Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libxcrypt-devel-static | Distribution: SUSE Linux Enterprise 15 |
Version: 4.4.15 | Vendor: SUSE LLC <https://www.suse.com/> |
Release: 2.51 | Build date: Thu May 6 17:24:41 2021 |
Group: Development/Libraries/C and C++ | Build host: xinomavro |
Size: 655222 | Source RPM: libxcrypt-4.4.15-2.51.src.rpm |
Packager: https://www.suse.com/ | |
Url: https://github.com/besser82/libxcrypt | |
Summary: Static library for -static linking with libxcrypt |
This package contains the libxcrypt static libraries for -static linking. You don't need this, unless you link statically, which is highly discouraged.
GPL-3.0-or-later AND LGPL-2.1-or-later AND BSD-2-Clause AND BSD-3-Clause AND SUSE-Public-Domain
* Sat Feb 06 2021 dmueller@suse.com - add compatibility provides for Step 15 as well (bsc#1181571) * Tue Sep 01 2020 schwab@suse.de - Add compatibility provides for SLE15 * Mon Mar 02 2020 schwab@suse.de - Update to version 4.4.15 * The compatibility symbols crypt_gensalt_r, xcrypt, xcrypt_r, xcrypt_gensalt, and xcrypt_gensalt_r are deprecated further * Speed up ka-sunmd5 by skipping most of the test phrases - Package README.md and TODO.md (bsc#1165389) * Thu Jan 30 2020 schwab@suse.de - Update to version 4.4.12 * Another fix for GCC v10.x, which occurs on s390 architectures only. * Wed Jan 22 2020 schwab@suse.de - Update to version 4.4.11 * Fixes for GCC v10.x * Change how the known-answer tests are parallelized - gcc10.patch: remove * Thu Dec 12 2019 schwab@suse.de - gcc10.patch: fix build with gcc10 (bsc#1158192) * Sat Dec 07 2019 schwab@suse.de - Update to version 4.4.10 * Fix alignment problem for GOST 34.11 (Streebog) in gost-yestcrypt. * The crypt_* functions will now all fail and set errno to ERANGE if their 'phrase' argument is longer than CRYPT_MAX_PASSPHRASE_SIZE characters (this is currently 512) * The NT hashing method no longer truncates passphrases at 128 characters; Windows does not do this. - format-overflow.patch: remove * Thu Jun 20 2019 mliska@suse.cz - Disable LTO due to symbol versioning (boo#1138833). * Tue Feb 19 2019 schwab@suse.de - format-overflow.patch: Fix -Werror=format-overflow * Thu Feb 14 2019 mliska@suse.cz - Update to version 4.4.3: * Add libxcrypt.so, libxcrypt.a and xcrypt.h. * Add new man3 manual pages. * Tue Oct 09 2018 schwab@suse.de - Set compatibility level to suse * Wed Aug 08 2018 schwab@suse.de - Add conflicts with glibc-devel < 2.28 * Mon Aug 06 2018 jengelh@inai.de - Fix RPM groups for Factory. * Wed Aug 01 2018 schwab@suse.de - Update to libxcrypt 4.1.0 * Fix spelling of SUSE. * Lower the minimum required automake version to 1.14. * Fix build with USE_SWAPCONTEXT turned off. * Extend --enable-weak-hashes configure option to accept optional "glibc" parameter. * Fix the leak of obtained random bytes. * Check expected output strings for deterministic methods. * Fix memory leak in crypt_sha1_rn. * Fix read of random bytes out of bounds in gensalt_sha1_rn. * Make it possible to disable individual hashes at configure time. * Make salt validation pickier. * Replace crypt-sunmd5.c with BSD-licensed cleanroom reimplementation. * Make crypt_gensalt for $sha1 deterministic. * Fix incorrect output-size computation in crypt_sha1_rn. * Add docs for SHA1, MD5/Sun, NTHASH. * Introduce CRYPT_GENSALT_IMPLEMENTS_* feature test macros. * Install libcrypt.pc symlink along with libxcrypt.pc. * Extend --enable-obsolete-api configure option. * Extend overall test coverage. * Wed May 23 2018 schwab@suse.de - Update to libxcrypt 4.0.1 * Wed May 09 2018 schwab@suse.de - ABI compatible replacement for libcypt from glibc
/usr/lib64/libcrypt.a /usr/lib64/libowcrypt.a /usr/lib64/libxcrypt.a
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 13:44:15 2024