aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorquapka2024-07-30 21:01:44 +0200
committerquapka2024-07-30 21:01:44 +0200
commit3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831 (patch)
treed353303a633db7e5adc8c321cfa481173ec1db73
parent40f5279a1f84c737daac70a3b66c649708f63973 (diff)
downloadECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.tar.gz
ECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.tar.zst
ECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.zip
Add autogenerated releases for OpenSSL, Crypto++ and Botan
-rw-r--r--fetchReleases.py140
-rw-r--r--flake.nix65
-rw-r--r--nix/botan_pkg_versions.nix139
-rw-r--r--nix/botanshim.nix10
-rw-r--r--nix/cryptopp_pkg_versions.nix32
-rw-r--r--nix/openssl_pkg_versions.nix65
6 files changed, 388 insertions, 63 deletions
diff --git a/fetchReleases.py b/fetchReleases.py
new file mode 100644
index 0000000..b462e1e
--- /dev/null
+++ b/fetchReleases.py
@@ -0,0 +1,140 @@
+#!/usr/bin/env python3
+
+import argparse
+
+import json
+import jinja2
+import re
+import requests
+
+import subprocess as sp
+
+from base64 import b32encode, b32decode, b64encode, b16decode
+from bs4 import BeautifulSoup
+
+env = jinja2.Environment()
+
+all_versions_template = env.from_string("""{
+ buildECTesterStandalone
+}:
+{ {% for version in pkg_versions %}
+ {{ version }} {% endfor %}
+}""")
+
+def get_source_hash(url, unpack=False):
+ digest_type = "sha256"
+
+ cmd = ["nix-prefetch-url"]
+ if unpack:
+ cmd.append("--unpack")
+ cmd.extend(["--type", digest_type, url])
+
+ digest_nixbase32 = sp.check_output(cmd, stderr=sp.DEVNULL).strip()
+ digest_sri = sp.check_output(["nix", "hash", "to-sri", "--type", digest_type, digest_nixbase32.decode()], stderr=sp.DEVNULL).strip().decode()
+ return digest_sri
+
+def fetch_botan():
+ # NOTE: this way omits the older releases at https://botan.randombit.net/releases/old
+ release_list = "https://botan.randombit.net/releases/"
+ download_url = "https://botan.randombit.net/releases/{version}"
+ resp = requests.get(release_list)
+ soup = BeautifulSoup(resp.content, 'html.parser')
+
+ single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone {
+ {{ pkg }} = { version="{{ version }}"; source_extension="{{ ext }}"; hash="{{ digest }}"; };
+ };""")
+
+ renders = []
+ for link in soup.find_all("a"):
+ if link.text.startswith("Botan") and not link.text.endswith('.asc'):
+ download_link = download_url.format(version=link['href'])
+
+ match = re.match(r"Botan-(?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\.(?P<ext>.*)", link.text)
+ version = f"{match['major']}.{match['minor']}.{match['patch']}"
+ ext = f"{match['ext']}"
+
+ digest = get_source_hash(download_link)
+ # NOTE: use underscore to separate the versions?
+ flat_version = f"v{match['major']}{match['minor']}{match['patch']}"
+
+ rendered = single_version_template.render(pkg="botan", digest=digest, ext=ext, flat_version=flat_version, version=version).strip()
+ renders.append(rendered)
+
+ all_versions = all_versions_template.render(pkg_versions=renders).strip()
+ with open("./nix/botan_pkg_versions.nix", "w") as handle:
+ handle.write(all_versions)
+
+def fetch_cryptopp():
+ owner = "weidai11"
+ repo = "cryptopp"
+ release_url = f"https://api.github.com/repos/{owner}/{repo}/releases"
+ resp = requests.get(release_url)
+
+ single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone {
+ {{ pkg }} = { version="{{ version }}"; hash="{{ digest }}"; };
+ };""")
+ renders = []
+ for release in resp.json():
+ if not release['draft'] and not release['prerelease']:
+ _, *version_values = release['tag_name'].split('_')
+ underscored_version = '_'.join(version_values)
+ flat_version = "v" + "".join(version_values)
+ download_url = f"https://github.com/{owner}/{repo}/archive/{release['tag_name']}.tar.gz"
+ digest = get_source_hash(download_url, unpack=True)
+
+
+ rendered = single_version_template.render(pkg="cryptopp", digest=digest, flat_version=flat_version, version=underscored_version).strip()
+ renders.append(rendered)
+
+ all_versions = all_versions_template.render(pkg_versions=renders).strip()
+ with open("./nix/cryptopp_pkg_versions.nix", "w") as handle:
+ handle.write(all_versions)
+
+def fetch_openssl():
+ pkg = "openssl"
+ owner = "openssl"
+ repo = "openssl"
+ release_url = f"https://api.github.com/repos/{owner}/{repo}/releases"
+ resp = requests.get(release_url)
+
+ single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone {
+ {{ pkg }} = { version="{{ version }}"; hash="{{ digest }}"; };
+ };""")
+ renders = []
+ for release in resp.json():
+ if not release['draft'] and not release['prerelease']:
+ try:
+ _, dotted_version = release['tag_name'].split('-')
+ except ValueError:
+ continue
+ flat_version = "v" + "".join(dotted_version.split('.'))
