[Forensics-changes] [SCM] Forensics related utilities branch, debian, updated. debian/1.11-6.5-2-gc492e20
Daniel Baumann
daniel at debian.org
Fri Nov 28 08:02:45 UTC 2008
The following commit has been merged in the debian branch:
commit c492e20d61bdca2f27a5610ffb2779b6aebeb421
Author: Daniel Baumann <daniel at debian.org>
Date: Fri Nov 28 09:02:00 2008 +0100
Adding debian version 1.18-1.
diff --git a/debian/changelog b/debian/changelog
index e0aeee3..e6c1c22 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,12 @@
+tct (1.18-1) unstable; urgency=low
+
+ * New maintainer (Closes: #499333).
+ * New upstream release (Closes: #262948).
+ * Acknolwedge NUMs (Closes: #235099, #325419).
+ * Redone debian packaging from scratch.
+
+ -- Daniel Baumann <daniel at debian.org> Thu, 27 Nov 2008 15:49:00 +0100
+
tct (1.11-6.5) unstable; urgency=low
* Non-maintainer upload.
@@ -90,13 +99,13 @@ tct (1.07-11) unstable; urgency=low
tct (1.07-10) unstable; urgency=low
- * Updated contact address.
+ * Updated contact address.
-- Yotam Rubin <yotamr at bezeqint.net> Wed, 22 May 2002 16:16:59 +0300
tct (1.07-9) unstable; urgency=low
- * Made timeout return the exit code of the forked command.
+ * Made timeout return the exit code of the forked command.
Closes: Bug#132927
* Prevented signal recursion in timeout. Closes: Bug#132929, Bug#135165
* Clarified the manual page. Closes: Bug#134999
@@ -124,7 +133,7 @@ tct (1.07-6) unstable; urgency=low
tct (1.07-5) unstable; urgency=low
- * Fixed alpha build problem. Patch from Christpoher Chimelis.
+ * Fixed alpha build problem. Patch from Christpoher Chimelis.
Closes: Bug#110341
-- Yotam Rubin <yotam at makif.omer.k12.il> Sat, 1 Sep 2001 17:29:44 +0300
@@ -163,6 +172,5 @@ tct (1.06-2) unstable; urgency=low
tct (1.06-1) unstable; urgency=low
* First Debian release
-
+
-- Yotam Rubin <yotam at makif.omer.k12.il> Sat, 7 Apr 2001 03:34:36 +0200
-
diff --git a/debian/compat b/debian/compat
index b8626c4..7f8f011 100644
--- a/debian/compat
+++ b/debian/compat
@@ -1 +1 @@
-4
+7
diff --git a/debian/contrib/md5_image_maker b/debian/contrib/md5_image_maker
deleted file mode 100644
index 234e828..0000000
--- a/debian/contrib/md5_image_maker
+++ /dev/null
@@ -1,23 +0,0 @@
-#!/bin/sh
-
-#
-# md5_image_maker: Produce raw images of partitions and store their appropriate
-# md5 sums in a separate file.
-# Written by Yotam Rubin <yotam at makif.omer.k12.il>
-# Usage: md5_image_maker <partition> <partition> ...
-#
-
-MD5SUM=/usr/bin/md5sum
-
-if [ -z $1 ]; then
- echo "Usage: $0 <partition> <partition> ..."
