summaryrefslogtreecommitdiff
path: root/net-analyzer
diff options
context:
space:
mode:
Diffstat (limited to 'net-analyzer')
-rw-r--r--net-analyzer/Manifest.gzbin43578 -> 43575 bytes
-rw-r--r--net-analyzer/firewalk/Manifest2
-rw-r--r--net-analyzer/firewalk/files/firewalk-5.0-signal.patch36
-rw-r--r--net-analyzer/firewalk/firewalk-5.0-r3.ebuild42
-rw-r--r--net-analyzer/iplog/Manifest2
-rw-r--r--net-analyzer/iplog/files/iplog-2.2.3-C23.patch36
-rw-r--r--net-analyzer/iplog/iplog-2.2.3-r4.ebuild41
-rw-r--r--net-analyzer/ippl/Manifest2
-rw-r--r--net-analyzer/ippl/files/ippl-1.4.14-musl.patch301
-rw-r--r--net-analyzer/ippl/ippl-1.4.14-r7.ebuild53
-rw-r--r--net-analyzer/isic/Manifest2
-rw-r--r--net-analyzer/isic/files/isic-0.07-configure.patch39
-rw-r--r--net-analyzer/isic/isic-0.07-r3.ebuild35
-rw-r--r--net-analyzer/yersinia/Manifest3
-rw-r--r--net-analyzer/yersinia/files/yersinia-0.8.2-C23.patch12
-rw-r--r--net-analyzer/yersinia/yersinia-0.8.2_p20221119.ebuild3
16 files changed, 607 insertions, 2 deletions
diff --git a/net-analyzer/Manifest.gz b/net-analyzer/Manifest.gz
index dd42581e5dfa..91cf01e07103 100644
--- a/net-analyzer/Manifest.gz
+++ b/net-analyzer/Manifest.gz
Binary files differ
diff --git a/net-analyzer/firewalk/Manifest b/net-analyzer/firewalk/Manifest
index 50d94a36363d..7193ab191acb 100644
--- a/net-analyzer/firewalk/Manifest
+++ b/net-analyzer/firewalk/Manifest
@@ -1,5 +1,7 @@
AUX firewalk-5.0-gcc3.4.diff 336 BLAKE2B 0ac2e06b910df060f25b892ea782bbb90c94d04c56cf02b297597717b5804a956667ca655b614b291747a6b4988b03d185a1a28e218930e81a4e2ba41b459a59 SHA512 7e6868951f4de1be0572ce1328fb8dd0d787cbd21198cdd84233db80aec40ad17d2748ff2afd98986fc4687357e0c7c411b80c0557aabcb73369ff1d1495cb5c
+AUX firewalk-5.0-signal.patch 901 BLAKE2B cc906896e4859fc21d15c3a2d85b8ff70ba5642e3aaa17101f441de909ae93404dfb0f7be45f695e89bab915ef301aab3b973c2f79c8c9d2d525973ec5ab5148 SHA512 3e7453af08f555a0f8c870f4b99094778e114d448bde529290e24c43707111be1dd72056dc9b66e996c65fe5373f98337cbc86e0d3baf06afc5e75fa288b398d
AUX firewalk-5.0-usage.diff 489 BLAKE2B b1607306ee554ad0f069d2a2c478bcfc86561e481ad40319088405bba2a223012f0b6b95cda15294885ed16de0a8892b8d22d3a8a86528998f0f784002b8ae82 SHA512 46fd81b4363ff09de7c1d13983c85239a9c7fc9d3aa139d2c0f600bc4235d53475e3f737e41cc56181b876ab9d70cc56cba2b872a619449c2ce60e0af1398b6a
DIST firewalk-5.0.tgz 80446 BLAKE2B 22580800fb21347fda6ff6290c0fd2f177e266778c2d6ce1087839b5484dfcf8e2ffbb415d90012d71e6d345ba4c95f888fecc902adaaa2903124605c1fcf427 SHA512 919aa6e464dac72a02f8967ccf7109de7d0b3a574f0a396bcf69bacc988ab8e13e8e25932d749eadc898cae2546f8f81014d53ef51429e6c784a16d40da90ff2
EBUILD firewalk-5.0-r2.ebuild 584 BLAKE2B 4ca022eed4c11ef50f4c8f9875f18b100cc86a8993601276a800e92ef26e6024c7edc9b4216cf1cc55c5bf03228b4acc683978fdb50312866c7c7b6740f197bb SHA512 d80402af3dd17e0b09969a6f474223122ee233ec14ac77419b2ac970b9c612a077b7ca9d66300613512a92f5bb1a0ce16ff6e09bd1778f868c017f5165fd024e
+EBUILD firewalk-5.0-r3.ebuild 718 BLAKE2B 589767adfa2ad443266e986ca2f8ec54249ac214bfa0d137be72676070c44b2c6f609d2f816ea770e3c3d35f55bb1d253275044540d22ea11ac705ccb9dd0be7 SHA512 2377980535b0b1909a1ed30ad152634b5f9cd652eca91059fa5d544ea43163548e368e8b4615e305d5cc4c64aa6fa194aa52d51681ecbf29b3105fcae43afd71
MISC metadata.xml 277 BLAKE2B 57fc90092c4674e5c4dfe38b0d79c983990fce4e8208b70c2ebb218aebb6d2135537f927115f3a7b7eb8c1ddb596461c17e60acb3e6a11b289796f20f3c80a33 SHA512 5ac67e6beabab60f83ac521249c6d1f021988d522fc86ab12ec98fbaa9d47a50157c10c7b9a39554e66a02b141cdc6dc6669e5e7c9c02c8b36ad404aa790d619
diff --git a/net-analyzer/firewalk/files/firewalk-5.0-signal.patch b/net-analyzer/firewalk/files/firewalk-5.0-signal.patch
new file mode 100644
index 000000000000..1d0c3423e8ac
--- /dev/null
+++ b/net-analyzer/firewalk/files/firewalk-5.0-signal.patch
@@ -0,0 +1,36 @@
+https://bugs.gentoo.org/945297
+fix signature of signal
+--- a/include/firewalk.h
++++ b/include/firewalk.h
+@@ -248,7 +248,7 @@
+ int /* 1 on success -1 or failure */
+ catch_sig(
+ int, /* signal to catch */
+- void (*)() /* new signal handler */
++ void (*)(int) /* new signal handler */
+ );
+
+ /* handles SIGINT from user */
+--- a/src/signal.c
++++ b/src/signal.c
+@@ -40,7 +40,7 @@
+ extern int loop;
+
+ int
+-catch_sig(int signo, void (*handler)())
++catch_sig(int signo, void (*handler)(int))
+ {
+ struct sigaction action;
+
+https://bugs.gentoo.org/731202
+patch out unneedeed strip - portage does it instead, and right.
