diff options
author | araujo <araujo@FreeBSD.org> | 2010-07-02 06:54:20 +0800 |
---|---|---|
committer | araujo <araujo@FreeBSD.org> | 2010-07-02 06:54:20 +0800 |
commit | c565d9477032f6c36e78d55b4754aca894be9de1 (patch) | |
tree | 8f747460d521b11ea42da93273aef40db387ecca | |
parent | 973fa110ee5d863e9f407d6f290e9b3921fcd249 (diff) | |
download | freebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.tar.gz freebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.tar.zst freebsd-ports-gnome-c565d9477032f6c36e78d55b4754aca894be9de1.zip |
- Development has been discontinued.
PR: ports/148261
Submitted by: Anderson Eduardo <anderson@secover.com.br> (maintainer)
Feature safe: yes
-rw-r--r-- | MOVED | 1 | ||||
-rw-r--r-- | security/Makefile | 1 | ||||
-rw-r--r-- | security/audit/Makefile | 86 | ||||
-rw-r--r-- | security/audit/distinfo | 3 | ||||
-rw-r--r-- | security/audit/files/patch-aa | 10 | ||||
-rw-r--r-- | security/audit/files/patch-ab | 10 | ||||
-rw-r--r-- | security/audit/files/patch-ac | 13 | ||||
-rw-r--r-- | security/audit/files/patch-ad | 13 | ||||
-rw-r--r-- | security/audit/files/patch-ae | 12 | ||||
-rw-r--r-- | security/audit/files/patch-af | 12 | ||||
-rw-r--r-- | security/audit/files/patch-src::audit::audit.c | 10 | ||||
-rw-r--r-- | security/audit/files/patch-src::auditd::audconf.c | 10 | ||||
-rw-r--r-- | security/audit/files/patch-src_include_sysdep.h | 13 | ||||
-rw-r--r-- | security/audit/files/patch-src_lib_packet.c | 44 | ||||
-rw-r--r-- | security/audit/files/patch-src_modules_auth_srp_auth_srp.c | 196 | ||||
-rw-r--r-- | security/audit/pkg-descr | 9 | ||||
-rw-r--r-- | security/audit/pkg-plist | 14 |
17 files changed, 1 insertions, 456 deletions
@@ -4446,3 +4446,4 @@ www/firefox3|www/firefox35|2010-06-23|Upstream support dropped www/firefox3-i18n|www/firefox35-i18n|2010-06-23|Upstream support dropped security/krb4||2010-06-26|security vulnerability and isn't more developed www/linux-mozilla|www/linux-seamonkey|2010-06-27|Security vulnerabilities and abandoned upstream since 2006 +security/audit||2010-07-01|development has been discontinued diff --git a/security/Makefile b/security/Makefile index c387e249ab7a..f8a3081c6da1 100644 --- a/security/Makefile +++ b/security/Makefile @@ -24,7 +24,6 @@ SUBDIR += apache-xml-security-c SUBDIR += apg SUBDIR += arirang - SUBDIR += audit SUBDIR += authforce SUBDIR += autossh SUBDIR += avcheck diff --git a/security/audit/Makefile b/security/audit/Makefile deleted file mode 100644 index 3167eee6500d..000000000000 --- a/security/audit/Makefile +++ /dev/null @@ -1,86 +0,0 @@ -# New ports collection makefile for: audit -# Date created: 24 March 2002 -# Whom: anders -# -# $FreeBSD$ -# - -PORTNAME= audit -PORTVERSION= 1.0 -PORTREVISION= 3 -CATEGORIES= security -MASTER_SITES= http://www1.corest.com/download/audit/ \ - ftp://ftp.stack.nl/pub/users/johans/audit/ -DISTNAME= ${PORTNAME}-v${PORTVERSION}beta-src - -MAINTAINER= anderson@secover.com.br -COMMENT= Tools for remote and centralized audit data collection - -OPTIONS= MYSQL "With MySQL support" off \ - PGSQL "With PostGreSQL support" off - -MAKE_ARGS= CFLAGS+="-fPIC -DPIC" - -WRKSRC= ${WRKDIR}/${PORTNAME}-v${PORTVERSION} - -USE_GMAKE= yes -USE_LDCONFIG= ${PREFIX}/lib/alat - -GNU_CONFIGURE= yes -CONFIGURE_ARGS+= --with-audit-libdir=${PREFIX}/lib/alat -MANCOMPRESSED= yes -MAN1= audit.1 -MAN8= auditd.8 - -PORTDOCS= COPYING README TODO -FIXPREFIX_CONF= src/include/audconf.h src/auditd/auditd.8 -LIBVERSION= 1 - -.include <bsd.port.pre.mk> - -.if defined(WITH_MYSQL) -USE_MYSQL= yes -.endif -.if defined(WITH_PGSQL) -USE_PGSQL= yes -.endif - -.if defined(WITH_MYSQL) -CONFIGURE_ARGS+= --with-mysql \ - --with-mysql-libdir=${LOCALBASE}/lib/mysql \ - --with-mysql-incdir=${LOCALBASE}/include -PLIST_SUB+= MYSQL='' -.else -PLIST_SUB+= MYSQL='@comment ' -.endif -.if defined(WITH_PGSQL) -CONFIGURE_ARGS+= --with-pgsql \ - --with-pgsql-libdir=${LOCALBASE}/lib \ - --with-pgsql-incdir=${LOCALBASE}/include -PLIST_SUB+= PGSQL='' -.else -PLIST_SUB+= PGSQL='@comment ' -.endif - -post-patch: - ${REINPLACE_CMD} -e "s@Linux@FreeBSD@g" ${WRKSRC}/configure - (${FIND} ${WRKSRC}/src/modules -name Makefile.in -exec \ - ${REINPLACE_CMD} -e \ - "s!^LIB=\(.*\).{VERSION}!LIB=\1${LIBVERSION}!" {} \;) - ${REINPLACE_CMD} -e "s@AUDIT_VERSION@\"${LIBVERSION}\"@g" \ - ${WRKSRC}/src/lib/modules.c -.for f in ${FIXPREFIX_CONF} - ${REINPLACE_CMD} -e "s@/etc/auditd.conf@${PREFIX}/etc/auditd.conf@g" \ - ${WRKSRC}/${f} -.endfor - -post-install: - ${INSTALL_DATA} ${WRKSRC}/auditd.conf ${PREFIX}/etc/auditd.conf.sample -.if !defined(NOPORTDOCS) - ${INSTALL} -d -o root -g wheel -m 0755 ${DOCSDIR} -.for f in ${PORTDOCS} - ${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR} -.endfor -.endif - -.include <bsd.port.post.mk> diff --git a/security/audit/distinfo b/security/audit/distinfo deleted file mode 100644 index 4831450b2616..000000000000 --- a/security/audit/distinfo +++ /dev/null @@ -1,3 +0,0 @@ -MD5 (audit-v1.0beta-src.tar.gz) = 31b707fb507e139c3c465d537613a100 -SHA256 (audit-v1.0beta-src.tar.gz) = 5c2370f625d6c42dc4a16c69b6422c6679c575a2dcbd9b4fc039c29cc0758b00 -SIZE (audit-v1.0beta-src.tar.gz) = 129337 diff --git a/security/audit/files/patch-aa b/security/audit/files/patch-aa deleted file mode 100644 index e5622008b701..000000000000 --- a/security/audit/files/patch-aa +++ /dev/null @@ -1,10 +0,0 @@ ---- src/lib/buffer.c.orig Sat Mar 30 22:39:49 2002 -+++ src/lib/buffer.c Sat Mar 30 22:40:08 2002 -@@ -35,6 +35,7 @@ - */ - - #include <sys/types.h> -+#include <arpa/inet.h> - - #ifndef WIN32 - #include <sys/uio.h> diff --git a/security/audit/files/patch-ab b/security/audit/files/patch-ab deleted file mode 100644 index 1894e6e7d627..000000000000 --- a/security/audit/files/patch-ab +++ /dev/null @@ -1,10 +0,0 @@ ---- src/include/buffer.h.orig Sat Mar 30 22:41:58 2002 -+++ src/include/buffer.h Sat Mar 30 22:42:01 2002 -@@ -32,6 +32,7 @@ - #ifndef BUFFER_H - #define BUFFER_H - -+#include <arpa/inet.h> - #include <openssl/evp.h> - - typedef struct _buffer { diff --git