+ download_url = f"https://github.com/{owner}/{repo}/archive/{release['tag_name']}.tar.gz"
+ digest = get_source_hash(download_url)
+
+
+ rendered = single_version_template.render(pkg=pkg, digest=digest, flat_version=flat_version, version=dotted_version).strip()
+ renders.append(rendered)
+
+ all_versions = all_versions_template.render(pkg_versions=renders).strip()
+ with open(f"./nix/{pkg}_pkg_versions.nix", "w") as handle:
+ handle.write(all_versions)
+
+
+
+
+def main():
+ parser = argparse.ArgumentParser()
+ parser.add_argument("lib")
+ args = parser.parse_args()
+
+ match args.lib:
+ case "botan":
+ fetch_botan()
+ case "cryptopp":
+ fetch_cryptopp()
+ case "openssl":
+ fetch_openssl()
+
+
+if __name__ == '__main__':
+ main()
diff --git a/flake.nix b/flake.nix
index 0e91ccd..a421626 100644
--- a/flake.nix
+++ b/flake.nix
@@ -45,15 +45,25 @@
'';
});
# FIXME: `nix develeop` now has different version than `nix run`
- openssl = { version ? "", hash ? "" }: (pkgs.openssl.override { static = true; }).overrideAttrs (final: prev: rec {
+ opensslBuilder = { version ? null, hash ? null }: (pkgs.openssl.override { static = true; }).overrideAttrs (final: prev: rec {
pname = "openssl";
- src = if version != "" then pkgs.fetchurl {
+ src = if version != null then pkgs.fetchurl {
url = "https://www.openssl.org/source/openssl-${version}.tar.gz";
hash = hash;
} else prev.src;
# FIXME Removing patches might cause unwanted things; this should be version based!
patches = [];
});
+ botan2Builder = { version, source_extension, hash }: pkgs.botan2.overrideAttrs (final: prev: {
+ src = if ( version == null ) then prev.src else
+ pkgs.fetchurl {
+ urls = [
+ "http://botan.randombit.net/releases/Botan-${version}.${source_extension}"
+ ];
+ inherit hash;
+ };
+ });
+
libgcrypt = pkgs.libgcrypt.overrideAttrs (final: prev: {
configureFlags = ( prev.configureFlags or [] ) ++ [ "--enable-static" ];
});
@@ -96,7 +106,15 @@
nettle = pkgs.nettle.overrideAttrs (final: prev: {
configureFlags = ( prev.configureFlags or [] ) ++ [ "--enable-static" ];
});
- cryptopp = pkgs.cryptopp.override { enableStatic = true; };
+ cryptoppBuilder = { version, hash }: (pkgs.cryptopp.override { enableStatic = true; }).overrideAttrs (final: prev: {
+ src = if version == null then prev.src else
+ pkgs.fetchFromGitHub {
+ owner = "weidai11";
+ repo = "cryptopp";
+ rev = "CRYPTOPP_${version}";
+ inherit hash;
+ };
+ });
libressl = (pkgs.libressl.override { buildShared = false; } ).overrideAttrs (_old: rec {
patches = [
(pkgs.fetchpatch {
@@ -135,10 +153,10 @@
# Shims and libs
# Current list of targets: tomcrypt botan cryptopp openssl boringssl gcrypt mbedtls ippcp nettle libressl
- tomcryptShim = import ./nix/tomcryptshim.nix { inherit pkgs libtomcrypt libtommath; };
- botanShim = import ./nix/botanshim.nix { inherit pkgs; };
- cryptoppShim = import ./nix/cryptoppshim.nix { inherit pkgs cryptopp; };