+--- a/src/Makefile.am
++++ b/src/Makefile.am
+@@ -25,7 +25,6 @@
+
+ all:
+ cp firewalk $(top_srcdir)
+- strip $(top_srcdir)/firewalk
+
+ clean:
+ rm -f $(top_srcdir)/firewalk
diff --git a/net-analyzer/firewalk/firewalk-5.0-r3.ebuild b/net-analyzer/firewalk/firewalk-5.0-r3.ebuild
new file mode 100644
index 000000000000..2bb76f120bd7
--- /dev/null
+++ b/net-analyzer/firewalk/firewalk-5.0-r3.ebuild
@@ -0,0 +1,42 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+inherit autotools
+
+DESCRIPTION="A tool for determining a firewall's rule set"
+HOMEPAGE="http://packetfactory.openwall.net/projects/firewalk/"
+SRC_URI="mirror://gentoo/${P}.tgz"
+S=${WORKDIR}/${PN^}
+
+LICENSE="BSD"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~x86"
+
+DEPEND="
+ dev-libs/libdnet
+ net-libs/libnet:1.1
+ net-libs/libpcap
+"
+RDEPEND="
+ ${DEPEND}
+"
+DOCS=( README TODO BUGS )
+PATCHES=(
+ "${FILESDIR}"/${P}-gcc3.4.diff
+ "${FILESDIR}"/${P}-usage.diff
+ "${FILESDIR}"/${P}-signal.patch
+)
+
+src_prepare() {
+ default
+
+ # bug https://bugs.gentoo.org/899922
+ eautoreconf
+}
+
+src_install() {
+ default
+ doman man/firewalk.8
+}
diff --git a/net-analyzer/iplog/Manifest b/net-analyzer/iplog/Manifest
index 04973484964e..7da11bfa7f9a 100644
--- a/net-analyzer/iplog/Manifest
+++ b/net-analyzer/iplog/Manifest
@@ -1,5 +1,7 @@
AUX 2.2.3-DLT_LINUX_SSL.patch 7265 BLAKE2B a20edebe47d65d066b1b3e214d8365b4a5811a7be4f600028edc11fc4c17e48f8396c34335a855299da17534a52dc89c916c890ae50a147620988b5f3c6ca8d9 SHA512 de93d97688e1079e480c138abc1a25572c47f2e045f70c98b7ba2c2098bcfffdb36997aab0a4272cbe908bead503b2531543368ac35624527cb8c0640594ad4b
+AUX iplog-2.2.3-C23.patch 915 BLAKE2B c6fbfedccfeee2c3e6f74094bc8fb22a65667ebd1d6950f210d4830347ff56a831f0433e34bf432acbed2f5bc721e4732325e683086808e1f36133b254ec6b06 SHA512 9871b83e0a392538040870714413e68dd0b443c28f14b67c576ddeb138a825001d1756f72de421147798a781266e335ae687b1ba08535386a71f1c2426d2ae0f
AUX iplog.rc6 776 BLAKE2B fba34208b2d16ba508cc9c3592e21eb7f0a479a89bf4617320bd9627047024f0cadde7fef55304baf25f7ccc56836e899b71801141b1802facc8b885b9b121ad SHA512 f0c3965810f7005e1ae183a2f3ed66ba06c054fcfd78da6277eaa364518ebffb9f44a0c99200b0d3042a63d4c57141d5b29823e8bc1d3f030e00d8e913021a34
DIST iplog-2.2.3.tar.gz 133639 BLAKE2B f8108259f3f9b662297785988c40711d9d4ce6381377ed9a797f441c84fd1dcd9f0c3832e07ed9a660ddcc41bc52777136204274de873b72bce151327738ec2d SHA512 d7669e39b728af366b5199c58d396c6907496b4895ffb1ba0cba54fae0646f9792170f932de1eae9634b5ac356644a5d6d0ccaf7bc77a62641695992245c9aed
EBUILD iplog-2.2.3-r3.ebuild 711 BLAKE2B 928594fb1952974eb3b843dcc83665e6fd36ac816956d1099dc89c453b85845f2291774577697be74b3583db983e27b7449360a09b6458d7deec43e1792a7612 SHA512 58bb5e3672c96b44d27ac2295702e311a311d096df0d2efee75c9cedd23b777d7dbc8916158c383569ece11004bcacc3211a55036f28df478392e3cad937f811
+EBUILD iplog-2.2.3-r4.ebuild 861 BLAKE2B f24e9a814c2d995d34a55e8b645e95b4c12b22841c3c3629222de7a84efef3e8f55513f4e3a496041c9f3c6f2e496ea986a153be138c1b719fac5499566fa0c7 SHA512 d7aaf6674af54eecdbc898ff3d93a62e2048b422184be2e5bed02b08a0261278f8ad0fb667f05ff26caa57b2b497010d6891294fcdd53ae884cf6f35cc5e4847
MISC metadata.xml 355 BLAKE2B 337b9d3630275e047ddd52222f2a94827901805a8e43cc316633048ab5ddf091f4300188d54f3eed58867b5a0f0efbbb5aa559f8182568104bb00bf2f4833afc SHA512 ae66cec4d69d91d7962a8b3b282fb429d008f6218e671d351dfae2dfc78310e066aa93e1a68dc00cd0b1ae61d0831ce6161fb5016edd6f1aa9120cb57903d384