- exit 0
-fi
-
-touch md5sums
-
-for partition in $@; do
- dd if=/dev/$partition of=$partition.bin
- $MD5SUM $partition.bin >> md5sums
-done
-
diff --git a/debian/control b/debian/control
index 7921f2e..3124ab1 100644
--- a/debian/control
+++ b/debian/control
@@ -1,35 +1,33 @@
Source: tct
Section: admin
-Build-Depends: debhelper (>> 4.0.0), e2fslibs-dev
Priority: optional
-Maintainer: Andrew Stribblehill <ads at debian.org>
-Standards-Version: 3.5.7
+Maintainer: Debian Forensics <forensics-devel at lists.alioth.debian.org>
+Uploaders: Daniel Baumann <daniel at debian.org>
+Build-Depends: debhelper (>= 7), dpatch, e2fslibs-dev
+Standards-Version: 3.8.0
+Homepage: http://www.porcupine.org/forensics/tct.html
+Vcs-Browser: http://git.debian.net/?p=debian-forensics/tct.git
+Vcs-Git: git://git.debian.net/git/debian-forensics/tct.git
Package: tct
Architecture: any
-Depends: ${shlibs:Depends}, ${perl:Depends}, file, libdate-manip-perl, timeout
-Section: admin
+Depends: ${shlibs:Depends}, ${misc:Depends}, file, libdate-manip-perl, timeout
Recommends: lsof
Suggests: acct
-Description: Forensics related utilities.
- The Coroner's Toolkit (TCT) is a collection of programs by Dan Farmer and
- Wietse Venema for a post-mortem analysis of a UNIX system after a break-in.
- TCT enables you to collect date regarding deleted files, modification times
- of files and more.
+Description: collection of forensics related utilities
+ TCT is a collection of programs for a post-mortem analysis of a UNIX system
+ after break-in. It enables you to collect data regarding deleted files,
+ modification times of files and more.
.
- Install this BEFORE you need to use it, so you don't risk destroying
- essential forensic data before you begin.
+ Install this BEFORE you need to use it, so you do not risk destroying essential
+ forensic data before you begin.
.
- Tools contained within this package: grave-robber, lazarus,
- inode-cat (ex icat), ils, unrm and pcat.
-
+ Tools contained within this package: grave-robber, lazarus, inode-cat,
+ ils, unrm and pcat.
+
Package: timeout
Architecture: any
-Depends: ${shlibs:Depends}
-Section: admin
-Replaces: tct (<= 1.07-2), netatalk (<< 1.5pre6-7)
-Conflicts: tct (<= 1.07-2), netatalk (<< 1.5pre6-7)
-Description: Run a command with a time limit.
- timeout executes a command and imposes an elapsed time limit. When the
- time limit is reached, timeout sends a predefined signal to the target
- process.
+Depends: ${shlibs:Depends}, ${misc:Depends}
+Description: run a command with a time limit
+ timeout executes a command and imposes an elapsed time limit. When the time
+ limit is reached, timeout sends a predefined signal to the target process.
diff --git a/debian/copyright b/debian/copyright
new file mode 100644
index 0000000..1efe99b
--- /dev/null
+++ b/debian/copyright
@@ -0,0 +1,389 @@
+Authors:
+ Dan Farmer
+ Wietse Venema
+Download: http://www.porcupine.org/forensics/tct.html
+
+Files: *
+Copyright: (C) 1999 Dan Farmer
+License: BSD
+ Redistribution and use in source and binary forms are permitted
+ provided that this entire copyright notice is duplicated in all such
+ copies.
+ .
+ THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
+ WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
+ MERCHANTABILITY AND FITNESS FOR ANY PARTICULAR PURPOSE.
+ .
+ IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
+ INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ (INCLUDING, BUT NOT LIMITED TO, LOSS OF USE, DATA, OR PROFITS OR
+ BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+ WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+ OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+ ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+Files:
+ extras/findkey/*, extras/entropy/*, lib/logger.pl, lib/command.pl,
+ lib/datez.pl, src/aux/*, src/major_minor/*, src/fstools/*, src/pcat/*
+Copyright:
+ (C) 1999 Dan Farmer
+ (C) 2003-2008 Wietse Venema <wietse at porcupine.org>
+License: other
+ IBM PUBLIC LICENSE VERSION 1.0 - CORONER TOOLKIT UTILITIES
+ .
+ THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS IBM PUBLIC LICENSE
+ ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES
+ RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
+ .
+ 1. DEFINITIONS
+ .