- opensslShimBuilder = { version, hash }: import ./nix/opensslshim.nix { inherit pkgs; openssl = (openssl { version = version; hash = hash;}); };
+ tomcryptShim = pkgs.callPackage ./nix/tomcryptshim.nix { inherit pkgs libtomcrypt libtommath; };
+ botanShimBuilder = { version, source_extension, hash }: pkgs.callPackage ./nix/botanshim.nix { botan2 = botan2Builder { inherit version source_extension hash; }; };
+ cryptoppShimBuilder = { version, hash}: pkgs.callPackage ./nix/cryptoppshim.nix { cryptopp = cryptoppBuilder { inherit version hash; };};
+ opensslShimBuilder = { version, hash }: import ./nix/opensslshim.nix { inherit pkgs; openssl = (opensslBuilder { version = version; hash = hash;}); };
boringsslShim = import ./nix/boringsslshim.nix { inherit pkgs; boringssl = boringssl; };
gcryptShim = import ./nix/gcryptshim.nix { inherit pkgs libgcrypt libgpg-error; };
mbedtlsShim = import ./nix/mbedtlsshim.nix { pkgs = pkgs; };
@@ -148,9 +166,15 @@
commonLibs = import ./nix/commonlibs.nix { pkgs = pkgs; };
- buildECTesterStandalone = { opensslVersion, opensslHash }: (
+ buildECTesterStandalone = {
+ openssl ? { version = null; hash = null; },
+ botan ? { version = null; source_extension = null; hash = null; },
+ cryptopp ? { version = null; hash = null; },
+ }: (
let
- opensslShim = (opensslShimBuilder { version = opensslVersion; hash = opensslHash; });
+ opensslShim = (opensslShimBuilder { inherit (openssl) version hash; });
+ botanShim = botanShimBuilder { inherit (botan) version source_extension hash; };
+ cryptoppShim = cryptoppShimBuilder { inherit (cryptopp) version hash; };
in
with pkgs;
gradle2nix.builders.${system}.buildGradlePackage rec {
@@ -201,20 +225,10 @@
in
{
packages = rec {
- default = openssl_331;
- openssl_331 = buildECTesterStandalone {
- opensslVersion="3.3.1"; opensslHash="sha256-d3zVlihMiDN1oqehG/XSeG/FQTJV76sgxQ1v/m0CC34=";
- };
- openssl_322 = buildECTesterStandalone {
- opensslVersion="3.2.2"; opensslHash="sha256-GXFJwY2enyksQ/BACsq6EuX1LKz+BQ89GZJ36nOOwuc=";
- };
- openssl_316 = buildECTesterStandalone {
- opensslVersion="3.1.6"; opensslHash="sha256-XSvkA2tHjvPLCoVMqbNTByw6DibYpW+PCrn7btMtONc=";
- };
- openssl_3014 = buildECTesterStandalone {
- opensslVersion="3.0.14"; opensslHash="sha256-7soDXU3U6E/CWEbZUtpil0hK+gZQpvhMaC453zpBI8o=";
- };
- # openssl_111w = buildECTesterStandalone "1.1.1w" "sha256-zzCYlQy02FOtlcCEHx+cbT3BAtzPys1SHZOSUgi3asg=";
+ default = openssl.v331;
+ openssl = pkgs.callPackage ./nix/openssl_pkg_versions.nix { inherit buildECTesterStandalone; };
+ botan = pkgs.callPackage ./nix/botan_pkg_versions.nix { inherit buildECTesterStandalone; };
+ cryptopp = pkgs.callPackage ./nix/cryptopp_pkg_versions.nix { inherit buildECTesterStandalone; };
};
devShells.default = with pkgs; mkShell rec {
nativeBuildInputs = [
@@ -235,7 +249,7 @@
global-platform-pro
gradle
