Nettle is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space. In most contexts, you need more than the basic cryptographic algorithms, you also need some way to keep track of available algorithms, their properties and variants. You often have some algorithm selection process, often dictated by a protocol you want to implement. And as the requirements of applications differ in subtle and not so subtle ways, an API that fits one application well can be a pain to use in a different context. And that is why there are so many different cryptographic libraries around. Nettle tries to avoid this problem by doing one thing, the low-level crypto stuff, and providing a simple but general interface to it. In particular, Nettle doesn't do algorithm selection. It doesn't do memory allocation. It doesn't do any I/O. The idea is that one can build several application and context specific interfaces on top of Nettle, and share the code, test cases, benchmarks, documentation, etc. Examples are the Nettle module for the Pike language, and LSH, which both use an object-oriented abstraction on top of the library.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | nettle-3.10.tgz |
NetBSD 10.0 | aarch64 | nettle-3.10.tgz |
NetBSD 10.0 | aarch64eb | nettle-3.10.tgz |
NetBSD 10.0 | aarch64eb | nettle-3.10.tgz |
NetBSD 10.0 | alpha | nettle-3.10.tgz |
NetBSD 10.0 | alpha | nettle-3.9.1.tgz |
NetBSD 10.0 | alpha | nettle-3.10.tgz |
NetBSD 10.0 | earmv6hf | nettle-3.9.1.tgz |
NetBSD 10.0 | earmv6hf | nettle-3.10.tgz |
NetBSD 10.0 | earmv6hf | nettle-3.10.tgz |
NetBSD 10.0 | earmv7hf | nettle-3.10.tgz |
NetBSD 10.0 | earmv7hf | nettle-3.9.1.tgz |
NetBSD 10.0 | earmv7hf | nettle-3.10.tgz |
NetBSD 10.0 | i386 | nettle-3.10.tgz |
NetBSD 10.0 | i386 | nettle-3.10.tgz |
NetBSD 10.0 | m68k | nettle-3.9.1.tgz |
NetBSD 10.0 | m68k | nettle-3.9.1.tgz |
NetBSD 10.0 | m68k | nettle-3.10.tgz |
NetBSD 10.0 | m68k | nettle-3.10.tgz |
NetBSD 10.0 | mips64eb | nettle-3.9.1.tgz |
NetBSD 10.0 | mips64eb | nettle-3.10.tgz |
NetBSD 10.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 10.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 10.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 10.0 | sh3el | nettle-3.10.tgz |
NetBSD 10.0 | sh3el | nettle-3.10.tgz |
NetBSD 10.0 | sparc64 | nettle-3.10.tgz |
NetBSD 10.0 | sparc64 | nettle-3.10.tgz |
NetBSD 10.0 | sparc | nettle-3.10.tgz |
NetBSD 10.0 | sparc | nettle-3.10.tgz |
NetBSD 10.0 | vax | nettle-3.9.1.tgz |
NetBSD 10.0 | vax | nettle-3.10.tgz |
NetBSD 10.0 | vax | nettle-3.10.tgz |
NetBSD 10.0 | x86_64 | nettle-3.10.tgz |
NetBSD 10.0 | x86_64 | nettle-3.10.tgz |
NetBSD 9.0 | aarch64 | nettle-3.10.tgz |
NetBSD 9.0 | aarch64 | nettle-3.10.tgz |
NetBSD 9.0 | alpha | nettle-3.10.tgz |
NetBSD 9.0 | alpha | nettle-3.10.tgz |
NetBSD 9.0 | earmv6hf | nettle-3.10.tgz |
NetBSD 9.0 | earmv6hf | nettle-3.9.1.tgz |
NetBSD 9.0 | earmv6hf | nettle-3.10.tgz |
NetBSD 9.0 | earmv7hf | nettle-3.10.tgz |
NetBSD 9.0 | earmv7hf | nettle-3.9.1.tgz |
NetBSD 9.0 | earmv7hf | nettle-3.10.tgz |
NetBSD 9.0 | i386 | nettle-3.10.tgz |
NetBSD 9.0 | i386 | nettle-3.10.tgz |
NetBSD 9.0 | m68k | nettle-3.9.1.tgz |
NetBSD 9.0 | m68k | nettle-3.9.1.tgz |
NetBSD 9.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 9.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 9.0 | powerpc | nettle-3.9.1.tgz |
NetBSD 9.0 | sparc64 | nettle-3.9.1.tgz |
NetBSD 9.0 | sparc64 | nettle-3.10.tgz |
NetBSD 9.0 | x86_64 | nettle-3.10.tgz |
NetBSD 9.0 | x86_64 | nettle-3.10.tgz |
NetBSD 9.3 | x86_64 | nettle-3.10.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.