Merge branch 'master' into staging
[jackhill/guix/guix.git] / gnu / packages / password-utils.scm
1 ;;; GNU Guix --- Functional package management for GNU
2 ;;; Copyright © 2015 Steve Sprang <scs@stevesprang.com>
3 ;;; Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Efraim Flashner <efraim@flashner.co.il>
4 ;;; Copyright © 2015 Aljosha Papsch <misc@rpapsch.de>
5 ;;; Copyright © 2016 Christopher Allan Webber <cwebber@dustycloud.org>
6 ;;; Copyright © 2016 Jessica Tallon <tsyesika@tsyesika.se>
7 ;;; Copyright © 2016 Andreas Enge <andreas@enge.fr>
8 ;;; Copyright © 2016 Lukas Gradl <lgradl@openmailbox.org>
9 ;;; Copyright © 2016, 2019 Alex Griffin <a@ajgrf.com>
10 ;;; Copyright © 2017 Leo Famulari <leo@famulari.name>
11 ;;; Copyright © 2017, 2018 Clément Lassieur <clement@lassieur.org>
12 ;;; Copyright © 2017, 2018, 2019 Tobias Geerinckx-Rice <me@tobias.gr>
13 ;;; Copyright © 2017 Jelle Licht <jlicht@fsfe.org>
14 ;;; Copyright © 2017, 2019 Eric Bavier <bavier@member.fsf.org>
15 ;;; Copyright © 2017 Nicolas Goaziou <mail@nicolasgoaziou.fr>
16 ;;; Copyright © 2017 Manolis Fragkiskos Ragkousis <manolis837@gmail.com>
17 ;;; Copyright © 2017 Rutger Helling <rhelling@mykolab.com>
18 ;;; Copyright © 2018 Marius Bakke <mbakke@fastmail.com>
19 ;;; Copyright © 2018 Konrad Hinsen <konrad.hinsen@fastmail.net>
20 ;;; Copyright © 2018 Thomas Sigurdsen <tonton@riseup.net>
21 ;;; Copyright © 2018 Arun Isaac <arunisaac@systemreboot.net>
22 ;;; Copyright © 2018 Pierre Neidhardt <mail@ambrevar.xyz>
23 ;;; Copyright © 2018 Amirouche Boubekki <amirouche@hypermove.net>
24 ;;; Copyright © 2018, 2019 Tim Gesthuizen <tim.gesthuizen@yahoo.de>
25 ;;; Copyright © 2019 Jens Mølgaard <jens@zete.tk>
26 ;;; Copyright © 2019 Tanguy Le Carrour <tanguy@bioneland.org>
27 ;;; Copyright © 2020 Guillaume Le Vaillant <glv@posteo.net>
28 ;;; Copyright © 2020 Brice Waegeneire <brice@waegenei.re>
29 ;;;
30 ;;; This file is part of GNU Guix.
31 ;;;
32 ;;; GNU Guix is free software; you can redistribute it and/or modify it
33 ;;; under the terms of the GNU General Public License as published by
34 ;;; the Free Software Foundation; either version 3 of the License, or (at
35 ;;; your option) any later version.
36 ;;;
37 ;;; GNU Guix is distributed in the hope that it will be useful, but
38 ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
39 ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
40 ;;; GNU General Public License for more details.
41 ;;;
42 ;;; You should have received a copy of the GNU General Public License
43 ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
44
45 (define-module (gnu packages password-utils)
46 #:use-module ((guix licenses) #:prefix license:)
47 #:use-module (guix build-system cmake)
48 #:use-module (guix build-system gnu)
49 #:use-module (guix build-system trivial)
50 #:use-module (guix download)
51 #:use-module (guix git-download)
52 #:use-module (guix packages)
53 #:use-module (gnu packages)
54 #:use-module (gnu packages admin)
55 #:use-module (gnu packages aidc)
56 #:use-module (gnu packages authentication)
57 #:use-module (gnu packages base)
58 #:use-module (gnu packages check)
59 #:use-module (gnu packages compression)
60 #:use-module (gnu packages crypto)
61 #:use-module (gnu packages cryptsetup)
62 #:use-module (gnu packages curl)
63 #:use-module (gnu packages file)
64 #:use-module (gnu packages freedesktop)
65 #:use-module (gnu packages gettext)
66 #:use-module (gnu packages glib)
67 #:use-module (gnu packages gnupg)
68 #:use-module (gnu packages gtk)
69 #:use-module (gnu packages guile)
70 #:use-module (gnu packages kerberos)
71 #:use-module (gnu packages libffi)
72 #:use-module (gnu packages linux)
73 #:use-module (gnu packages man)
74 #:use-module (gnu packages multiprecision)
75 #:use-module (gnu packages ncurses)
76 #:use-module (gnu packages nss)
77 #:use-module (gnu packages opencl)
78 #:use-module (gnu packages perl)
79 #:use-module (gnu packages pkg-config)
80 #:use-module (gnu packages python)
81 #:use-module (gnu packages python-web)
82 #:use-module (gnu packages python-xyz)
83 #:use-module (gnu packages readline)
84 #:use-module (gnu packages ruby)
85 #:use-module (gnu packages security-token)
86 #:use-module (gnu packages suckless)
87 #:use-module (gnu packages tcl)
88 #:use-module (gnu packages tls)
89 #:use-module (gnu packages qt)
90 #:use-module (gnu packages version-control)
91 #:use-module (gnu packages wxwidgets)
92 #:use-module (gnu packages xdisorg)
93 #:use-module (gnu packages xorg)
94 #:use-module (gnu packages xml)
95 #:use-module (guix build-system python))
96
97 (define-public pwgen
98 (package
99 (name "pwgen")
100 (version "2.08")
101 (source
102 (origin
103 (method url-fetch)
104 (uri (string-append "mirror://sourceforge/pwgen/pwgen/" version
105 "/pwgen-" version ".tar.gz"))
106 (sha256
107 (base32 "0yy90pqrr2pszzhb5hxjishq9qc7dqd290amiibqx9fm1b9kvc6s"))))
108 (build-system gnu-build-system)
109 (arguments
110 `(#:tests? #f)) ; no test suite
111 (home-page "http://pwgen.sourceforge.net/")
112 (synopsis "Password generator")
113 (description "Pwgen generates passwords which can be easily memorized by a
114 human.")
