diff options
author | V3n3RiX <venerix@koprulu.sector> | 2022-02-02 01:39:05 +0000 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2022-02-02 01:39:05 +0000 |
commit | fcc5224904648a8e6eb528d7603154160a20022f (patch) | |
tree | 3bfce096b38a9cea8eed13fc70c1526c456e9abd /app-forensics | |
parent | 2fd57282f0262ca084e05b0f2c63fbada395d02b (diff) |
gentoo resync : 02.02.2022
Diffstat (limited to 'app-forensics')
-rw-r--r-- | app-forensics/Manifest.gz | bin | 4540 -> 4700 bytes | |||
-rw-r--r-- | app-forensics/aflplusplus/Manifest | 4 | ||||
-rw-r--r-- | app-forensics/aflplusplus/aflplusplus-4.00c.ebuild | 93 | ||||
-rw-r--r-- | app-forensics/aflplusplus/files/aflplusplus-4.00c-no-ignore-errors-makefile.patch | 121 | ||||
-rw-r--r-- | app-forensics/aflplusplus/files/aflplusplus-4.00c-respect-flags.patch | 122 | ||||
-rw-r--r-- | app-forensics/honggfuzz/Manifest | 2 | ||||
-rw-r--r-- | app-forensics/honggfuzz/honggfuzz-2.5.ebuild | 56 | ||||
-rw-r--r-- | app-forensics/lynis/Manifest | 6 | ||||
-rw-r--r-- | app-forensics/lynis/lynis-3.0.7-r1.ebuild (renamed from app-forensics/lynis/lynis-3.0.6.ebuild) | 31 | ||||
-rw-r--r-- | app-forensics/lynis/metadata.xml | 3 | ||||
-rw-r--r-- | app-forensics/yara/Manifest | 5 | ||||
-rw-r--r-- | app-forensics/yara/metadata.xml | 30 | ||||
-rw-r--r-- | app-forensics/yara/yara-4.1.3.ebuild | 52 | ||||
-rw-r--r-- | app-forensics/yara/yara-4.2.0_rc1.ebuild | 55 |
14 files changed, 571 insertions, 9 deletions
diff --git a/app-forensics/Manifest.gz b/app-forensics/Manifest.gz Binary files differindex 23d4bd5e5209..65d2e344c153 100644 --- a/app-forensics/Manifest.gz +++ b/app-forensics/Manifest.gz diff --git a/app-forensics/aflplusplus/Manifest b/app-forensics/aflplusplus/Manifest index 6794bf1263b9..e5895253ac87 100644 --- a/app-forensics/aflplusplus/Manifest +++ b/app-forensics/aflplusplus/Manifest @@ -1,6 +1,10 @@ AUX aflplusplus-3.0c-LDFLAGS.patch 445 BLAKE2B cfb1282dcba575ed96f355bf6695896f69625b1ace2c6b5d02a0c507fc2a09d4ee6cba97d27f7ac08516a525e5a09c5d3cfab75f3c3f4421357c8aa2cc5aee8c SHA512 d3f43709debf92a0a51077c33c85cf16d9e74324999267c66765f4eeda46d0091ee5c08a6e94bdb635ee6f970445c06e0ac1fdceba561c9345670ef7e365dfb0 AUX aflplusplus-3.13c-CFLAGS.patch 5732 BLAKE2B 95e4a581fa9e0e9cf8c321968c8f4774c5012f4d5fe0f1d940b0bab3aa15803758c343af0969a5f7fd05b3454845ff306325cd29821f04d630c4bb42f4bfa2c9 SHA512 3e35b5068d64429a435f58e03fc557056ee9b0f73d4c407e34abef083b7c4f47b072f84d1e2abe99bf49449a5f6f46217b158893b84d635bed025979edb8c5e0 AUX aflplusplus-3.14c-no-ignore-errors-makefile.patch 3047 BLAKE2B 2eaf28e5a758f55294360280b97a06c7e600606c7f22cd3619265ca534ae2146f1d5bae3e4cb30bf9aac89e662bba6491db726693ac644e5070236fd259a0ca8 SHA512 e074b068745e1989153448de1610de5975dd6d738b233056eb30d884208c0b8c61ce82020c3c94b0c95390f31616334cf81e4569af3a16767c1dbffafe1cc75a +AUX aflplusplus-4.00c-no-ignore-errors-makefile.patch 4990 BLAKE2B e3e4b734e4e2b6d6e6fa384ec3b92003b1ee2a1313ec76eb5b6c0e6a6552dc8d08bb2639add2a11c2203fc9b731deff18015f497531beaa27ef59a6dd8e83be2 SHA512 ccf75c622c9a0227b3bc916f182bb1ad5fa6453622773f3a63a9d697c2e11a8597cc1758b48a19546101c1ea9bd7dc5ec91e75e960ddb3aef580b0447cd5675c +AUX aflplusplus-4.00c-respect-flags.patch 7004 BLAKE2B a13695116d491e9dc0a05a3d2f3fa14fa9126350ea8debbd5e3664cac45c91969f34d1de6062f62adbbaf97c0fb485f74d6c367ff37464fe34f7b66db9663996 SHA512 2eb8e116fa690e08eb91ced2b760e87d4c623b020ac451409ca68501b32c9aee7773e237c0bdfeef09086b851e95a3b3fb216e7ca58681e64fc12a958994f7d1 DIST aflplusplus-3.14c.tar.gz 2162934 BLAKE2B 0830b320cea65b9bdd048a08a388c7145164f6b7f4dc140a2f4268a3aa22dc608a771169c830e2196e7a0d543e6f3da49f39736f3b2514c559b986ce929d43c4 SHA512 318607cff40b5f2fc94938747e2ac6b8f400767138eb39edf4daf320afbdab417d0d97a80a1c9db8bb557ad4b7b62f887ae6e692c376f5d5673a493bd23bb811 +DIST aflplusplus-4.00c.tar.gz 2805041 BLAKE2B c1ce15aa9860fc02a7d6f608cae9dd8987b72253b465ea734c721d1b6927e482c31b907aeafe82c00618465227e2e140bfc595151ea5d73037638c3ee630872c SHA512 23a7a4260e581f7c212393e1e14704464bbbc3ff5465b3472db31c6c7f2cd25a9ecc5ad81fad8958c775fcd01b22269085e6c69419a07fbbdb9ec317a3e39beb EBUILD aflplusplus-3.14c-r2.ebuild 2218 BLAKE2B