aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoraraujo <araujo@FreeBSD.org>2010-07-02 06:54:20 +0800
committeraraujo <araujo@FreeBSD.org>2010-07-02 06:54:20 +0800
commitc565d9477032f6c36e78d55b4754aca894be9de1 (patch)
tree8f747460d521b11ea42da93273aef40db387ecca
parent973fa110ee5d863e9f407d6f290e9b3921fcd249 (diff)
downloadfreebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.tar.gz
freebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.tar.zst
freebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.zip
- Development has been discontinued.
PR: ports/148261 Submitted by: Anderson Eduardo <anderson@secover.com.br> (maintainer) Feature safe: yes
-rw-r--r--MOVED1
-rw-r--r--security/Makefile1
-rw-r--r--security/audit/Makefile86
-rw-r--r--security/audit/distinfo3
-rw-r--r--security/audit/files/patch-aa10
-rw-r--r--security/audit/files/patch-ab10
-rw-r--r--security/audit/files/patch-ac13
-rw-r--r--security/audit/files/patch-ad13
-rw-r--r--security/audit/files/patch-ae12
-rw-r--r--security/audit/files/patch-af12
-rw-r--r--security/audit/files/patch-src::audit::audit.c10
-rw-r--r--security/audit/files/patch-src::auditd::audconf.c10
-rw-r--r--security/audit/files/patch-src_include_sysdep.h13
-rw-r--r--security/audit/files/patch-src_lib_packet.c44
-rw-r--r--security/audit/files/patch-src_modules_auth_srp_auth_srp.c196
-rw-r--r--security/audit/pkg-descr9
-rw-r--r--security/audit/pkg-plist14
17 files changed, 1 insertions, 456 deletions
diff --git a/MOVED b/MOVED
index 1c3955d6808e..a74868263ff0 100644
--- a/MOVED
+++ b/MOVED
@@ -4446,3 +4446,4 @@ www/firefox3|www/firefox35|2010-06-23|Upstream support dropped
www/firefox3-i18n|www/firefox35-i18n|2010-06-23|Upstream support dropped
security/krb4||2010-06-26|security vulnerability and isn't more developed
www/linux-mozilla|www/linux-seamonkey|2010-06-27|Security vulnerabilities and abandoned upstream since 2006
+security/audit||2010-07-01|development has been discontinued
diff --git a/security/Makefile b/security/Makefile
index c387e249ab7a..f8a3081c6da1 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -24,7 +24,6 @@
SUBDIR += apache-xml-security-c
SUBDIR += apg
SUBDIR += arirang
- SUBDIR += audit
SUBDIR += authforce
SUBDIR += autossh
SUBDIR += avcheck
diff --git a/security/audit/Makefile b/security/audit/Makefile
deleted file mode 100644
index 3167eee6500d..000000000000
--- a/security/audit/Makefile
+++ /dev/null
@@ -1,86 +0,0 @@
-# New ports collection makefile for: audit
-# Date created: 24 March 2002
-# Whom: anders
-#
-# $FreeBSD$
-#
-
-PORTNAME= audit
-PORTVERSION= 1.0
-PORTREVISION= 3
-CATEGORIES= security
-MASTER_SITES= http://www1.corest.com/download/audit/ \
- ftp://ftp.stack.nl/pub/users/johans/audit/
-DISTNAME= ${PORTNAME}-v${PORTVERSION}beta-src
-
-MAINTAINER= anderson@secover.com.br
-COMMENT= Tools for remote and centralized audit data collection
-
-OPTIONS= MYSQL "With MySQL support" off \
- PGSQL "With PostGreSQL support" off
-
-MAKE_ARGS= CFLAGS+="-fPIC -DPIC"
-
