sthen
4c39430a5d
Use a link rather than compile test to for __builtin_bswap64 in libnettle;
...
fixes little-endian base-gcc (mips64el). From George Koehler, tested by
manphiz@gmail.com , ok aja@.
2019-12-04 10:36:34 +00:00
ajacoutot
0d63d42531
Update to libnettle-3.5.1.
2019-06-29 22:26:25 +00:00
jca
c459f7c54f
Unbreak on gcc archs by rewriting C99 construct
...
Spotted on sparc64 by landry@ who had the same diff.
ok aja@ (maintainer) landry@
2018-12-11 10:46:06 +00:00
ajacoutot
ddc1b1a04a
Update to libnettle-3.4.1.
2018-12-06 14:03:41 +00:00
ajacoutot
c4a1d30272
Update to libnettle-3.4.
2017-11-20 09:09:45 +00:00
ajacoutot
9159afdc55
Update to libnettle-3.2.
2016-01-30 09:16:41 +00:00
ajacoutot
124d5279a1
Major upgrade to libnettle-3.1.1.
2015-07-14 03:21:15 +00:00
ajacoutot
78329c96bc
incompatible implicit declaration of built-in function 'alloca'
2015-05-01 16:03:35 +00:00
sthen
50e8f03e81
tweaks for libnettle, from Juan Francisco Cantero Hurtado:
...
- don't force -ggdb3
- don't use asm on arm, our toolchain can't handle it
(http://rhaalovely.net/build-failures/arm/20130730/security/libnettle.log )
2013-09-03 13:53:47 +00:00
ajacoutot
f366653484
Update to libnettle-2.7.1.
2013-06-09 14:25:12 +00:00
ajacoutot
2b792359b2
Update to libnettle-2.7.
2013-05-07 06:39:41 +00:00
ajacoutot
ba8cb1bad6
Fix relocation errors on (at least) sparc64.
...
breakage reported by Markus Lude
2013-01-19 07:04:01 +00:00
ajacoutot
54820153df
Update to libnettle-2.6.
2013-01-18 10:41:00 +00:00
ajacoutot
c4179b4b42
Update to libnettle-2.5.
...
tested in a bulk by landry@, thanks
2012-09-05 07:14:47 +00:00
ajacoutot
0b5fab133a
Update to libnettle-2.2.
2011-08-25 09:20:27 +00:00
sebastia
b0d98745cf
Fix build with gcc-2.95
...
OK jasper@
2011-06-08 08:39:02 +00:00
ajacoutot
fd064b31d7
Import libnettle-2.1.
...
Nettle is a cryptographic library that is designed to fit easily in more
or less any context: In crypto toolkits for object-oriented languages
(C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in
kernel space. In most contexts, you need more than the basic
cryptographic algorithms, you also need some way to keep track of
available algorithms, their properties and variants. You often have some
algorithm selection process, often dictated by a protocol you want to
implement.
<...>
ok jasper@ landry@
2011-04-15 16:08:01 +00:00