115 (license license:gpl2)))
116
117 (define-public keepassxc
118 (package
119 (name "keepassxc")
120 (version "2.5.3")
121 (source
122 (origin
123 (method url-fetch)
124 (uri (string-append "https://github.com/keepassxreboot/keepassxc"
125 "/releases/download/" version "/keepassxc-"
126 version "-src.tar.xz"))
127 (sha256
128 (base32 "1sx647mp1xikig50p9bb6vxv18ymdfj3wkxj6qfdr1zfcv7gn005"))))
129 (build-system cmake-build-system)
130 (arguments
131 '(#:configure-flags '("-DWITH_XC_ALL=YES"
132 "-DWITH_XC_UPDATECHECK=NO")))
133 (inputs
134 `(("argon2" ,argon2)
135 ("libgcrypt" ,libgcrypt)
136 ("libsodium" ,libsodium) ; XC_BROWSER
137 ("libyubikey" ,libyubikey) ; XC_YUBIKEY
138 ("libxi" ,libxi)
139 ("libxtst" ,libxtst)
140 ("qrencode" ,qrencode)
141 ("qtbase" ,qtbase)
142 ("qtsvg" ,qtsvg)
143 ("qtx11extras" ,qtx11extras)
144 ("quazip" ,quazip) ; XC_KEESHARE
145 ("readline" ,readline)
146 ("yubikey-personalization" ,yubikey-personalization) ; XC_YUBIKEY
147 ("zlib" ,zlib)))
148 (native-inputs
149 `(("qttools" ,qttools)))
150 (home-page "https://www.keepassxc.org")
151 (synopsis "Password manager")
152 (description "KeePassXC is a password manager or safe which helps you to
153 manage your passwords in a secure way. You can put all your passwords in one
154 database, which is locked with one master key or a key-file which can be stored
155 on an external storage device. The databases are encrypted using the
156 algorithms AES or Twofish.")
157 ;; While various parts of the software are licensed under different licenses,
158 ;; the combined work falls under the GPLv3.
159 (license license:gpl3)))
160
161 (define-public keepassx
162 (package
163 (name "keepassx")
164 (version "2.0.3")
165 (source
166 (origin
167 (method url-fetch)
168 (uri (string-append "https://www.keepassx.org/releases/" version
169 "/keepassx-" version ".tar.gz"))
170 (sha256
171 (base32
172 "1ia7cqx9ias38mnffsl7da7g1f66bcbjsi23k49sln0c6spb9zr3"))))
173 (build-system cmake-build-system)
174 (inputs
175 `(("libgcrypt" ,libgcrypt)
176 ("libxi" ,libxi)
177 ("libxtst" ,libxtst)
178 ("qt" ,qt-4)))
179 (native-inputs
180 `(("zlib" ,zlib)))
181 (home-page "https://www.keepassx.org")
182 (synopsis "Password manager")
183 (description "KeePassX is a password manager or safe which helps you to
184 manage your passwords in a secure way. You can put all your passwords in one
185 database, which is locked with one master key or a key-file which can be stored
186 on an external storage device. The databases are encrypted using the
187 algorithms AES or Twofish.")
188 ;; Non functional parts use various licences.
189 (license license:gpl3)
190 (properties `((superseded . ,keepassxc)))))
191
192 (define-public pwsafe
193 (package
194 (name "pwsafe")
195 (version "3.50.0")
196 (home-page "https://www.pwsafe.org/")
197 (source
198 (origin
199 (method git-fetch)
200 (uri (git-reference
201 (url "https://github.com/pwsafe/pwsafe.git")
202 (commit version)))
203 (sha256
204 (base32 "01kfssd2vr64yh4dqhch58x36n3aj3hpj5n560f41rsxym69c6qs"))
205 (file-name (git-file-name name version))))
206 (build-system cmake-build-system)
207 (native-inputs
208 `(("gettext" ,gettext-minimal)
209 ("gtest" ,googletest)
210 ("perl" ,perl)
211 ("zip" ,zip)))
212 (inputs `(("curl" ,curl)
213 ("file" ,file)
214 ("libuuid" ,util-linux)
215 ("libxt" ,libxt)
216 ("libxtst" ,libxtst)
217 ("openssl" ,openssl)
218 ("qrencode" ,qrencode)
219 ("wxwidgets" ,wxwidgets)
220 ("xerces-c" ,xerces-c)))
221 (arguments '(#:configure-flags (list "-DNO_GTEST=YES")
222 #:phases (modify-phases %standard-phases
223 (add-after 'unpack 'add-gtest
224 (lambda* (#:key inputs #:allow-other-keys)
225 (chmod "CMakeLists.txt" #o644)
226 (let ((cmake-port (open-file "CMakeLists.txt"
227 "a")))
228 (display "find_package(GTest)
229 add_subdirectory(src/test)\n" cmake-port)
230 (close cmake-port)
231 #t)))
232 (add-after 'add-gtest 'patch-executables
233 (lambda* (#:key inputs #:allow-other-keys)
234 (chmod "src/test/OSTest.cpp" #o644)
235 (substitute* "src/os/unix/media.cpp"
236 (("/usr/bin/file")
237 (string-append (assoc-ref inputs "file")
238 "/bin/file")))
239 #t)))))
240 (synopsis "Password safe with automatic input and key generation")
241 (description "pwsafe is a password manager originally designed by Bruce
242 Schneier. It offers a simple UI to manage passwords for different services.
243 There are other programs that support the file format on different
244 platforms.")