-WRKSRC= ${WRKDIR}/${PORTNAME}-v${PORTVERSION}
-
-USE_GMAKE= yes
-USE_LDCONFIG= ${PREFIX}/lib/alat
-
-GNU_CONFIGURE= yes
-CONFIGURE_ARGS+= --with-audit-libdir=${PREFIX}/lib/alat
-MANCOMPRESSED= yes
-MAN1= audit.1
-MAN8= auditd.8
-
-PORTDOCS= COPYING README TODO
-FIXPREFIX_CONF= src/include/audconf.h src/auditd/auditd.8
-LIBVERSION= 1
-
-.include <bsd.port.pre.mk>
-
-.if defined(WITH_MYSQL)
-USE_MYSQL= yes
-.endif
-.if defined(WITH_PGSQL)
-USE_PGSQL= yes
-.endif
-
-.if defined(WITH_MYSQL)
-CONFIGURE_ARGS+= --with-mysql \
- --with-mysql-libdir=${LOCALBASE}/lib/mysql \
- --with-mysql-incdir=${LOCALBASE}/include
-PLIST_SUB+= MYSQL=''
-.else
-PLIST_SUB+= MYSQL='@comment '
-.endif
-.if defined(WITH_PGSQL)
-CONFIGURE_ARGS+= --with-pgsql \
- --with-pgsql-libdir=${LOCALBASE}/lib \
- --with-pgsql-incdir=${LOCALBASE}/include
-PLIST_SUB+= PGSQL=''
-.else
-PLIST_SUB+= PGSQL='@comment '
-.endif
-
-post-patch:
- ${REINPLACE_CMD} -e "s@Linux@FreeBSD@g" ${WRKSRC}/configure
- (${FIND} ${WRKSRC}/src/modules -name Makefile.in -exec \
- ${REINPLACE_CMD} -e \
- "s!^LIB=\(.*\).{VERSION}!LIB=\1${LIBVERSION}!" {} \;)
- ${REINPLACE_CMD} -e "s@AUDIT_VERSION@\"${LIBVERSION}\"@g" \
- ${WRKSRC}/src/lib/modules.c
-.for f in ${FIXPREFIX_CONF}
- ${REINPLACE_CMD} -e "s@/etc/auditd.conf@${PREFIX}/etc/auditd.conf@g" \
- ${WRKSRC}/${f}
-.endfor
-
-post-install:
- ${INSTALL_DATA} ${WRKSRC}/auditd.conf ${PREFIX}/etc/auditd.conf.sample
-.if !defined(NOPORTDOCS)
- ${INSTALL} -d -o root -g wheel -m 0755 ${DOCSDIR}
-.for f in ${PORTDOCS}
- ${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR}
-.endfor
-.endif
-
-.include <bsd.port.post.mk>
diff --git a/security/audit/distinfo b/security/audit/distinfo
deleted file mode 100644
index 4831450b2616..000000000000
--- a/security/audit/distinfo
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 (audit-v1.0beta-src.tar.gz) = 31b707fb507e139c3c465d537613a100
-SHA256 (audit-v1.0beta-src.tar.gz) = 5c2370f625d6c42dc4a16c69b6422c6679c575a2dcbd9b4fc039c29cc0758b00
-SIZE (audit-v1.0beta-src.tar.gz) = 129337
diff --git a/security/audit/files/patch-aa b/security/audit/files/patch-aa
deleted file mode 100644
index e5622008b701..000000000000
--- a/security/audit/files/patch-aa
+++ /dev/null
@@ -1,10 +0,0 @@
---- src/lib/buffer.c.orig Sat Mar 30 22:39:49 2002
-+++ src/lib/buffer.c Sat Mar 30 22:40:08 2002
-@@ -35,6 +35,7 @@
- */
-
- #include <sys/types.h>
-+#include <arpa/inet.h>
-
- #ifndef WIN32
- #include <sys/uio.h>
diff --git a/security/audit/files/patch-ab b/security/audit/files/patch-ab
deleted file mode 100644
index 1894e6e7d627..000000000000
--- a/security/audit/files/patch-ab
+++ /dev/null
@@ -1,10 +0,0 @@
---- src/include/buffer.h.orig Sat Mar 30 22:41:58 2002
-+++ src/include/buffer.h Sat Mar 30 22:42:01 2002
-@@ -32,6 +32,7 @@
- #ifndef BUFFER_H
- #define BUFFER_H
-
-+#include <arpa/inet.h>
- #include <openssl/evp.h>
-
- typedef struct _buffer {
diff --git a/security/audit/files/patch-ac b/security/audit/files/patch-ac
deleted file mode 100644