# libraries to test
- (openssl {})
+ (opensslBuilder {})
libressl
# glibc
boringssl
@@ -280,8 +294,7 @@
libtomcrypt
botan2
cryptopp
- # (openssl {})
- (openssl {})
+ (opensslBuilder {})
boringssl
libgcrypt
libgpg-error
diff --git a/nix/botan_pkg_versions.nix b/nix/botan_pkg_versions.nix
index 90295f1..66b0db5 100644
--- a/nix/botan_pkg_versions.nix
+++ b/nix/botan_pkg_versions.nix
@@ -1,19 +1,122 @@
{
-
-v200 = buildECTesterStandalone {
- botan = { version="2.0.0"; hash="sha256-AxZZzKD4CGnp2XogkX7b4hZM7bwHnoxT4Oe9m+oVNxo="; };
-};
-
-v201 = buildECTesterStandalone {
- botan = { version="2.0.1"; hash="sha256-oTjtMW0RRQqEBUUbnJZkuOZAqbethNPzrTToBx82Tgs="; };
-};
-
-v210 = buildECTesterStandalone {
- botan = { version="2.1.0"; hash="sha256-Rg8tcgWu0RP4mN9JR7H2bM+NCA7sfawinvC3VMmtYpQ="; };
-};
-
-v2100 = buildECTesterStandalone {
- botan = { version="2.10.0"; hash="sha256-iEgZl1eMJ5JHJP6nZhDUPZ9ZyZ7f5WHUGAO7yYhxrTE="; };
-};
-
-}
+ buildECTesterStandalone
+}:
+{
+ v200 = buildECTesterStandalone {
+ botan = { version="2.0.0"; source_extension="tgz"; hash="sha256-AxZZzKD4CGnp2XogkX7b4hZM7bwHnoxT4Oe9m+oVNxo="; };
+ };
+ v201 = buildECTesterStandalone {
+ botan = { version="2.0.1"; source_extension="tgz"; hash="sha256-oTjtMW0RRQqEBUUbnJZkuOZAqbethNPzrTToBx82Tgs="; };
+ };
+ v210 = buildECTesterStandalone {
+ botan = { version="2.1.0"; source_extension="tgz"; hash="sha256-Rg8tcgWu0RP4mN9JR7H2bM+NCA7sfawinvC3VMmtYpQ="; };
+ };
+ v2100 = buildECTesterStandalone {
+ botan = { version="2.10.0"; source_extension="tgz"; hash="sha256-iEgZl1eMJ5JHJP6nZhDUPZ9ZyZ7f5WHUGAO7yYhxrTE="; };
+ };
+ v2110 = buildECTesterStandalone {
+ botan = { version="2.11.0"; source_extension="tar.xz"; hash="sha256-94dNoq64wBj9d99AshN4eb+Qtm9ViUkMmR6D+z6AlL4="; };
+ };
+ v2120 = buildECTesterStandalone {
+ botan = { version="2.12.0"; source_extension="tar.xz"; hash="sha256-Hq79RZ1S8n3hgFz/jGh5LgYQkZZI7pjhAZgOlO25CmM="; };
+ };
+ v2121 = buildECTesterStandalone {
+ botan = { version="2.12.1"; source_extension="tar.xz"; hash="sha256-fgNfFCpR/KE1lwV5JieigkVtSXSb9io3qOSDddQbqqk="; };
+ };
+ v2130 = buildECTesterStandalone {
+ botan = { version="2.13.0"; source_extension="tar.xz"; hash="sha256-9XrkKkHhCRvKWPRPQa3evZo5C2UWA5UsiB7InVAYfpA="; };
+ };
+ v2140 = buildECTesterStandalone {
+ botan = { version="2.14.0"; source_extension="tar.xz"; hash="sha256-DBDxK0JKQO4ZveACkgmOIB10mFNcBi2NW1htB4YaVLU="; };
+ };
+ v2150 = buildECTesterStandalone {
+ botan = { version="2.15.0"; source_extension="tar.xz"; hash="sha256-2IrxMH8f76x5qk8vUkaZR41pzhWoV88tCpCsa/KlAAk="; };
+ };
+ v2160 = buildECTesterStandalone {
+ botan = { version="2.16.0"; source_extension="tar.xz"; hash="sha256-ku1uvJGNhr0bBCIcpRivTPKcwybEdgdAvS0i5hzqJig="; };
+ };
+ v2170 = buildECTesterStandalone {
+ botan = { version="2.17.0"; source_extension="tar.xz"; hash="sha256-uXBEsxKqcYNJr3hRMxsGS8e9U1JADV+AeTus5CfQE0M="; };
+ };