bc586c6e3154fe8df05f5867c791a43316a4b1d83a9c8291a6b7d8a103fca3f5c567fc309acac75a5073e2d1bed3fa081593ab59d292e51f337a4aaedab8e620 SHA512 c20e73459494b7b55e143a65eba0d86d68d378733d4744bafc8a22ac961af571f44f3945683a13ca3a0097487dda053b44935059f57a1eb7df5d0d13de3b1927 +EBUILD aflplusplus-4.00c.ebuild 2101 BLAKE2B 0318d5a70de1e9de7107cbc6e3be28985d75b819d32d80b0b51b4e40f7728f504cf6a57773a22c917ded9c12bd2c3d5134d7dc21894d409589484463aa08c785 SHA512 4e65136ab36ef687f5c2352d6395db9b5e56a87dec8300f458151f14a9ffd49a6098850ccb147ce32958c5dabf267b37916b232b1ee15e9ec61ca8903f8c0f75 MISC metadata.xml 328 BLAKE2B c9ad582740e9c2ad03a30fe0eaafb8ee19f0d9bc2e98cc7bcd14385a3407f84301479d324b92d3aecafdc1e5cfef1d2cfc8a15c2ecb5d8f2fa348d82de920128 SHA512 e56ce158f6764926c2ed4dc486f017ce75fa272ac8e6ad16e4a816f8c734d7313e3dc9cb007bab07efe73e59cab185312a02d6178296bfe25002719ce4975d14 diff --git a/app-forensics/aflplusplus/aflplusplus-4.00c.ebuild b/app-forensics/aflplusplus/aflplusplus-4.00c.ebuild new file mode 100644 index 000000000000..8f04bfb0de1b --- /dev/null +++ b/app-forensics/aflplusplus/aflplusplus-4.00c.ebuild @@ -0,0 +1,93 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=7 + +PYTHON_COMPAT=( python3_{8,9,10} ) +LLVM_MAX_SLOT=13 +inherit toolchain-funcs llvm optfeature python-single-r1 + +DESCRIPTION="A fork of AFL, the popular compile-time instrumentation fuzzer" +HOMEPAGE="https://github.com/AFLplusplus/AFLplusplus" +SRC_URI="https://github.com/AFLplusplus/AFLplusplus/archive/${PV}.tar.gz -> ${P}.tar.gz" +S="${WORKDIR}/AFLplusplus-${PV}" + +LICENSE="Apache-2.0" +SLOT="0" +KEYWORDS="~amd64 ~arm64" +IUSE="test" + +REQUIRED_USE="${PYTHON_REQUIRED_USE}" + +# Tests involve heavy use of LD_PRELOAD in some cases +# This isn't compatible with sandbox +RESTRICT="test" + +# It turns out we need Clang too +RDEPEND=" + ${PYTHON_DEPS} + >=sys-devel/llvm-10:= + || ( + sys-devel/clang:10 + sys-devel/clang:11 + sys-devel/clang:12 + sys-devel/clang:13 + ) + !app-forensics/afl +" +DEPEND=" + ${RDEPEND} + test? ( dev-util/cmocka ) +" + +QA_PREBUILT="/usr/share/afl/testcases/others/elf/small_exec.elf" + +PATCHES=( + "${FILESDIR}"/${PN}-4.00c-respect-flags.patch + "${FILESDIR}"/${PN}-4.00c-no-ignore-errors-makefile.patch +) + +llvm_check_deps() { + has_version -b "sys-devel/clang:${LLVM_SLOT}" && \ + has_version -b "sys-devel/llvm:${LLVM_SLOT}" +} + +pkg_setup() { + llvm_pkg_setup + python-single-r1_pkg_setup +} + +src_compile() { + emake \ + CC="$(tc-getCC)" \ + CXX="$(tc-getCXX)" \ + CFLAGS_FLTO="" \ + PREFIX="${EPREFIX}/usr" \ + HELPER_PATH="${EPREFIX}/usr/$(get_libdir)/afl" \ + DOC_PATH="${EPREFIX}/usr/share/doc/${PF}" \ + MAN_PATH="${EPREFIX}/usr/share/man/man8" +} + +src_test() { + emake \ + CC="$(tc-getCC)" \ + CXX="$(tc-getCXX)" +} + +src_install() { + emake \ + CC="$(tc-getCC)" \ + CXX="$(tc-getCXX)" \ + DESTDIR="${D}" \ + PREFIX="${EPREFIX}/usr" \ + HELPER_PATH="${EPREFIX}/usr/$(get_libdir)/afl" \ + DOC_PATH="${EPREFIX}/usr/share/doc/${PF}" \ + MAN_PATH="${EPREFIX}/usr/share/man/man8" \ + install +} + +pkg_postinst() { + # TODO: Any others? + optfeature "fuzzing with AFL_USE_ASAN" sys-libs/compiler-rt-sanitizers[asan] + optfeature "fuzzing with AFL_USE_MSAN" sys-libs/compiler-rt-sanitizers[msan] +} diff --git a/app-forensics/aflplusplus/files/aflplusplus-4.00c-no-ignore-errors-makefile.patch b/app-forensics/aflplusplus/files/aflplusplus-4.00c-no-ignore-errors-makefile.patch new file mode 100644 index 000000000000..50d9268ac9bb --- /dev/null +++ b/app-forensics/aflplusplus/files/aflplusplus-4.00c-no-ignore-errors-makefile.patch @@ -0,0 +1,121 @@ +https://bugs.gentoo.org/800941 + +--- a/GNUmakefile ++++ b/GNUmakefile +@@ -310,13 +310,13 @@ all: test_x86 test_shm test_python ready $(PROGS) afl-as llvm gcc_plugin test_bu + + .PHONY: llvm + llvm: +- -$(MAKE) -j4 -f GNUmakefile.llvm ++ $(MAKE) -j4 -f GNUmakefile.llvm + @test -e afl-cc || { echo "[-] Compiling afl-cc failed. You seem not to have a working compiler." ; exit 1; } + + .PHONY: gcc_plugin + gcc_plugin: + ifneq "$(SYS)" "Darwin" +- -$(MAKE) -f GNUmakefile.gcc_plugin ++ $(MAKE) -f GNUmakefile.gcc_plugin + endif + + .PHONY: man +@@ -565,19 +565,19 @@ all_done: test_build + .PHONY: clean + clean: + rm -rf $(PROGS) afl-fuzz-document afl-as as afl-g++ afl-clang afl-clang++ *.o src/*.o *~ a.out core core.