index d46c546e077c..000000000000
--- a/security/audit/files/patch-ac
+++ /dev/null
@@ -1,13 +0,0 @@
---- src/auditd/auditd.c.orig 2001-11-01 23:22:31.000000000 +0100
-+++ src/auditd/auditd.c 2007-10-17 09:41:34.000000000 +0200
-@@ -55,6 +55,10 @@
- #include <sysexits.h>
- #include <unistd.h>
- #include <openssl/evp.h>
-+#include <sys/param.h>
-+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
-+#include <limits.h>
-+#endif
-
- #include "sysdep.h"
- #include "packet.h"
diff --git a/security/audit/files/patch-ad b/security/audit/files/patch-ad
deleted file mode 100644
index 08738b0a6129..000000000000
--- a/security/audit/files/patch-ad
+++ /dev/null
@@ -1,13 +0,0 @@
---- src/auditd/ia.c.orig 2001-10-10 02:30:11.000000000 +0200
-+++ src/auditd/ia.c 2007-10-17 09:41:34.000000000 +0200
-@@ -54,6 +54,10 @@
- #include <sysexits.h>
- #include <unistd.h>
- #include <openssl/evp.h>
-+#include <sys/param.h>
-+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
-+#include <limits.h>
-+#endif
-
- #include "sysdep.h"
- #include "packet.h"
diff --git a/security/audit/files/patch-ae b/security/audit/files/patch-ae
deleted file mode 100644
index acbc497ebe23..000000000000
--- a/security/audit/files/patch-ae
+++ /dev/null
@@ -1,12 +0,0 @@
---- src/modules/attr/mysql/attr_mysql.c.orig Sun Nov 24 06:01:45 2002
-+++ src/modules/attr/mysql/attr_mysql.c Sun Nov 24 06:01:58 2002
-@@ -35,6 +35,9 @@
- */
-
- #include <sys/param.h>
-+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
-+#include <limits.h>
-+#endif
-
- #ifdef __linux__
- #include <netinet/in.h>
diff --git a/security/audit/files/patch-af b/security/audit/files/patch-af
deleted file mode 100644
index 281d56102733..000000000000
--- a/security/audit/files/patch-af
+++ /dev/null
@@ -1,12 +0,0 @@
---- src/modules/attr/pgsql/attr_pgsql.c.orig Sun Nov 24 06:02:19 2002
-+++ src/modules/attr/pgsql/attr_pgsql.c Sun Nov 24 06:02:28 2002
-@@ -35,6 +35,9 @@
- */
-
- #include <sys/param.h>
-+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035)
-+#include <limits.h>
-+#endif
-
- #ifdef __linux__
- #include <netinet/in.h>
diff --git a/security/audit/files/patch-src::audit::audit.c b/security/audit/files/patch-src::audit::audit.c
deleted file mode 100644
index 6f027726cbc7..000000000000
--- a/security/audit/files/patch-src::audit::audit.c
+++ /dev/null
@@ -1,10 +0,0 @@
---- src/audit/audit.c.orig 2001-10-06 01:14:58.000000000 +0200
-+++ src/audit/audit.c 2007-10-17 09:41:34.000000000 +0200
-@@ -147,6 +147,7 @@
- case SIGABRT:
- fatal(-1, "");
- default:
-+ break;
- }
- errno = old_errno;
- }
diff --git a/security/audit/files/patch-src::auditd::audconf.c b/security/audit/files/patch-src::auditd::audconf.c
deleted file mode 100644
index 150a58c57097..000000000000
--- a/security/audit/files/patch-src::auditd::audconf.c
+++ /dev/null
@@ -1,10 +0,0 @@
---- src/auditd/audconf.c.orig Thu Nov 4 07:25:36 2004
-+++ src/auditd/audconf.c Thu Nov 4 07:25:45 2004
-@@ -295,6 +295,7 @@
- strlcpy(options->resmodule, value, sizeof(options->resmodule));