+ "Contribution" means:
+ a) in the case of International Business Machines Corporation ("IBM"),
+ the Original Program, and
+ b) in the case of each Contributor,
+ i) changes to the Program, and
+ ii) additions to the Program;
+ where such changes and/or additions to the Program originate
+ from and are distributed by that particular Contributor.
+ A Contribution 'originates' from a Contributor if it was added
+ to the Program by such Contributor itself or anyone acting on
+ such Contributor's behalf.
+ Contributions do not include additions to the Program which:
+ (i) are separate modules of software distributed in conjunction
+ with the Program under their own license agreement, and
+ (ii) are not derivative works of the Program.
+ .
+ "Contributor" means IBM and any other entity that distributes the Program.
+ .
+ "Licensed Patents " mean patent claims licensable by a Contributor which are
+ necessarily infringed by the use or sale of its Contribution alone or when
+ combined with the Program.
+ .
+ "Original Program" means the original version of the software accompanying this
+ Agreement as released by IBM, including source code, object code and
+ documentation, if any.
+ .
+ "Program" means the Original Program and Contributions.
+ .
+ "Recipient" means anyone who receives the Program under this Agreement,
+ including all Contributors.
+ .
+ 2. GRANT OF RIGHTS
+ .
+ a) Subject to the terms of this Agreement, each Contributor hereby grants
+ Recipient a non-exclusive, worldwide, royalty-free copyright license to
+ reproduce, prepare derivative works of, publicly display, publicly perform,
+ distribute and sublicense the Contribution of such Contributor, if any, and
+ such derivative works, in source code and object code form.
+ .
+ b) Subject to the terms of this Agreement, each Contributor hereby grants
+ Recipient a non-exclusive, worldwide, royalty-free patent license under
+ Licensed Patents to make, use, sell, offer to sell, import and otherwise
+ transfer the Contribution of such Contributor, if any, in source code and
+ object code form. This patent license shall apply to the combination of the
+ Contribution and the Program if, at the time the Contribution is added by the
+ Contributor, such addition of the Contribution causes such combination to be
+ covered by the Licensed Patents. The patent license shall not apply to any
+ other combinations which include the Contribution. No hardware per se is
+ licensed hereunder.
+ .
+ c) Recipient understands that although each Contributor grants the licenses to
+ its Contributions set forth herein, no assurances are provided by any
+ Contributor that the Program does not infringe the patent or other
+ intellectual property rights of any other entity. Each Contributor disclaims
+ any liability to Recipient for claims brought by any other entity based on
+ infringement of intellectual property rights or otherwise. As a condition to
+ exercising the rights and licenses granted hereunder, each Recipient hereby
+ assumes sole responsibility to secure any other intellectual property rights
+ needed, if any. For example, if a third party patent license is required to
+ allow Recipient to distribute the Program, it is Recipient's responsibility to
+ acquire that license before distributing the Program.
+ .
+ d) Each Contributor represents that to its knowledge it has sufficient
+ copyright rights in its Contribution, if any, to grant the copyright license
+ set forth in this Agreement.
+ .
+ 3. REQUIREMENTS
+ .
+ A Contributor may choose to distribute the Program in object code form under
+ its own license agreement, provided that:
+ a) it complies with the terms and conditions of this Agreement; and
+ b) its license agreement:
+ i) effectively disclaims on behalf of all Contributors all
+ warranties and conditions, express and implied, including
+ warranties or conditions of title and non-infringement, and
+ implied warranties or conditions of merchantability and fitness
+ for a particular purpose;
+ ii) effectively excludes on behalf of all Contributors all
+ liability for damages, including direct, indirect, special,
+ incidental and consequential damages, such as lost profits;
+ iii) states that any provisions which differ from this Agreement
+ are offered by that Contributor alone and not by any other
+ party; and
+ iv) states that source code for the Program is available from
+ such Contributor, and informs licensees how to obtain it in a
+ reasonable manner on or through a medium customarily used for
+ software exchange.
+ .
