diff options
| author | quapka | 2024-07-30 21:01:44 +0200 |
|---|---|---|
| committer | quapka | 2024-07-30 21:01:44 +0200 |
| commit | 3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831 (patch) | |
| tree | d353303a633db7e5adc8c321cfa481173ec1db73 | |
| parent | 40f5279a1f84c737daac70a3b66c649708f63973 (diff) | |
| download | ECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.tar.gz ECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.tar.zst ECTester-3fcaa7a9f4d8e3ac41ccbf96c5b3dfe8d5e20831.zip | |
Add autogenerated releases for OpenSSL, Crypto++ and Botan
| -rw-r--r-- | fetchReleases.py | 140 | ||||
| -rw-r--r-- | flake.nix | 65 | ||||
| -rw-r--r-- | nix/botan_pkg_versions.nix | 139 | ||||
| -rw-r--r-- | nix/botanshim.nix | 10 | ||||
| -rw-r--r-- | nix/cryptopp_pkg_versions.nix | 32 | ||||
| -rw-r--r-- | nix/openssl_pkg_versions.nix | 65 |
6 files changed, 388 insertions, 63 deletions
diff --git a/fetchReleases.py b/fetchReleases.py new file mode 100644 index 0000000..b462e1e --- /dev/null +++ b/fetchReleases.py @@ -0,0 +1,140 @@ +#!/usr/bin/env python3 + +import argparse + +import json +import jinja2 +import re +import requests + +import subprocess as sp + +from base64 import b32encode, b32decode, b64encode, b16decode +from bs4 import BeautifulSoup + +env = jinja2.Environment() + +all_versions_template = env.from_string("""{ + buildECTesterStandalone +}: +{ {% for version in pkg_versions %} + {{ version }} {% endfor %} +}""") + +def get_source_hash(url, unpack=False): + digest_type = "sha256" + + cmd = ["nix-prefetch-url"] + if unpack: + cmd.append("--unpack") + cmd.extend(["--type", digest_type, url]) + + digest_nixbase32 = sp.check_output(cmd, stderr=sp.DEVNULL).strip() + digest_sri = sp.check_output(["nix", "hash", "to-sri", "--type", digest_type, digest_nixbase32.decode()], stderr=sp.DEVNULL).strip().decode() + return digest_sri + +def fetch_botan(): + # NOTE: this way omits the older releases at https://botan.randombit.net/releases/old + release_list = "https://botan.randombit.net/releases/" + download_url = "https://botan.randombit.net/releases/{version}" + resp = requests.get(release_list) + soup = BeautifulSoup(resp.content, 'html.parser') + + single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone { + {{ pkg }} = { version="{{ version }}"; source_extension="{{ ext }}"; hash="{{ digest }}"; }; + };""") + + renders = [] + for link in soup.find_all("a"): + if link.text.startswith("Botan") and not link.text.endswith('.asc'): + download_link = download_url.format(version=link['href']) + + match = re.match(r"Botan-(?P<major>\d+)\.(?P<minor>\d+)\.(?P<patch>\d+)\.(?P<ext>.*)", link.text) + version = f"{match['major']}.{match['minor']}.