aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
26 lines
731 B
Nix
26 lines
731 B
Nix
{ stdenv, fetchurl, openssl }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "socat-1.7.3.1";
|
|
|
|
src = fetchurl {
|
|
url = "http://www.dest-unreach.org/socat/download/${name}.tar.bz2";
|
|
sha256 = "1apvi7sahcl44arnq1ad2y6lbfqnmvx7nhz9i3rkk0f382anbnnj";
|
|
};
|
|
|
|
buildInputs = [ openssl ];
|
|
|
|
patches = [ ./enable-ecdhe.patch ./libressl-fixes.patch ];
|
|
|
|
hardeningEnable = [ "pie" ];
|
|
|
|
meta = {
|
|
description = "A utility for bidirectional data transfer between two independent data channels";
|
|
homepage = http://www.dest-unreach.org/socat/;
|
|
repositories.git = git://repo.or.cz/socat.git;
|
|
platforms = stdenv.lib.platforms.unix;
|
|
license = stdenv.lib.licenses.gpl2;
|
|
maintainers = [ stdenv.lib.maintainers.eelco ];
|
|
};
|
|
}
|