diff options
author | Eelco Dolstra <eelco.dolstra@logicblox.com> | 2013-07-23 18:56:12 +0200 |
---|---|---|
committer | Eelco Dolstra <eelco.dolstra@logicblox.com> | 2013-07-23 22:18:25 +0200 |
commit | 8dc09be07bb94c5d3ce7baeef9c690868a0c0461 (patch) | |
tree | 44136eb0421292d18ed6911637beda7f9161286b /modules/system/boot | |
parent | 462e4255fa3238f8766f5a11b461d2c78bbbf3ff (diff) | |
download | nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.gz nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.bz2 nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.lz nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.xz nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.zst nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.zip |
Fix indentation / tabs
Diffstat (limited to 'modules/system/boot')
-rw-r--r-- | modules/system/boot/luksroot.nix | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/modules/system/boot/luksroot.nix b/modules/system/boot/luksroot.nix index 8f48bba880b..b9c44ae7078 100644 --- a/modules/system/boot/luksroot.nix +++ b/modules/system/boot/luksroot.nix @@ -1,4 +1,4 @@ -{pkgs, config, ...}: +{ config, pkgs, ... }: with pkgs.lib; @@ -52,23 +52,23 @@ in boot.initrd.luks.mitigateDMAAttacks = mkOption { default = true; description = '' - Unless enabled, encryption keys can be easily recovered by an attacker with physical - access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port. - More information: http://en.wikipedia.org/wiki/DMA_attack + Unless enabled, encryption keys can be easily recovered by an attacker with physical + access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port. + More information: http://en.wikipedia.org/wiki/DMA_attack - This option blacklists FireWire drivers, but doesn't remove them. You can manually - load the drivers if you need to use a FireWire device, but don't forget to unload them! + This option blacklists FireWire drivers, but doesn't remove them. You can manually + load the drivers if you need to use a FireWire device, but don't forget to unload them! ''; }; boot.initrd.luks.cryptoModules = mkOption { - default = [ "aes" "aes_generic" "aes_x86_64" "aes_i586" "blowfish" "twofish" "serpent" "cbc" "xts" "lrw" "sha256" -"sha1" -"sha2" -]; + default = + [ "aes" "aes_generic" "aes_x86_64" "aes_i586" "blowfish" "twofish" + "serpent" "cbc" "xts" "lrw" "sha256" "sha1" "sha2" + ]; description = '' - A list of cryptographic kernel modules needed to decrypt the root device(s). - The default includes all common modules. + A list of cryptographic kernel modules needed to decrypt the root device(s). + The default includes all common modules. ''; }; @@ -151,7 +151,7 @@ in ["firewire_ohci" "firewire_core" "firewire_sbp2"]; # Some modules that may be needed for mounting anything ciphered - boot.initrd.kernelModules = [ "dm_mod" "dm_crypt" "cryptd" ] ++ luks.cryptoModules; + boot.initrd.kernelModules = [ "dm_mod" "dm_crypt" "cryptd" ] ++ luks.cryptoModules; # copy the cryptsetup binary and it's dependencies boot.initrd.extraUtilsCommands = '' |