{match['patch']}" + ext = f"{match['ext']}" + + digest = get_source_hash(download_link) + # NOTE: use underscore to separate the versions? + flat_version = f"v{match['major']}{match['minor']}{match['patch']}" + + rendered = single_version_template.render(pkg="botan", digest=digest, ext=ext, flat_version=flat_version, version=version).strip() + renders.append(rendered) + + all_versions = all_versions_template.render(pkg_versions=renders).strip() + with open("./nix/botan_pkg_versions.nix", "w") as handle: + handle.write(all_versions) + +def fetch_cryptopp(): + owner = "weidai11" + repo = "cryptopp" + release_url = f"https://api.github.com/repos/{owner}/{repo}/releases" + resp = requests.get(release_url) + + single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone { + {{ pkg }} = { version="{{ version }}"; hash="{{ digest }}"; }; + };""") + renders = [] + for release in resp.json(): + if not release['draft'] and not release['prerelease']: + _, *version_values = release['tag_name'].split('_') + underscored_version = '_'.join(version_values) + flat_version = "v" + "".join(version_values) + download_url = f"https://github.com/{owner}/{repo}/archive/{release['tag_name']}.tar.gz" + digest = get_source_hash(download_url, unpack=True) + + + rendered = single_version_template.render(pkg="cryptopp", digest=digest, flat_version=flat_version, version=underscored_version).strip() + renders.append(rendered) + + all_versions = all_versions_template.render(pkg_versions=renders).strip() + with open("./nix/cryptopp_pkg_versions.nix", "w") as handle: + handle.write(all_versions) + +def fetch_openssl(): + pkg = "openssl" + owner = "openssl" + repo = "openssl" + release_url = f"https://api.github.com/repos/{owner}/{repo}/releases" + resp = requests.get(release_url) + + single_version_template = env.from_string("""{{ flat_version }} = buildECTesterStandalone { + {{ pkg }} = { version="{{ version }}"; hash="{{ digest }}"; }; + };""") + renders = [] + for release in resp.json(): + if not release['draft'] and not release['prerelease']: + try: + _, dotted_version = release['tag_name'].split('-') + except ValueError: + continue + flat_version = "v" + "".join(dotted_version.split('.')) + download_url = f"https://github.com/{owner}/{repo}/archive/{release['tag_name']}.tar.gz" + digest = get_source_hash(download_url) + + + rendered = single_version_template.render(pkg=pkg, digest=digest, flat_version=flat_version, version=dotted_version).strip() + renders.append(rendered) + + all_versions = all_versions_template.render(pkg_versions=renders).strip() + with open(f"./nix/{pkg}_pkg_versions.nix", "w") as handle: + handle.write(all_versions) + + + + +def main(): + parser = argparse.ArgumentParser() + parser.add_argument("lib") + args = parser.parse_args() + + match args.lib: + case "botan": + fetch_botan() + case "cryptopp": + fetch_cryptopp() + case "openssl": + fetch_openssl() + + +if __name__ == '__main__': + main() @@ -45,15 +45,25 @@ ''; }); # FIXME: `nix develeop` now has different version than `nix run` - openssl = { version ? "", hash ? "" }: (pkgs.openssl.override { static = true; }).overrideAttrs (final: prev: rec { + opensslBuilder = { version ? null, hash ? null }: (pkgs.openssl.override { static = true; }).overrideAttrs (final: prev: rec { pname = "openssl"; - src = if version != "" then pkgs.fetchurl { + src = if version != null then pkgs.fetchurl { url = "https://www.openssl.org/source/openssl-${version}.tar.gz"; hash = hash; } else prev.src; # FIXME Removing patches might cause unwanted things; this should be version based! patches = []; }); + botan2Builder = { version, source_extension, hash }: pkgs.botan2.overrideAttrs (final: prev: { + src = if ( version == null ) then prev.src else + pkgs.fetchurl { + urls = [ + "http://botan.randombit.net/releases/Botan-${version}.