+ v2171 = buildECTesterStandalone {
+ botan = { version="2.17.1"; source_extension="tar.xz"; hash="sha256-dBNYs/FjjtfZsvWbTjRKpG9JZrFZWLVDTArBWA3wwME="; };
+ };
+ v2172 = buildECTesterStandalone {
+ botan = { version="2.17.2"; source_extension="tar.xz"; hash="sha256-6+J9/itV1+Ar9SDpJmBsSLdrIvrLSDJWsTqzjgGOHmw="; };
+ };
+ v2173 = buildECTesterStandalone {
+ botan = { version="2.17.3"; source_extension="tar.xz"; hash="sha256-eRI7ZURFpKu6SG4JpDF4hUXHCCNzgqPnZWZMn1WwO4g="; };
+ };
+ v2180 = buildECTesterStandalone {
+ botan = { version="2.18.0"; source_extension="tar.xz"; hash="sha256-zGSFLh4MW7MOzQUuShLVE2ElqM5cO+LvtvsGHIZ34yc="; };
+ };
+ v2181 = buildECTesterStandalone {
+ botan = { version="2.18.1"; source_extension="tar.xz"; hash="sha256-+Me0YiKoVxaKdUpcwym7eAUEEisnABjdpTBMmNsorik="; };
+ };
+ v2182 = buildECTesterStandalone {
+ botan = { version="2.18.2"; source_extension="tar.xz"; hash="sha256-VBo7E/G50w+XfGwa5Me/39p2PNpuRN6Ac2nc559CMH4="; };
+ };
+ v2190 = buildECTesterStandalone {
+ botan = { version="2.19.0"; source_extension="tar.xz"; hash="sha256-JA2eVuasuR70zwaoocbA8QHGHUDPSMzPE5+u+CHXBAs="; };
+ };
+ v2191 = buildECTesterStandalone {
+ botan = { version="2.19.1"; source_extension="tar.xz"; hash="sha256-4m4Az+/aZAgq/dVA08U3kk9kXWpnSv7SzRcQBd7/VWA="; };
+ };
+ v2192 = buildECTesterStandalone {
+ botan = { version="2.19.2"; source_extension="tar.xz"; hash="sha256-OvXxdhXGtc2Lgy0mn7bLTVTsZPnrCd2/Gt1Qk5QbTXU="; };
+ };
+ v2193 = buildECTesterStandalone {
+ botan = { version="2.19.3"; source_extension="tar.xz"; hash="sha256-2uBH85nFpH8IfbXT2dno8RrkmF0UySjXHaGv+AGALVU="; };
+ };
+ v2194 = buildECTesterStandalone {
+ botan = { version="2.19.4"; source_extension="tar.xz"; hash="sha256-WjqI72Qz6XvKsO+h7WDGGX5K2p2dMLwcR0N7+JuX8nY="; };
+ };
+ v2195 = buildECTesterStandalone {
+ botan = { version="2.19.5"; source_extension="tar.xz"; hash="sha256-3+6g4KbybWckxK8B2pp7iEh62y2Bunxy/K9S21IsmtQ="; };
+ };
+ v220 = buildECTesterStandalone {
+ botan = { version="2.2.0"; source_extension="tgz"; hash="sha256-x5TbLsRvb/iPN652gl8MJY8HiAuGW2cHsmrPzEVnuCQ="; };
+ };
+ v230 = buildECTesterStandalone {
+ botan = { version="2.3.0"; source_extension="tgz"; hash="sha256-Oflw/uWYakw+QlAwrvUKwoTaGFlsAE0anM52iMTm1Hw="; };
+ };
+ v240 = buildECTesterStandalone {
+ botan = { version="2.4.0"; source_extension="tgz"; hash="sha256-7ZRk4qXP7kzT2b16j4BnO0XIoHGNshgac/VGWmBmCKU="; };
+ };
+ v250 = buildECTesterStandalone {
+ botan = { version="2.5.0"; source_extension="tgz"; hash="sha256-uKMf4D5/BIpb05Z+zQS2pIlmIV54eS3wbjM7Du3k+xs="; };
+ };
+ v260 = buildECTesterStandalone {
+ botan = { version="2.6.0"; source_extension="tgz"; hash="sha256-wfJhVVu6cCxzYI3ee9dD7y1jd6QaHClZFbJcW6uvXMU="; };
+ };
+ v270 = buildECTesterStandalone {
+ botan = { version="2.7.0"; source_extension="tgz"; hash="sha256-5C35FVYxdYjGyg5Bv3lvm9XsXHDgZo5sl8YIxpfCSpA="; };
+ };
