GNU Libidn is an implementation of the Stringprep, Punycode, and IDNA specifications defined by the IETF Internationalized Domain Names (IDN) working group. It is used to prepare internationalized strings (such as domain name labels, usernames, and passwords) in order to increase the likelihood that string input and string comparison work in ways that make sense for typical users throughout the world. The library contains a generic Stringprep implementation that does Unicode 3.2 NFKC normalization, mapping and prohibition of characters, and bidirectional character handling. Profiles for iSCSI, Kerberos 5, Nameprep, SASL, and XMPP are included. Punycode and ASCII Compatible Encoding (ACE) via IDNA are supported.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | libidn-1.42.tgz |
NetBSD 10.0 | aarch64 | libidn-1.41.tgz |
NetBSD 10.0 | aarch64 | libidn-1.42.tgz |
NetBSD 10.0 | aarch64eb | libidn-1.42.tgz |
NetBSD 10.0 | aarch64eb | libidn-1.42.tgz |
NetBSD 10.0 | alpha | libidn-1.42.tgz |
NetBSD 10.0 | alpha | libidn-1.42.tgz |
NetBSD 10.0 | earmv4 | libidn-1.41.tgz |
NetBSD 10.0 | earmv4 | libidn-1.42.tgz |
NetBSD 10.0 | earmv4 | libidn-1.42.tgz |
NetBSD 10.0 | earmv6hf | libidn-1.41.tgz |
NetBSD 10.0 | earmv6hf | libidn-1.42.tgz |
NetBSD 10.0 | earmv6hf | libidn-1.42.tgz |
NetBSD 10.0 | earmv7hf | libidn-1.42.tgz |
NetBSD 10.0 | earmv7hf | libidn-1.41.tgz |
NetBSD 10.0 | earmv7hf | libidn-1.42.tgz |
NetBSD 10.0 | i386 | libidn-1.42.tgz |
NetBSD 10.0 | i386 | libidn-1.41.tgz |
NetBSD 10.0 | i386 | libidn-1.42.tgz |
NetBSD 10.0 | i386 | libidn-1.42.tgz |
NetBSD 10.0 | m68k | libidn-1.41.tgz |
NetBSD 10.0 | m68k | libidn-1.42.tgz |
NetBSD 10.0 | m68k | libidn-1.42.tgz |
NetBSD 10.0 | mips64eb | libidn-1.42.tgz |
NetBSD 10.0 | mips64eb | libidn-1.42.tgz |
NetBSD 10.0 | powerpc | libidn-1.41.tgz |
NetBSD 10.0 | powerpc | libidn-1.41.tgz |
NetBSD 10.0 | powerpc | libidn-1.42.tgz |
NetBSD 10.0 | sh3el | libidn-1.42.tgz |
NetBSD 10.0 | sh3el | libidn-1.42.tgz |
NetBSD 10.0 | sparc64 | libidn-1.42.tgz |
NetBSD 10.0 | sparc64 | libidn-1.42.tgz |
NetBSD 10.0 | sparc | libidn-1.42.tgz |
NetBSD 10.0 | sparc | libidn-1.42.tgz |
NetBSD 10.0 | vax | libidn-1.42.tgz |
NetBSD 10.0 | vax | libidn-1.42.tgz |
NetBSD 10.0 | x86_64 | libidn-1.42.tgz |
NetBSD 10.0 | x86_64 | libidn-1.41.tgz |
NetBSD 10.0 | x86_64 | libidn-1.42.tgz |
NetBSD 10.0 | x86_64 | libidn-1.42.tgz |
NetBSD 9.0 | aarch64 | libidn-1.42.tgz |
NetBSD 9.0 | aarch64 | libidn-1.41.tgz |
NetBSD 9.0 | aarch64 | libidn-1.42.tgz |
NetBSD 9.0 | alpha | libidn-1.42.tgz |
NetBSD 9.0 | alpha | libidn-1.42.tgz |
NetBSD 9.0 | earmv4 | libidn-1.41.tgz |
NetBSD 9.0 | earmv4 | libidn-1.42.tgz |
NetBSD 9.0 | earmv6hf | libidn-1.42.tgz |
NetBSD 9.0 | earmv6hf | libidn-1.41.tgz |
NetBSD 9.0 | earmv6hf | libidn-1.42.tgz |
NetBSD 9.0 | earmv7hf | libidn-1.42.tgz |
NetBSD 9.0 | earmv7hf | libidn-1.41.tgz |
NetBSD 9.0 | earmv7hf | libidn-1.42.tgz |
NetBSD 9.0 | i386 | libidn-1.42.tgz |
NetBSD 9.0 | i386 | libidn-1.41.tgz |
NetBSD 9.0 | i386 | libidn-1.42.tgz |
NetBSD 9.0 | i386 | libidn-1.42.tgz |
NetBSD 9.0 | m68k | libidn-1.41.tgz |
NetBSD 9.0 | m68k | libidn-1.42.tgz |
NetBSD 9.0 | powerpc | libidn-1.41.tgz |
NetBSD 9.0 | powerpc | libidn-1.41.tgz |
NetBSD 9.0 | powerpc | libidn-1.42.tgz |
NetBSD 9.0 | sparc64 | libidn-1.42.tgz |
NetBSD 9.0 | x86_64 | libidn-1.42.tgz |
NetBSD 9.0 | x86_64 | libidn-1.41.tgz |
NetBSD 9.0 | x86_64 | libidn-1.42.tgz |
NetBSD 9.0 | x86_64 | libidn-1.42.tgz |
NetBSD 9.3 | x86_64 | libidn-1.42.tgz |
NetBSD 9.3 | x86_64 | libidn-1.42.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.