fixup lintian errors
This commit is contained in:
		
							parent
							
								
									017ef07f42
								
							
						
					
					
						commit
						0929c13d3b
					
				
							
								
								
									
										2
									
								
								debian/control
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								debian/control
									
									
									
									
										vendored
									
									
								
							|  | @ -9,7 +9,7 @@ Homepage: http://e-x-a.org/codecrypt | ||||||
| Package: codecrypt | Package: codecrypt | ||||||
| Architecture: any | Architecture: any | ||||||
| Depends: ${shlibs:Depends}, ${misc:Depends}, libgmp10, libcrypto++9v5, libfftw3-double3 | Depends: ${shlibs:Depends}, ${misc:Depends}, libgmp10, libcrypto++9v5, libfftw3-double3 | ||||||
| Description: Encryption and signing tool using post-quantum cryptography. | Description: post-quantum encryption&signing tool | ||||||
|  Codecrypt is a quantum-computer-resistant cryptography tool that can be used |  Codecrypt is a quantum-computer-resistant cryptography tool that can be used | ||||||
|  to encrypt, decrypt, sign and verify documents and communications in a manner |  to encrypt, decrypt, sign and verify documents and communications in a manner | ||||||
|  similar to GnuPG or PGP. |  similar to GnuPG or PGP. | ||||||
|  |  | ||||||
|  | @ -121,13 +121,13 @@ When doing "generate", "encrypt" or "decrypt" operation, do not encrypt | ||||||
| asymmetrically, but instead generate or use a file with a key for specified | asymmetrically, but instead generate or use a file with a key for specified | ||||||
| symmetric cipher. Use "-g help" to see available symmetric primitives. For | symmetric cipher. Use "-g help" to see available symmetric primitives. For | ||||||
| symmetric encryption to work, at least one stream cipher (marked with C) and at | symmetric encryption to work, at least one stream cipher (marked with C) and at | ||||||
| least one hash function (marked with H, used to protect agains malleability) | least one hash function (marked with H, used to protect against malleability) | ||||||
| separated by comma need to be selected. Additionally, user can specify | separated by comma need to be selected. Additionally, user can specify | ||||||
| "longblock" or "shortblock" keyword to manipulate size of internal encryption | "longblock" or "shortblock" keyword to manipulate size of internal encryption | ||||||
| block structure (longer blocks consume more RAM, but the ciphertext doesn't | block structure (longer blocks consume more RAM, but the ciphertext doesn't | ||||||
| grow very much); or the "longkey" flag which creates larger symmetric key to | grow very much); or the "longkey" flag which creates larger symmetric key to | ||||||
| provide more key material to the ciphers (which can help to protect against | provide more key material to the ciphers (which can help to protect against | ||||||
| low-quality random numbers, but is generally unneccesary and even considered to | low-quality random numbers, but is generally unnecessary and even considered to | ||||||
| be a bad practice). It is also possible to combine more stream ciphers and hash | be a bad practice). It is also possible to combine more stream ciphers and hash | ||||||
| functions. | functions. | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
		Loading…
	
		Reference in a new issue