lol

openssl_3_4: init at 3.4.1; openssl_3_3: remove

Updates OpenSSL 3.x latest to 3.4.1

Security Fixes in 3.4.1:
* Fixed RFC7250 handshakes with unauthenticated servers don't abort as expected. ([CVE-2024-12797])
* Fixed timing side-channel in ECDSA signature computation. ([CVE-2024-13176](https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176))

Release notes:
https://github.com/openssl/openssl/blob/openssl-3.4.0/NEWS.md#openssl-34

Some significant changes:
* Deprecation of TS_VERIFY_CTX_set_* functions and addition of replacement TS_VERIFY_CTX_set0_*
functions with improved semantics
* SHAKE-128 and SHAKE-256 implementations have no default digest length anymore.
That means these algorithms cannot be used with EVP_DigestFinal/_ex() unless the xoflen param is set before.
* An empty renegotiate extension will be used in TLS client hellos instead of the empty renegotiation SCSV, for
all connections with a minimum TLS version > 1.0.
* Deprecation of SSL_SESSION_get_time(), SSL_SESSION_set_time() and SSL_CTX_flush_sessions() functions in favor
of their respective _ex functions which are Y2038-safe on platforms with Y2038-safe time_t

Some new features:
* Support for directly fetched composite signature algorithms such as RSA-SHA2-256 including new API functions
* New options -not_before and -not_after for explicit setting start and end dates of certificates created with
the req and x509 apps
* Support for attribute certificates
* Support for pkeyutl in combination with key encapsulation (e.q.
PQC-KEMs): -encap/-decap

Signed-off-by: Markus Theil <theil.markus@gmail.com>

+7 -7
pkgs/development/libraries/openssl/3.3/use-etc-ssl-certs-darwin.patch pkgs/development/libraries/openssl/3.4/use-etc-ssl-certs-darwin.patch
pkgs/development/libraries/openssl/3.3/use-etc-ssl-certs.patch pkgs/development/libraries/openssl/3.4/use-etc-ssl-certs.patch
+5 -5
pkgs/development/libraries/openssl/default.nix
··· 366 366 }; 367 367 }; 368 368 369 - openssl_3_3 = common { 370 - version = "3.3.2"; 371 - hash = "sha256-LopAsBl5r+i+C7+z3l3BxnCf7bRtbInBDaEUq1/D0oE="; 369 + openssl_3_4 = common { 370 + version = "3.4.1"; 371 + hash = "sha256-1LIlJ6ZFrPdrU+REh6jbaHxu7WIdckaJHQJeOLqMllE="; 372 372 373 373 patches = [ 374 374 ./3.0/nix-ssl-cert-file.patch ··· 379 379 380 380 ( 381 381 if stdenv.hostPlatform.isDarwin then 382 - ./3.3/use-etc-ssl-certs-darwin.patch 382 + ./3.4/use-etc-ssl-certs-darwin.patch 383 383 else 384 - ./3.3/use-etc-ssl-certs.patch 384 + ./3.4/use-etc-ssl-certs.patch 385 385 ) 386 386 ]; 387 387
+2 -2
pkgs/top-level/all-packages.nix
··· 10196 10196 inherit (darwin.apple_sdk_11_0.frameworks) Security; 10197 10197 }; 10198 10198 10199 - openssl = openssl_3_3; 10199 + openssl = openssl_3_4; 10200 10200 10201 10201 openssl_legacy = openssl.override { 10202 10202 conf = ../development/libraries/openssl/3.0/legacy.cnf; ··· 10205 10205 inherit (callPackages ../development/libraries/openssl { }) 10206 10206 openssl_1_1 10207 10207 openssl_3 10208 - openssl_3_3; 10208 + openssl_3_4; 10209 10209 10210 10210 openwebrx = callPackage ../applications/radio/openwebrx { 10211 10211 inherit (python3Packages)