+ When the Program is made available in source code form:
+ a) it must be made available under this Agreement; and
+ b) a copy of this Agreement must be included with each copy of the
+ Program.
+ .
+ Each Contributor must include the following in a conspicuous location in the
+ Program:
+ .
+ Copyright (c) 1997,1998,1999, International Business Machines
+ Corporation and others. All Rights Reserved.
+ .
+ In addition, each Contributor must identify itself as the originator of its
+ Contribution, if any, in a manner that reasonably allows subsequent Recipients
+ to identify the originator of the Contribution.
+ .
+ 4. COMMERCIAL DISTRIBUTION
+ .
+ Commercial distributors of software may accept certain responsibilities with
+ respect to end users, business partners and the like. While this license is
+ intended to facilitate the commercial use of the Program, the Contributor who
+ includes the Program in a commercial product offering should do so in a manner
+ which does not create potential liability for other Contributors. Therefore, if
+ a Contributor includes the Program in a commercial product offering, such
+ Contributor ("Commercial Contributor") hereby agrees to defend and indemnify
+ every other Contributor ("Indemnified Contributor") against any losses, damages
+ and costs (collectively "Losses") arising from claims, lawsuits and other legal
+ actions brought by a third party against the Indemnified Contributor to the
+ extent caused by the acts or omissions of such Commercial Contributor in
+ connection with its distribution of the Program in a commercial product
+ offering. The obligations in this section do not apply to any claims or Losses
+ relating to any actual or alleged intellectual property infringement. In order
+ to qualify, an Indemnified Contributor must:
+ a) promptly notify the Commercial Contributor in writing of such claim,
+ and
+ b) allow the Commercial Contributor to control, and cooperate with the
+ Commercial Contributor in, the defense and any related settlement
+ negotiations. The Indemnified Contributor may participate in any such
+ claim at its own expense.
+ .
+ For example, a Contributor might include the Program in a commercial product
+ offering, Product X. That Contributor is then a Commercial Contributor. If that
+ Commercial Contributor then makes performance claims, or offers warranties
+ related to Product X, those performance claims and warranties are such
+ Commercial Contributor's responsibility alone. Under this section, the
+ Commercial Contributor would have to defend claims against the other
+ Contributors related to those performance claims and warranties, and if a court
+ requires any other Contributor to pay any damages as a result, the Commercial
+ Contributor must pay those damages.
+ .
+ 5. NO WARRANTY
+ .
+ EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED ON AN
+ "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR
+ IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE,
+ NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each
+ Recipient is solely responsible for determining the appropriateness of using
+ and distributing the Program and assumes all risks associated with its exercise
+ of rights under this Agreement, including but not limited to the risks and
+ costs of program errors, compliance with applicable laws, damage to or loss of
+ data, programs or equipment, and unavailability or interruption of operations.
+ .
+ 6. DISCLAIMER OF LIABILITY
+ .
+ EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY
+ CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST
+ PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
+ WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS
+ GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
+ .
+ 7. GENERAL
+ .
+ If any provision of this Agreement is invalid or unenforceable under applicable
+ law, it shall not affect the validity or enforceability of the remainder of the
+ terms of this Agreement, and without further action by the parties hereto, such
+ provision shall be reformed to the minimum extent necessary to make such
+ provision valid and enforceable.
+ .
+ If Recipient institutes patent litigation against a Contributor with respect to
+ a patent applicable to software (including a cross-claim or counterclaim in a
+ lawsuit), then any patent licenses granted by that Contributor to such
+ Recipient under this Agreement shall terminate as of the date such litigation
+ is filed. In addition, If Recipient institutes patent litigation against any
+ entity (including a cross-claim or counterclaim in a lawsuit) alleging that the
+ Program itself (excluding combinations of the Program with other software or
+ hardware) infringes such Recipient's patent(s), then such Recipient's rights
+ granted under Section 2(b) shall terminate as of the date such litigation is
+ filed.
+ .