diff --git a/net-analyzer/iplog/files/iplog-2.2.3-C23.patch b/net-analyzer/iplog/files/iplog-2.2.3-C23.patch
new file mode 100644
index 000000000000..b905f0be4d9a
--- /dev/null
+++ b/net-analyzer/iplog/files/iplog-2.2.3-C23.patch
@@ -0,0 +1,36 @@
+https://bugs.gentoo.org/945194 - guard bool for modern compilers
+https://bugs.gentoo.org/712644 - type aliaces for musl
+--- a/src/iplog.h
++++ b/src/iplog.h
+@@ -21,6 +21,9 @@
+ #ifndef __IPLOG_H
+ #define __IPLOG_H
+
++#define _GNU_SOURCE 1
++#include <sys/types.h> /* for u_* types */
++
+ #ifndef HAVE_IPADDR_T
+ typedef u_int32_t ipaddr_t;
+ #endif
+@@ -82,7 +82,9 @@
+ # define min(x,y) ((x) < (y) ? (x) : (y))
+ #endif
+
++#if __STDC_VERSION__ <= 201710L
+ typedef enum { false, true } bool;
++#endif
+
+ #ifdef HAVE_PATHS_H
+ # include <paths.h>
+C23 and GNU-15 compatibility, explicitly cast sockaddr
+--- a/src/iplog_tcp.c
++++ b/src/iplog_tcp.c
+@@ -144,7 +144,7 @@
+
+ ret = sendto(raw_sock, (char *) xip,
+ sizeof(struct ip) + sizeof(struct tcphdr), 0,
+-#if !defined(__GLIBC__) || (__GLIBC__ < 2)
++#if !defined(__GLIBC__) || (__GLIBC__ < 2) || (__STDC_VERSION__ > 201710L)
+ (struct sockaddr *)
+ #endif
+ &fn_sin,
diff --git a/net-analyzer/iplog/iplog-2.2.3-r4.ebuild b/net-analyzer/iplog/iplog-2.2.3-r4.ebuild
new file mode 100644
index 000000000000..1abed3079f62
--- /dev/null
+++ b/net-analyzer/iplog/iplog-2.2.3-r4.ebuild
@@ -0,0 +1,41 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+inherit flag-o-matic toolchain-funcs autotools
+
+DESCRIPTION="TCP/IP traffic logger"
+HOMEPAGE="https://ojnk.sourceforge.net/"
+SRC_URI="https://downloads.sourceforge.net/ojnk/${P}.tar.gz"
+
+LICENSE="|| ( GPL-2 FDL-1.1 )"
+SLOT="0"
+KEYWORDS="~alpha ~amd64 ~ppc ~sparc ~x86"
+
+DEPEND="net-libs/libpcap"
+RDEPEND="${DEPEND}"
+
+PATCHES=(
+ "${FILESDIR}/${PV}-DLT_LINUX_SSL.patch"
+ "${FILESDIR}/${P}-C23.patch")
+
+DOCS=( AUTHORS NEWS README TODO example-iplog.conf )
+
+src_prepare() {
+ default
+
+ #https://bugs.gentoo.org/899936
+ #https://bugs.gentoo.org/875155
+ eautoreconf
+}
+
+src_compile() {
+ append-cppflags -D_REENTRANT
+ emake CC="$(tc-getCC)" CFLAGS="${CFLAGS}" CPPFLAGS="${CPPFLAGS}" all
+}
+
+src_install() {
+ default
+ newinitd "${FILESDIR}"/iplog.rc6 iplog
+}
diff --git a/net-analyzer/ippl/Manifest b/net-analyzer/ippl/Manifest
index 73d9f93cca9d..e07fcd1cefd8 100644
--- a/net-analyzer/ippl/Manifest
+++ b/net-analyzer/ippl/Manifest
@@ -2,9 +2,11 @@ AUX ippl-1.4.14-fix-build-system.patch 1031 BLAKE2B 93a35f8dcd2955e3189b459b3758
AUX ippl-1.4.14-format-warnings.patch 645 BLAKE2B 24d9d12e456fc5686c04ed003dcf7c7b4e3c3c9188fda4c36c14a052740d0286c6c617c36965f06ab212c73c6ac2ef330ab39d2bb8eb3c60802f451b0399db1b SHA512 e3b247d5628883c4bbc5ae24e39bf4ef0910ed15dbcc7a13d586eddbea6ee1dfa5de1c4252c07fa87564da60febbb200f0e78a58cf29547db4b7446eebc73544
AUX ippl-1.4.14-includes.patch 374 BLAKE2B 8f870033fa01978bba0d0e950c74ddc6e06a5d82bdd411aa1b561cdae8f5ff6c901dc0b70db638bc91176038e156a0ecc3fd588f3d8898a77a4722b7b746cee1 SHA512 5e7c8ab27770e3f50d09ee7e1f68246828d1b540a87c50c5c1afb3bbbe646af3b3d71369dfe2e41a1f04c306d88b8ef20f2be80edca8c201f7cb6d8c5539dfc9
