3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix

36 lines
1.1 KiB
Nix
Raw Normal View History

{ lib, stdenv, fetchFromGitHub, autoreconfHook, cryptsetup }:
2016-01-27 03:59:51 +00:00
stdenv.mkDerivation rec {
pname = "bruteforce-luks";
2019-12-08 00:41:25 +00:00
version = "1.4.0";
2016-01-27 03:59:51 +00:00
src = fetchFromGitHub {
2019-12-08 00:41:25 +00:00
sha256 = "0yyrda077avdapq1mvavgv5mvj2r94d6p01q56bbnaq4a3h5kfd6";
2016-01-27 03:59:51 +00:00
rev = version;
repo = "bruteforce-luks";
owner = "glv2";
};
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ cryptsetup ];
enableParallelBuilding = true;
doCheck = true;
meta = with lib; {
2016-01-27 03:59:51 +00:00
inherit (src.meta) homepage;
description = "Cracks passwords of LUKS encrypted volumes";
longDescription = ''
The program tries to decrypt at least one of the key slots by trying
all the possible passwords. It is especially useful if you know
something about the password (i.e. you forgot a part of your password but
still remember most of it). Finding the password of a volume without
knowing anything about it would take way too much time (unless the
password is really short and/or weak). It can also use a dictionary.
'';
license = licenses.gpl3Plus;
platforms = platforms.linux;
};
}