${source_extension}" + ]; + inherit hash; + }; + }); + libgcrypt = pkgs.libgcrypt.overrideAttrs (final: prev: { configureFlags = ( prev.configureFlags or [] ) ++ [ "--enable-static" ]; }); @@ -96,7 +106,15 @@ nettle = pkgs.nettle.overrideAttrs (final: prev: { configureFlags = ( prev.configureFlags or [] ) ++ [ "--enable-static" ]; }); - cryptopp = pkgs.cryptopp.override { enableStatic = true; }; + cryptoppBuilder = { version, hash }: (pkgs.cryptopp.override { enableStatic = true; }).overrideAttrs (final: prev: { + src = if version == null then prev.src else + pkgs.fetchFromGitHub { + owner = "weidai11"; + repo = "cryptopp"; + rev = "CRYPTOPP_${version}"; + inherit hash; + }; + }); libressl = (pkgs.libressl.override { buildShared = false; } ).overrideAttrs (_old: rec { patches = [ (pkgs.fetchpatch { @@ -135,10 +153,10 @@ # Shims and libs # Current list of targets: tomcrypt botan cryptopp openssl boringssl gcrypt mbedtls ippcp nettle libressl - tomcryptShim = import ./nix/tomcryptshim.nix { inherit pkgs libtomcrypt libtommath; }; - botanShim = import ./nix/botanshim.nix { inherit pkgs; }; - cryptoppShim = import ./nix/cryptoppshim.nix { inherit pkgs cryptopp; }; - opensslShimBuilder = { version, hash }: import ./nix/opensslshim.nix { inherit pkgs; openssl = (openssl { version = version; hash = hash;}); }; + tomcryptShim = pkgs.callPackage ./nix/tomcryptshim.nix { inherit pkgs libtomcrypt libtommath; }; + botanShimBuilder = { version, source_extension, hash }: pkgs.callPackage ./nix/botanshim.nix { botan2 = botan2Builder { inherit version source_extension hash; }; }; + cryptoppShimBuilder = { version, hash}: pkgs.callPackage ./nix/cryptoppshim.nix { cryptopp = cryptoppBuilder { inherit version hash; };}; + opensslShimBuilder = { version, hash }: import ./nix/opensslshim.nix { inherit pkgs; openssl = (opensslBuilder { version = version; hash = hash;}); }; boringsslShim = import ./nix/boringsslshim.nix { inherit pkgs; boringssl = boringssl; }; gcryptShim = import ./nix/gcryptshim.nix { inherit pkgs libgcrypt libgpg-error; }; mbedtlsShim = import ./nix/mbedtlsshim.nix { pkgs = pkgs; }; @@ -148,9 +166,15 @@ commonLibs = import ./nix/commonlibs.nix { pkgs = pkgs; }; - buildECTesterStandalone = { opensslVersion, opensslHash }: ( + buildECTesterStandalone = { + openssl ? { version = null; hash = null; }, + botan ? { version = null; source_extension = null; hash = null; }, + cryptopp ? { version = null; hash = null; }, + }: ( let - opensslShim = (opensslShimBuilder { version = opensslVersion; hash = opensslHash; }); + opensslShim = (opensslShimBuilder { inherit (openssl) version hash; }); + botanShim = botanShimBuilder { inherit (botan) version source_extension hash; }; + cryptoppShim = cryptoppShimBuilder { inherit (cryptopp) version hash; }; in with pkgs; gradle2nix.builders.