summaryrefslogtreecommitdiffstats
path: root/pkgs/development/libraries/openssl
AgeCommit message (Collapse)Author
2021-01-21pkgs/development/libraries: stdenv.lib -> libBen Siraphob
2021-01-03treewide: Start to break up static overlayJohn Ericson
We can use use `stdenv.hostPlatform.isStatic` instead, and move the logic per package. The least opionated benefit of this is that it makes it much easier to replace packages with modified ones, as there is no longer any issue of overlay order. CC @FRidh @matthewbauer
2020-12-08openssl: 1.1.1h -> 1.1.1iMartin Weinelt
Fixes: CVE-2020-1971 Closes: #106218
2020-10-26Re-Revert "Merge #101508: libraw: 0.20.0 -> 0.20.2"Vladimír Čunát
This reverts commit c778945806b44d46ec16bc4302e7e7163e6bab97. I believe this is exactly what brings the staging branch into the right shape after the last merge from master (through staging-next); otherwise part of staging changes would be lost (due to being already reachable from master but reverted).
2020-10-25Revert "Merge #101508: libraw: 0.20.0 -> 0.20.2"Vladimír Čunát
I'm sorry; I didn't notice it contained staging commits. This reverts commit 17f5305b6c20df795c365368d2d868266519599e, reversing changes made to a8a018ddc0a8b5c3d4fa94c94b672c37356bc075.
2020-10-08openssl: 1.1.1g -> 1.1.1hMartin Weinelt
2020-07-31treewide: add warning comment to “boot” packagesMatthew Bauer
This adds a warning to the top of each “boot” package that reads: Note: this package is used for bootstrapping fetchurl, and thus cannot use fetchpatch! All mutable patches (generated by GitHub or cgit) that are needed here should be included directly in Nixpkgs as files. This makes it clear to maintainer that they may need to treat this package a little differently than others. Importantly, we can’t use fetchpatch here due to using <nix/fetchurl.nix>. To avoid having stale hashes, we need to include patches that are subject to changing overtime (for instance, gitweb’s patches contain a version number at the bottom).
2020-04-22openssl: 1.1.1f → 1.1.1gMartin Weinelt
Fixes: CVE-2020-1967 Segmentation fault in SSL_check_chain (CVE-2020-1967) ===================================================== Severity: High Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Affected OpenSSL 1.1.1 users should upgrade to 1.1.1g This issue was found by Bernd Edlinger and reported to OpenSSL on 7th April 2020. It was found using the new static analysis pass being implemented in GCC, - -fanalyzer. Additional analysis was performed by Matt Caswell and Benjamin Kaduk.
2020-04-16Merge branch 'master' into staging-nextJan Tojnar
2020-04-13sslscan: enabling scanning for sslv3Robin Gloster
2020-04-13Merge branch 'master' into staging-nextJan Tojnar
2020-04-10treewide: Per RFC45, remove all unquoted URLsMichael Reilly
2020-04-02openssl: 1.1.1d -> 1.1.1fVladimír Čunát
https://github.com/pyca/pyopenssl/issues/899#issuecomment-607709065 The tests in python3.pkgs.pyopenssl succeed! Fixing this problem we experienced is listed as the only major change: https://www.openssl.org/news/openssl-1.1.1-notes.html
2020-04-02openssl(_1_1): patch CVE-2019-1551Vladimír Čunát
fetchpatch can't be used here and fetchurl from GitHub like in PR #82928 has the risk of breaking the hash later; fortunately the patches aren't too large. (cherry picked from commit 2071e3be28ee0d6ec46056352c88b88f5c0d7f60)
2020-03-16openssl: Fix openssl build for muslHamish Mackenzie
2020-03-14openssl: fix platform detection on armv5tel-linuxAndrew Childs
2020-02-21openssl_1_0_2: mark as insecure; fixes #77503 (kinda)Vladimír Čunát
No vulnerabilities are know so far (to me), but still I'd go this way. Especially for 20.03 it seems better to deprecate it before official release happens. Current casualties: $ ./maintainers/scripts/rebuild-amount.sh --print HEAD HEAD^ Estimating rebuild amount by counting changed Hydra jobs. 87 x86_64-darwin 161 x86_64-linux
2020-02-14openssl: revert a workaround that's no longer neededVladimír Čunát
Thanks to python3Minimal. This reverts part of c2038483f #79738.
2020-02-10glibc, openssl: unbreak cross eval (with minor caveats)Vladimír Čunát
It's certainly better to have those two caveats than not evaluate. Both seem rather niche. Unfortunately I failed to find a better way. I started testing builds of several cross variants; all seem OK.
