. "$GRIMOIRE"/CMAKE_FUNCTIONS
           SPELL=bkcrack
         VERSION=1.5.0
          SOURCE="$SPELL-$VERSION.tar.gz"
   SOURCE_URL[0]=https://github.com/kimci86/$SPELL/archive/refs/tags/v$VERSION.tar.gz
     SOURCE_HASH=sha512:75dd31f4e8fff1a8c4cf05df3aad6baf4c6bd84692ced27bbc3aa2e7cc5fe535303d401a8130e0430b1524a0d4c4fd16e00c732075629e3f764fc6f1d97722f8
SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION"
        DOC_DIRS="example"
            DOCS="doc/*.md *.md license.txt"
        WEB_SITE="https://github.com/kimci86/bkcrack"
      LICENSE[0]="Zlib"
         ENTERED=20221120
        KEYWORDS=""
           SHORT="Crack legacy Zip encryption"
cat << EOF
bkcrack is a command-line tool which implements a known plaintext attack against
the PKZip encryption algorithm. The main features are:
* Recover internal state from ciphertext and plaintext.
* Change a ZIP archive's password using the internal state.
* Recover the original password from the internal state.

The internal state of the cipher can be reversed given a ciphertext and just 12
bytes of corresponding plaintext, and the password can also be reasonably
cracked by brute force.
EOF