+ v280 = buildECTesterStandalone {
+ botan = { version="2.8.0"; source_extension="tgz"; hash="sha256-5xWbEn6R4MFYJF1hxjjFDUQ+x7RAtrAWEyjEezq6OWA="; };
+ };
+ v290 = buildECTesterStandalone {
+ botan = { version="2.9.0"; source_extension="tgz"; hash="sha256-MFVkNSM03WOuY9sDkHfZauUt+lejJIhxCBcZtqny0Rk="; };
+ };
+ v300 = buildECTesterStandalone {
+ botan = { version="3.0.0"; source_extension="tar.xz"; hash="sha256-XaVS4A+hwEepDCLrXwJH7CfnQytot44Qp84JVSacytc="; };
+ };
+ v310 = buildECTesterStandalone {
+ botan = { version="3.1.0"; source_extension="tar.xz"; hash="sha256-ThjnVai7xr+W+skW+/By7NBnQMcqcgF8JxYuTAtHJf4="; };
+ };
+ v311 = buildECTesterStandalone {
+ botan = { version="3.1.1"; source_extension="tar.xz"; hash="sha256-MMhP6RmTapj+9TMfJGxiqiwOTSCFstRREgf2ogr6Oms="; };
+ };
+ v320 = buildECTesterStandalone {
+ botan = { version="3.2.0"; source_extension="tar.xz"; hash="sha256-BJyEeDX89u86niBrM94F3TiZnDJeJHSCdypVmNnl7OM="; };
+ };
+ v330 = buildECTesterStandalone {
+ botan = { version="3.3.0"; source_extension="tar.xz"; hash="sha256-No8R9CbxIFrtuenjI2ihZTXcEb1gNRBm5vZmTsNrhbk="; };
+ };
+ v340 = buildECTesterStandalone {
+ botan = { version="3.4.0"; source_extension="tar.xz"; hash="sha256-cYQ6/MCixYX48z+jBPC1iuS5xdgwb4lGZ7N0YEQndVc="; };
+ };
+ v350 = buildECTesterStandalone {
+ botan = { version="3.5.0"; source_extension="tar.xz"; hash="sha256-Z+ja4cokaNkN5OYByH1fMf9JKzjoq4vL0C3fcQTtip8="; };
+ };
+} \ No newline at end of file
diff --git a/nix/botanshim.nix b/nix/botanshim.nix
index f6de723..3711d1d 100644
--- a/nix/botanshim.nix
+++ b/nix/botanshim.nix
@@ -1,7 +1,11 @@
-{
- pkgs
+{
+ stdenv
+ , botan2
+ , pkg-config
+ # NOTE change to jdk17?
+ , jdk11_headless
}:
-with pkgs; stdenv.mkDerivation {
+stdenv.mkDerivation {
name = "BotanShim";
src = ../standalone/src/main/resources/cz/crcs/ectester/standalone/libs/jni;
diff --git a/nix/cryptopp_pkg_versions.nix b/nix/cryptopp_pkg_versions.nix
index 3e77a12..781135b 100644
--- a/nix/cryptopp_pkg_versions.nix
+++ b/nix/cryptopp_pkg_versions.nix
@@ -3,51 +3,51 @@
}:
{
v890 = buildECTesterStandalone {
- cryptopp = { version="8_9_0"; hash="sha256-q1F0ubXGI2WI4VoaoarstmWM2+CVAceYGsjbJ2ok2as="; };
+ cryptopp = { version="8_9_0"; hash="sha256-HV+afSFkiXdy840JbHBTR8lLL0GMwsN3QdwaoQmicpQ="; };
};
v880 = buildECTesterStandalone {
- cryptopp = { version="8_8_0"; hash="sha256-+Lj2MlM7J57il2lOZR6SBIJLumAizmbmDr67CLVR/no="; };
+ cryptopp = { version="8_8_0"; hash="sha256-hg7g56bIYaXxB28nAmSQ7EP9NEwd1Psf/2GUtbC27oU="; };
};
v870 = buildECTesterStandalone {
- cryptopp = { version="8_7_0"; hash="sha256-jWpAZLjp80zT6Dj1oSxABn7nuV7jfZFz7Cc8sJE+fKI="; };
+ cryptopp = { version="8_7_0"; hash="sha256-KtZXW7+J9a4uKHnK8sqj5WVaIjG3d6tzBBDxa7Wv4AE="; };
};
v860 = buildECTesterStandalone {
- cryptopp = { version="8_6_0"; hash="sha256-kwRiX0dnoT4KXybQ8BnXjPk3VgSjPlORw78ugTmd/rg="; };
