diff options
author | zimoun <zimon.toutoune@gmail.com> | 2021-06-23 17:52:25 +0200 |
---|---|---|
committer | Ludovic Courtès <ludo@gnu.org> | 2021-06-29 12:37:32 +0200 |
commit | 81fa44f431d33bd75e56648477a806f6e7786786 (patch) | |
tree | 884a4a51fb78a38aea918d33f63947520a69bbea | |
parent | 61e88d28f441a6170e58fa5f1adc19d80e716713 (diff) | |
download | guix-81fa44f431d33bd75e56648477a806f6e7786786.tar.gz guix-81fa44f431d33bd75e56648477a806f6e7786786.zip |
gnu: python2-roca-detect: Remove package.
* gnu/packages/python-crypto.scm (python2-roca-detect): Remove variable.
Signed-off-by: Ludovic Courtès <ludo@gnu.org>
-rw-r--r-- | gnu/packages/python-crypto.scm | 38 |
1 files changed, 0 insertions, 38 deletions
diff --git a/gnu/packages/python-crypto.scm b/gnu/packages/python-crypto.scm index 733a87cd2f..278657c57a 100644 --- a/gnu/packages/python-crypto.scm +++ b/gnu/packages/python-crypto.scm @@ -857,44 +857,6 @@ of improving usability, security and speed.") @end itemize\n") (license license:bsd-3))) -(define-public python2-roca-detect - (package - (name "python2-roca-detect") - (version "1.0.8") - (source - (origin - (method url-fetch) - (uri (pypi-uri "roca-detect" version)) - (sha256 - (base32 - "1di4akyw2lf5r8zfwvyhkilz8jv8g4b66rgaqwfabmjwma6gnw27")))) - (build-system python-build-system) - (native-inputs - ;; TODO: apk_parse_ph4, pyjks - `(("python2-dateutil" ,python2-dateutil) - ("python2-six" ,python2-six) - ("python2-cryptography" ,python2-cryptography) - ("python2-future" ,python2-future) - ("python2-coloredlogs" ,python2-coloredlogs) - ("python2-pgpdump" ,python2-pgpdump))) - (arguments - `(;; Basic testing routine is quite simple and works with Py3 - ;; but the rest of the code that processes the different - ;; key formats and extracts the modulus for inspection is - ;; not yet fully py3 ready. - #:python ,python-2)) - (home-page "https://github.com/crocs-muni/roca") - (synopsis "ROCA detection tool") - (description - "This tool is related to the paper entitled @i{Return of the -Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli}. It -enables you to test public RSA keys for a presence of the described -vulnerability. Currently the tool supports the following key formats: X.509 -Certificate (DER encoded, PEM encoded), RSA PEM (encoded private key, public -key), SSH public key, ASC-encoded OpenPGP key, APK Android application, LDIFF -file, and more.") - (license license:gpl3))) - (define-public python-blurhash (package (name "python-blurhash") |