summaryrefslogtreecommitdiffstats
path: root/meta/recipes-support/nettle/nettle_3.5.1.bb
diff options
context:
space:
mode:
authorMeh Mbeh Ida Delphine <idadelm@gmail.com>2021-03-02 11:07:33 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2021-03-18 21:20:24 +0000
commit87a19bbc3ca6adfbe373d413bd86e1862800cd01 (patch)
treea0c45cc751eac910a0fa78968ba0199f5b1dc06b /meta/recipes-support/nettle/nettle_3.5.1.bb
parent04b8c911c1c0e6daf01bc7744043b782b7e6e1f9 (diff)
downloadpoky-87a19bbc3ca6adfbe373d413bd86e1862800cd01.tar.gz
recipes-support: Add missing HOMEPAGE and DESCRIPTION for recipes
Fixes: [YOCTO #13471] (From OE-Core rev: 54e0df20665be8df9d8961d8c4e716e38104ba16) Signed-off-by: Ida Delphine <idadelm@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 6db24928d62aeb093a0e6da6619713eaca57a96f) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-support/nettle/nettle_3.5.1.bb')
-rw-r--r--meta/recipes-support/nettle/nettle_3.5.1.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-support/nettle/nettle_3.5.1.bb b/meta/recipes-support/nettle/nettle_3.5.1.bb
index a9550ed033..b2ec24b36c 100644
--- a/meta/recipes-support/nettle/nettle_3.5.1.bb
+++ b/meta/recipes-support/nettle/nettle_3.5.1.bb
@@ -1,4 +1,5 @@
1SUMMARY = "A low level cryptographic library" 1SUMMARY = "A low level cryptographic library"
2DESCRIPTION = "Nettle is a cryptographic library that is designed to fit easily in more or less any context: In crypto toolkits for object-oriented languages (C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in kernel space."
2HOMEPAGE = "http://www.lysator.liu.se/~nisse/nettle/" 3HOMEPAGE = "http://www.lysator.liu.se/~nisse/nettle/"
3DESCRIPTION = "It tries to solve a problem of providing a common set of \ 4DESCRIPTION = "It tries to solve a problem of providing a common set of \
4cryptographic algorithms for higher-level applications by implementing a \ 5cryptographic algorithms for higher-level applications by implementing a \