[1-9][0-9]* *.stackdump .test .test1 .test2 test-instr .test-instr0 .test-instr1 afl-cs-proxy afl-qemu-trace afl-gcc-fast afl-g++-fast ld *.so *.8 test/unittests/*.o test/unittests/unit_maybe_alloc test/unittests/preallocable .afl-* afl-gcc afl-g++ afl-clang afl-clang++ test/unittests/unit_hash test/unittests/unit_rand *.dSYM +- -$(MAKE) -f GNUmakefile.llvm clean +- -$(MAKE) -f GNUmakefile.gcc_plugin clean +- -$(MAKE) -C utils/libdislocator clean +- -$(MAKE) -C utils/libtokencap clean ++ $(MAKE) -f GNUmakefile.llvm clean ++ $(MAKE) -f GNUmakefile.gcc_plugin clean ++ $(MAKE) -C utils/libdislocator clean ++ $(MAKE) -C utils/libtokencap clean + $(MAKE) -C utils/aflpp_driver clean +- -$(MAKE) -C utils/afl_network_proxy clean +- -$(MAKE) -C utils/socket_fuzzing clean +- -$(MAKE) -C utils/argv_fuzzing clean +- -$(MAKE) -C utils/plot_ui clean +- -$(MAKE) -C qemu_mode/unsigaction clean +- -$(MAKE) -C qemu_mode/libcompcov clean +- -$(MAKE) -C qemu_mode/libqasan clean +- -$(MAKE) -C frida_mode clean ++ $(MAKE) -C utils/afl_network_proxy clean ++ $(MAKE) -C utils/socket_fuzzing clean ++ $(MAKE) -C utils/argv_fuzzing clean ++ $(MAKE) -C utils/plot_ui clean ++ $(MAKE) -C qemu_mode/unsigaction clean ++ $(MAKE) -C qemu_mode/libcompcov clean ++ $(MAKE) -C qemu_mode/libqasan clean ++ $(MAKE) -C frida_mode clean + rm -rf nyx_mode/packer/linux_initramfs/init.cpio.gz nyx_mode/libnyx/libnyx/target/release/* nyx_mode/QEMU-Nyx/x86_64-softmmu/qemu-system-x86_64 + ifeq "$(IN_REPO)" "1" + -test -e coresight_mode/coresight-trace/Makefile && $(MAKE) -C coresight_mode/coresight-trace clean || true +@@ -607,20 +607,20 @@ endif + + .PHONY: distrib + distrib: all +- -$(MAKE) -j4 -f GNUmakefile.llvm ++ $(MAKE) -j4 -f GNUmakefile.llvm + ifneq "$(SYS)" "Darwin" +- -$(MAKE) -f GNUmakefile.gcc_plugin ++ $(MAKE) -f GNUmakefile.gcc_plugin + endif +- -$(MAKE) -C utils/libdislocator +- -$(MAKE) -C utils/libtokencap +- -$(MAKE) -C utils/afl_network_proxy +- -$(MAKE) -C utils/socket_fuzzing +- -$(MAKE) -C utils/argv_fuzzing ++ $(MAKE) -C utils/libdislocator ++ $(MAKE) -C utils/libtokencap ++ $(MAKE) -C utils/afl_network_proxy ++ $(MAKE) -C utils/socket_fuzzing ++ $(MAKE) -C utils/argv_fuzzing + # -$(MAKE) -C utils/plot_ui +- -$(MAKE) -C frida_mode ++ $(MAKE) -C frida_mode + ifneq "$(SYS)" "Darwin" + ifeq "$(ARCH)" "aarch64" +- -$(MAKE) -C coresight_mode ++ $(MAKE) -C coresight_mode + endif + ifeq "$(SYS)" "Linux" + -cd nyx_mode && ./build_nyx_support.sh +@@ -651,12 +651,12 @@ endif + + .PHONY: source-only + source-only: all +- -$(MAKE) -j4 -f GNUmakefile.llvm ++ $(MAKE) -j4 -f GNUmakefile.llvm + ifneq "$(SYS)" "Darwin" +- -$(MAKE) -f GNUmakefile.gcc_plugin ++ $(MAKE) -f GNUmakefile.gcc_plugin + endif +- -$(MAKE) -C utils/libdislocator +- -$(MAKE) -C utils/libtokencap ++ $(MAKE) -C utils/libdislocator ++ $(MAKE) -C utils/libtokencap + # -$(MAKE) -C utils/plot_ui + ifeq "$(SYS)" "Linux" + -cd nyx_mode && ./build_nyx_support.sh +@@ -702,9 +702,9 @@ install: all $(MANPAGES) + @if [ -f utils/afl_network_proxy/afl-network-server ]; then $(MAKE) -C utils/afl_network_proxy install; fi + @if [ -f utils/aflpp_driver/libAFLDriver.a ]; then set -e; install -m 644 utils/aflpp_driver/libAFLDriver.a $${DESTDIR}$(HELPER_PATH); fi + @if [ -f utils/aflpp_driver/libAFLQemuDriver.a ]; then set -e; install -m 644 utils/aflpp_driver/libAFLQemuDriver.a $${DESTDIR}$(HELPER_PATH); fi +- -$(MAKE) -f GNUmakefile.llvm install ++ $(MAKE) -f GNUmakefile.llvm install + ifneq "$(SYS)" "Darwin" +- -$(MAKE) -f GNUmakefile.gcc_plugin install ++ $(MAKE) -f GNUmakefile.gcc_plugin install + endif + ln -sf afl-cc $${DESTDIR}$(BIN_PATH)/afl-gcc + ln -sf afl-cc $${DESTDIR}$(BIN_PATH)/afl-g++ +--- a/GNUmakefile.llvm ++++ b/GNUmakefile.llvm +@@ -457,6 +457,7 @@ document: + test_build: $(PROGS) + @echo "[*] Testing the CC wrapper and instrumentation output..." + unset AFL_USE_ASAN AFL_USE_MSAN AFL_INST_RATIO; ASAN_OPTIONS=detect_leaks=0 AFL_QUIET=1 AFL_PATH=. AFL_LLVM_LAF_ALL=1 ./afl-cc $(CFLAGS) $(CPPFLAGS) ./test-instr.c -o test-instr $(LDFLAGS) ++ @test -e test-instr || { echo "[-] Testing CC wrapper failed. You seem not to have a working compiler." ; exit 1; } + ASAN_OPTIONS=detect_leaks=0 ./afl-showmap -m none -q -o .test-instr0 ./test-instr < /dev/null + echo 1 | ASAN_OPTIONS=detect_leaks=0 ./afl-showmap -m none -q -o .test-instr1 ./test-instr + @rm -f test-instr diff --git a/app-forensics/aflplusplus/files/aflplusplus-4.00c-respect-flags.patch b/app-forensics/aflplusplus/files/aflplusplus-4.00c-respect-flags.patch new file mode 100644 index 000000000000..47ccbe008c89 --- /dev/null +++ b/app-forensics/aflplusplus/files/aflplusplus-4.00c-respect-flags.patch @@ -0,0 +1,122 @@ +--- a/GNUmakefile ++++ b/GNUmakefile +@@ -420,7 +420,7 @@ afl-as: src/afl-as.c include/afl-as.h $(COMM_HDR) | test_x86 + @ln -sf afl-as as + + src/afl-performance.o : $(COMM_HDR) src/afl-performance.c include/hash.h +- $(CC) $(CFLAGS) -Iinclude $(SPECIAL_PERFORMANCE) -O3 -fno-unroll-loops -c src/afl-performance.c -o src/afl-performance.o ++ $(CC) $(CFLAGS) -Iinclude $(SPECIAL_PERFORMANCE) -fno-unroll-loops -c src/afl-performance.c -o src/afl-performance.o + + src/afl-common.o : $(COMM_HDR) src/afl-common.c include/common.h + $(CC) $(CFLAGS) $(CFLAGS_FLTO) -c src/afl-common.c -o src/afl-common.o +--- a/GNUmakefile.gcc_plugin ++++ b/GNUmakefile.gcc_plugin +@@ -131,18 +131,18 @@ afl-common.o: ./src/afl-common.c + $(CC) $(CFLAGS) $(CPPFLAGS) -c $< -o $@ $(LDFLAGS) + + ./afl-compiler-rt.o: instrumentation/afl-compiler-rt.o.c +- $(CC) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -fPIC -c $< -o $@ ++ $(CC) $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -fPIC -c $< -o $@ + + ./afl-compiler-rt-32.o: instrumentation/afl-compiler-rt.o.c + @printf "[*] Building 32-bit variant of the runtime (-m32)... " +- @$(CC) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -m32 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-32.o afl-llvm-rt-32.o; else echo "failed (that's fine)"; fi ++ @$(CC) $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -m32 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-32.o afl-llvm-rt-32.o; else echo "failed (that's fine)"; fi + + ./afl-compiler-rt-64.o: instrumentation/afl-compiler-rt.o.c + @printf "[*] Building 64-bit variant of the runtime (-m64)... " +- @$(CC) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -m64 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-64.o afl-llvm-rt-64.o; else echo "failed (that's fine)"; fi ++ @$(CC) $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -m64 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-64.o afl-llvm-rt-64.o; else echo "failed (that's fine)"; fi + + ./afl-gcc-pass.so: instrumentation/afl-gcc-pass.so.cc | test_deps +- $(CXX) $(CXXEFLAGS) $(PLUGIN_FLAGS) -shared $< -o $@ ++ $(CXX) $(CXXEFLAGS) $(PLUGIN_FLAGS) -shared $< -o $@ $(LDFLAGS) + ln -sf afl-cc afl-gcc-fast + ln -sf afl-cc afl-g++-fast + ln -sf afl-cc.8 afl-gcc-fast.8 +--- a/GNUmakefile.llvm ++++ b/GNUmakefile.llvm +@@ -438,20 +438,20 @@ afl-llvm-dict2file.so: instrumentation/afl-llvm-dict2file.so.cc instrumentation/ + + .PHONY: document + document: +- $(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -O3 -Wno-unused-result -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt.o +- @$(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -O3 -Wno-unused-result -m32 -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt-32.o 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; else echo "failed (that's fine)"; fi +- @$(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -O3 -Wno-unused-result -m64 -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt-64.o 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; else echo "failed (that's fine)"; fi ++ $(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -Wno-unused-result -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt.o ++ @$(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -Wno-unused-result -m32 -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt-32.o 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; else echo "failed (that's fine)"; fi ++ @$(CLANG_BIN) -D_AFL_DOCUMENT_MUTATIONS $(CFLAGS) $(CFLAGS_SAFE) $(CPPFLAGS) $(CLANG_CFL) -Wno-unused-result -m64 -fPIC -c instrumentation/afl-compiler-rt.o.c -o ./afl-compiler-rt-64.o 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; else echo "failed (that's fine)"; fi + + ./afl-compiler-rt.o: instrumentation/afl-compiler-rt.o.c +- $(CC) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -fPIC -c $< -o $@ ++ $(CC) $(CFLAGS) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -fPIC -c $< -o $@ + + ./afl-compiler-rt-32.o: instrumentation/afl-compiler-rt.o.c + @printf "[*] Building 32-bit variant of the runtime (-m32)... " +- @$(CC) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -m32 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-32.o afl-llvm-rt-32.o; else echo "failed (that's fine)"; fi ++ @$(CC) $(CFLAGS) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -m32 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-32.o afl-llvm-rt-32.o; else echo "failed (that's fine)"; fi + + ./afl-compiler-rt-64.o: instrumentation/afl-compiler-rt.o.c + @printf "[*] Building 64-bit variant of the runtime (-m64)... " +- @$(CC) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -O3 -Wno-unused-result -m64 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-64.o afl-llvm-rt-64.o; else echo "failed (that's fine)"; fi ++ @$(CC) $(CFLAGS) $(CLANG_CFL) $(CFLAGS_SAFE) $(CPPFLAGS) -Wno-unused-result -m64 -fPIC -c $< -o $@ 2>/dev/null; if [ "$$?" = "0" ]; then echo "success!"; ln -sf afl-compiler-rt-64.o afl-llvm-rt-64.o; else echo "failed (that's fine)"; fi + + .PHONY: test_build + test_build: $(PROGS) +--- a/custom_mutators/honggfuzz/Makefile ++++ b/custom_mutators/honggfuzz/Makefile +@@ -1,5 +1,6 @@ + +-CFLAGS = -O3 -funroll-loops -fPIC -Wl,-Bsymbolic ++CFLAGS ?= -O3 ++CFLAGS += -funroll-loops -fPIC -Wl,-Bsymbolic + + all: honggfuzz-mutator.so + +--- a/custom_mutators/libfuzzer/Makefile ++++ b/custom_mutators/libfuzzer/Makefile +@@ -1,5 +1,6 @@ + +-CFLAGS = -g -O3 -funroll-loops -fPIC -fpermissive -std=c++11 ++CFLAGS ?= -g -O3 ++CFLAGS += -funroll-loops -fpermissive -std=c++11 -fPIC + #CFLAGS = -g -O0 -fPIC -fpermissive -std=c++11 + CXX ?= clang++ + +--- a/frida_mode/GNUmakefile ++++ b/frida_mode/GNUmakefile +@@ -17,7 +17,6 @@ CFLAGS+=-fPIC \ + -D_GNU_SOURCE \ + -D_FORTIFY_SOURCE=2 \ + -g \ +- -O3 \ + -funroll-loops \ + -ffunction-sections \ + +--- a/frida_mode/test/png/persistent/hook/GNUmakefile ++++ b/frida_mode/test/png/persistent/hook/GNUmakefile +@@ -5,11 +5,9 @@ BUILD_DIR:=$(PWD)build/ + AFLPP_FRIDA_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/frida_hook.so + AFLPP_QEMU_DRIVER_HOOK_OBJ=$(ROOT)frida_mode/build/qemu_hook.so + +-CFLAGS+=-O3 \ +- -funroll-loops \ ++CFLAGS+= -funroll-loops \ + -g \ +- -fPIC \ +- -funroll-loops \ ++ -fPIC + + LDFLAGS+=-shared \ + +--- a/utils/aflpp_driver/GNUmakefile ++++ b/utils/aflpp_driver/GNUmakefile +@@ -7,7 +7,7 @@ ifneq "" "$(LLVM_BINDIR)" + LLVM_BINDIR := $(LLVM_BINDIR)/ + endif + +-CFLAGS := -O3 -funroll-loops -g -fPIC ++CFLAGS ?= -O3 -funroll-loops -g -fPIC + + all: libAFLDriver.a libAFLQemuDriver.a aflpp_qemu_driver_hook.so + diff --git a/app-forensics/honggfuzz/Manifest b/app-forensics/honggfuzz/Manifest index c489114491d5..21cf6c482288 100644 --- a/app-forensics/honggfuzz/Manifest +++ b/app-forensics/honggfuzz/Manifest @@ -1,5 +1,7 @@ AUX honggfuzz-2.0-no-werror.patch 518 BLAKE2B aaf123687ea5f7fd584d1fd5e57f2f6ac50a8d80c3a1555d8b01d42df91a106848ec1d73007e6b67127e767770d91effa5e95dd9016f47fecac0e465e74cfe61 SHA512 7775f683cd5b22d91d3cf16cb0f8e7df50f5159a3f16ef42dc6125c961a856ddfc59c944319575e403747a2af768cd3f93437fc0bbc32bfc12f833f4cd7db0eb AUX honggfuzz-2.4-headers-musl.patch 1077 BLAKE2B 2b818c0a60e9ae13573cda4a16bd0432ad21d452c720ec2d4822ff8ef24d794821cb9f1ca7c973e6350008300bbe69d712db1468f1a946c24688706f49bc634c SHA512 a132323982c0fd22fba2ac1af1fe44233ded66e85d365d18718aa36a12c794c4562a4073340c356dcd1dae1a349abedc9e7e8a4b07006ec9f631426a49c6e953 DIST honggfuzz-2.4.tar.gz 65224128 BLAKE2B b584b0f143fe64c8f64f134d7dc3116ec88232ec4a7b635d1cee2c8c5e7253524a8559c0b89fac11b67c1c3566891f189efc2201a1bf42410c78f211b2bc376e SHA512 bdb172e6e1f694ba8c200fb37ba84c4dd88875c9412fc26a45b7be302d234ac503c108eadb0c14fafbf8494ffaf70450975cf205e8a71b8b3b8902fdf455b4f6 +DIST honggfuzz-2.5.tar.gz 65224877 BLAKE2B 610a15a674cfa928eb4b4d9fda91e5494fe08be4b01857f390c36925872479c77b5424c06ed4df87ad791de29598d848d88eb5437d6f5f9bf9521ff67aaa5ded SHA512 d1ff23471372a3d9d62de768bda8beba0e75c49f9550bc106efb4ab49ea626c1ccc078f7a9950051a99fbc841615a81faae2c3b39270facd6c0064e28956c419 EBUILD honggfuzz-2.4.ebuild 993 BLAKE2B 75a575f29c1c53b74b21b5aaabb3526821f0d2b2c22b96cf6cfe126051086676c3391587513aa38fcd2c58589ebe8a0c335825f12721b2db03f724fd0ffc6c9a SHA512 5774074982a15f0a959953e67eaac7fdaa9fc89d9bed8de175b19729040e513edf8df12ed6c54f1d8f6778ad27682abaa4a1e6340813df72fc6663f16f247430 +EBUILD honggfuzz-2.5.ebuild 945 BLAKE2B 7f6f1dcde39815dd58d23709989b8c8ef9054a56d6585a68aae0c294e54663afb964a9f4d950c7b47c21a4f28fc361d105d50b8a96b74a83fca6cb3a315066bd SHA512 5d7286bba1a0c2729d93e10085334765e24d494446fbe90396a40f7e7328bf7bf853ece0f969365440a29f85019807f5653895b27d12ef8b962ca231a4b2a3e0 MISC metadata.xml 444 BLAKE2B c91cbea147520dcda86e37764f46b10166bc25238833818cf961a2cb69b4711a4cd4bce87b55937dcdd53592b5cd2fc67d940d7d25f418c8338fa321709ae420 SHA512 38e00bb52cf6436c9f5c89201b5f0ae2b9f73a7c9df1a639e89bfe298b045f6b4181a620220a3e8b0f97f4d84a24d17f1db001de77e032bc6b51bf7f338396a7 diff --git a/app-forensics/honggfuzz/honggfuzz-2.5.ebuild b/app-forensics/honggfuzz/honggfuzz-2.5.ebuild new file mode 100644 index 000000000000..db12e6d64274 --- /dev/null +++ b/app-forensics/honggfuzz/honggfuzz-2.5.ebuild @@ -0,0 +1,56 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit toolchain-funcs + +DESCRIPTION="A general purpose fuzzer with feedback support" +HOMEPAGE="https://honggfuzz.dev/" +SRC_URI="https://github.com/google/${PN}/archive/${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="Apache-2.0" +SLOT="0" +KEYWORDS="~amd64" +IUSE="clang" + +RDEPEND=" + >=sys-libs/binutils-libs-2.29:= + sys-libs/libunwind:= + app-arch/xz-utils + clang? ( sys-libs/blocksruntime ) +" + +DEPEND="${RDEPEND} + elibc_musl? ( sys-libs/queue-standalone )" + +DOCS=( + CHANGELOG + COPYING + CONTRIBUTING.md + README.md +) + +PATCHES=( + "${FILESDIR}"/${PN}-2.0-no-werror.patch +) + +pkg_pretend() { + if tc-is-clang; then + use clang || die "${P}: to use clang enable USE=clang for ${P} (bug #729256)." + fi +} + +src_prepare() { + default + tc-export AR CC + export CFLAGS + export LDFLAGS +} + +src_install() { + dobin ${PN} + dobin hfuzz_cc/hfuzz-cc + + einstalldocs +} diff --git a/app-forensics/lynis/Manifest b/app-forensics/lynis/Manifest index 9a9b10ce0863..d41857411d4d 100644 --- a/app-forensics/lynis/Manifest +++ b/app-forensics/lynis/Manifest @@ -1,4 +1,4 @@ AUX lynis.cron-new 72 BLAKE2B 1f2d683c74e9e85f142c23277f24e8c81b33e4d1691a6f171694194bd5d81a5e1473532afe2c6fca23c995d9c7bd08d18d6eed78a07661618c12e22b35e9ff81 SHA512 1cdaaee433912c2ccdec8ad7c9b88be55fe3f1d68e2fca79cc6e0e10112d465a70cfbe0a049623437f604bfc9793e0d29b709e035cbf710d4d38ba48acc5355f -DIST lynis-3.0.6.tar.gz 336725 BLAKE2B 49abad8af63e4eeb3585a241d34433f85f84719a0bbd0c2c1f87a2ab45fc0f88193236f3b10261a59e1c6efd9352134a29b8f311c5a5a749eccede2c8353c6e7 SHA512 113f3bf1b8ca4ec030bd971da41e3f182c2467d97e09eb0f2b502ab5d04c43b922570a00b62de06b97bfca64cb67576f14754f9921be63731500d3beb33d5a2a -EBUILD lynis-3.0.6.ebuild 1157 BLAKE2B 4325283944043df8436d178c0a492df13ac37f25d3bebb57e1829da12483a9b29f31ea957f799ef6f45e3fe593feea87714c0fe7eab8d75b4f9b45e956760b93 SHA512 8b044e319f313239101100a5b11c1d1cec81d097f265123cb72163f94ce97f59a8b7fe97ef027b65bef64abc032aca2186e466f96313c0becdd82a84d2db14b6 -MISC metadata.xml 252 BLAKE2B 8f1004ecee8a05309563a95ad3cedf667680511094e6e9ef6a22d245a8a884d8be18142cdd6986c5561e5663c3ebd716021dccb5c98956b1e0a17380ab130545 SHA512 613b2b774b48d3e95b6792f7e9f9308683eddc02cd88d87da13141ef46e822bb59bd9d5b06fdd1f52b709574319314b138461efd06b00bc0144805824d3e2db3 +DIST lynis-3.0.7.tar.gz 338212 BLAKE2B d9cddcba9c83ddee08ea38c8e80bf6f0a78179ad102673a876a1fe3d4544612e945d8637a8d026ce7bff72b09d6274223031e1cb6fc74596b2c65f0380fecd67 SHA512 c65d42071a48b15c2f16ceaf30404db0dac740c4cc6109442a0757e0576f794ebaf9430547eb1a0a452ce85993f00e8779ce2c4ffc47c206d674b8fd2cb02e3a +EBUILD