gnu: hcxdumptool: Update to 5.1.4.

* gnu/packages/networking.scm (hcxdumptool): Update to 5.1.4.
This commit is contained in:
Tobias Geerinckx-Rice 2019-04-26 00:58:16 +02:00
parent 03c443ce8f
commit 4f7db08571
No known key found for this signature in database
GPG key ID: 0DB0FF884F556D79

View file

@ -2244,37 +2244,37 @@ (define-public hcxtools
(license license:expat)))
(define-public hcxdumptool
(let* ((commit "f4799b5da82c5b030a6d99b02d1c1b9dc838ad36"))
(package
(name "hcxdumptool")
(version (git-version "0.0.0" "1" commit))
(home-page "https://github.com/ZerBea/hcxdumptool")
(source (origin
(method git-fetch)
(uri (git-reference
(url home-page)
(commit commit)))
(sha256
(base32
"0qlsin0rws9sshn12faq4spmd0ffzssal36s71vhv6gkhhga7abl"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags (list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ;no tests
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
(package
(name "hcxdumptool")
(version "5.1.4")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/ZerBea/hcxdumptool.git")
(commit version)))
(sha256
(base32 "0h2cc2dfpc83325hwqkxwn0p8qfq5gh1dg0yb1nr8bnffy0b4r4v"))
(file-name (git-file-name name version))))
(build-system gnu-build-system)
(arguments
`(#:make-flags
(list "CC=gcc"
(string-append "INSTALLDIR=" (assoc-ref %outputs "out") "/bin"))
#:tests? #f ; no test suite
#:phases
(modify-phases %standard-phases
(delete 'configure))))
(home-page "https://github.com/ZerBea/hcxdumptool")
(synopsis "Small tool to capture packets from wlan devices")
(description
"Small tool to capture packets from WLAN devices. After capturing,
upload the \"uncleaned\" cap to @url{https://wpa-sec.stanev.org/?submit} to
see if the access point or the client is vulnerable to a dictionary attack.
Convert the cap file to hccapx format and/or to WPA-PMKID-PBKDF2
hashline (16800) with @command{hcxpcaptool} from the @code{hcxtools} package
and check if the WLAN key or the master key was transmitted unencrypted.")
(license license:expat))))
(license license:expat)))
(define-public dante
(package