+ cryptopp = { version="8_6_0"; hash="sha256-a3TYaK34WvKEXN7LKAfGwQ3ZL6a3k/zMZyyVfnkQqO4="; };
};
v850 = buildECTesterStandalone {
- cryptopp = { version="8_5_0"; hash="sha256-j2TPCc9PYdXXS8pTV0uMyZWRhswPByouZZfkmZ1q1ds="; };
+ cryptopp = { version="8_5_0"; hash="sha256-A7eoJNwIOSCrO7vXyA6JER4E18k8vRRKdDsk/BXNx0Y="; };
};
v840 = buildECTesterStandalone {
- cryptopp = { version="8_4_0"; hash="sha256-ZoffweM7CErqtIw1qFULI57l9zoJmjtqCRjXC4qJ5lQ="; };
+ cryptopp = { version="8_4_0"; hash="sha256-gxd3LtvtgwgE1bUQc9pXLT8/WFrQPm3ghIHAGqBHlr8="; };
};
v830 = buildECTesterStandalone {
- cryptopp = { version="8_3_0"; hash="sha256-YzBMb5Q/Q1pOOFJz4Vq7ac/zuFpEZjFQv1pgabhKvUM="; };
+ cryptopp = { version="8_3_0"; hash="sha256-PHQol8Q7R0b63wiAf43nq+l+FcGItBzw65JZYSMf1ng="; };
};
v820 = buildECTesterStandalone {
- cryptopp = { version="8_2_0"; hash="sha256-47zUimJzmtF5rYBktSM0artTdnvL78Af43MDQSKSND4="; };
+ cryptopp = { version="8_2_0"; hash="sha256-sg7MrjzuAfWRK0RNZ6xR6cUD6z6F/u/SmtCTYOXP+Qc="; };
};
v810 = buildECTesterStandalone {
- cryptopp = { version="8_1_0"; hash="sha256-ik5Hc6ObDAfXzqG4vno/ep0Sa9Osmp8HL4LTpTpHSoc="; };
+ cryptopp = { version="8_1_0"; hash="sha256-6SRr0Kv+iJrtEixJjb7Rbj/YdVa7vhW7u476FZLTymI="; };
};
v800 = buildECTesterStandalone {
- cryptopp = { version="8_0_0"; hash="sha256-Zei3qwaKkUJ/nrvdFP/uLM/tNN79GQIyXIej6xbvvm0="; };
+ cryptopp = { version="8_0_0"; hash="sha256-mq8xhse5xXbP0VcnNbnNz6xxLxJDIj8Gm3Pn/DEOt4w="; };
};
v700 = buildECTesterStandalone {
- cryptopp = { version="7_0_0"; hash="sha256-Pul5A4grX1jIi2+dLOUP0QAL6VR5GAx7RoHNP0wcdik="; };
+ cryptopp = { version="7_0_0"; hash="sha256-6m7ZnIBbOqthlX7I4uj/UvUgh1BEopNE02BC4pyMuU4="; };
};
v610 = buildECTesterStandalone {
- cryptopp = { version="6_1_0"; hash="sha256-ae5x/f+cwNVmNHEnA8jrqXIEv1j+rN/hqU34f6/+/1U="; };
+ cryptopp = { version="6_1_0"; hash="sha256-ZbercC0i/XhMhCYv54GwyIJuTygezD89/8HGeSKgkTo="; };
};
v600 = buildECTesterStandalone {
- cryptopp = { version="6_0_0"; hash="sha256-7ZUZc65PTVLtzyWIL6UjgUWgCtyB7bnXvkznuap0Qmk="; };
+ cryptopp = { version="6_0_0"; hash="sha256-3IZpDOzlljFmYRfkw/Kxe8BiBxYkqM4zIF03FyNqC/E="; };
};
v565 = buildECTesterStandalone {
- cryptopp = { version="5_6_5"; hash="sha256-ef1VFLOxkaHG2TTNmJ1eBY9HJqcqPa0kRL0SdKaq5oY="; };
+ cryptopp = { version="5_6_5"; hash="sha256-h+7LK8nzk1NlkVB4Loc9VQpN79SUFvBYESSpTZyXZ/o="; };
};
v564 = buildECTesterStandalone {
- cryptopp = { version="5_6_4"; hash="sha256-T6hN4QUOjiBUlyIpMsk6jWtuJvR+rE8RAojtVJAuBdM="; };
+ cryptopp = { version="5_6_4"; hash="sha256-IgSRJAF+4lEFSXeboxktfG0iW+a72ZFp6Vibk5/qgz4="; };
};
v563 = buildECTesterStandalone {
- cryptopp = { version="5_6_3"; hash="sha256-7ZP5aTEtlWvdlduDIOyVc8OPT+mJYKXFg2k73fDrBlQ="; };
+ cryptopp = { version="5_6_3"; hash="sha256-FDskGxaeACp7x3ZbgYXDr6PpFcPO0d6SEKVsOLIXbN0="; };
};
} \ No newline at end of file
diff --git a/nix/openssl_pkg_versions.nix b/nix/openssl_pkg_versions.nix
