aboutsummaryrefslogtreecommitdiff
path: root/gnu/local.mk
diff options
context:
space:
mode:
authorMarius Bakke <mbakke@fastmail.com>2020-03-26 23:09:15 +0100
committerMarius Bakke <mbakke@fastmail.com>2020-03-26 23:09:15 +0100
commit0ab8ad46322bea331ed5f5592843ba35e7f38b37 (patch)
tree0fa456ec3e82affe0a69840f5d26689f5f07f591 /gnu/local.mk
parentb12acffbd03c025b1e849f7a93d5edd47682a8ce (diff)
downloadguix-0ab8ad46322bea331ed5f5592843ba35e7f38b37.tar
guix-0ab8ad46322bea331ed5f5592843ba35e7f38b37.tar.gz
gnu: OpenSSL: Add upstream patch to preserve compatibility in EOF handling.
This is a follow-up to ad8254c23a86c3ca4ca32bc68fc8d76954aa80fd, which unexpectedly caused a test failure in the Python test suite. * gnu/packages/patches/openssl-1.1.1e-revert-detect-eof.patch: New file. * gnu/local.mk (dist_patch_DATA): Adjust accordingly. * gnu/packages/tls.scm (openssl)[source](patches): Add it.
Diffstat (limited to 'gnu/local.mk')
-rw-r--r--gnu/local.mk1
1 files changed, 1 insertions, 0 deletions
diff --git a/gnu/local.mk b/gnu/local.mk
index c1ee251e90..d687c53a8a 100644
--- a/gnu/local.mk
+++ b/gnu/local.mk
@@ -1267,6 +1267,7 @@ dist_patch_DATA = \
%D%/packages/patches/openocd-nrf52.patch \
%D%/packages/patches/openssl-runpath.patch \
%D%/packages/patches/openssl-1.1-c-rehash-in.patch \
+ %D%/packages/patches/openssl-1.1.1e-revert-detect-eof.patch \
%D%/packages/patches/openssl-c-rehash-in.patch \
%D%/packages/patches/openssl-CVE-2019-1559.patch \
%D%/packages/patches/open-zwave-hidapi.patch \