2020-01-16pkgsStatic: make OpenSSL 1.1 compile (#77542)Antonio Nuno Monteiro
* pkgsStatic: make OpenSSL 1.1 compile
2020-01-15openssl: don’t separate debug info on useLLVMMatthew Bauer
fixes #77779
2020-01-14openssl: fix build linux with clangStdenvJörg Thalheim
2020-01-11openssl_1_0_2: 1.0.2t -> 1.0.2u (low-severity security)Vladimír Čunát
Fixes #77266: CVE-2019-1551 https://www.openssl.org/news/secadv/20191206.txt (cherry picked from commit 961d0cf9f5f5e762eacb1ceda10d45cd35a81662) Oops - I realized too late that the rebuild amount is minimal, so why not have it immediately in master.
2019-10-26Merge pull request #68398 from angerman/feature/fix-opensslJohn Ericson
fix openssl for cross compilation
2019-10-23openssl: use old method for configuring on i686, fixes #71786Frederik Rietdijk
unbreaks pkgsi686Linux.openssl_1_0_2
2019-10-22openssl: switch to linux-x86 and linux-x86_64 targetsDing Xiang Fei
2019-10-17fix opensslMoritz Angermann
2019-10-17[win32] fix opensslMoritz Angermann
2019-09-22Re-Revert "Merge branch 'staging-next'"Vladimír Čunát
This reverts commit f8a8fc6c7c079de430fa528f688ddac781bcef16.
2019-09-21Revert "Merge branch 'staging-next'"Vladimír Čunát
This reverts commit 41af38f3728bd64b80721c44ed1fb019978cbc1b, reversing changes made to f0fec244ca380b9d3e617ee7b419c59758c8b0f1. Let's delay this. We have some serious regressions.
2019-09-11openssl_1_0_2: fixup sha256Andreas Rammhold
2019-09-10openssl: 1.1.1c -> 1.1.1dAndreas Rammhold
(cherry picked from commit 76d54c72acaaa32e2c1f8b13002f0ceac3b7b06f)
2019-09-10openssl_1_0_2: 1.0.2s -> 1.0.2tAndreas Rammhold
(cherry picked from commit aa6327c29c2de41a61db5aef8444385c531d4cc2)
2019-08-31openssl: fix man pages collisions (#66317)Guillaume Maudoux
2019-08-28treewide: remove redundant recvolth
2019-08-26treewide: remove redundant quotesvolth
2019-08-17treewide: name -> pnamevolth
2019-08-15treewide: name -> pname (easy cases) (#66585)volth
treewide replacement of stdenv.mkDerivation rec { name = "*-${version}"; version = "*"; to pname
2019-06-16treewide: remove unused variables (#63177)volth
* treewide: remove unused variables * making ofborg happy
2019-05-29Revert "openssl: fix CVE-2019-1543"Will Dietz
This reverts commit aae4c114a4f8e722ed221d47ecbb6a391682bca9.
2019-05-28openssl: 1.1.1b -> 1.1.1cWill Dietz
https://mta.openssl.org/pipermail/openssl-announce/2019-May/000153.html
2019-05-28openssl: 1.0.2r -> 1.0.2sWill Dietz
https://mta.openssl.org/pipermail/openssl-announce/2019-May/000151.html
2019-05-22openssl: fix CVE-2019-1543Tom Bereknyei
Closes https://github.com/NixOS/nixpkgs/pull/61827. Fixes https://github.com/NixOS/nixpkgs/issues/60107.
2019-02-26openssl_1_1: 1.1.1a -> 1.1.1bAlyssa Ross
2019-02-26openssl: 1.0.2q -> 1.0.2rAlyssa Ross
2019-01-21openssl_1_1: use the same default CA path as 1.0.*Vladimír Čunát
Fixes https://github.com/NixOS/nixpkgs/issues/54437
2018-12-09openssl_1_1: Add "doc" output to contain HTML documentationAndrew Dunham
This prevents cluttering up openssl_1_1.out with many megabytes of documentation. Fixes #51659
2018-11-24Merge staging-next into stagingFrederik Rietdijk
2018-11-23openssl: fix cross compile (perl)Daniel Goertzen
Fixes issue #50921. Build result was depending on build perl instead of host perl which broke cross compilation.
2018-11-22openssl: fix `cryptodev` fallout from d836b811cb533c4cacba9a932d4906cbb41abc7cJan Malakhovski