AUX ippl-1.4.14-manpage.patch 306 BLAKE2B 46c9901a4f365bceb67610bf1ecc4fb5be0011320af552a7afcaf2ec863de972d523f81436c60a81bcbeada3056f1e246c3ec5bf125c518ab03e637c6f74332e SHA512 4dc5b6ad12875c94a5b86ca380aeabb003734aabfd54b97edba20614b449dab35d8ba748e8faeda8a2bf2608158d4dd5c6e34c82b664ddf4fd12710ab81498ef
+AUX ippl-1.4.14-musl.patch 9098 BLAKE2B 1ebcdf025cfa07f41cd1f375b2572851fb016554f40d3728eaea8b28a640e1d563cd3e1d66622cf9987babf7b5cf17c1a2c839ffbf05bb0c8075a2ef0724785b SHA512 e7937981575548d43e114adb9535f0a3c3f2d1ae503bd46992c53804706053c8b7ce0006eaf491ac2d15554edb80c6d64534f5c6b28bf6a1f0c793f1687ec8d2
AUX ippl-1.4.14-noportresolve.patch 10610 BLAKE2B 94061b2dac8aeb383b149ced13d8a6e4119bf16060326f19f04525a02b423fbf2f6a4c7ad8631e597e744986ec7b27c2032746affa0a2693bcdc90928b26a19b SHA512 591a0aaaac11f80087e2f7a53a18434c065a2d29ba6a09893f2927edbd9b0622925e5bc441657f283fe4689c21bb669bfdfd71faf900d8ff9309e25885adc7e3
AUX ippl-1.4.14-privilege-drop.patch 4289 BLAKE2B 456854f3a9df7d802a5a18ba98a657cb61ddbf52fbeb05a9098c7854dc3f7fe0c6a93a525bfd2d0c02b69092d491effe8099dfefebca08fd9a0c08c8c8ff7bcb SHA512 7b711bd0ac56867a6936035f63b047c1e86fe072f215dcc18eb8dada58d1087964a29b05c1eadef0303d203329a91a053e747c997d78ecd1697788e9f7a15f2f
AUX ippl.rc 573 BLAKE2B c70512acb076fc08e0106bcac078463e7e0d37697c2dee7cc6ebd1cffb726239838d7da4794ce1e70a5b4a9e2169019b7b463c1d3a28778afc03daad8b163673 SHA512 2aadbb7cf33c83addef03e7815dd5d6c6a983ee0b269677d251a3b4550e2c038db4436b03a27024ea5ce12f0ca1eb2b87f33ba267e78f70afb06436119b99396
DIST ippl-1.4.14.tar.gz 54030 BLAKE2B 384747ea50e55e52695606538850958320afe53dbe3c71e42c90302dff0b535d2167d18a40f0b2953f941cda1aa238490bfe7b7fde8f675071668ea5f561af74 SHA512 3d71afc3ec7a0420cc9b269bf67dc008a777464c68d233dfbad4ee7a2dd2b960e114500e42866977e31b9dbeee26bbefea937fef8a09aa41cf87f96361ba0088
EBUILD ippl-1.4.14-r6.ebuild 953 BLAKE2B ff3d6e99cce87edb22968f1242059695dfb5ce75dc8ebef76c481a0b66cb8def6494b29404874e2b6bb6a659a984af67127ab28c09376b67fabb59bc1fc857fb SHA512 c6d89fb61baa8fc0def2dbc6d5a41ea3e4f84b205f733d728d1bdc7450c885cd951d826c363004fec79d24773d72d64653d06cc49369f614ff024436b8d7d76b
+EBUILD ippl-1.4.14-r7.ebuild 1083 BLAKE2B ccd3f55d10a26ab91543df0ee65aa408489cc5f369552808bcde1807f42a8dd794f13ba243fd97ce43e4f9f94c56bb484f338289adef186d8b2d39bf33559949 SHA512 67e99f2fda8c5548997affc966747b174c656aa03c99ee7ae6345adb8e76ff640cf68ff2e68d77833c8f0b53402be5911f7946986a757e7070431645f01a95b5
MISC metadata.xml 277 BLAKE2B 57fc90092c4674e5c4dfe38b0d79c983990fce4e8208b70c2ebb218aebb6d2135537f927115f3a7b7eb8c1ddb596461c17e60acb3e6a11b289796f20f3c80a33 SHA512 5ac67e6beabab60f83ac521249c6d1f021988d522fc86ab12ec98fbaa9d47a50157c10c7b9a39554e66a02b141cdc6dc6669e5e7c9c02c8b36ad404aa790d619
diff --git a/net-analyzer/ippl/files/ippl-1.4.14-musl.patch b/net-analyzer/ippl/files/ippl-1.4.14-musl.patch
new file mode 100644
index 000000000000..44596aac3b4a
--- /dev/null
+++ b/net-analyzer/ippl/files/ippl-1.4.14-musl.patch
@@ -0,0 +1,301 @@
+Add missing includes. For some non-POSIX integer types and open()
+Rename global logging facility so it won't try to shadow musl-provided symbol
+and cause build failures
+udphdr union has two variants - RFC and BSD flavors, glibc uses union,
+musl uses BSD flavor in netinet/udp.h with linux/udp.h for RFC flavor.
+Switched header to linux.