lynis-3.0.7-r1.ebuild 1797 BLAKE2B d52a6e8ffe953af973b32d54fa0f5d28920f8f431b51f5fdb917292c4eef781bcc04a3a6e0b176e8771adea3b048346d94f50428de70469fc2067d26b73980c7 SHA512 1cbb68236f68d559d29cd4c78307d55aa798fedd38c87e62f12c39e147066e9aa84d8560e8904653d25da9ab6feca968b8e5f0def845f884ffd405089e1c8b6f +MISC metadata.xml 324 BLAKE2B 3ccc9fa29e93b80f279e24768171e1ed3ae9c371ec0cc1fca13770f498c91a75235e886b1c873dbf2a6a7355caa054c614612054251f3cdd828813e93948b6be SHA512 349bad0292a35a2434456d7b9385163a41e2430651f3fe115a3953ae8419d4369b339691b84502ff661267c8948fac13eeffe9dec2cb0a92bdf3d478cb48b0a5 diff --git a/app-forensics/lynis/lynis-3.0.6.ebuild b/app-forensics/lynis/lynis-3.0.7-r1.ebuild index 0de67b2421e8..6209f7360914 100644 --- a/app-forensics/lynis/lynis-3.0.6.ebuild +++ b/app-forensics/lynis/lynis-3.0.7-r1.ebuild @@ -1,4 +1,4 @@ -# Copyright 1999-2021 Gentoo Authors +# Copyright 1999-2022 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI="7" @@ -12,10 +12,12 @@ SRC_URI="https://cisofy.com/files/${P}.tar.gz" LICENSE="GPL-3" SLOT="0" KEYWORDS="~amd64 ~x86" -IUSE="" +IUSE="+cron systemd" DEPEND="" -RDEPEND="app-shells/bash" +RDEPEND=" + app-shells/bash + !systemd? ( virtual/cron )" S="${WORKDIR}/${PN}" @@ -44,10 +46,27 @@ src_install() { sed -i -e 's/\/path\/to\///' "${S}/extras/systemd/${PN}.service" || die "Sed Failed!" systemd_dounit "${S}/extras/systemd/${PN}.service" || die "Sed Failed!" systemd_dounit "${S}/extras/systemd/${PN}.timer" + + if ! use cron; then + ebegin "removing cron files from installation image" + rm -rfv "${ED}/etc/cron.daily" || die + eend "$?" + fi } pkg_postinst() { - einfo - einfo "A cron script has been installed to ${ROOT}/etc/cron.daily/lynis." - einfo + if use cron; then + if systemd_is_booted || has_version sys-apps/systemd; then + echo + ewarn "Both 'cron' and 'systemd' flags are enabled." + ewarn "So both ${PN}.target and cron files were installed." + ewarn "Please don't use 2 implementations at the same time." + ewarn "Cronjobs are usually enabled by default via /etc/cron.* jobs" + ewarn "If you want to use systemd ${PN}.target timers" + ewarn "disable 'cron' flag and reinstall ${PN}" + echo + else + einfo "A cron script has been installed to ${ROOT}/etc/cron.daily/lynis." + fi + fi } diff --git a/app-forensics/lynis/metadata.xml b/app-forensics/lynis/metadata.xml index 086891921a07..72bf02bbb435 100644 --- a/app-forensics/lynis/metadata.xml +++ b/app-forensics/lynis/metadata.xml @@ -5,4 +5,7 @@ <email>mpagano@gentoo.org</email> <name>Mike Pagano</name> </maintainer> + <use> + <flag name="cron">Install /etc/cron.* files</flag> + </use> </pkgmetadata> diff --git a/app-forensics/yara/Manifest b/app-forensics/yara/Manifest new file mode 100644 index 000000000000..de4566ba38b6 --- /dev/null +++ b/app-forensics/yara/Manifest @@ -0,0 +1,5 @@ +DIST yara-4.1.3.tar.gz 936462 BLAKE2B abfdd5918abe3641056ccde3eebb754cbd66eff5569978d3b1aad5d925d62fcb96b1f7367d0d014dd165db8634418259667be3b2441f93e0848bfbd905ca32dd SHA512 1bfa1787c62dfd9a87fa8db5e8c2fa68f082ae66b16b5373bdcc6bc66b32016fcaffd4baa7e59a7c1f6d3426c972eca9cc22f70d475067d7557b1014a4ab65fc +DIST yara-4.2.0_rc1.tar.gz 1283822 BLAKE2B d7bf869e670a0223895aac31df0dbe063d3f0110d1981ae8a42ab26726976790c744b522f13a6963f521310a281fab2b27d6336b23e504a4a9a3d414473ae452 SHA512 03bd09d7c020078946101854e68b7f9ca17c04f7a68624e9e15dc476fe209cc11b010108a0e7aea9746f05aabdbb8d6a6a2ffc54516eb9cb86f170c4259934df +EBUILD yara-4.1.3.ebuild 1084 BLAKE2B 0a458d363a826219fca0b28da3d9520446597d89f5d51564b3801b7703421b2eead7360d0deb88382c4fd5459ff7165d60de16b060c3b3282f24ec71ce903d4e SHA512 a30a98f8a109130c06f578a76aa99f91bf2baaddaaa514b67e51cdc5957cb7b9f7a219827359a64df380425c26253e1114cfbed2007cbd5adf37cec9322c00b7 +EBUILD yara-4.2.0_rc1.ebuild 1154 BLAKE2B d881ba15e2b3bfcde9ce490981af10e8a2828edcfd6a729d5ce69b763fd4f6be1bd1c13fb83bc79602ba6d0be4f2c2f52cd840f07419687d2e8293bb2df1370c SHA512 edb5a75ad5fdef624320c18950a11faf45e5a04152afc3ec4c7621d07e9eb3000c8bd82e695ff8d5226ecb5347c3ab155dca98482d6bf102c261cf5c10f7b799 +MISC metadata.xml 1151 BLAKE2B a2f641c9c0f851884cc6482248446d7b509e4ca2c5cec26159063a0fec025b8928955cfefbdf87e26ace0d06a01a2cec7d1f3d10b09b99b1cf1040c09519adfa