${system}.buildGradlePackage rec { @@ -201,20 +225,10 @@ in { packages = rec { - default = openssl_331; - openssl_331 = buildECTesterStandalone { - opensslVersion="3.3.1"; opensslHash="sha256-d3zVlihMiDN1oqehG/XSeG/FQTJV76sgxQ1v/m0CC34="; - }; - openssl_322 = buildECTesterStandalone { - opensslVersion="3.2.2"; opensslHash="sha256-GXFJwY2enyksQ/BACsq6EuX1LKz+BQ89GZJ36nOOwuc="; - }; - openssl_316 = buildECTesterStandalone { - opensslVersion="3.1.6"; opensslHash="sha256-XSvkA2tHjvPLCoVMqbNTByw6DibYpW+PCrn7btMtONc="; - }; - openssl_3014 = buildECTesterStandalone { - opensslVersion="3.0.14"; opensslHash="sha256-7soDXU3U6E/CWEbZUtpil0hK+gZQpvhMaC453zpBI8o="; - }; - # openssl_111w = buildECTesterStandalone "1.1.1w" "sha256-zzCYlQy02FOtlcCEHx+cbT3BAtzPys1SHZOSUgi3asg="; + default = openssl.v331; + openssl = pkgs.callPackage ./nix/openssl_pkg_versions.nix { inherit buildECTesterStandalone; }; + botan = pkgs.callPackage ./nix/botan_pkg_versions.nix { inherit buildECTesterStandalone; }; + cryptopp = pkgs.callPackage ./nix/cryptopp_pkg_versions.nix { inherit buildECTesterStandalone; }; }; devShells.default = with pkgs; mkShell rec { nativeBuildInputs = [ @@ -235,7 +249,7 @@ global-platform-pro gradle # libraries to test - (openssl {}) + (opensslBuilder {}) libressl # glibc boringssl @@ -280,8 +294,7 @@ libtomcrypt botan2 cryptopp - # (openssl {}) - (openssl {}) + (opensslBuilder {}) boringssl libgcrypt libgpg-error diff --git a/nix/botan_pkg_versions.nix b/nix/botan_pkg_versions.nix index 90295f1..66b0db5 100644 --- a/nix/botan_pkg_versions.nix +++ b/nix/botan_pkg_versions.nix @@ -1,19 +1,122 @@ { - -v200 = buildECTesterStandalone { - botan = { version="2.0.0"; hash="sha256-AxZZzKD4CGnp2XogkX7b4hZM7bwHnoxT4Oe9m+oVNxo="; }; -}; - -v201 = buildECTesterStandalone { - botan = { version="2.0.1"; hash="sha256-oTjtMW0RRQqEBUUbnJZkuOZAqbethNPzrTToBx82Tgs="; }; -}; - -v210 = buildECTesterStandalone { - botan = { version="2.1.0"; hash="sha256-Rg8tcgWu0RP4mN9JR7H2bM+NCA7sfawinvC3VMmtYpQ="; }; -}; - -v2100 = buildECTesterStandalone { - botan = { version="2.10.0"; hash="sha256-iEgZl1eMJ5JHJP6nZhDUPZ9ZyZ7f5WHUGAO7yYhxrTE="; }; -}; - -} + buildECTesterStandalone +}: +{ + v200 = buildECTesterStandalone { + botan = { version="2.0.0"; source_extension="tgz"; hash="sha256-AxZZzKD4CGnp2XogkX7b4hZM7bwHnoxT4Oe9m+oVNxo="; }; + }; + v201 = buildECTesterStandalone { + botan = { version="2.0.1"; source_extension="tgz"; hash="sha256-oTjtMW0RRQqEBUUbnJZkuOZAqbethNPzrTToBx82Tgs="; }; + }; + v210 = buildECTesterStandalone { + botan = { version="2.1.0"; source_extension="tgz"; hash="sha256-Rg8tcgWu0RP4mN9JR7H2bM+NCA7sfawinvC3VMmtYpQ="; }; + }; + v2100 = buildECTesterStandalone { + botan = { version="2.10.0"; source_extension="tgz"; hash="sha256-iEgZl1eMJ5JHJP6nZhDUPZ9ZyZ7f5WHUGAO7yYhxrTE="; }; + }; + v2110 = buildECTesterStandalone { + botan = { version="2.11.0"; source_extension="tar.xz"; hash="sha256-94dNoq64wBj9d99AshN4eb+Qtm9ViUkMmR6D+z6AlL4="; }; + }; + v2120 = buildECTesterStandalone { + botan = { version="2.12.0"; source_extension="tar.xz"; hash="sha256-Hq79RZ1S8n3hgFz/jGh5LgYQkZZI7pjhAZgOlO25CmM="; }; + }; + v2121 = buildECTesterStandalone { + botan = { version="2.12.1"; source_extension="tar.xz"; hash="sha256-fgNfFCpR/KE1lwV5JieigkVtSXSb9io3qOSDddQbqqk="; }; + }; + v2130 = buildECTesterStandalone { + botan = { version="2.13.0"; source_extension="tar.xz"; hash="sha256-9XrkKkHhCRvKWPRPQa3evZo5C2UWA5UsiB7InVAYfpA="; }; + }; + v2140 = buildECTesterStandalone { + botan = { version="2.14.0"; source_extension="tar.xz"; hash="sha256-DBDxK0JKQO4ZveACkgmOIB10mFNcBi2NW1htB4YaVLU="; }; + }; + v2150 = buildECTesterStandalone { + botan = { version="2.15.0"; source_extension="tar.xz"; hash="sha256-2IrxMH8f76x5qk8vUkaZR41pzhWoV88tCpCsa/KlAAk="; }; + }; + v2160 = buildECTesterStandalone { + botan = { version="2.16.0"; source_extension="tar.xz"; hash="sha256-ku1uvJGNhr0bBCIcpRivTPKcwybEdgdAvS0i5hzqJig="; }; + }; + v2170 = buildECTesterStandalone { + botan = { version="2.17.0"; source_extension="tar.xz"; hash="sha256-uXBEsxKqcYNJr3hRMxsGS8e9U1JADV+AeTus5CfQE0M="; }; + }; + v2171 = buildECTesterStandalone { + botan = { version="2.17.1"; source_extension="tar.xz"; hash="sha256-dBNYs/FjjtfZsvWbTjRKpG9JZrFZWLVDTArBWA3wwME="; }; + }; + v2172 = buildECTesterStandalone { + botan = { version="2.17.2"; source_extension="tar.xz"; hash="sha256-6+J9/itV1+Ar9SDpJmBsSLdrIvrLSDJWsTqzjgGOHmw="; }; + }; + v2173 = buildECTesterStandalone { + botan = { version="2.17.3"; source_extension="tar.xz"; hash="sha256-eRI7ZURFpKu6SG4JpDF4hUXHCCNzgqPnZWZMn1WwO4g="; }; + }; + v2180 = buildECTesterStandalone { + botan = { version="2.18.0"; source_extension="tar.xz"; hash="sha256-zGSFLh4MW7MOzQUuShLVE2ElqM5cO+LvtvsGHIZ34yc="; }; + }; + v2181 = buildECTesterStandalone { + botan = { version="2.18.1"; source_extension="tar.xz"; hash="sha256-+Me0YiKoVxaKdUpcwym7eAUEEisnABjdpTBMmNsorik="; }; + }; + v2182 = buildECTesterStandalone { + botan = { version="2.18.2"; source_extension="tar.xz"; hash="sha256-VBo7E/G50w+XfGwa5Me/39p2PNpuRN6Ac2nc559CMH4="; }; + }; + v2190 = buildECTesterStandalone { + botan = { version="2.19.0"; source_extension="tar.xz"; hash="sha256-JA2eVuasuR70zwaoocbA8QHGHUDPSMzPE5+u+CHXBAs="; }; + }; + v2191 = buildECTesterStandalone { + botan = { version="2.19.1"; source_extension="tar.xz"; hash="sha256-4m4Az+/aZAgq/dVA08U3kk9kXWpnSv7SzRcQBd7/VWA="; }; + }; + v2192 = buildECTesterStandalone { + botan = { version="2.19.2"; source_extension="tar.xz"; hash="sha256-OvXxdhXGtc2Lgy0mn7bLTVTsZPnrCd2/Gt1Qk5QbTXU="; }; + }; + v2193 = buildECTesterStandalone { + botan = { version="2.19.3"; source_extension="tar.xz"; hash="sha256-2uBH85nFpH8IfbXT2dno8RrkmF0UySjXHaGv+AGALVU="; }; + }; + v2194 = buildECTesterStandalone { + botan = { version="2.19.4"; source_extension="tar.xz"; hash="sha256-WjqI72Qz6XvKsO+h7WDGGX5K2p2dMLwcR0N7+JuX8nY="; }; + }; + v2195 = buildECTesterStandalone { + botan = { version="2.19.5"; source_extension="tar.xz"; hash="sha256-3+6g4KbybWckxK8B2pp7iEh62y2Bunxy/K9S21IsmtQ="; }; + }; + v220 = buildECTesterStandalone { + botan = { version="2.2.0"; source_extension="tgz"; hash="sha256-x5TbLsRvb/iPN652gl8MJY8HiAuGW2cHsmrPzEVnuCQ="; }; + }; + v230 = buildECTesterStandalone { + botan = { version="2.3.0"; source_extension="tgz"; hash="sha256-Oflw/uWYakw+QlAwrvUKwoTaGFlsAE0anM52iMTm1Hw="; }; + }; + v240 = buildECTesterStandalone { + botan = { version="2.4.0"; source_extension="tgz"; hash="sha256-7ZRk4qXP7kzT2b16j4BnO0XIoHGNshgac/VGWmBmCKU="; }; + }; + v250 = buildECTesterStandalone { + botan = { version="2.5.0"; source_extension="tgz"; hash="sha256-uKMf4D5/BIpb05Z+zQS2pIlmIV54eS3wbjM7Du3k+xs="; }; + }; + v260 = buildECTesterStandalone { + botan = { version="2.6.0"; source_extension="tgz"; hash="sha256-wfJhVVu6cCxzYI3ee9dD7y1jd6QaHClZFbJcW6uvXMU="; }; + }; + v270 = buildECTesterStandalone { + botan = { version="2.7.0"; source_extension="tgz"; hash="sha256-5C35FVYxdYjGyg5Bv3lvm9XsXHDgZo5sl8YIxpfCSpA="; }; + }; + v280 = buildECTesterStandalone { + botan = { version="2.8.0"; source_extension="tgz"; hash="sha256-5xWbEn6R4MFYJF1hxjjFDUQ+x7RAtrAWEyjEezq6OWA="; }; + }; + v290 = buildECTesterStandalone { + botan = { version="2.9.0"; source_extension="tgz"; hash="sha256-MFVkNSM03WOuY9sDkHfZauUt+lejJIhxCBcZtqny0Rk="; }; + }; + v300 = buildECTesterStandalone { + botan = { version="3.0.0"; source_extension="tar.xz"; hash="sha256-XaVS4A+hwEepDCLrXwJH7CfnQytot44Qp84JVSacytc="; }; + }; + v310 = buildECTesterStandalone { + botan = { version="3.1.0"; source_extension="tar.xz"; hash="sha256-ThjnVai7xr+W+skW+/By7NBnQMcqcgF8JxYuTAtHJf4="; }; + }; + v311 = buildECTesterStandalone { + botan = { version="3.1.1"; source_extension="tar.xz"; hash="sha256-MMhP6RmTapj+9TMfJGxiqiwOTSCFstRREgf2ogr6Oms="; }; + }; + v320 = buildECTesterStandalone { + botan = { version="3.2.0"; source_extension="tar.xz"; hash="sha256-BJyEeDX89u86niBrM94F3TiZnDJeJHSCdypVmNnl7OM="; }; + }; + v330 = buildECTesterStandalone { + botan = { version="3.3.0"; source_extension="tar.xz"; hash="sha256-No8R9CbxIFrtuenjI2ihZTXcEb1gNRBm5vZmTsNrhbk="; }; + }; + v340 = buildECTesterStandalone { + botan = { version="3.4.0"; source_extension="tar.xz"; hash="sha256-cYQ6/MCixYX48z+jBPC1iuS5xdgwb4lGZ7N0YEQndVc="; }; + }; + v350 = buildECTesterStandalone { + botan = { version="3.5.0"; source_extension="tar.xz"; hash="sha256-Z+ja4cokaNkN5OYByH1fMf9JKzjoq4vL0C3fcQTtip8="; }; + }; +}
\ No newline at end of file diff --git a/nix/botanshim.nix b/nix/botanshim.nix index f6de723..3711d1d 100644 --- a/nix/botanshim.nix +++ b/nix/botanshim.nix @@ -1,7 +1,11 @@ -{ - pkgs +{ + stdenv + , botan2 + , pkg-config + # NOTE change to jdk17? + , jdk11_headless }: -with pkgs; stdenv.mkDerivation { +stdenv.mkDerivation { name = "BotanShim"; src = ../standalone/src/main/resources/cz/crcs/ectester/standalone/libs/jni; diff --git a/nix/cryptopp_pkg_versions.nix b/nix/cryptopp_pkg_versions.nix index 3e77a12..781135b 100644 --- a/nix/cryptopp_pkg_versions.nix +++ b/nix/cryptopp_pkg_versions.nix @@ -3,51 +3,51 @@ }: { v890 = buildECTesterStandalone { - cryptopp = { version="8_9_0"; hash="sha256-q1F0ubXGI2WI4VoaoarstmWM2+CVAceYGsjbJ2ok2as="; }; + cryptopp = { version="8_9_0"; hash="sha256-HV+afSFkiXdy840JbHBTR8lLL0GMwsN3QdwaoQmicpQ="; }; }; v880 = buildECTesterStandalone { - cryptopp = { version="8_8_0"; hash="sha256-+Lj2MlM7J57il2lOZR6SBIJLumAizmbmDr67CLVR/no="; }; + cryptopp = { version="8_8_0"; hash="sha256-hg7g56bIYaXxB28nAmSQ7EP9NEwd1Psf/2GUtbC27oU="; }; }; v870 = buildECTesterStandalone { - cryptopp = { version="8_7_0"; hash="sha256-jWpAZLjp80zT6Dj1oSxABn7nuV7jfZFz7Cc8sJE+fKI="; }; + cryptopp = { version="8_7_0"; hash="sha256-KtZXW7+J9a4uKHnK8sqj5WVaIjG3d6tzBBDxa7Wv4AE="; }; }; v860 = buildECTesterStandalone { - cryptopp = { version="8_6_0"; hash="sha256-kwRiX0dnoT4KXybQ8BnXjPk3VgSjPlORw78ugTmd/rg="; }; + cryptopp = { version="8_6_0"; hash="sha256-a3TYaK34WvKEXN7LKAfGwQ3ZL6a3k/zMZyyVfnkQqO4="; }; }; v850 = buildECTesterStandalone { - cryptopp = { version="8_5_0"; hash="sha256-j2TPCc9PYdXXS8pTV0uMyZWRhswPByouZZfkmZ1q1ds="; }; + cryptopp = { version="8_5_0"; hash="sha256-A7eoJNwIOSCrO7vXyA6JER4E18k8vRRKdDsk/BXNx0Y="; }; }; v840 = buildECTesterStandalone { - cryptopp = { version="8_4_0"; hash="sha256-ZoffweM7CErqtIw1qFULI57l9zoJmjtqCRjXC4qJ5lQ="; }; + cryptopp = { version="8_4_0"; hash="sha256-gxd3LtvtgwgE1bUQc9pXLT8/WFrQPm3ghIHAGqBHlr8="; }; }; v830 = buildECTesterStandalone { - cryptopp = { version="8_3_0"; hash="sha256-YzBMb5Q/Q1pOOFJz4Vq7ac/zuFpEZjFQv1pgabhKvUM="; }; + cryptopp = { version="8_3_0"; hash="sha256-PHQol8Q7R0b63wiAf43nq+l+FcGItBzw65JZYSMf1ng="; }; }; v820 = buildECTesterStandalone { - cryptopp = { version="8_2_0"; hash="sha256-47zUimJzmtF5rYBktSM0artTdnvL78Af43MDQSKSND4="; }; + cryptopp = { version="8_2_0"; hash="sha256-sg7MrjzuAfWRK0RNZ6xR6cUD6z6F/u/SmtCTYOXP+Qc="; }; }; v810 = buildECTesterStandalone { - cryptopp = { version="8_1_0"; hash="sha256-ik5Hc6ObDAfXzqG4vno/ep0Sa9Osmp8HL4LTpTpHSoc="; }; + cryptopp = { version="8_1_0"; hash="sha256-6SRr0Kv+iJrtEixJjb7Rbj/YdVa7vhW7u476FZLTymI="; }; }; v800 = buildECTesterStandalone { - cryptopp = { version="8_0_0"; hash="sha256-Zei3qwaKkUJ/nrvdFP/uLM/tNN79GQIyXIej6xbvvm0="; }; + cryptopp = { version="8_0_0"; hash="sha256-mq8xhse5xXbP0VcnNbnNz6xxLxJDIj8Gm3Pn/DEOt4w="; }; }; v700 = buildECTesterStandalone { - cryptopp = { version="7_0_0"; hash="sha256-Pul5A4grX1jIi2+dLOUP0QAL6VR5GAx7RoHNP0wcdik="; }; + cryptopp = { version="7_0_0"; hash="sha256-6m7ZnIBbOqthlX7I4uj/UvUgh1BEopNE02BC4pyMuU4="; }; }; v610 = buildECTesterStandalone { - cryptopp = { version="6_1_0"; hash="sha256-ae5x/f+cwNVmNHEnA8jrqXIEv1j+rN/hqU34f6/+/1U="; }; + cryptopp = { version="6_1_0"; hash="sha256-ZbercC0i/XhMhCYv54GwyIJuTygezD89/8HGeSKgkTo="; }; }; v600 = buildECTesterStandalone { - cryptopp = { version="6_0_0"; hash="sha256-7ZUZc65PTVLtzyWIL6UjgUWgCtyB7bnXvkznuap0Qmk="; }; + cryptopp = { version="6_0_0"; hash="sha256-3IZpDOzlljFmYRfkw/Kxe8BiBxYkqM4zIF03FyNqC/E="; }; }; v565 = buildECTesterStandalone { - cryptopp = { version="5_6_5"; hash="sha256-ef1VFLOxkaHG2TTNmJ1eBY9HJqcqPa0kRL0SdKaq5oY="; }; + cryptopp = { version="5_6_5"; hash="sha256-h+7LK8nzk1NlkVB4Loc9VQpN79SUFvBYESSpTZyXZ/o="; }; }; v564 = buildECTesterStandalone { - cryptopp = { version="5_6_4"; hash="sha256-T6hN4QUOjiBUlyIpMsk6jWtuJvR+rE8RAojtVJAuBdM="; }; + cryptopp = { version="5_6_4"; hash="sha256-IgSRJAF+4lEFSXeboxktfG0iW+a72ZFp6Vibk5/qgz4="; }; }; v563 = buildECTesterStandalone { - cryptopp = { version="5_6_3"; hash="sha256-7ZP5aTEtlWvdlduDIOyVc8OPT+mJYKXFg2k73fDrBlQ="; }; + cryptopp = { version="5_6_3"; hash="sha256-FDskGxaeACp7x3ZbgYXDr6PpFcPO0d6SEKVsOLIXbN0="; }; }; }