245 (license license:artistic2.0)))
246
247 (define-public shroud
248 (package
249 (name "shroud")
250 (version "0.1.2")
251 (source (origin
252 (method url-fetch)
253 (uri (string-append "https://files.dthompson.us/shroud/shroud-"
254 version ".tar.gz"))
255 (sha256
256 (base32
257 "1l2shrhvcwfzkar9qiwb75nhcqmx25iz55lzmz0c187nbjhqzi9p"))))
258 (build-system gnu-build-system)
259 (native-inputs
260 `(("pkg-config" ,pkg-config)))
261 (arguments
262 `(#:modules ((guix build gnu-build-system)
263 (guix build utils)
264 (ice-9 popen)
265 (ice-9 rdelim))
266 #:phases
267 (modify-phases %standard-phases
268 (add-after 'install 'wrap-shroud
269 (lambda* (#:key inputs outputs #:allow-other-keys)
270 (let* ((out (assoc-ref outputs "out"))
271 (guile (assoc-ref inputs "guile"))
272 (effective (read-line
273 (open-pipe* OPEN_READ
274 (string-append guile "/bin/guile")
275 "-c" "(display (effective-version))")))
276 (ccachedir (string-append out
277 "/lib/guile/" effective "/site-ccache"))
278 (prog (string-append out "/bin/shroud")))
279 (wrap-program prog
280 `("GUILE_LOAD_COMPILED_PATH" ":" prefix (,ccachedir)))
281 #t))))))
282 (inputs
283 `(("guile" ,guile-2.2)
284 ("gnupg" ,gnupg)
285 ("xclip" ,xclip)))
286 (synopsis "GnuPG-based secret manager")
287 (description "Shroud is a simple secret manager with a command line
288 interface. The password database is stored as a Scheme s-expression and
289 encrypted with a GnuPG key. Secrets consist of an arbitrary number of
290 key/value pairs, making Shroud suitable for more than just password storage.
291 For copying and pasting secrets into web browsers and other graphical
292 applications, there is xclip integration." )
293 (home-page "https://dthompson.us/projects/shroud.html")
294 (license license:gpl3+)))
295
296 (define-public yapet
297 (package
298 (name "yapet")
299 (version "2.3")
300 (source
301 (origin
302 (method url-fetch)
303 (uri (string-append "https://yapet.guengel.ch/downloads/yapet-"
304 version ".tar.xz"))
305 (sha256
306 (base32 "1fl4s7v1psl52ndd6i7716i9f493aj8ipl6lgmraadnn5h26l3pm"))))
307 (build-system gnu-build-system)
308 (inputs
309 `(("argon2" ,argon2)
310 ("ncurses" ,ncurses)
311 ("openssl" ,openssl)))
312 (native-inputs
313 `(("cppunit" ,cppunit)
314 ("pkg-config" ,pkg-config)))
315 (synopsis "Yet Another Password Encryption Tool")
316 (description "YAPET is a text based password manager using the Blowfish
317 encryption algorithm. Because of its small footprint and very few library
318 dependencies, it is suited for installing on desktop and server systems alike.
319 The text based user interface allows you to run YAPET easily in a Secure Shell
320 session. Two companion utilities enable users to convert CSV files to YAPET
321 and vice versa.")
322 (home-page "https://yapet.guengel.ch/")
323 (license license:gpl3+)))
324
325 (define-public cracklib
326 (package
327 (name "cracklib")
328 (version "2.9.7")
329 (source
330 (origin
331 (method url-fetch)
332 (uri (string-append "https://github.com/cracklib/cracklib/"
333 "releases/download/v" version "/"
334 "cracklib-" version ".tar.bz2"))
335 (sha256
336 (base32 "1rimpjsdnmw8f5b7k558cic41p2qy2n2yrlqp5vh7mp4162hk0py"))))
337 (build-system gnu-build-system)
338 (arguments
339 `(#:phases
340 (modify-phases %standard-phases
341 (add-after 'install 'install-dict
342 (lambda* (#:key make-flags #:allow-other-keys)
343 (begin
344 (chmod (string-append "util/cracklib-format") #o755)
345 (apply invoke "make" "dict" make-flags)
346 #t))))))
347 (synopsis "Password checking library")
348 (home-page "https://github.com/cracklib/cracklib")
349 (description
350 "CrackLib is a library containing a C function which may be used in a
351 @command{passwd}-like program. The idea is simple: try to prevent users from
352 choosing passwords that could easily be guessed (or \"cracked\") by filtering
353 them out, at the source.")
354 (license license:lgpl2.1)))
355
356 (define-public libpwquality
357 (package
358 (name "libpwquality")
359 (version "1.4.2")
360 (source (origin
361 (method url-fetch)
362 (uri (list
363 (string-append "https://github.com/libpwquality/libpwquality"
364 "/releases/download/libpwquality-" version
365 "/libpwquality-" version ".tar.bz2")
366 (string-append "https://launchpad.net/libpwquality/trunk/"
367 version "/+download/"
368 "libpwquality-" version ".tar.bz2")))
369 (sha256
370 (base32
371 "13hw532fmzc5xjpy75d74rlfdlxf2a8ibb4hyy9c0s92wsgf0qsj"))))
372 (build-system gnu-build-system)
373 (arguments
374 ;; XXX: have RUNPATH issue.
375 '(#:configure-flags '("--disable-python-bindings")))
376 (inputs
377 `(("cracklib" ,cracklib)))
378 (synopsis "Password quality checker")
379 (home-page "https://github.com/libpwquality/libpwquality")
380 (description
381 "Libpwquality is a library for password quality checking and generation of
382 random passwords that pass the checks.")