+https://bugs.gentoo.org/716916
+https://bugs.gentoo.org/731184
+--- a/Source/defines.h
++++ b/Source/defines.h
+@@ -62,6 +62,7 @@
+
+ /* Useful types */
+ #ifndef _I386_TYPES_H
++#include <sys/types.h>
+ typedef u_int32_t __u32;
+ typedef u_int16_t __u16;
+ typedef u_int8_t __u8;
+--- a/Source/pidfile.c
++++ b/Source/pidfile.c
+@@ -31,6 +31,7 @@
+ #include <string.h>
+ #include <errno.h>
+ #include <signal.h>
++#include <fcntl.h>
+
+ /* read_pid
+ *
+--- a/Source/configuration.c
++++ b/Source/configuration.c
+@@ -39,11 +39,11 @@
+
+ FILE *open_configuration(char *name) {
+ FILE *configfile;
+- extern struct loginfo log;
++ extern struct loginfo local_log;
+
+ configfile = fopen(name, "r");
+ if (configfile == NULL) {
+- log.log(log.level_or_fd, "Cannot open configuration file %s.\n", name);
++ local_log.log(local_log.level_or_fd, "Cannot open configuration file %s.\n", name);
+ exit(1);
+ }
+ return configfile;
+--- a/Source/icmp.c
++++ b/Source/icmp.c
+@@ -46,7 +46,7 @@
+ int icmp_socket;
+
+ struct loginfo icmp_log;
+-extern struct loginfo log;
++extern struct loginfo local_log;
+ extern unsigned short resolve_protocols;
+
+ /*
+@@ -299,7 +299,7 @@
+ icmp_socket = socket(AF_INET, SOCK_RAW, IPPROTO_ICMP);
+ if (icmp_socket <= 0) {
+ int error = errno;
+- log.log(log.level_or_fd, "FATAL: Unable to open icmp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to open icmp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
+ exit(1);
+ }
+
+@@ -311,7 +311,7 @@
+
+ for(;;) {
+ if (read(icmp_socket, (__u8 *) &pkt, ICMP_CAPTURE_LENGTH) == -1) {
+- log.log(log.level_or_fd, "FATAL: Unable to read icmp raw socket");
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to read icmp raw socket");
+ exit(1);
+ }
+
+--- a/Source/log.c
++++ b/Source/log.c
+@@ -32,7 +32,7 @@
+
+ #include "log.h"
+
+-extern struct loginfo log;
++extern struct loginfo local_log;
+
+ /* Mutex either for stdout or for a file */
+ pthread_mutex_t log_mutex = PTHREAD_MUTEX_INITIALIZER;
+@@ -193,7 +193,7 @@
+
+ *fd = open((const char *) filename, O_WRONLY | O_APPEND | O_CREAT, 0640);
+ if (*fd == 0) {
+- log.log(log.level_or_fd, "Can't open log file %s.", filename);
++ local_log.log(local_log.level_or_fd, "Can't open log file %s.", filename);
+ }
+ }
+
+--- a/Source/main.c
++++ b/Source/main.c
+@@ -54,7 +54,7 @@
+ #endif
+
+ /* Logging mechanism */
+-struct loginfo log;
++struct loginfo local_log;
+
+ /* Do we have to run as a daemon? */
+ int run_as_daemon = TRUE;
+@@ -127,17 +127,17 @@
+
+ account = getpwnam(used_user);
+ if (!account) {
+- log.log(log.level_or_fd, "WARNING: I cannot find the \"%s\" account. Not spawning threads.", used_user);
++ local_log.log(local_log.level_or_fd, "WARNING: I cannot find the \"%s\" account. Not spawning threads.", used_user);
+ log_protocols = NONE;
+ return;
+ }
+
+ if (!strcmp(used_user, "root")) {
+- log.log(log.level_or_fd, "WARNING: Using root account to run threads!");
++ local_log.log(local_log.level_or_fd, "WARNING: Using root account to run threads!");
+ }
+
+ if (log_protocols == NONE) {
+- log.log(log.level_or_fd, "WARNING: Nothing to log.");
++ local_log.log(local_log.level_or_fd, "WARNING: Nothing to log.");
+ return;
+ }
+
+@@ -309,7 +309,7 @@
+
+ /* Check PID */
+ if (check_pid(PID_FILE)) {
+- log.log(log.level_or_fd, "Already running. Exiting...");
++ local_log.log(local_log.level_or_fd, "Already running. Exiting...");
+ exit(1);
+ }
+
+@@ -323,7 +323,7 @@
+
+ /* Write PID file */
+ if (!write_pid(PID_FILE)) {
+- log.log(log.level_or_fd, "Can't write pid.\n");
++ local_log.log(local_log.level_or_fd, "Can't write pid.\n");
+ exit(1);
+ }
+
+@@ -360,7 +360,7 @@
+ (void) remove_pid(PID_FILE);
+ }
+
+- log.log(log.level_or_fd, "IP Protocols Logger: stopped (signal %d).", sig);
++ local_log.log(local_log.level_or_fd, "IP Protocols Logger: stopped (signal %d).", sig);
+
+ exit(0);
+ }
+@@ -372,8 +372,8 @@
+ */
+ void sighup(int sig) {
+ // DEPRECATED - reload_configuration();
+- // log.log(log.level_or_fd, "IP Protocols Logger: reloaded configuration.");
+- log.log(log.level_or_fd, "IP Protocols Logger: reload configuration is unsupported.");
++ // local_log.log(local_log.level_or_fd, "IP Protocols Logger: reloaded configuration.");
++ local_log.log(local_log.level_or_fd, "IP Protocols Logger: reload configuration is unsupported.");
+ die(sig);
+ signal(SIGHUP, sighup);
+ }
+@@ -412,15 +412,15 @@