\ No newline at end of file diff --git a/nix/openssl_pkg_versions.nix b/nix/openssl_pkg_versions.nix new file mode 100644 index 0000000..a702e61 --- /dev/null +++ b/nix/openssl_pkg_versions.nix @@ -0,0 +1,65 @@ +{ + buildECTesterStandalone +}: +{ + v331 = buildECTesterStandalone { + openssl = { version="3.3.1"; hash="sha256-Ezvzm40WNayUqEgwQsxEglG3cKDRLHrwwF6old3Zjx0="; }; + }; + v322 = buildECTesterStandalone { + openssl = { version="3.2.2"; hash="sha256-QYFzZZxh7gSRWwtSaV8JHgF6w+ZjePgTT9b4H+CjB6s="; }; + }; + v316 = buildECTesterStandalone { + openssl = { version="3.1.6"; hash="sha256-QrArZza3vMRME4/iAy+K4mwtCyErH9mklYkRrZciPrM="; }; + }; + v3014 = buildECTesterStandalone { + openssl = { version="3.0.14"; hash="sha256-DwwWLusMcv1Zz9t8KsV3pFVtFDvfAJTXCJDSfg6jAh8="; }; + }; + v330 = buildECTesterStandalone { + openssl = { version="3.3.0"; hash="sha256-Gke9xG+sJWoNyO+2lvf3b6X5YEm6G2D97VR4vTFlxtI="; }; + }; + v321 = buildECTesterStandalone { + openssl = { version="3.2.1"; hash="sha256-dcxoA/+skmJcBuo8Z3+zLvINFaG0HsyN3bxrnWotqEw="; }; + }; + v315 = buildECTesterStandalone { + openssl = { version="3.1.5"; hash="sha256-KZ3f0KUGptN95WOG0VzjDTRNkYhN/JirMzC3wAkCmTE="; }; + }; + v3013 = buildECTesterStandalone { + openssl = { version="3.0.13"; hash="sha256-50UE7XA1KV7HBisdoWwVtX/yoDzSBkoo2MOUWMrMRfw="; }; + }; + v320 = buildECTesterStandalone { + openssl = { version="3.2.0"; hash="sha256-qS9tvKl1ZngOyV4ro9SKqNqgkEiqyDksfHxYzJwDx2I="; }; + }; + v314 = buildECTesterStandalone { + openssl = { version="3.1.4"; hash="sha256-cnwwVD/kCugEwZ5tZbB+PlfWRIJtpUtutOveOsQHfZc="; }; + }; + v3012 = buildECTesterStandalone { + openssl = { version="3.0.12"; hash="sha256-mnpzVfPUtz9DtXMM6ANx+dH5eET/yMSwHHI7oGJdaq0="; }; + }; + v313 = buildECTesterStandalone { + openssl = { version="3.1.3"; hash="sha256-+0zy03Hvld8NyiqoXxHgrivbyG95gcv5MM6O/hrKDyg="; }; + }; + v3011 = buildECTesterStandalone { + openssl = { version="3.0.11"; hash="sha256-n6TUFXzWgxk1pUJ5ZxzCDF5U6VlDOOEJy5h5+giV0Qw="; }; + }; + v312 = buildECTesterStandalone { + openssl = { version="3.1.2"; hash="sha256-jHdpkxVGUtC7OT9QbYULgRUXyL2NJLEAiu9X++VdPzE="; }; + }; + v3010 = buildECTesterStandalone { + openssl = { version="3.0.10"; hash="sha256-II8ngfBapaRVxpMOIKXPe5eGoZh7Qlhb4BN/tF4rimQ="; }; + }; + v311 = buildECTesterStandalone { + openssl = { version="3.1.1"; hash="sha256-aLQF6mRSHJhTd3lbW3BdEWwc87+TOE0bvngkf3YBCCI="; }; + }; + v309 = buildECTesterStandalone { + openssl = { version="3.0.9"; hash="sha256-Luwx8qwOEm/2jYEHiR71NBWcT8+wlTZdTNTcV9gmFu4="; }; + }; + v310 = buildECTesterStandalone { + openssl = { version="3.1.0"; hash="sha256-qG6tXD4lm/F1FN7LMLKQ4L86Y2aDFobP+6z3UN9EFSc="; }; + }; + v308 = buildECTesterStandalone { + openssl = { version="3.0.8"; hash="sha256-aTPi8dpvI6UOoibuxukbVD0nfSCYAldjtZMc9qfgmcc="; }; + }; + v307 = buildECTesterStandalone { + openssl = { version="3.0.7"; hash="sha256-6Pc1kIFYRtsobSFZUP3vm4grtriG1QrLQxwChXgv41s="; }; + }; +}
\ No newline at end of file |