383 (license license:gpl2+)))
384
385 (define-public assword
386 (package
387 (name "assword")
388 (version "0.11")
389 (source (origin
390 (method url-fetch)
391 (uri (list
392 (string-append
393 "http://http.debian.net/debian/pool/main/a/assword/"
394 "assword_" version ".orig.tar.gz")))
395 (sha256
396 (base32
397 "03gkb6kvsghznbcw5l7nmrc6mn3ixkjd5jcs96ni4zs9l47jf7yp"))))
398 (arguments
399 `(;; irritatingly, tests do run but not there are two problems:
400 ;; - "import gtk" fails for unknown reasons here despite it the
401 ;; program working (indeed, I've found I have to do a logout and log
402 ;; back in in after an install order for some mumbo jumbo environment
403 ;; variable mess to work with pygtk and assword... what's up with
404 ;; that?)
405 ;; - even when the tests fail, they don't return a nonzero status,
406 ;; so I'm not sure how to programmatically get that information
407 #:tests? #f
408 #:phases
409 (modify-phases %standard-phases
410 (add-after 'install 'wrap-assword
411 (lambda* (#:key outputs #:allow-other-keys)
412 (let ((prog (string-append
413 (assoc-ref outputs "out")
414 "/bin/assword"))
415 (gi-typelib-path (getenv "GI_TYPELIB_PATH")))
416 (wrap-program prog
417 `("GI_TYPELIB_PATH" ":" prefix (,gi-typelib-path)))
418 #t)))
419 (add-after 'install 'manpage
420 (lambda* (#:key outputs #:allow-other-keys)
421 ;; Without this substitution, it fails with
422 ;; ImportError: No module named 'gpg'
423 (substitute* "Makefile"
424 (("PYTHONPATH=.") ""))
425 (invoke "make" "assword.1")
426 (install-file
427 "assword.1"
428 (string-append (assoc-ref outputs "out") "/share/man/man1")))))))
429 (build-system python-build-system)
430 (native-inputs
431 `(("txt2man" ,txt2man)))
432 (inputs
433 `(("gtk+" ,gtk+)
434 ("python-xdo" ,python-xdo)
435 ("python-gpg" ,python-gpg)
436 ("python-pygobject" ,python-pygobject)))
437 (propagated-inputs
438 `(("xclip" ,xclip)))
439 (home-page "https://finestructure.net/assword/")
440 (synopsis "Password manager")
441 (description "assword is a simple password manager using GPG-wrapped
442 JSON files. It has a command line interface as well as a very simple
443 graphical interface, which can even \"type\" your passwords into
444 any X11 window.")
445 (license license:gpl3+)))
446
447 (define-public password-store
448 (package
449 (name "password-store")
450 (version "1.7.3")
451 (source (origin
452 (method url-fetch)
453 (uri
454 (string-append "https://git.zx2c4.com/password-store/snapshot/"
455 name "-" version ".tar.xz"))
456 (sha256
457 (base32
458 "1x53k5dn3cdmvy8m4fqdld4hji5n676ksl0ql4armkmsds26av1b"))))
459 (build-system gnu-build-system)
460 (arguments
461 '(#:phases
462 (modify-phases %standard-phases
463 (delete 'configure)
464 (delete 'build)
465 (add-before 'install 'patch-system-extension-dir
466 (lambda* (#:key outputs #:allow-other-keys)
467 (let* ((out (assoc-ref outputs "out"))
468 (extension-dir (string-append out "/lib/password-store/extensions")))
469 (substitute* "src/password-store.sh"
470 (("^SYSTEM_EXTENSION_DIR=.*$")
471 ;; lead with whitespace to prevent 'make install' from
472 ;; overwriting it again
473 (string-append " SYSTEM_EXTENSION_DIR=\""
474 "${PASSWORD_STORE_SYSTEM_EXTENSION_DIR:-"
475 extension-dir
476 "}\"\n"))))
477 #t))
478 (add-before 'install 'patch-passmenu-path
479 (lambda* (#:key inputs #:allow-other-keys)
480 (substitute* "contrib/dmenu/passmenu"
481 (("dmenu") (string-append (assoc-ref inputs "dmenu")
482 "/bin/dmenu"))
483 (("xdotool") (string-append (assoc-ref inputs "xdotool")
484 "/bin/xdotool")))
485 #t))
486 (add-after 'install 'install-passmenu
487 (lambda* (#:key outputs #:allow-other-keys)
488 (let* ((out (assoc-ref outputs "out"))
489 (bin (string-append out "/bin")))
490 (install-file "contrib/dmenu/passmenu" bin)
491 #t)))
492 (add-after 'install 'wrap-path
493 (lambda* (#:key inputs outputs #:allow-other-keys)
494 (let ((out (assoc-ref outputs "out"))
495 (path (map (lambda (pkg)
496 (string-append (assoc-ref inputs pkg) "/bin"))
497 '("coreutils" "getopt" "git" "gnupg" "qrencode"
498 "sed" "tree" "which" "xclip"))))
499 (wrap-program (string-append out "/bin/pass")
500 `("PATH" ":" prefix (,(string-join path ":"))))
501 #t))))
502 #:make-flags (list "CC=gcc" (string-append "PREFIX=" %output)
503 "WITH_ALLCOMP=yes"
504 (string-append "BASHCOMPDIR="
505 %output "/etc/bash_completion.d"))
506 ;; Parallel tests may cause a race condition leading to a
507 ;; timeout in some circumstances.
508 #:parallel-tests? #f
509 #:test-target "test"))
510 (native-search-paths
511 (list (search-path-specification
512 (variable "PASSWORD_STORE_SYSTEM_EXTENSION_DIR")
513 (separator #f) ;single entry
514 (files '("lib/password-store/extensions")))))
515 (inputs
516 `(("dmenu" ,dmenu)
517 ("getopt" ,util-linux)
518 ("git" ,git)
519 ("gnupg" ,gnupg)
520 ("qrencode" ,qrencode)
521 ("sed" ,sed)
522 ("tree" ,tree)
523 ("which" ,which)
524 ("xclip" ,xclip)
525 ("xdotool" ,xdotool)))
526 (home-page "https://www.passwordstore.org/")
527 (synopsis "Encrypted password manager")
528 (description "Password-store is a password manager which uses GnuPG to
529 store and retrieve passwords. The tool stores each password in its own
530 GnuPG-encrypted file, allowing the program to be simple yet secure.
531 Synchronization is possible using the integrated git support, which commits
532 changes to your password database to a git repository that can be managed
533 through the pass command.")