a/security/audit/files/patch-ac b/security/audit/files/patch-ac deleted file mode 100644 index d46c546e077c..000000000000 --- a/security/audit/files/patch-ac +++ /dev/null @@ -1,13 +0,0 @@ ---- src/auditd/auditd.c.orig 2001-11-01 23:22:31.000000000 +0100 -+++ src/auditd/auditd.c 2007-10-17 09:41:34.000000000 +0200 -@@ -55,6 +55,10 @@ - #include <sysexits.h> - #include <unistd.h> - #include <openssl/evp.h> -+#include <sys/param.h> -+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035) -+#include <limits.h> -+#endif - - #include "sysdep.h" - #include "packet.h" diff --git a/security/audit/files/patch-ad b/security/audit/files/patch-ad deleted file mode 100644 index 08738b0a6129..000000000000 --- a/security/audit/files/patch-ad +++ /dev/null @@ -1,13 +0,0 @@ ---- src/auditd/ia.c.orig 2001-10-10 02:30:11.000000000 +0200 -+++ src/auditd/ia.c 2007-10-17 09:41:34.000000000 +0200 -@@ -54,6 +54,10 @@ - #include <sysexits.h> - #include <unistd.h> - #include <openssl/evp.h> -+#include <sys/param.h> -+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035) -+#include <limits.h> -+#endif - - #include "sysdep.h" - #include "packet.h" diff --git a/security/audit/files/patch-ae b/security/audit/files/patch-ae deleted file mode 100644 index acbc497ebe23..000000000000 --- a/security/audit/files/patch-ae +++ /dev/null @@ -1,12 +0,0 @@ ---- src/modules/attr/mysql/attr_mysql.c.orig Sun Nov 24 06:01:45 2002 -+++ src/modules/attr/mysql/attr_mysql.c Sun Nov 24 06:01:58 2002 -@@ -35,6 +35,9 @@ - */ - - #include <sys/param.h> -+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035) -+#include <limits.h> -+#endif - - #ifdef __linux__ - #include <netinet/in.h> diff --git a/security/audit/files/patch-af b/security/audit/files/patch-af deleted file mode 100644 index 281d56102733..000000000000 --- a/security/audit/files/patch-af +++ /dev/null @@ -1,12 +0,0 @@ ---- src/modules/attr/pgsql/attr_pgsql.c.orig Sun Nov 24 06:02:19 2002 -+++ src/modules/attr/pgsql/attr_pgsql.c Sun Nov 24 06:02:28 2002 -@@ -35,6 +35,9 @@ - */ - - #include <sys/param.h> -+#if defined(__FreeBSD__) && (__FreeBSD_version >= 500035) -+#include <limits.h> -+#endif - - #ifdef __linux__ - #include <netinet/in.h> diff --git a/security/audit/files/patch-src::audit::audit.c b/security/audit/files/patch-src::audit::audit.c deleted file mode 100644 index 6f027726cbc7..000000000000 --- a/security/audit/files/patch-src::audit::audit.c +++ /dev/null @@ -1,10 +0,0 @@ ---- src/audit/audit.c.orig 2001-10-06 01:14:58.000000000 +0200 -+++ src/audit/audit.c 2007-10-17 09:41:34.000000000 +0200 -@@ -147,6 +147,7 @@ - case SIGABRT: - fatal(-1, ""); - default: -+ break; - } - errno = old_errno; - } diff --git a/security/audit/files/patch-src::auditd::audconf.c b/security/audit/files/patch-src::auditd::audconf.c deleted file mode 100644 index 150a58c57097..000000000000 --- a/security/audit/files/patch-src::auditd::audconf.c +++ /dev/null @@ -1,10 +0,0 @@ ---- src/auditd/audconf.c.orig Thu Nov 4 07:25:36 2004 -+++ src/auditd/audconf.c Thu Nov 4 07:25:45 