SHA512 5001e3a14dc458a6b27f69226fb346dc8bf07058270e20b81f325c0742300ccb6e241b3d3dc6f55eccc43b68f0fea74977d33d8bcca6d0612057f6015f857500 diff --git a/app-forensics/yara/metadata.xml b/app-forensics/yara/metadata.xml new file mode 100644 index 000000000000..a368fb9eb15d --- /dev/null +++ b/app-forensics/yara/metadata.xml @@ -0,0 +1,30 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "https://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <maintainer type="person" proxied="yes"> + <email>mario.haustein@hrz.tu-chemnitz.de</email> + <name>Mario Haustein</name> + </maintainer> + <maintainer type="person"> + <email>sam@gentoo.org</email> + <name>Sam James</name> + </maintainer> + <longdescription> + YARA is a tool aimed at (but not limited to) helping malware + researchers to identify and classify malware samples. With YARA you can + create descriptions of malware families (or whatever you want to + describe) based on textual or binary patterns. + </longdescription> + <use> + <flag name='cuckoo'>Enable cockoo module</flag> + <flag name='dex'>Enable dex module</flag> + <flag name='dotnet'>Enable dotnet module</flag> + <flag name='macho'>Enable macho module</flag> + <flag name='magic'>Enable magic module</flag> + <flag name='profiling'>Enable rules profiling</flag> + <flag name='python'>Pulls in python binding via <pkg>dev-python/yara-python</pkg></flag> + </use> + <upstream> + <remote-id type="github">VirusTotal/yara</remote-id> + </upstream> +</pkgmetadata> diff --git a/app-forensics/yara/yara-4.1.3.ebuild b/app-forensics/yara/yara-4.1.3.ebuild new file mode 100644 index 000000000000..e11e07efff40 --- /dev/null +++ b/app-forensics/yara/yara-4.1.3.ebuild @@ -0,0 +1,52 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit autotools + +DESCRIPTION="A malware identification and classification tool" +HOMEPAGE="http://virustotal.github.io/yara/" +SRC_URI="https://github.com/virustotal/yara/archive/v${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="Apache-2.0" +SLOT="0/8" +KEYWORDS="~amd64 ~x86" +IUSE="+dex +dotnet +cuckoo +macho +magic profiling python test" +RESTRICT="!test? ( test )" + +DEPEND=" + dev-libs/openssl:= + cuckoo? ( dev-libs/jansson:= ) + magic? ( sys-apps/file:= ) +" +RDEPEND="${DEPEND}" +PDEPEND="python? ( =dev-python/yara-python-$(ver_cut 1)* )" + +src_prepare() { + default + eautoreconf +} + +src_configure() { + econf \ + $(use_enable profiling) \ + $(use_enable cuckoo) \ + $(use_enable magic) \ + $(use_enable dotnet) \ + $(use_enable macho) \ + $(use_enable dex) \ + $(use_enable test static) +} + +src_test() { + emake check +} + +src_install() { + default + + # TODO: Allow tests to work against dyn. lib rather than building + # statically just for tests. + find "${ED}" -name '*.a' -delete || die +} diff --git a/app-forensics/yara/yara-4.2.0_rc1.ebuild b/app-forensics/yara/yara-4.2.0_rc1.ebuild new file mode 100644 index 000000000000..8bac51561719 --- /dev/null +++ b/app-forensics/yara/yara-4.2.0_rc1.ebuild @@ -0,0 +1,55 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit autotools + +DESCRIPTION="A malware identification and classification tool" +HOMEPAGE="http://virustotal.github.io/yara/" +SRC_URI="https://github.com/virustotal/yara/archive/v${PV/_/-}.tar.gz -> ${P}.tar.gz" +S="${WORKDIR}/${PN}-${PV/_/-}" + +LICENSE="Apache-2.0" +SLOT="0/8" +if [[ ${PV} != *_rc* ]] ; then + KEYWORDS="~amd64 ~x86" +fi +IUSE="+dex +dotnet +cuckoo +macho +magic profiling python test" +RESTRICT="!test? ( test )" + +DEPEND=" + dev-libs/openssl:= + cuckoo? ( dev-libs/jansson:= ) + magic? ( sys-apps/file:= ) +" +RDEPEND="${DEPEND}" +PDEPEND="python? ( =dev-python/yara-python-$(ver_cut 1)* )" + +src_prepare() { + default + eautoreconf +} + +src_configure() { + econf \ + $(use_enable profiling) \ + $(use_enable cuckoo) \ + $(use_enable magic) \ + $(use_enable dotnet) \ + $(use_enable macho) \ + $(use_enable dex) \ + $(use_enable test static) +} + +src_test() { + emake check +} + +src_install() { + default + + # TODO: Allow tests to work against dyn. lib rather than building + # statically just for tests. + find "${ED}" -name '*.a' -delete || die +} |