534 (license license:gpl2+)))
535
536 (define-public pass-otp
537 (package
538 (name "pass-otp")
539 (version "1.2.0")
540 (source
541 (origin
542 (method url-fetch)
543 (uri
544 (string-append "https://github.com/tadfisher/pass-otp/releases/"
545 "download/v" version "/pass-otp-" version ".tar.gz"))
546 (sha256
547 (base32
548 "0rrs3iazq80dn0wbl20xkh270428jd8l99m5gd7hl93s4r4sc82p"))))
549 (build-system gnu-build-system)
550 (arguments
551 '(#:make-flags
552 (let* ((out (assoc-ref %outputs "out"))
553 (bashcomp (string-append out "/etc/bash_completion.d")))
554 (list (string-append "PREFIX=" %output)
555 (string-append "BASHCOMPDIR=" bashcomp)))
556 #:phases
557 (modify-phases %standard-phases
558 (delete 'configure)
559 (add-after 'build 'patch-oath-path
560 (lambda* (#:key inputs #:allow-other-keys)
561 (substitute* "otp.bash"
562 (("^OATH=.*$")
563 (string-append
564 "OATH="
565 (assoc-ref inputs "oath-toolkit")
566 "/bin/oathtool\n")))
567 #t)))
568 #:test-target "test"))
569 (inputs
570 `(("oath-toolkit" ,oath-toolkit)))
571 (native-inputs
572 `(("password-store" ,password-store)
573 ("expect" ,expect)
574 ("git" ,git)
575 ("gnupg" ,gnupg)
576 ("which" ,which)))
577 (home-page "https://github.com/tadfisher/pass-otp")
578 (synopsis "Pass extension for managing one-time-password (OTP) tokens")
579 (description
580 "Pass OTP is an extension for password-store that allows adding
581 one-time-password (OTP) secrets, generating OTP codes, and displaying secret
582 key URIs using the standard otpauth:// scheme.")
583 (license license:gpl3+)))
584
585 (define-public qtpass
586 (package
587 (name "qtpass")
588 (version "1.2.3")
589 (source
590 (origin
591 (method git-fetch)
592 (uri (git-reference
593 (url "https://github.com/IJHack/QtPass.git")
594 (commit (string-append "v" version))))
595 (file-name (git-file-name name version))
596 (sha256
597 (base32
598 "1vfhfyccrxq9snyvayqfzm5rqik8ny2gysyv7nipc91kvhq3bhky"))))
599 (build-system gnu-build-system)
600 (arguments
601 `(#:phases
602 (modify-phases %standard-phases
603 (replace 'configure
604 (lambda* (#:key inputs outputs #:allow-other-keys)
605 (let ((out (assoc-ref outputs "out")))
606 ;; lupdate/lrelease need to find qmake.
607 (setenv "QMAKE" "qmake")
608 ;; qmake needs to find lrelease/lupdate.
609 (invoke "qmake"
610 "QMAKE_LRELEASE=lrelease"
611 "QMAKE_LUPDATE=lupdate"
612 (string-append "PREFIX=" out)))))
613 (add-after 'configure 'reset-resource-timestamps
614 ;; Reset timestamps on localization files for a reproducible build.
615 (lambda _
616 (with-directory-excursion "localization"
617 (for-each (lambda (file)
618 (let* ((base (basename file ".qm"))
619 (src (string-append base ".ts"))
620 (st (stat src)))
621 (set-file-time file st)))
622 (find-files "." ".*\\.qm")))
623 #t))
624 (add-after 'install 'install-auxilliary
625 ;; Install man-page, icon and .desktop file.
626 (lambda* (#:key inputs outputs #:allow-other-keys)
627 (let* ((out (assoc-ref outputs "out"))
628 (applications (string-append out "/share/applications"))
629 (icons (string-append out "/share/icons/hicolor/scalable/apps"))
630 (man (string-append out "/share/man/man1")))
631 (install-file "qtpass.desktop" applications)
632 (install-file "artwork/icon.svg" icons)
633 (rename-file (string-append icons "/icon.svg")
634 (string-append icons "/qtpass-icon.svg"))
635 (install-file "qtpass.1" man)
636 #t)))
637 (add-before 'check 'check-setup
638 ;; Make Qt render "offscreen", required for tests.
639 (lambda _
640 (setenv "QT_QPA_PLATFORM" "offscreen")
641 #t)))))
642 (native-inputs
643 `(("qttools" ,qttools)))
644 (inputs
645 `(("qtbase" ,qtbase)
646 ("qtsvg" ,qtsvg)))
647 (home-page "https://qtpass.org")
648 (synopsis "GUI for password manager password-store")
649 (description
650 "Qt-based graphical user interface for the password manager
651 password-store also known as pass. Can use either pass or gpg to interact
652 with password-store files. Features configurable password generation,
653 templates, clipboard handling, and per folder settings for multi-recipient
654 encryption.")