+ if (configuration_file == NULL)
+ configuration_file = strdup(CONFIGURATION_FILE);
+
+- init_loginfo(&log);
+- log.open(&log.level_or_fd, log.file);
++ init_loginfo(&local_log);
++ local_log.open(&local_log.level_or_fd, local_log.file);
+
+ if (run_as_daemon) {
+ go_background();
+ }
+
+ start_all_threads();
+- log.log(log.level_or_fd, "IP Protocols Logger: started.");
++ local_log.log(local_log.level_or_fd, "IP Protocols Logger: started.");
+
+ for(;;) {
+ sleep(dns_expire);
+--- a/Source/netutils.c
++++ b/Source/netutils.c
+@@ -34,7 +34,7 @@
+ #include "netutils.h"
+ #include "log.h"
+
+-extern struct loginfo log;
++extern struct loginfo local_log;
+
+ /* Mutexes */
+ pthread_mutex_t service_mutex = PTHREAD_MUTEX_INITIALIZER;
+@@ -96,7 +96,7 @@
+ pthread_mutex_unlock(&dns_mutex);
+
+ #ifdef CACHE_DEBUG
+- log.log(log.level_or_fd, "DEBUG cache: cleared %d entries", dbg_freed);
++ local_log.log(local_log.level_or_fd, "DEBUG cache: cleared %d entries", dbg_freed);
+ #endif
+ }
+
+@@ -121,7 +121,7 @@
+
+ #ifdef CACHE_DEBUG
+ if (dbg_calls % DUMP_EVERY == 0)
+- log.log(log.level_or_fd, "DEBUG cache: %d calls - %d misses", dbg_calls, dbg_missed);
++ local_log.log(local_log.level_or_fd, "DEBUG cache: %d calls - %d misses", dbg_calls, dbg_missed);
+
+ dbg_calls++;
+ #endif
+@@ -165,8 +165,8 @@
+ #endif
+ res = perform_lookup(host, in);
+ #ifdef CACHE_DEBUG
+- log.log(log.level_or_fd, "DEBUG cache: result of lookup - %s", host);
+- log.log(log.level_or_fd, "DEBUG cache: replacing (%d; %d; %d; %s)", key, table[key].ip, table[key].dirty, table[key].name);
++ local_log.log(local_log.level_or_fd, "DEBUG cache: result of lookup - %s", host);
++ local_log.log(local_log.level_or_fd, "DEBUG cache: replacing (%d; %d; %d; %s)", key, table[key].ip, table[key].dirty, table[key].name);
+ #endif
+ /* Now host contains the correct value; store it in the table */
+ table[key].ip = in;
+--- a/Source/tcp.c
++++ b/Source/tcp.c
+@@ -51,7 +51,7 @@
+ int tcp_socket;
+
+ struct loginfo tcp_log;
+-extern struct loginfo log;
++extern struct loginfo local_log;
+ extern unsigned short resolve_protocols;
+ extern unsigned short portresolve_protocols;
+
+@@ -262,7 +262,7 @@
+ tcp_socket = socket(AF_INET, SOCK_RAW, IPPROTO_TCP);
+ if (tcp_socket <= 0) {
+ int error = errno;
+- log.log(log.level_or_fd, "FATAL: Unable to open tcp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to open tcp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
+ exit(1);
+ }
+
+@@ -274,7 +274,7 @@
+
+ for(;;) {
+ if (read(tcp_socket, (__u8 *) &pkt, TCP_CAPTURE_LENGTH) == -1) {
+- log.log(log.level_or_fd, "FATAL: Unable to read tcp raw socket");
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to read tcp raw socket");
+ exit(1);
+ }
+
+--- a/Source/ippl.y
++++ b/Source/ippl.y
+@@ -535,7 +535,7 @@
+ */
+
+ void print_error(char *s, int l) {
+- extern struct loginfo log;
++ extern struct loginfo local_log;
+
+- log.log(log.level_or_fd, "CFG: Parse error line %d: %s",l,s);
++ local_log.log(local_log.level_or_fd, "CFG: Parse error line %d: %s",l,s);
+ }
+--- a/Source/udp.c
++++ b/Source/udp.c
+@@ -21,7 +21,7 @@
+ #include <netinet/in.h>
+ #include <arpa/inet.h>
+ #include <netinet/ip.h>
+-#include <netinet/udp.h>
++#include <linux/udp.h>
+ #include <sys/types.h>
+ #include <sys/socket.h>
+ #include <netdb.h>
+@@ -48,7 +48,7 @@
+ extern unsigned short resolve_protocols;
+
+ struct loginfo udp_log;
+-extern struct loginfo log;
++extern struct loginfo local_log;
+
+ /*
+ * Structure of a UDP packet
+@@ -141,7 +141,7 @@
+ udp_socket = socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
+ if (udp_socket <= 0) {
+ int error = errno;
+- log.log(log.level_or_fd, "FATAL: Unable to open udp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to open udp raw socket\nERROR No: %d\nERROR : %s", error, strerror(error));
+ exit(1);
+ }
+
+@@ -153,7 +153,7 @@
+
+ for(;;) {
+ if (read(udp_socket, (__u8 *) &pkt, UDP_CAPTURE_LENGTH) == -1) {
+- log.log(log.level_or_fd, "FATAL: Unable to read udp raw socket");
++ local_log.log(local_log.level_or_fd, "FATAL: Unable to read udp raw socket");
+ exit(1);
+ }
+
diff --git a/net-analyzer/ippl/ippl-1.4.14-r7.ebuild b/net-analyzer/ippl/ippl-1.4.14-r7.ebuild
new file mode 100644
index 000000000000..ec2bb459a1c6
--- /dev/null
+++ b/net-analyzer/ippl/ippl-1.4.14-r7.ebuild
@@ -0,0 +1,53 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+inherit toolchain-funcs autotools
