/var/lib/ghc/package.conf.d/cryptonite-0.23.conf is in libghc-cryptonite-dev 0.23-2build5.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 | name: cryptonite
version: 0.23
id: cryptonite-0.23-Hf4isO3pAGx446gNggQFBj
key: cryptonite-0.23-Hf4isO3pAGx446gNggQFBj
license: BSD3
copyright: Vincent Hanquez <vincent@snarc.org>
maintainer: vincent@snarc.org
stability: experimental
homepage: https://github.com/haskell-crypto/cryptonite
synopsis: Cryptography Primitives sink
description:
A repository of cryptographic primitives.
.
* Symmetric ciphers: AES, DES, 3DES, Blowfish, Camellia, RC4, Salsa, XSalsa, ChaCha.
.
* Hash: SHA1, SHA2, SHA3, SHAKE, MD2, MD4, MD5, Keccak, Skein, Ripemd, Tiger, Whirlpool, Blake2
.
* MAC: HMAC, Poly1305
.
* Asymmetric crypto: DSA, RSA, DH, ECDH, ECDSA, ECC, Curve25519, Curve448, Ed25519
.
* Key Derivation Function: PBKDF2, Scrypt, HKDF, Argon2
.
* Cryptographic Random generation: System Entropy, Deterministic Random Generator
.
* Data related: Anti-Forensic Information Splitter (AFIS)
.
If anything cryptographic related is missing from here, submit
a pull request to have it added. This package strive to be a
cryptographic kitchen sink that provides cryptography for everyone.
.
Evaluate the security related to your requirements before using.
.
Read "Crypto.Tutorial" for a quick start guide.
category: Cryptography
author: Vincent Hanquez <vincent@snarc.org>
exposed: True
exposed-modules:
Crypto.Cipher.AES Crypto.Cipher.Blowfish Crypto.Cipher.Camellia
Crypto.Cipher.ChaCha Crypto.Cipher.ChaChaPoly1305 Crypto.Cipher.DES
Crypto.Cipher.RC4 Crypto.Cipher.Salsa Crypto.Cipher.TripleDES
Crypto.Cipher.Twofish Crypto.Cipher.Types Crypto.Cipher.Utils
Crypto.Cipher.XSalsa Crypto.ConstructHash.MiyaguchiPreneel
Crypto.Data.AFIS Crypto.Data.Padding Crypto.ECC Crypto.Error
Crypto.MAC.CMAC Crypto.MAC.Poly1305 Crypto.MAC.HMAC
Crypto.Number.Basic Crypto.Number.F2m Crypto.Number.Generate
Crypto.Number.ModArithmetic Crypto.Number.Prime
Crypto.Number.Serialize Crypto.Number.Serialize.Internal
Crypto.KDF.Argon2 Crypto.KDF.PBKDF2 Crypto.KDF.Scrypt
Crypto.KDF.BCrypt Crypto.KDF.HKDF Crypto.Hash Crypto.Hash.IO
Crypto.Hash.Algorithms Crypto.OTP Crypto.PubKey.Curve25519
Crypto.PubKey.Curve448 Crypto.PubKey.MaskGenFunction
Crypto.PubKey.DH Crypto.PubKey.DSA Crypto.PubKey.ECC.Generate
Crypto.PubKey.ECC.Prim Crypto.PubKey.ECC.DH Crypto.PubKey.ECC.ECDSA
Crypto.PubKey.ECC.P256 Crypto.PubKey.ECC.Types Crypto.PubKey.ECIES
Crypto.PubKey.Ed25519 Crypto.PubKey.Ed448 Crypto.PubKey.RSA
Crypto.PubKey.RSA.PKCS15 Crypto.PubKey.RSA.Prim
Crypto.PubKey.RSA.PSS Crypto.PubKey.RSA.OAEP
Crypto.PubKey.RSA.Types Crypto.Random Crypto.Random.Types
Crypto.Random.Entropy Crypto.Random.EntropyPool
Crypto.Random.Entropy.Unsafe Crypto.Tutorial
hidden-modules: Crypto.Cipher.AES.Primitive
Crypto.Cipher.Blowfish.Box Crypto.Cipher.Blowfish.Primitive
Crypto.Cipher.Camellia.Primitive Crypto.Cipher.DES.Primitive
Crypto.Cipher.Twofish.Primitive Crypto.Cipher.Types.AEAD
Crypto.Cipher.Types.Base Crypto.Cipher.Types.Block
Crypto.Cipher.Types.GF Crypto.Cipher.Types.Stream
Crypto.Cipher.Types.Utils Crypto.Error.Types Crypto.Number.Compat
Crypto.Hash.Types Crypto.Hash.Blake2s Crypto.Hash.Blake2sp
Crypto.Hash.Blake2b Crypto.Hash.Blake2bp Crypto.Hash.SHA1
Crypto.Hash.SHA224 Crypto.Hash.SHA256 Crypto.Hash.SHA384
Crypto.Hash.SHA512 Crypto.Hash.SHA512t Crypto.Hash.SHA3
Crypto.Hash.Keccak Crypto.Hash.MD2 Crypto.Hash.MD4 Crypto.Hash.MD5
Crypto.Hash.RIPEMD160 Crypto.Hash.Skein256 Crypto.Hash.Skein512
Crypto.Hash.Tiger Crypto.Hash.Whirlpool
Crypto.Random.Entropy.Source Crypto.Random.Entropy.Backend
Crypto.Random.ChaChaDRG Crypto.Random.SystemDRG
Crypto.Random.Probabilistic Crypto.PubKey.Internal
Crypto.PubKey.ElGamal Crypto.ECC.Simple.Types
Crypto.ECC.Simple.Prim Crypto.Internal.Proxy
Crypto.Internal.ByteArray Crypto.Internal.Compat
Crypto.Internal.CompatPrim Crypto.Internal.DeepSeq
Crypto.Internal.Imports Crypto.Internal.Words
Crypto.Internal.WordArray Crypto.Hash.SHAKE Crypto.Hash.Blake2
Crypto.Internal.Nat Crypto.Random.Entropy.RDRand
Crypto.Random.Entropy.Unix
abi: 24093d6ad22f267b6b6d7a3a3569142f
trusted: False
import-dirs: /usr/lib/haskell-packages/ghc/lib/x86_64-linux-ghc-8.0.2/cryptonite-0.23-Hf4isO3pAGx446gNggQFBj
library-dirs: /usr/lib/haskell-packages/ghc/lib/x86_64-linux-ghc-8.0.2/cryptonite-0.23-Hf4isO3pAGx446gNggQFBj
dynamic-library-dirs: /usr/lib/haskell-packages/ghc/lib/x86_64-linux-ghc-8.0.2
data-dir: /usr/share/cryptonite
hs-libraries: HScryptonite-0.23-Hf4isO3pAGx446gNggQFBj
depends:
base-4.9.1.0 bytestring-0.10.8.1 deepseq-1.4.2.0
foundation-0.0.17-CL5hY2f92B7EywaUc6v2Lf ghc-prim-0.5.0.0
integer-gmp-1.0.0.1 memory-0.14.11-8AGdHgntVnC94lQ3k423XF
haddock-interfaces: /usr/lib/ghc-doc/haddock/cryptonite-0.23/cryptonite.haddock
haddock-html: /usr/share/doc/libghc-cryptonite-doc/html/
|