655 (license license:gpl3+)))
656
657 (define-public rofi-pass
658 (package
659 (name "rofi-pass")
660 (version "2.0.2")
661 (source
662 (origin
663 (method url-fetch)
664 (uri
665 (string-append "https://raw.githubusercontent.com/carnager/rofi-pass/"
666 version "/rofi-pass"))
667 (sha256
668 (base32 "0msldkndqp40nx1s5s7ggcr97ir4nshpmnyzvj5hqw1l7m3gvw6j"))
669 (file-name name)))
670 (build-system trivial-build-system)
671 (arguments
672 `(#:modules ((guix build utils))
673 #:builder
674 (begin
675 (use-modules (guix build utils))
676 (let ((source (string-append (assoc-ref %build-inputs "source")))
677 (script "rofi-pass")
678 (out (assoc-ref %outputs "out")))
679 (copy-file source script)
680 (chmod script #o555)
681 (install-file script (string-append out "/bin"))))))
682 (propagated-inputs
683 `(("password-store" ,password-store)
684 ("rofi" ,rofi)
685 ("xdotool" ,xdotool)))
686 (home-page "https://github.com/carnager/rofi-pass")
687 (synopsis "Rofi frontend for password-store")
688 (description "Rofi-pass provides a way to manipulate information stored
689 using password-store through rofi interface:
690 @enumerate
691 @item open URLs of entries with hotkey;
692 @item type any field from entry;
693 @item auto-typing of user and/or password fields;
694 @item auto-typing username based on path;
695 @item auto-typing of more than one field, using the autotype entry;
696 @item bookmarks mode (open stored URLs in browser, default: Alt+x).
697 @end enumerate")
698 (license license:gpl3)))
699
700 (define-public argon2
701 (package
702 (name "argon2")
703 (version "20190702")
704 (source
705 (origin
706 (method git-fetch)
707 (uri (git-reference
708 (url "https://github.com/P-H-C/phc-winner-argon2")
709 (commit version)))
710 (file-name (git-file-name name version))
711 (sha256
712 (base32
713 "01rwanr4wmr9vm6c712x411wig543q195z2icn388z892a93lc7p"))))
714 (build-system gnu-build-system)
715 (arguments
716 `(#:test-target "test"
717 #:make-flags (list "CC=gcc"
718 (string-append "PREFIX=" (assoc-ref %outputs "out"))
719 "LIBRARY_REL=lib"
720 (string-append "ARGON2_VERSION=" ,version)
721 "OPTTEST=1") ; disable CPU optimization
722 #:phases
723 (modify-phases %standard-phases
724 (delete 'configure)))) ; No configure script.
725 (home-page "https://www.argon2.com/")
726 (synopsis "Password hashing library")
727 (description "Argon2 provides a key derivation function that was declared
728 winner of the 2015 Password Hashing Competition.")
729 ;; Argon2 is dual licensed under CC0 and ASL 2.0. Some of the source
730 ;; files are CC0 only; see README.md and LICENSE for details.
731 (license (list license:cc0 license:asl2.0))))
732
733 (define-public pass-git-helper
734 (package
735 (name "pass-git-helper")
736 (version "1.1.0")
737 (source
738 (origin
739 (method git-fetch)
740 (uri (git-reference
741 (url "https://github.com/languitar/pass-git-helper")
742 (commit (string-append "v" version))))
743 (file-name (git-file-name name version))
744 (sha256
745 (base32
746 "18nvwlp0w4aqj268wly60rnjzqw2d8jl0hbs6bkwp3hpzzz5g6yd"))))
747 (build-system python-build-system)
748 (arguments
749 `(#:phases
750 (modify-phases %standard-phases
751 (add-before 'build 'patch-pass-path
752 (lambda* (#:key inputs #:allow-other-keys)
753 (let* ((password-store (assoc-ref inputs "password-store"))
754 (pass (string-append password-store "/bin/pass")))
755 (substitute* '("passgithelper.py"
756 "test_passgithelper.py")
757 (("'pass'") (string-append "'" pass "'")))
758 #t)))
759 (replace 'check
760 (lambda _
761 (setenv "HOME" (getcwd))
762 (invoke "pytest"))))))
763 (inputs
764 `(("python-pyxdg" ,python-pyxdg)
765 ("password-store" ,password-store)))
766 (native-inputs
767 `(("python-pytest" ,python-pytest)
768 ("python-pytest-mock" ,python-pytest-mock)))
769 (home-page "https://github.com/languitar/pass-git-helper")
770 (synopsis "Git credential helper interfacing with pass")
771 (description "pass-git-helper is a git credential helper which allows to
772 use pass, the standard unix password manager, as the credential backend for
773 your git repositories. This is achieved by explicitly defining mappings
774 between hosts and entries in the password store.")
775 (license license:lgpl3+)))
776
777 (define-public john-the-ripper-jumbo
778 (let ((official-version "1.9.0")
779 (jumbo-version "1"))
780 (package
781 (name "john-the-ripper-jumbo")
782 (version (string-append official-version "-" jumbo-version))
783 (source
784 (origin
785 (method url-fetch)
786 (uri (string-append "http://www.openwall.com/john/j/john-"
787 official-version "-jumbo-" jumbo-version ".tar.xz"))
788 (sha256
789 (base32
790 "0fvz3v41hnaiv1ggpxanfykyfjq79cwp9qcqqn63vic357w27lgm"))))
791 (build-system gnu-build-system)
792 (native-inputs
793 `(("perl" ,perl)))
794 (inputs
795 `(("gmp" ,gmp)
796 ("libpcap" ,libpcap)
797 ("nss" ,nss)
798 ("openssl" ,openssl-1.0)
799 ("python" ,python-2) ; For "python" and "python2" shebangs
800 ("ruby" ,ruby) ; For genincstats.rb
801 ("zlib" ,zlib)))
802 (arguments
803 `(#:configure-flags
804 (list "--with-systemwide"
805 ;; Do not test for instruction set in configure, and do not
806 ;; pass '-march=native' to gcc:
807 "--disable-native-tests"
808 "--disable-native-march"
809 ,(string-append
810 "--enable-simd="
811 (let ((system (or (%current-target-system)
812 (%current-system))))
813 (cond
814 ((or (string-prefix? "x86_64" system)
815 (string-prefix? "i686" system)) "sse2")
816 ((string-prefix? "aarch" system) "neon")
817 (else "no")))))
818 #:phases
819 (modify-phases %standard-phases
820 (add-before 'configure 'chdir-src
821 (lambda _ (chdir "src") #t))
822 (replace 'install
823 (lambda _
824 (let ((bindir (string-append %output "/bin"))
825 (docdir (string-append %output "/share/doc/john"))
826 (execdir (string-append %output "/libexec/john"))
827 (datadir (string-append %output "/share/john"))
828 (install-file-to (lambda (dir)
829 (lambda (f) (install-file f dir))))
830 (symlink? (lambda (_ s) (eq? (stat:type s) 'symlink))))
831 (with-directory-excursion "../run"
832 (for-each (install-file-to bindir)
833 (cons*
834 "john" "makechr" "cprepair" "SIPdump" "tgtsnarf"
835 "genmkvpwd" "mkvcalcproba" "calc_stat" "raw2dyna"
836 (find-files "." "(to|2)?john(-[^.]*)?$")))
837 (for-each (lambda (f) ; Install symlinked aliases
838 (let ((tgt (string-append bindir "/" (basename f))))
839 ;; The use of install-file above dereferences
840 ;; symlinks. We'd rather have the symlinks
841 ;; for clarity, so remove tgt before linking.