- return (0);
- default:
-+ break;
- }
-
- errno = EINVAL;
diff --git a/security/audit/files/patch-src_include_sysdep.h b/security/audit/files/patch-src_include_sysdep.h
deleted file mode 100644
index d33f3c733d1c..000000000000
--- a/security/audit/files/patch-src_include_sysdep.h
+++ /dev/null
@@ -1,13 +0,0 @@
---- src/include/sysdep.h.orig 2007-10-17 09:51:14.000000000 +0200
-+++ src/include/sysdep.h 2007-10-17 09:50:32.000000000 +0200
-@@ -96,10 +96,6 @@ size_t strlcat (char *, const char *, si
- #define _PASSWORD_LEN 128
- #endif
-
--#if defined(__FreeBSD__)
--typedef int32_t in_addr_t;
--#endif /* __FreeBSD__ */
--
- int init_socket ();
-
- #endif /* SYSDEP */
diff --git a/security/audit/files/patch-src_lib_packet.c b/security/audit/files/patch-src_lib_packet.c
deleted file mode 100644
index a6f960ca5a1a..000000000000
--- a/security/audit/files/patch-src_lib_packet.c
+++ /dev/null
@@ -1,44 +0,0 @@
---- src/lib/packet.c.orig 2001-10-06 00:04:06.000000000 +0200
-+++ src/lib/packet.c 2007-10-17 09:44:32.000000000 +0200
-@@ -546,19 +546,19 @@
- packet_put_raw(PACKET *p, const void *_data, ssize_t size)
- {
- ssize_t written;
-- void *data;
-+ char *data;
-
- if (p == NULL || _data == NULL || size <= 0)
- return;
-
-- data = (void *) _data;
-+ data = (char *) _data;
- while (size) {
- written = buf_put_raw(p->pkt_wbuf, data, size);
- if (written < 0)
- fatal(EX_SOFTWARE, "Invalid internal packet structure. "
- "Connection aborted.");
- size -= written;
-- (char *) data += written;
-+ data += written;
- if (size)
- _packet_write(p);
- }
-@@ -607,14 +607,16 @@
- packet_get_raw(PACKET *p, void *data, ssize_t size)
- {
- ssize_t readed;
-+ char *cdata;
-
- if (p == NULL || data == NULL || size <= 0)
- return;
-
-+ cdata = (char *)data;
- while (size) {
-- readed = buf_get_raw(p->pkt_rbuf, data, size);
-+ readed = buf_get_raw(p->pkt_rbuf, cdata, size);
- size -= readed;
-- (char *) data += readed;
-+ cdata += readed;
- if (size)
- _packet_read(p);
- }
diff --git a/security/audit/files/patch-src_modules_auth_srp_auth_srp.c b/security/audit/files/patch-src_modules_auth_srp_auth_srp.c
deleted file mode 100644
index c86f1af9e833..000000000000
--- a/security/audit/files/patch-src_modules_auth_srp_auth_srp.c
+++ /dev/null
@@ -1,196 +0,0 @@
---- src/modules/auth/srp/auth_srp.c.orig 2001-12-12 21:35:02.000000000 +0100
-+++ src/modules/auth/srp/auth_srp.c 2007-10-17 09:48:57.000000000 +0200
-@@ -289,7 +289,7 @@
- _get_srppass(AUTHCON *ct, BIGNUM *v, BIGNUM *s, unsigned char *bs)
- {
- RESOURCE *r;
-- BN_CTX bnctx;
-+ BN_CTX *bnctx = BN_CTX_new();
- BIGNUM tmp;
-
- if (ct->rlist != NULL) {
-@@ -308,12 +308,12 @@
-
- /* Generate fake verifier and salt (try to avoid timing attack) */
- log_debug(AUTH_SRP "Generating fake verifier and salt.");
-- BN_CTX_init(&bnctx);
-+ BN_CTX_init(bnctx);
- BN_init(&tmp);
-- _rand_bn(v, &tmp, &bnctx);
-- _rand_bn(s, &tmp, &bnctx);
-+ _rand_bn(v, &tmp, bnctx);
-+ _rand_bn(s, &tmp, bnctx);
- BN_free(&tmp);
-- BN_CTX_free(&bnctx);
