depot/third_party/nixpkgs/pkgs/tools/security/bruteforce-luks/default.nix
Default email 8ac5e011d6 Project import generated by Copybara.
GitOrigin-RevId: 2c3273caa153ee8eb5786bc8141b85b859e7efd7
2020-04-24 19:36:52 -04:00

35 lines
1.1 KiB
Nix

{ stdenv, fetchFromGitHub, autoreconfHook, cryptsetup }:
stdenv.mkDerivation rec {
pname = "bruteforce-luks";
version = "1.4.0";
src = fetchFromGitHub {
sha256 = "0yyrda077avdapq1mvavgv5mvj2r94d6p01q56bbnaq4a3h5kfd6";
rev = version;
repo = "bruteforce-luks";
owner = "glv2";
};
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ cryptsetup ];
enableParallelBuilding = true;
doCheck = true;
meta = with stdenv.lib; {
inherit (src.meta) homepage;
description = "Cracks passwords of LUKS encrypted volumes";
longDescription = ''
The program tries to decrypt at least one of the key slots by trying
all the possible passwords. It is especially useful if you know
something about the password (i.e. you forgot a part of your password but
still remember most of it). Finding the password of a volume without
knowing anything about it would take way too much time (unless the
password is really short and/or weak). It can also use a dictionary.
'';
license = licenses.gpl3Plus;
platforms = platforms.linux;
};
}