842 (when (file-exists? tgt) (delete-file tgt))
843 (symlink "john" tgt)))
844 (find-files "." symlink?))
845 (for-each (install-file-to execdir)
846 (cons* "mailer" "benchmark-unify" "relbench"
847 (find-files "." ".*\\.js")))
848 (for-each (lambda (f)
849 (let* ((base (basename f))
850 (name (substring base 0 (string-index base #\.)))
851 (link (string-append bindir "/" name)))
852 (install-file f execdir)
853 (when (and (executable-file? f)
854 (not (file-exists? link)))
855 (symlink (string-append execdir "/" base) link))))
856 (find-files "." ".*\\.(pl|py|rb|lua)"))
857 (for-each (install-file-to datadir)
858 (append (find-files "." "(stats|dictionary.*)")
859 (find-files "." "(.*\\.chr|.*\\.lst)")
860 (find-files "." ".*\\.conf")))
861 (copy-recursively "rules" (string-append datadir "/rules")))
862 (copy-recursively "../doc" docdir)
863 #t)))
864 (delete 'check) ; Tests need installed .conf files; move after install
865 (add-after 'install 'check
866 (lambda args
867 (setenv "HOME" "/tmp") ; Some tests need to write to ~/.john
868 (setenv "OMP_NUM_THREADS" (number->string (parallel-job-count)))
869 (apply (assoc-ref %standard-phases 'check) args))))))
870 (home-page "http://www.openwall.com/john/")
871 (synopsis "Password cracker")
872 (description "John the Ripper is a fast password cracker. Its primary
873 purpose is to detect weak Unix passwords. Besides several @code{crypt}
874 password hash types most commonly found on various Unix systems, supported out
875 of the box are Windows LM hashes, plus lots of other hashes and ciphers. This
876 is the community-enhanced, \"jumbo\" version of John the Ripper.")
877 (license license:gpl2+))))
878
879 (define-public sala
880 (package
881 (name "sala")
882 (version "1.3")
883 (source
884 (origin
885 (method url-fetch)
886 (uri (pypi-uri "sala" version))
887 (sha256
888 (base32
889 "13qgmc3i2a0cqp8jqrfl93lnphfagb32pgfikc1gza2a14asxzi8"))))
890 (build-system python-build-system)
891 (arguments
892 ;; Sala is supposed to work with Python 3.2 or higher,
893 ;; but it doesn't work with Python 3.6. Better stick
894 ;; to Python 2, which works fine.
895 `(#:python ,python-2))
896 (propagated-inputs
897 `(("gnupg" ,gnupg)
898 ("pwgen" ,pwgen)))
899 (home-page "http://www.digip.org/sala/")
900 (synopsis "Encrypted plaintext password store")
901 (description
902 "Store passwords and other bits of sensitive plain-text information
903 to encrypted files on a directory hierarchy. The information is protected
904 by GnuPG's symmetrical encryption.")
905 (license license:expat)))
906
907 (define-public fpm2
908 (package
909 (name "fpm2")
910 (version "0.79")
911 (source (origin
912 (method url-fetch)
913 (uri (string-append "https://als.regnet.cz/fpm2/download/fpm2-"
914 version ".tar.bz2"))
915 (sha256
916 (base32
917 "19sdy1lygfhkg5nxi2w9a4d9kwvw24nxp0ix0p0lz91qpvk9qpnm"))))
918 (build-system gnu-build-system)
919 (inputs `(("gtk2" ,gtk+-2)
920 ("gnupg" ,gnupg)
921 ("libxml2" ,libxml2)))
922 (native-inputs `(("pkg-config" ,pkg-config)
923 ("intltool" ,intltool)))
924 (arguments
925 `(#:phases
926 (modify-phases %standard-phases
927 (add-before 'configure 'pre-configure
928 ;; The file po/POTFILES.in ends up missing for some reason in
929 ;; both nix and guix builds. Adding the file with contents
930 ;; found during troubleshooting.
931 (lambda _
932 (call-with-output-file "po/POTFILES.in"
933 (lambda (port)
934 (format port "data/fpm2.desktop.in
935 data/fpm2.desktop.in.in
936 fpm2.glade
937 src/callbacks.c
938 src/fpm.c
939 src/fpm_file.c
940 src/interface.c
941 src/support.c
942 fpm2.glade
943 ")))
944 #t)))))
945 (synopsis "Manage, generate and store passwords encrypted")
946 (description "FPM2 is GTK2 port from Figaro's Password Manager
947 originally developed by John Conneely, with some new enhancements.
948
949 Upstream development seems to have stopped. It is therefore recommended
950 to use a different password manager.")
