[libdancer2-plugin-passphrase-perl] 07/08: Add patch to fix spelling typos

Nuno Carvalho smash at cpan.org
Fri Oct 21 11:25:50 UTC 2016


This is an automated email from the git hooks/post-receive script.

mestre-guest pushed a commit to branch master
in repository libdancer2-plugin-passphrase-perl.

commit 0a30f16e642c798354ca33acbdad97172652b9f6
Author: Nuno Carvalho <smash at cpan.org>
Date:   Fri Oct 21 12:08:39 2016 +0100

    Add patch to fix spelling typos
---
 .../01-fix-spelling-errors-in-manpage.patch        | 34 ++++++++++++++++++++++
 debian/patches/series                              |  1 +
 2 files changed, 35 insertions(+)

diff --git a/debian/patches/01-fix-spelling-errors-in-manpage.patch b/debian/patches/01-fix-spelling-errors-in-manpage.patch
new file mode 100644
index 0000000..678327e
--- /dev/null
+++ b/debian/patches/01-fix-spelling-errors-in-manpage.patch
@@ -0,0 +1,34 @@
+Description: fix spelling typos in manpage
+Forwarded: https://github.com/hvoers/Dancer2-Plugin-Passphrase/pull/12
+Author: Nuno Carvalho <smash at cpan.org>
+Last-Update: 2016-10-21
+
+--- a/lib/Dancer2/Plugin/Passphrase.pm
++++ b/lib/Dancer2/Plugin/Passphrase.pm
+@@ -152,7 +152,7 @@
+ =head2 generate_random
+ 
+ Generates and returns any number of cryptographically random
+-characters from the url-safe base64 charater set.
++characters from the url-safe base64 character set.
+ 
+     my $rand_pass = passphrase->generate_random;
+ 
+@@ -400,7 +400,7 @@
+ SHA isn't quite as broken as MD5, but it shares the same theoretical 
+ weaknesses. Even without hash collisions, it is vulnerable to brute forcing.
+ Modern hardware is so powerful it can try around a billion hashes a second. 
+-That means every 7 chracter password in the range [A-Za-z0-9] can be cracked 
++That means every 7 character password in the range [A-Za-z0-9] can be cracked 
+ in one hour on your average desktop computer.
+ 
+ =item If the only way to break the hash is to brute-force it, it's secure enough
+@@ -423,7 +423,7 @@
+ 
+     Input must contain only octets
+ 
+-The C<MD5>, C<bcrypt>, and C<SHA> algorithms can't handle chracters with an ordinal
++The C<MD5>, C<bcrypt>, and C<SHA> algorithms can't handle characters with an ordinal
+ value above 255, producing errors like this if they encounter them.
+ It is not possible for this plugin to automagically work out the correct
+ encoding for a given string.
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..d346409
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+01-fix-spelling-errors-in-manpage.patch

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libdancer2-plugin-passphrase-perl.git



More information about the Pkg-perl-cvs-commits mailing list