] 07/08: Add patch to fix spelling typos
Nuno Carvalho
smash at cpan.org
Fri Oct 21 11:25:50 UTC 2016
This is an automated email from the git hooks/post-receive script.
mestre-guest pushed a commit to branch master
in repository libdancer2-plugin-passphrase-perl.
commit 0a30f16e642c798354ca33acbdad97172652b9f6
Author: Nuno Carvalho <smash at cpan.org>
Date: Fri Oct 21 12:08:39 2016 +0100
Add patch to fix spelling typos
---
.../01-fix-spelling-errors-in-manpage.patch | 34 ++++++++++++++++++++++
debian/patches/series | 1 +
2 files changed, 35 insertions(+)
diff --git a/debian/patches/01-fix-spelling-errors-in-manpage.patch b/debian/patches/01-fix-spelling-errors-in-manpage.patch
new file mode 100644
index 0000000..678327e
--- /dev/null
+++ b/debian/patches/01-fix-spelling-errors-in-manpage.patch
@@ -0,0 +1,34 @@
+Description: fix spelling typos in manpage
+Forwarded: https://github.com/hvoers/Dancer2-Plugin-Passphrase/pull/12
+Author: Nuno Carvalho <smash at cpan.org>
+Last-Update: 2016-10-21
+
+--- a/lib/Dancer2/Plugin/Passphrase.pm
++++ b/lib/Dancer2/Plugin/Passphrase.pm
+@@ -152,7 +152,7 @@
+ =head2 generate_random
+
+ Generates and returns any number of cryptographically random
+-characters from the url-safe base64 charater set.
++characters from the url-safe base64 character set.
+
+ my $rand_pass = passphrase->generate_random;
+
+@@ -400,7 +400,7 @@
+ SHA isn't quite as broken as MD5, but it shares the same theoretical
+ weaknesses. Even without hash collisions, it is vulnerable to brute forcing.
+ Modern hardware is so powerful it can try around a billion hashes a second.
+-That means every 7 chracter password in the range [A-Za-z0-9] can be cracked
++That means every 7 character password in the range [A-Za-z0-9] can be cracked
+ in one hour on your average desktop computer.
+
+ =item If the only way to break the hash is to brute-force it, it's secure enough
+@@ -423,7 +423,7 @@
+
+ Input must contain only octets
+
+-The C<MD5>, C<bcrypt>, and C<SHA> algorithms can't handle chracters with an ordinal
++The C<MD5>, C<bcrypt>, and C<SHA> algorithms can't handle characters with an ordinal
+ value above 255, producing errors like this if they encounter them.
+ It is not possible for this plugin to automagically work out the correct
+ encoding for a given string.
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..d346409
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+01-fix-spelling-errors-in-manpage.patch
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libdancer2-plugin-passphrase-perl.git
More information about the Pkg-perl-cvs-commits
mailing list