2004 -@@ -295,6 +295,7 @@ - strlcpy(options->resmodule, value, sizeof(options->resmodule)); - return (0); - default: -+ break; - } - - errno = EINVAL; diff --git a/security/audit/files/patch-src_include_sysdep.h b/security/audit/files/patch-src_include_sysdep.h deleted file mode 100644 index d33f3c733d1c..000000000000 --- a/security/audit/files/patch-src_include_sysdep.h +++ /dev/null @@ -1,13 +0,0 @@ ---- src/include/sysdep.h.orig 2007-10-17 09:51:14.000000000 +0200 -+++ src/include/sysdep.h 2007-10-17 09:50:32.000000000 +0200 -@@ -96,10 +96,6 @@ size_t strlcat (char *, const char *, si - #define _PASSWORD_LEN 128 - #endif - --#if defined(__FreeBSD__) --typedef int32_t in_addr_t; --#endif /* __FreeBSD__ */ -- - int init_socket (); - - #endif /* SYSDEP */ diff --git a/security/audit/files/patch-src_lib_packet.c b/security/audit/files/patch-src_lib_packet.c deleted file mode 100644 index a6f960ca5a1a..000000000000 --- a/security/audit/files/patch-src_lib_packet.c +++ /dev/null @@ -1,44 +0,0 @@ ---- src/lib/packet.c.orig 2001-10-06 00:04:06.000000000 +0200 -+++ src/lib/packet.c 2007-10-17 09:44:32.000000000 +0200 -@@ -546,19 +546,19 @@ - packet_put_raw(PACKET *p, const void *_data, ssize_t size) - { - ssize_t written; -- void *data; -+ char *data; - - if (p == NULL || _data == NULL || size <= 0) - return; - -- data = (void *) _data; -+ data = (char *) _data; - while (size) { - written = buf_put_raw(p->pkt_wbuf, data, size); - if (written < 0) - fatal(EX_SOFTWARE, "Invalid internal packet structure. " - "Connection aborted."); - size -= written; -- (char *) data += written; -+ data += written; - if (size) - _packet_write(p); - } -@@ -607,14 +607,16 @@ - packet_get_raw(PACKET *p, void *data, ssize_t size) - { - ssize_t readed; -+ char *cdata; - - if (p == NULL || data == NULL || size <= 0) - return; - -+ cdata = (char *)data; - while (size) { -- readed = buf_get_raw(p->pkt_rbuf, data, size); -+ readed = buf_get_raw(p->pkt_rbuf, cdata, size); - size -= readed; -- (char *) data += readed; -+ cdata += readed; - if (size) - _packet_read(p); - } diff --git a/security/audit/files/patch-src_modules_auth_srp_auth_srp.c b/security/audit/files/patch-src_modules_auth_srp_auth_srp.c deleted file mode 100644 index c86f1af9e833..000000000000 --- a/security/audit/files/patch-src_modules_auth_srp_auth_srp.c +++ /dev/null @@ -1,196 +0,0 @@ ---- src/modules/auth/srp/auth_srp.c.orig 2001-12-12 21:35:02.000000000 +0100 -+++ src/modules/auth/srp/auth_srp.c 2007-10-17 09:48:57.000000000 +0200 -@@ -289,7 +289,7 @@ - _get_srppass(AUTHCON *ct, BIGNUM *v, BIGNUM *s, unsigned char *bs) - { - RESOURCE *r; -- BN_CTX bnctx; -+ BN_CTX *bnctx = BN_CTX_new(); - BIGNUM tmp; - - if (ct->rlist != NULL) { -@@ -308,12 +308,12 @@ - - /* Generate fake verifier and salt (try to avoid timing attack) */ - log_debug(AUTH_SRP "Generating fake verifier and salt."); -- BN_CTX_init(&bnctx); -+ BN_CTX_init(bnctx); - BN_init(&tmp); -- _rand_bn(v, &tmp, &bnctx); -- _rand_bn(s, &tmp, &bnctx); -+ _rand_bn(v, &tmp, bnctx); -+ _rand_bn(s, &tmp, bnctx); - BN_free(&tmp); -- BN_CTX_free(&bnctx); -+ BN_CTX_free(bnctx); - BN_bn2bin(s, bs); - return (-1); - } -@@ -460,7 +460,7 @@ - USER_M1[SHA1_DIGESTSIZE], - bs[NBYTES]; - BIGNUM A, B, S, b, u, v, s, tmp; -- BN_CTX bnctx; -+ BN_CTX *bnctx = BN_CTX_new(); - void *buffer; - size_t bufsiz; - char hostname[MAXHOSTNAMELEN]; /* XXX: move to engine */ -@@ -483,7 +483,7 @@ - BN_init(&u); - BN_init(&v); - BN_init(&tmp); -- BN_CTX_init(&bnctx); -+ BN_CTX_init(bnctx); - - clnt_st = LOGIN_FAILED; - -@@ -508,10 +508,10 @@ - * u = rand(); 1 < u < p - 1 - * B = (g exp b + v) % p = ((g exp b) % p + v) % p - */ -- _rand_bn(&b, &tmp, &bnctx); -- _rand_bn(&u, &tmp, &bnctx); -- if (!BN_mod_exp(&B, &g, &b, &p, &bnctx) || -- !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, &bnctx)) -+ _rand_bn(&b, &tmp, bnctx); -+ _rand_bn(&u, &tmp, bnctx); -+ if (!BN_mod_exp(&B, &g, &b, &p, bnctx) || -+ !BN_add(&tmp, &B, &v) || !BN_mod(&B, &tmp, &p, bnctx)) - _fatal_bn("srvr_auth()"); - - /* Receive A, send B and u */ -@@ -527,9 +527,9 @@ - * K = HASH(S) - * M1 = HASH(A, B, K) - */ -- if (!BN_mod_exp(&S, &v, &u, &p, &bnctx) || -- !BN_mod_mul(&tmp, &A, &S, &p, &bnctx) || -- !BN_mod_exp(&S, &tmp, &b, &p, &bnctx)) -+ if (!BN_mod_exp(&S, &v, &u, &p, bnctx) || -+ !BN_mod_mul(&tmp, &A, &S, &p, bnctx) || -+ !BN_mod_exp(&S, &tmp, &b, &p, bnctx)) - _fatal_bn("srvr_auth()"); - _hash_bn(K, &S, &buffer, &bufsiz); - _auth_digest1(M1, &A, &B, K, &buffer, &bufsiz); -@@ -581,7 +581,7 @@ - BN_clear_free(&u); - BN_clear_free(&v); - BN_clear_free(&tmp); -- BN_CTX_free(&bnctx); -+ BN_CTX_free(bnctx); - free(buffer); - - /* Init encryption */ -@@ -624,7 +624,7 @@ - M2[SHA1_DIGESTSIZE], - SERVER_M2[SHA1_DIGESTSIZE]; - BIGNUM a, u, x, A, B, S, tmp1, tmp2, tmp3; -- BN_CTX bnctx; -+ BN_CTX *bnctx = BN_CTX_new(); - SHA1_CTX sha1_ctx; - void *buffer; - size_t bufsiz; -@@ -643,7 +643,7 @@ - BN_init(&tmp1); - BN_init(&tmp2); - BN_init(&tmp3); -- BN_CTX_init(&bnctx); -+ BN_CTX_init(bnctx); - - srvr_st = clnt_st = LOGIN_FAILED; - -@@ -681,7 +681,7 @@ - SHA1Final(xdigest, &sha1_ctx); - bzero(args->pass, sizeof(args->pass)); - if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp1) == NULL || -- !BN_mod(&x, &tmp1, &pm1, &bnctx)) -+ !BN_mod(&x, &tmp1, &pm1, bnctx)) - _fatal_bn("_auth_clnt()"); - - /* -@@ -689,8 +689,8 @@ - * a = rand(); 1 < a < n - 1 - * A = (g exp a) % n - */ -- _rand_bn(&a, &tmp1, &bnctx); -- if (!BN_mod_exp(&A, &g, &a, &p, &bnctx)) -+ _rand_bn(&a, &tmp1, bnctx); -+ if (!BN_mod_exp(&A, &g, &a, &p, bnctx)) - _fatal_bn("_auth_clnt()"); - - /* Send A, receive B and u */ -@@ -704,14 +704,14 @@ - * = ( (B - (g exp x) % n) exp - * ((a + ((u * x) % (n - 1))) % (n - 1)) ) % n - */ -- if (!BN_mod_mul(&tmp1, &u, &x, &pm1, &bnctx) || -+ if (!BN_mod_mul(&tmp1, &u, &x, &pm1, bnctx) || - !BN_add(&S, &tmp1, &a) || -- !BN_mod(&tmp1, &S, &pm1, &bnctx) || -- !BN_mod_exp(&tmp2, &g, &x, &p, &bnctx) || -+ !BN_mod(&tmp1, &S, &pm1, bnctx) || -+ !BN_mod_exp(&tmp2, &g, &x, &p, bnctx) || - !BN_add(&tmp3, &B, &p) || /* Workaround