-+ BN_CTX_free(bnctx);
- BN_bn2bin(s, bs);
- return (-1);
- }
-@@ -460,7 +460,7 @@
- USER_M1[SHA1_DIGESTSIZE],
- bs[NBYTES];
- BIGNUM A, B, S, b, u, v, s, tmp;
-- BN_CTX bnctx;
-+ BN_CTX *bnctx = BN_CTX_new();
- void *buffer;
- size_t bufsiz;
- char hostname[MAXHOSTNAMELEN]; /* XXX: move to engine */
-@@ -483,7 +483,7 @@
- BN_init(&u);
- BN_init(&v);
- BN_init(&tmp);
-- BN_CTX_init(&bnctx);
-+ BN_CTX_init(bnctx);
-
- clnt_st = LOGIN_FAILED;
-
-@@ -508,10 +508,10 @@
- * u = rand(); 1 < u < p - 1
- * B = (g exp b + v) % p = ((g exp b) % p + v) % p
- */
-- _rand_bn(&b, &tmp, &bnctx);
-- _rand_bn(&u, &tmp, &bnctx);
-- if (!BN_mod_exp(&B, &g, &b, &p, &bnctx) ||
-- !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, &bnctx))
-+ _rand_bn(&b, &tmp, bnctx);
-+ _rand_bn(&u, &tmp, bnctx);
-+ if (!BN_mod_exp(&B, &g, &b, &p, bnctx) ||
-+ !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, bnctx))
- _fatal_bn("srvr_auth()");
-
- /* Receive A, send B and u */
-@@ -527,9 +527,9 @@
- * K = HASH(S)
- * M1 = HASH(A, B, K)
- */
-- if (!BN_mod_exp(&S, &v, &u, &p, &bnctx) ||
-- !BN_mod_mul(&tmp, &A, &S, &p, &bnctx) ||
-- !BN_mod_exp(&S, &tmp, &b, &p, &bnctx))
-+ if (!BN_mod_exp(&S, &v, &u, &p, bnctx) ||
-+ !BN_mod_mul(&tmp, &A, &S, &p, bnctx) ||
-+ !BN_mod_exp(&S, &tmp, &b, &p, bnctx))
- _fatal_bn("srvr_auth()");
- _hash_bn(K, &S, &buffer, &bufsiz);
- _auth_digest1(M1, &A, &B, K, &buffer, &bufsiz);
-@@ -581,7 +581,7 @@
- BN_clear_free(&u);
- BN_clear_free(&v);
- BN_clear_free(&tmp);
-- BN_CTX_free(&bnctx);
-+ BN_CTX_free(bnctx);
- free(buffer);
-
- /* Init encryption */
-@@ -624,7 +624,7 @@
- M2[SHA1_DIGESTSIZE],
- SERVER_M2[SHA1_DIGESTSIZE];
- BIGNUM a, u, x, A, B, S, tmp1, tmp2, tmp3;
-- BN_CTX bnctx;
-+ BN_CTX *bnctx = BN_CTX_new();
- SHA1_CTX sha1_ctx;
- void *buffer;
- size_t bufsiz;
-@@ -643,7 +643,7 @@
- BN_init(&tmp1);
- BN_init(&tmp2);
- BN_init(&tmp3);
-- BN_CTX_init(&bnctx);
-+ BN_CTX_init(bnctx);
-
- srvr_st = clnt_st = LOGIN_FAILED;
-
-@@ -681,7 +681,7 @@
- SHA1Final(xdigest, &sha1_ctx);
- bzero(args->pass, sizeof(args->pass));
- if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp1) == NULL ||
-- !BN_mod(&x, &tmp1, &pm1, &bnctx))
-+ !BN_mod(&x, &tmp1, &pm1, bnctx))
- _fatal_bn("_auth_clnt()");
-
- /*
-@@ -689,8 +689,8 @@
- * a = rand(); 1 < a < n - 1
- * A = (g exp a) % n
- */
-- _rand_bn(&a, &tmp1, &bnctx);
-- if (!BN_mod_exp(&A, &g, &a, &p, &bnctx))
-+ _rand_bn(&a, &tmp1, bnctx);
-+ if (!BN_mod_exp(&A, &g, &a, &p, bnctx))
- _fatal_bn("_auth_clnt()");
-
- /* Send A, receive B and u */
-@@ -704,14 +704,14 @@
- * = ( (B - (g exp x) % n) exp
- * ((a + ((u * x) % (n - 1))) % (n - 1)) ) % n
- */
-- if (!BN_mod_mul(&tmp1, &u, &x, &pm1, &bnctx) ||
-+ if (!BN_mod_mul(&tmp1, &u, &x, &pm1, bnctx) ||
- !BN_add(&S, &tmp1, &a) ||
-- !BN_mod(&tmp1, &S, &pm1, &bnctx) ||
-- !BN_mod_exp(&tmp2, &g, &x, &p, &bnctx) ||
-+ !BN_mod(&tmp1, &S, &pm1, bnctx) ||
-+ !BN_mod_exp(&tmp2, &g, &x, &p, bnctx) ||
- !BN_add(&tmp3, &B, &p) || /* Workaround for the BN_mod() bug */