new file mode 100644
index 0000000..a702e61
--- /dev/null
+++ b/nix/openssl_pkg_versions.nix
@@ -0,0 +1,65 @@
+{
+ buildECTesterStandalone
+}:
+{
+ v331 = buildECTesterStandalone {
+ openssl = { version="3.3.1"; hash="sha256-Ezvzm40WNayUqEgwQsxEglG3cKDRLHrwwF6old3Zjx0="; };
+ };
+ v322 = buildECTesterStandalone {
+ openssl = { version="3.2.2"; hash="sha256-QYFzZZxh7gSRWwtSaV8JHgF6w+ZjePgTT9b4H+CjB6s="; };
+ };
+ v316 = buildECTesterStandalone {
+ openssl = { version="3.1.6"; hash="sha256-QrArZza3vMRME4/iAy+K4mwtCyErH9mklYkRrZciPrM="; };
+ };
+ v3014 = buildECTesterStandalone {
+ openssl = { version="3.0.14"; hash="sha256-DwwWLusMcv1Zz9t8KsV3pFVtFDvfAJTXCJDSfg6jAh8="; };
+ };
+ v330 = buildECTesterStandalone {
+ openssl = { version="3.3.0"; hash="sha256-Gke9xG+sJWoNyO+2lvf3b6X5YEm6G2D97VR4vTFlxtI="; };
+ };
+ v321 = buildECTesterStandalone {
+ openssl = { version="3.2.1"; hash="sha256-dcxoA/+skmJcBuo8Z3+zLvINFaG0HsyN3bxrnWotqEw="; };
+ };
+ v315 = buildECTesterStandalone {
+ openssl = { version="3.1.5"; hash="sha256-KZ3f0KUGptN95WOG0VzjDTRNkYhN/JirMzC3wAkCmTE="; };
+ };
+ v3013 = buildECTesterStandalone {
+ openssl = { version="3.0.13"; hash="sha256-50UE7XA1KV7HBisdoWwVtX/yoDzSBkoo2MOUWMrMRfw="; };
+ };
+ v320 = buildECTesterStandalone {
+ openssl = { version="3.2.0"; hash="sha256-qS9tvKl1ZngOyV4ro9SKqNqgkEiqyDksfHxYzJwDx2I="; };
+ };
+ v314 = buildECTesterStandalone {
+ openssl = { version="3.1.4"; hash="sha256-cnwwVD/kCugEwZ5tZbB+PlfWRIJtpUtutOveOsQHfZc="; };
+ };
+ v3012 = buildECTesterStandalone {
+ openssl = { version="3.0.12"; hash="sha256-mnpzVfPUtz9DtXMM6ANx+dH5eET/yMSwHHI7oGJdaq0="; };
+ };
+ v313 = buildECTesterStandalone {
+ openssl = { version="3.1.3"; hash="sha256-+0zy03Hvld8NyiqoXxHgrivbyG95gcv5MM6O/hrKDyg="; };
+ };
+ v3011 = buildECTesterStandalone {
+ openssl = { version="3.0.11"; hash="sha256-n6TUFXzWgxk1pUJ5ZxzCDF5U6VlDOOEJy5h5+giV0Qw="; };
+ };
+ v312 = buildECTesterStandalone {
+ openssl = { version="3.1.2"; hash="sha256-jHdpkxVGUtC7OT9QbYULgRUXyL2NJLEAiu9X++VdPzE="; };
+ };
+ v3010 = buildECTesterStandalone {
+ openssl = { version="3.0.10"; hash="sha256-II8ngfBapaRVxpMOIKXPe5eGoZh7Qlhb4BN/tF4rimQ="; };
+ };
+ v311 = buildECTesterStandalone {
+ openssl = { version="3.1.1"; hash="sha256-aLQF6mRSHJhTd3lbW3BdEWwc87+TOE0bvngkf3YBCCI="; };
+ };
+ v309 = buildECTesterStandalone {
+ openssl = { version="3.0.9"; hash="sha256-Luwx8qwOEm/2jYEHiR71NBWcT8+wlTZdTNTcV9gmFu4="; };
+ };
+ v310 = buildECTesterStandalone {
+ openssl = { version="3.1.0"; hash="sha256-qG6tXD4lm/F1FN7LMLKQ4L86Y2aDFobP+6z3UN9EFSc="; };
+ };
+ v308 = buildECTesterStandalone {
+ openssl = { version="3.0.8"; hash="sha256-aTPi8dpvI6UOoibuxukbVD0nfSCYAldjtZMc9qfgmcc="; };
+ };
+ v307 = buildECTesterStandalone {
+ openssl = { version="3.0.7"; hash="sha256-6Pc1kIFYRtsobSFZUP3vm4grtriG1QrLQxwChXgv41s="; };
+ };
+} \ No newline at end of file