for the BN_mod() bug */ - !BN_sub(&S, &tmp3, &tmp2) || -- !BN_mod(&tmp2, &S, &p, &bnctx) || -- !BN_mod_exp(&S, &tmp2, &tmp1, &p, &bnctx)) -+ !BN_mod(&tmp2, &S, &p, bnctx) || -+ !BN_mod_exp(&S, &tmp2, &tmp1, &p, bnctx)) - _fatal_bn("_auth_clnt()"); - - /* -@@ -749,7 +749,7 @@ - BN_clear_free(&S); - BN_clear_free(&tmp1); - BN_clear_free(&tmp2); -- BN_CTX_free(&bnctx); -+ BN_CTX_free(bnctx); - free(buffer); - - /* Init encryption */ -@@ -776,7 +776,7 @@ - _filter_resource(AUTHCON *ct, struct autharg_filter *args) - { - SHA1_CTX sha1_ctx; -- BN_CTX bnctx; -+ BN_CTX *bnctx = BN_CTX_new(); - BIGNUM salt, verifier, x, tmp; - unsigned char bsalt[NBYTES], xdigest[SHA1_DIGESTSIZE]; - -@@ -789,7 +789,7 @@ - /* Just filter srp passwords */ - if (!strcmp(args->rname, SRP_PASS_RNAME)) { - -- BN_CTX_init(&bnctx); -+ BN_CTX_init(bnctx); - BN_init(&salt); - BN_init(&x); - BN_init(&verifier); -@@ -801,15 +801,15 @@ - * x = HASH(salt, password); 1 < x < n - 1 - * verifier = (g exp x) % n - */ -- _rand_bn(&salt, &tmp, &bnctx); -+ _rand_bn(&salt, &tmp, bnctx); - BN_bn2bin(&salt, bsalt); - SHA1Init(&sha1_ctx); - SHA1Update(&sha1_ctx, bsalt, sizeof(bsalt)); - SHA1Update(&sha1_ctx, args->value, args->vsize); - SHA1Final(xdigest, &sha1_ctx); - if (BN_bin2bn(xdigest, sizeof(xdigest), &tmp) == NULL || -- !BN_mod(&x, &tmp, &pm1, &bnctx) || -- !BN_mod_exp(&verifier, &g, &x, &p, &bnctx)) -+ !BN_mod(&x, &tmp, &pm1, bnctx) || -+ !BN_mod_exp(&verifier, &g, &x, &p, bnctx)) - _fatal_bn("_filter_resource()"); - - /* Get memory for the filtered value */ -@@ -829,7 +829,7 @@ - BN_clear_free(&verifier); - BN_clear_free(&x); - BN_clear_free(&salt); -- BN_CTX_free(&bnctx); -+ BN_CTX_free(bnctx); - - if (args->fvalue == NULL) - return (-1); diff --git a/security/audit/pkg-descr b/security/audit/pkg-descr deleted file mode 100644 index 6defe49d15b3..000000000000 --- a/security/audit/pkg-descr +++ /dev/null @@ -1,9 +0,0 @@ -Audit is a client/server system that allows remote system logs auditing and -centralizing. It supports standard and modular syslog output formats -(non-standard logs can be easily supported due to its modular design). The -server (auditd) runs on audited machines and the client (audit) runs on the -auditors workstations. Multiple auditors are supported and managed by one or -more 'chief' auditors. Auditors can be configured in a way that each of them -can examine specific sets of logs. - -WWW: http://www.corest.com/products/corewisdom/CW02.php diff --git a/security/audit/pkg-plist b/security/audit/pkg-plist deleted file mode 100644 index bc7129def4b3..000000000000 --- a/security/audit/pkg-plist +++ /dev/null @@ -1,14 +0,0 @@ -bin/audit -etc/auditd.conf.sample -lib/alat/libattr_classic.so.1 -%%MYSQL%%lib/alat/libattr_mysql.so.1 -lib/alat/libattr_peo.so.1 -%%PGSQL%%lib/alat/libattr_pgsql.so.1 -lib/alat/libattr_regex.so.1 -lib/alat/libattr_tcp.so.1 -lib/alat/libauth_raw.so.1 -lib/alat/libauth_srp.so.1 -lib/alat/libia_syslog.so.1 -lib/alat/libres_local.so.1 -sbin/auditd -@dirrmtry lib/alat |