diff options
author | ng0 <ng0@infotropique.org> | 2017-10-21 23:45:51 +0000 |
---|---|---|
committer | Ludovic Courtès <ludo@gnu.org> | 2017-10-25 22:26:15 -0700 |
commit | 60e95297297fbd67607445b601fa0245f83900f5 (patch) | |
tree | 1d8a82444c344159516368089ec0b975940defb4 /gnu | |
parent | 7756eab0783b54037298758354f04a6f15052d3e (diff) | |
download | guix-60e95297297fbd67607445b601fa0245f83900f5.tar.gz |
gnu: Add python2-roca-detect.
* gnu/packages/crypto.scm (python2-roca-detect): New variable. Signed-off-by: Ludovic Courtès <ludo@gnu.org>
Diffstat (limited to 'gnu')
-rw-r--r-- | gnu/packages/crypto.scm | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/gnu/packages/crypto.scm b/gnu/packages/crypto.scm index 0021bee7b4..e17db289e5 100644 --- a/gnu/packages/crypto.scm +++ b/gnu/packages/crypto.scm @@ -664,3 +664,41 @@ of improving usability, security and speed.") ;; The compilation is distributed under the Boost license; the individual ;; files in the compilation are in the public domain. (license (list license:boost1.0 license:public-domain)))) + +(define-public python2-roca-detect + (package + (name "python2-roca-detect") + (version "1.0.8") + (source + (origin + (method url-fetch) + (uri (pypi-uri "roca-detect" version)) + (sha256 + (base32 + "1di4akyw2lf5r8zfwvyhkilz8jv8g4b66rgaqwfabmjwma6gnw27")))) + (build-system python-build-system) + (native-inputs + ;; TODO: apk_parse_ph4, pyjks + `(("python2-dateutil" ,python2-dateutil) + ("python2-six" ,python2-six) + ("python2-cryptography" ,python2-cryptography) + ("python2-future" ,python2-future) + ("python2-coloredlogs" ,python2-coloredlogs) + ("python2-pgpdump" ,python2-pgpdump))) + (arguments + `(;; Basic testing routine is quite simple and works with Py3 + ;; but the rest of the code that processes the different + ;; key formats and extracts the modulus for inspection is + ;; not yet fully py3 ready. + #:python ,python-2)) + (home-page "https://github.com/crocs-muni/roca") + (synopsis "ROCA detection tool") + (description + "This tool is related to the paper entitled @i{Return of the +Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli}. It +enables you to test public RSA keys for a presence of the described +vulnerability. Currently the tool supports the following key formats: X.509 +Certificate (DER encoded, PEM encoded), RSA PEM (encoded private key, public +key), SSH public key, ASC-encoded OpenPGP key, APK Android application, LDIFF +file, and more.") + (license license:gpl3))) |