From 367144768506a783aedb501ac2ce1e29d7412cb1 Mon Sep 17 00:00:00 2001 From: Tobias Geerinckx-Rice Date: Wed, 27 Jan 2016 04:59:51 +0100 Subject: bruteforce-luks: init at 1.2.0 --- pkgs/tools/security/bruteforce-luks/default.nix | 36 +++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 pkgs/tools/security/bruteforce-luks/default.nix (limited to 'pkgs/tools/security') diff --git a/pkgs/tools/security/bruteforce-luks/default.nix b/pkgs/tools/security/bruteforce-luks/default.nix new file mode 100644 index 000000000000..a28f949c7fdd --- /dev/null +++ b/pkgs/tools/security/bruteforce-luks/default.nix @@ -0,0 +1,36 @@ +{ stdenv, fetchFromGitHub, autoreconfHook, cryptsetup }: + +stdenv.mkDerivation rec { + name = "bruteforce-luks-${version}"; + version = "1.2.0"; + + src = fetchFromGitHub { + sha256 = "0d01rn45dg7ysa75r8z0b31hj1z7w47vv5vr359pl71zxgzngjd2"; + rev = version; + repo = "bruteforce-luks"; + owner = "glv2"; + }; + + nativeBuildInputs = [ autoreconfHook ]; + buildInputs = [ cryptsetup ]; + + enableParallelBuilding = true; + + doCheck = true; + + meta = with stdenv.lib; { + inherit (src.meta) homepage; + description = "Cracks passwords of LUKS encrypted volumes"; + longDescription = '' + The program tries to decrypt at least one of the key slots by trying + all the possible passwords. It is especially useful if you know + something about the password (i.e. you forgot a part of your password but + still remember most of it). Finding the password of a volume without + knowing anything about it would take way too much time (unless the + password is really short and/or weak). It can also use a dictionary. + ''; + license = licenses.gpl3Plus; + platforms = platforms.linux; + maintainers = with maintainers; [ nckx ]; + }; +} -- cgit 1.4.1