+
+DESCRIPTION="A daemon which logs TCP/UDP/ICMP packets"
+HOMEPAGE="http://pltplp.net/ippl/"
+SRC_URI="http://pltplp.net/ippl/archive/${P}.tar.gz"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~x86"
+
+BDEPEND="
+ app-alternatives/yacc
+ app-alternatives/lex"
+RDEPEND="acct-user/ippl"
+
+PATCHES=(
+ "${FILESDIR}"/${PN}-1.4.14-noportresolve.patch
+ "${FILESDIR}"/${PN}-1.4.14-manpage.patch
+ "${FILESDIR}"/${PN}-1.4.14-privilege-drop.patch
+ "${FILESDIR}"/${PN}-1.4.14-includes.patch
+ "${FILESDIR}"/${PN}-1.4.14-format-warnings.patch
+ # bug #351287
+ "${FILESDIR}"/${PN}-1.4.14-fix-build-system.patch
+ "${FILESDIR}"/${PN}-1.4.14-musl.patch
+)
+
+src_prepare() {
+ default
+ # bug https://bugs.gentoo.org/875665
+ eautoreconf
+}
+
+src_configure() {
+ tc-export CC
+ default
+}
+
+src_install() {
+ dosbin Source/ippl
+
+ insinto /etc
+ doins ippl.conf
+
+ doman Docs/{ippl.8,ippl.conf.5}
+ dodoc BUGS CREDITS HISTORY README TODO
+
+ newinitd "${FILESDIR}"/ippl.rc ippl
+}
diff --git a/net-analyzer/isic/Manifest b/net-analyzer/isic/Manifest
index 13095f09e32a..3e4905615e89 100644
--- a/net-analyzer/isic/Manifest
+++ b/net-analyzer/isic/Manifest
@@ -1,3 +1,5 @@
+AUX isic-0.07-configure.patch 1335 BLAKE2B 207534a2593e93738fe66a4ae219ceeb67f4b2e4544986df526b49a8aeee43e0405d7cadf2231b10752260a454a3ff3321528f237910d65312098525c37e3115 SHA512 2f89330af33796f16fa92f645b4da399e5096ceaaca9423047206f6eca30fa491ce55cfb0c8a3ce24bc1c23b085faf2fec6c8b2aa95c71fc016bab5036d5d320
DIST isic-0.07.tgz 39823 BLAKE2B 1a6a0bdca9b8e3c6acab9879b1165862311c331697db09f2f6facf1bd5b2b2f716bc2b1c8bea69a771553836fc7ead11c826f8cf5c9369f30577afafbae027c8 SHA512 2495ee1c6d552fa6f8f79ab06a886aeef39d247589479e75124a03d5633a75d47e8c9a15e16de3596744a83f74da7afa460cc3dd8653e346e58ac70e04126882
EBUILD isic-0.07-r2.ebuild 758 BLAKE2B 03eba3108190be581c652cf81420eeee7670473d733560e6d8ecfa593392cfb8786fd0f18af444a0b661270037e504e1ef5d6662e869f0af02e01d0233b4a618 SHA512 14b93d2af62738d0a99748a35a06e74db305c62a7178ae15fdff2046725b7d8014d019065e0442b22c1f246992f6c19e268259264952f716a848ef560e576923
+EBUILD isic-0.07-r3.ebuild 629 BLAKE2B c88f5ccc0f9335aad1e2b5f8db22deb431fc051022a42e242b8c3f2871b66bfe44ca1dab857d0018851db01b47344b0c8a07e0912da5800234d24cd13b04c3e2 SHA512 82fe846e36c0656e2c47a01ab358de993f073e516cbf462069d34763e556f637824776338b9f1385e4b5893a174cb67f81edbd55cca39647b69583d166536983
MISC metadata.xml 355 BLAKE2B 3b8f517e5a3552157da3987eed5994e1a0575675f46f20fa2a2e49fec04021cdf555f8046c947984ca8e65b520b9aec770401b39f0d81486f1f7011e34426137 SHA512 868919ca5288f406742333f99c10ef6584e57e4af860b72eb27b16a912be2b18e792eae91e3d172afc78cdf7a9a7720de90bea7f21eb84c29147e7bd6feb83c6
diff --git a/net-analyzer/isic/files/isic-0.07-configure.patch b/net-analyzer/isic/files/isic-0.07-configure.patch
new file mode 100644
index 000000000000..9a080f2a936d
--- /dev/null
+++ b/net-analyzer/isic/files/isic-0.07-configure.patch
@@ -0,0 +1,39 @@
+Make build system respect DESTDIR, fix just the configure
+as a path of least resistance.
+Autoreconf stuffs spaces where they don't belong and produces
+broken configure
+https://bugs.gentoo.org/899938
+https://bugs.gentoo.org/874531
+--- a/configure
++++ b/configure
+@@ -652,7 +652,7 @@
+ #line 653 "configure"
+ #include "confdefs.h"
+
+-main(){return(0);}
++int main(){return(0);}
+ EOF
+ if { (eval echo configure:658: \"$ac_link\") 1>&5; (eval $ac_link) 2>&5; } && test -s conftest${ac_exeext}; then
+ ac_cv_prog_cc_works=yes
+@@ -1092,6 +1092,7 @@
+ #line 1119 "configure"
+ #include "confdefs.h"
+ #include <ctype.h>
++#include <stdlib.h>
+ #define ISLOWER(c) ('a' <= (c) && (c) <= 'z')
+ #define TOUPPER(c) (ISLOWER(c) ? 'A' + ((c) - 'a') : (c))
+ #define XOR(e, f) (((e) && !(f)) || (!(e) && (f)))
+--- a/Makefile.in
++++ b/Makefile.in
+@@ -63,7 +63,7 @@
+ tar -czvf isic-$(VERSION).tgz ./isic-$(VERSION)/* )
+
+ install: $(BINS) $(MAN)
+- $(INSTALL) -m 0755 -d $(PREFIX)/bin
+- $(INSTALL) -m 0755 -c $(BINS) $(PREFIX)/bin
+- $(INSTALL) -m 0755 -d $(PREFIX)/man/man1
+- ${INSTALL} -m 0755 -c $(MAN) $(PREFIX)/man/man1
++ $(INSTALL) -m 0755 -d $(DESTDIR)/$(PREFIX)/bin
++ $(INSTALL) -m 0755 -c $(BINS) $(DESTDIR)/$(PREFIX)/bin
++ $(INSTALL) -m 0755 -d $(DESTDIR)/$(PREFIX)/share/man/man1
++ ${INSTALL} -m 0755 -c $(MAN) $(DESTDIR)/$(PREFIX)/share/man/man1
diff --git a/net-analyzer/isic/isic-0.07-r3.ebuild b/net-analyzer/isic/isic-0.07-r3.ebuild