- !BN_sub(&S, &tmp3, &tmp2) ||
-- !BN_mod(&tmp2, &S, &p, &bnctx) ||
-- !BN_mod_exp(&S, &tmp2, &tmp1, &p, &bnctx))
-+ !BN_mod(&tmp2, &S, &p, bnctx) ||
-+ !BN_mod_exp(&S, &tmp2, &tmp1, &p, bnctx))
- _fatal_bn("_auth_clnt()");
-
- /*
-@@ -749,7 +749,7 @@
- BN_clear_free(&S);
- BN_clear_free(&tmp1);
- BN_clear_free(&tmp2);
-- BN_CTX_free(&bnctx);
-+ BN_CTX_free(bnctx);
- free(buffer);
-
- /* Init encryption */
-@@ -776,7 +776,7 @@
- _filter_resource(AUTHCON *ct, struct autharg_filter *args)
- {
- SHA1_CTX sha1_ctx;
-- BN_CTX bnctx;
-+ BN_CTX *bnctx = BN_CTX_new();
- BIGNUM salt, verifier, x, tmp;
- unsigned char bsalt[NBYTES], xdigest[SHA1_DIGESTSIZE];
-
-@@ -789,7 +789,7 @@
- /* Just filter srp passwords */
- if (!strcmp(args->rname, SRP_PASS_RNAME)) {
-
-- BN_CTX_init(&bnctx);
-+ BN_CTX_init(bnctx);
- BN_init(&salt);
- BN_init(&x);
- BN_init(&verifier);
-@@ -801,15 +801,15 @@
- * x = HASH(salt, password); 1 < x < n - 1
- * verifier = (g exp x) % n
- */
-- _rand_bn(&salt, &tmp, &bnctx);
-+ _rand_bn(&salt, &tmp, bnctx);
- BN_bn2bin(&salt, bsalt);
- SHA1Init(&sha1_ctx);
- SHA1Update(&sha1_ctx, bsalt, sizeof(bsalt));
- SHA1Update(&sha1_ctx, args->value, args->vsize);
- SHA1Final(xdigest, &sha1_ctx);
- if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp) == NULL ||
-- !BN_mod(&x, &tmp, &pm1, &bnctx) ||
-- !BN_mod_exp(&verifier, &g, &x, &p, &bnctx))
-+ !BN_mod(&x, &tmp, &pm1, bnctx) ||
-+ !BN_mod_exp(&verifier, &g, &x, &p, bnctx))
- _fatal_bn("_filter_resource()");
-
- /* Get memory for the filtered value */
-@@ -829,7 +829,7 @@
- BN_clear_free(&verifier);
- BN_clear_free(&x);
- BN_clear_free(&salt);
-- BN_CTX_free(&bnctx);
-+ BN_CTX_free(bnctx);
-
- if (args->fvalue == NULL)
- return (-1);
diff --git a/security/audit/pkg-descr b/security/audit/pkg-descr
deleted file mode 100644
index 6defe49d15b3..000000000000
--- a/security/audit/pkg-descr
+++ /dev/null
@@ -1,9 +0,0 @@
-Audit is a client/server system that allows remote system logs auditing and
-centralizing. It supports standard and modular syslog output formats
-(non-standard logs can be easily supported due to its modular design). The
-server (auditd) runs on audited machines and the client (audit) runs on the
-auditors workstations. Multiple auditors are supported and managed by one or
-more 'chief' auditors. Auditors can be configured in a way that each of them
-can examine specific sets of logs.
-
-WWW: http://www.corest.com/products/corewisdom/CW02.php
diff --git a/security/audit/pkg-plist b/security/audit/pkg-plist
deleted file mode 100644
index bc7129def4b3..000000000000
--- a/security/audit/pkg-plist
+++ /dev/null
@@ -1,14 +0,0 @@
-bin/audit
-etc/auditd.conf.sample
-lib/alat/libattr_classic.so.1
-%%MYSQL%%lib/alat/libattr_mysql.so.1
-lib/alat/libattr_peo.so.1
-%%PGSQL%%lib/alat/libattr_pgsql.so.1
-lib/alat/libattr_regex.so.1
-lib/alat/libattr_tcp.so.1
-lib/alat/libauth_raw.so.1
-lib/alat/libauth_srp.so.1
-lib/alat/libia_syslog.so.1
-lib/alat/libres_local.so.1
-sbin/auditd
-@dirrmtry lib/alat