2016-01-27 03:59:51 +00:00
|
|
|
{ stdenv, fetchFromGitHub, autoreconfHook, cryptsetup }:
|
|
|
|
|
|
|
|
stdenv.mkDerivation rec {
|
2019-08-15 13:41:18 +01:00
|
|
|
pname = "bruteforce-luks";
|
2019-06-01 08:56:49 +01:00
|
|
|
version = "1.3.2";
|
2016-01-27 03:59:51 +00:00
|
|
|
|
|
|
|
src = fetchFromGitHub {
|
2019-06-01 08:56:49 +01:00
|
|
|
sha256 = "0ws5bm5pczhvqrlhl60h8a9rdwk6xlh9wr5ndnkyxvv7m90qpy9b";
|
2016-01-27 03:59:51 +00:00
|
|
|
rev = version;
|
|
|
|
repo = "bruteforce-luks";
|
|
|
|
owner = "glv2";
|
|
|
|
};
|
|
|
|
|
|
|
|
nativeBuildInputs = [ autoreconfHook ];
|
|
|
|
buildInputs = [ cryptsetup ];
|
|
|
|
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
|
|
|
doCheck = true;
|
|
|
|
|
|
|
|
meta = with stdenv.lib; {
|
|
|
|
inherit (src.meta) homepage;
|
|
|
|
description = "Cracks passwords of LUKS encrypted volumes";
|
|
|
|
longDescription = ''
|
|
|
|
The program tries to decrypt at least one of the key slots by trying
|
|
|
|
all the possible passwords. It is especially useful if you know
|
|
|
|
something about the password (i.e. you forgot a part of your password but
|
|
|
|
still remember most of it). Finding the password of a volume without
|
|
|
|
knowing anything about it would take way too much time (unless the
|
|
|
|
password is really short and/or weak). It can also use a dictionary.
|
|
|
|
'';
|
|
|
|
license = licenses.gpl3Plus;
|
|
|
|
platforms = platforms.linux;
|
|
|
|
};
|
|
|
|
}
|