new file mode 100644
index 000000000000..65fb0951e17a
--- /dev/null
+++ b/net-analyzer/isic/isic-0.07-r3.ebuild
@@ -0,0 +1,35 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+inherit toolchain-funcs
+
+DESCRIPTION="IP Stack Integrity Checker"
+HOMEPAGE="https://isic.sourceforge.net/"
+SRC_URI="https://downloads.sourceforge.net/isic/${P}.tgz"
+
+LICENSE="BSD"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~x86"
+
+DEPEND="net-libs/libnet:1.1"
+RDEPEND="${DEPEND}"
+
+PATCHES=(
+ "${FILESDIR}/${P}-configure.patch"
+)
+
+src_prepare() {
+ default
+ # Add two missing includes
+ echo "#include <netinet/udp.h>" >> isic.h || die
+ echo "#include <netinet/tcp.h>" >> isic.h || die
+
+}
+
+src_configure() {
+ tc-export CC
+
+ econf
+}
diff --git a/net-analyzer/yersinia/Manifest b/net-analyzer/yersinia/Manifest
index 1a38819f9ba1..6840bacf9f30 100644
--- a/net-analyzer/yersinia/Manifest
+++ b/net-analyzer/yersinia/Manifest
@@ -1,5 +1,6 @@
AUX yersinia-0.7.1-no-ncurses.patch 330 BLAKE2B 86c2cb84542012c6424fdcae398e07769647bcdda300d6efdbb263451c8765e23cd272f76e4e0e84751272df3de46a77b32fd2321a0ab3bc70cc8199b457adf6 SHA512 c0a0ef6456727eaa0ae9ea50667e04a72afb01c5b75d13965836657e4d1946df550840afd091ec58e8875b1a551df5966feb98b655183cec6dadaf4f5de23e4f
AUX yersinia-0.7.3-tinfo.patch 563 BLAKE2B ef2b554f82037dde165373fd6db71503ee124062cef4689062e7e1799f5ae26afd5758468f3c860690046aa4cb6e12dafd7ed3189a765a52565b5530a322d11a SHA512 a0edb5a47281bc66f0296914597fc4a9901f0e50640b43b6b31a30ddc4b6a5202220207039c3936f32769161f2c61d78afc5a3d7725d04ea41afd301312efa24
+AUX yersinia-0.8.2-C23.patch 348 BLAKE2B 4c9198b087e61a59c85a0a5b98e9d2ad78d2f75c7376a768f5af348ffda2a0b6889ab1997d9dfb2cb29cc2d59a71c8e3bc92cff5c8338bc9fb570c31d6e543da SHA512 03a1ff9ba632d033c59766649539b45fa83b3780c57e8bdddc312e3cd0523d70aa01aff989f8253dc3cc3cd2c6096fc4cb5c4831c6367ebe42457d82263d4889
DIST yersinia-0.8.2_p20221119.tar.gz 268158 BLAKE2B 2598d6809c7830c7824c9141ef58a617a8d472c0d7b3591b81e6209cecb915649a82d780108c45c488619775effca266eca4a9a0e60d1174211a5af05a05997d SHA512 e54025d782374d836148a813c0a8eb8d822c82f87d6e92c10b254831b95eef073d36ddb1ef94a7e7db2cd962fd52589d41fc6d21ca63422ca57c5ada2045de72
-EBUILD yersinia-0.8.2_p20221119.ebuild 1272 BLAKE2B 35d5af7a6f5ecdf83fc6b19f0163166368a51c51aa363f17a91d56df65e9d4eb4568d42518bd05e317a9d950ea2cc1221f5d5056ba6c005a4114efa9314375b1 SHA512 c971148a0dd9a8906b87b5515eb583612ea3a499c1b470505140e5a377ee286b02cb20403772cc8ff1cf6b04e54f45733de94d11443f0ac2a986e7e99f3e8446
+EBUILD yersinia-0.8.2_p20221119.ebuild 1309 BLAKE2B 131759ff907ebd2c0b92cb977a60ea78bed3df2c1834075f0bc847c1e300e20527ab13a059aeb75eed228609ac3df03ce5b9c5492e7a4fefe9eebe9a9d395699 SHA512 c94199ef4aa20ba7f7aca4d609076cbbcbb44f6cdd5033268d80e7c09e3340de86e37566c49cbe4046e054f999a4fef7cbf9ade966d0efd5e252c1e07478a4c6
MISC metadata.xml 602 BLAKE2B 17ecc301b7c25dfbe55ca622e293154a6802050de8ea0674697f36418af73c37258e76d191449686d0475368ec3532e66102e85d93ba7c0fb7eb77280ace59a7 SHA512 9fcebd2cd58ae500fc4211de33a31b01a4cfaf67555b6ae1c5b6aa64ba68c53cfe22bc5b93f603919b1cd0653b1885b62cddca15dd6c6597dbea9f363da043fa
diff --git a/net-analyzer/yersinia/files/yersinia-0.8.2-C23.patch b/net-analyzer/yersinia/files/yersinia-0.8.2-C23.patch
new file mode 100644
index 000000000000..6cbfde50ed11
--- /dev/null
+++ b/net-analyzer/yersinia/files/yersinia-0.8.2-C23.patch
@@ -0,0 +1,12 @@
+diff -ru a/src/yersinia.c b/src/yersinia.c
+--- a/src/yersinia.c 2025-01-06 20:10:12.501482780 +0400
++++ b/src/yersinia.c 2025-01-06 20:11:08.635172681 +0400
+@@ -927,7 +927,7 @@
+ * POSIX functions for signals
+ */
+ int
+-posix_signal( int signo, void (*handler)() )
++posix_signal( int signo, void (*handler)(int) )
+ {
+ struct sigaction act;
+
diff --git a/net-analyzer/yersinia/yersinia-0.8.2_p20221119.ebuild b/net-analyzer/yersinia/yersinia-0.8.2_p20221119.ebuild
index 3dd4b4f768e5..45575b519ea0 100644
--- a/net-analyzer/yersinia/yersinia-0.8.2_p20221119.ebuild
+++ b/net-analyzer/yersinia/yersinia-0.8.2_p20221119.ebuild
@@ -1,4 +1,4 @@
-# Copyright 1999-2024 Gentoo Authors
+# Copyright 1999-2025 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
@@ -36,6 +36,7 @@ DOCS=( AUTHORS ChangeLog FAQ README THANKS TODO )
PATCHES=(
"${FILESDIR}"/${PN}-0.7.1-no-ncurses.patch
"${FILESDIR}"/${PN}-0.7.3-tinfo.patch
+ "${FILESDIR}"/${PN}-0.8.2-C23.patch
)
src_prepare() {