951 (home-page "https://als.regnet.cz/fpm2/")
952 (license license:gpl2+)))
953
954 (define-public pass-rotate
955 (package
956 (name "pass-rotate")
957 (version "0.1")
958 (source
959 (origin
960 (method git-fetch)
961 (uri (git-reference
962 (url "https://github.com/ddevault/pass-rotate")
963 (commit version)))
964 (file-name (git-file-name name version))
965 (sha256
966 (base32
967 "1m067vvdlc85csbpkp8aw4s3ags7q8s3jszrr32kmj9qhk5c254f"))))
968 (build-system python-build-system)
969 (inputs
970 `(("python-beautifulsoup4" ,python-beautifulsoup4)
971 ("python-docopt" ,python-docopt)
972 ("python-html5lib" ,python-html5lib)
973 ("python-requests" ,python-requests)))
974 (home-page "https://github.com/ddevault/pass-rotate")
975 (synopsis "Rotate password on online services")
976 (description "pass-rotate is a command line utility and python library for
977 rotating passwords on various web services. It makes it easier to rotate your
978 passwords, one at a time or in bulk, when security events or routine upkeep of
979 your online accounts makes it necessary.")
980 (license license:expat)))
981
982 (define-public hashcat
983 (package
984 (name "hashcat")
985 (version "5.1.0")
986 (source
987 (origin
988 (method url-fetch)
989 (uri (string-append "https://hashcat.net/files/hashcat-"
990 version ".tar.gz"))
991 (sha256
992 (base32
993 "0f73y4cg8c7a6q7x34qvpfi4g3lw6j9bnn0a13g43aqyiskflfr8"))))
994 (native-inputs
995 `(("opencl-headers" ,opencl-headers)))
996 (build-system gnu-build-system)
997 (arguments
998 '(#:tests? #f ;no tests
999 #:make-flags (list (string-append "PREFIX=" %output))
1000 #:phases
1001 (modify-phases %standard-phases
1002 (delete 'configure))))
1003 (home-page "https://hashcat.net/hashcat/")
1004 (synopsis "Advanced password recovery utility")
1005 (description "Hashcat is an password recovery utility, supporting five
1006 unique modes of attack for over 200 highly-optimized hashing algorithms.
1007 Hashcat currently supports CPUs, GPUs, and other hardware accelerators on
1008 Linux, Windows, and macOS, and has facilities to help enable distributed
1009 password cracking.")
1010 (license license:expat)))
1011
1012 (define-public hashcat-utils
1013 (package
1014 (name "hashcat-utils")
1015 (version "1.9")
1016 (source
1017 (origin
1018 (method url-fetch)
1019 (uri (string-append "https://github.com/hashcat/hashcat-utils/releases/"
1020 "download/v" version "/"
1021 "hashcat-utils-" version ".7z"))
1022 (sha256
1023 (base32 "0kq555kb338691qd7zjmi8vhq4km3apnsl2w63zh0igwzcjx6lx1"))))
1024 (native-inputs
1025 `(("p7zip" ,p7zip)))
1026 (inputs
1027 `(("perl" ,perl)))
1028 (build-system gnu-build-system)
1029 (arguments
1030 `(#:tests? #f ;no tests
1031 #:make-flags (list "CC=gcc"
1032 ;; Upstream bug(?): "make all" seems to remove the
1033 ;; Perl scripts from the source.
1034 "native")
1035 #:phases
1036 (modify-phases %standard-phases
1037 (replace 'unpack
1038 (lambda* (#:key source #:allow-other-keys)
1039 (invoke "7z" "x" source)
1040 (chdir (string-append "hashcat-utils-" ,version "/src"))
1041 #t))
1042 (delete 'configure)
1043 (replace 'install
1044 (lambda* (#:key outputs #:allow-other-keys)
1045 (let ((out (string-append (assoc-ref outputs "out") "/bin")))
1046 (mkdir-p out)
1047 (for-each
1048 (lambda (file)
1049 (copy-file file (string-append out "/"
1050 (basename file ".bin"))))
1051 (find-files "." "\\.bin$"))
1052 (for-each
1053 (lambda (file)
1054 (copy-file file (string-append out "/"
1055 (basename file ".pl"))))
1056 (find-files "../bin" "\\.pl$"))
1057 #t))))))
1058 (home-page "https://github.com/hashcat/hashcat-utils/")
1059 (synopsis "Small utilities that are useful in advanced password cracking")
1060 (description "Hashcat-utils are a set of small utilities that are useful
1061 in advanced password cracking. They all are packed into multiple stand-alone
1062 binaries. All of these utils are designed to execute only one specific
1063 function. Since they all work with @code{STDIN} and @code{STDOUT} you can
1064 group them into chains.")
1065 (license license:expat)))
1066
1067 (define-public bruteforce-luks
1068 (package
1069 (name "bruteforce-luks")
1070 (version "1.4.0")
1071 (source
1072 (origin
1073 (method url-fetch)
1074 (uri (string-append "https://github.com/glv2/bruteforce-luks/releases/download/"
1075 version
1076 "/bruteforce-luks-"
1077 version
1078 ".tar.lz"))
1079 (sha256
1080 (base32 "0yawrlbbklhmvwr99wm7li3r0d5kxvpkwf33a12rji7z0ya5p340"))))
1081 (build-system gnu-build-system)
1082 (native-inputs
1083 `(("lzip" ,lzip)))
1084 (inputs
1085 `(("cryptsetup" ,cryptsetup)))
1086 (synopsis "LUKS encrypted volume cracker")
1087 (description
1088 "This is a cracker for LUKS encrypted volumes. It can be used either in
1089 exhaustive mode to try every password given a charset or in dictionary mode to
1090 try every password contained in a file.")
1091 (home-page "https://github.com/glv2/bruteforce-luks")
1092 (license license:gpl3+)))