+ All Recipient's rights under this Agreement shall terminate if it fails to
+ comply with any of the material terms or conditions of this Agreement and does
+ not cure such failure in a reasonable period of time after becoming aware of
+ such noncompliance. If all Recipient's rights under this Agreement terminate,
+ Recipient agrees to cease use and distribution of the Program as soon as
+ reasonably practicable. However, Recipient's obligations under this Agreement
+ and any licenses granted by Recipient relating to the Program shall continue
+ and survive.
+ .
+ IBM may publish new versions (including revisions) of this Agreement from time
+ to time. Each new version of the Agreement will be given a distinguishing
+ version number. The Program (including Contributions) may always be distributed
+ subject to the version of the Agreement under which it was received. In
+ addition, after a new version of the Agreement is published, Contributor may
+ elect to distribute the Program (including its Contributions) under the new
+ version. No one other than IBM has the right to modify this Agreement. Except
+ as expressly stated in Sections 2(a) and 2(b) above, Recipient receives no
+ rights or licenses to the intellectual property of any Contributor under this
+ Agreement, whether expressly, by implication, estoppel or otherwise. All rights
+ in the Program not expressly granted under this Agreement are reserved.
+ .
+ This Agreement is governed by the laws of the State of New York and the
+ intellectual property laws of the United States of America. No party to this
+ Agreement will bring a legal action under this Agreement more than one year
+ after the cause of action arose. Each party waives its rights to a jury trial
+ in any resulting litigation.
+
+Files: Date/Manip.pm
+Copyright: (C) 1995-1999 Sullivan Beck
+License: GPL | Artistic
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of either:
+ .
+ a) the GNU General Public License as published by the Free
+ Software Foundation; either version 1, or (at your option) any
+ later version, or
+ .
+ b) the "Artistic License" which comes with this Kit.
+ .
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See either
+ the GNU General Public License or the Artistic License for more details.
+
+Files: lib/realpath.pl
+Copyright: 1996 Shigio Yamaguchi
+License: GPL | Artistic
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of either:
+ .
+ a) the GNU General Public License as published by the Free
+ Software Foundation; either version 1, or (at your option) any
+ later version, or
+ .
+ b) the "Artistic License" which comes with this Kit.
+ .
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See either
+ the GNU General Public License or the Artistic License for more details.
+
+Files: man/man1/file.1, src/file/*
+Copyright: (C) 1987-1995 Ian F. Darwin
+License: BSD
+ This software (or derivative software) may not be made subject to any
+ license which denies anyone permission to alter it and redistribute it
+ freely. Derivative software must also still fall under this license.
+ .
+ This software is not subject to any export provision of the United States
+ Department of Commerce, and may be exported to any country or planet.
+ .
+ Permission is granted to anyone to use this software for any purpose on
+ any computer system, and to alter it and redistribute it freely, subject
+ to the following restrictions:
+ .
+ 1. The author is not responsible for the consequences of use of this
+ software, no matter how awful, even if they arise from flaws in it.
+ .
+ 2. The origin of this software must not be misrepresented, either by
+ explicit claim or by omission. Since few users ever read sources,
+ credits must appear in the documentation.
+ .
+ 3. Altered versions must be plainly marked as such, and must not be
+ misrepresented as being the original software. Since few users
+ ever read sources, credits must appear in the documentation.
+ Derivative works must also be marked as such, and credits must appear
+ in the documentation.
+ .
+ 4. This notice may not be removed or altered.
+
+Files: man/man1/lastcomm.1, src/lastcomm/*
+Copyright: (C) 1980-1993
+License: The Regents of the University of California
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions
+ are met:
+ .
+ 1. Redistributions of source code must retain the above copyright
+ notice, this list of conditions and the following disclaimer.
+ .
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+ .
+ 3. All advertising materials mentioning features or use of this software
+ must display the following acknowledgement:
+ .
+ This product includes software developed by the University of
+ California, Berkeley and its contributors.
+ .
+ 4. Neither the name of the University nor the names of its contributors
+ may be used to endorse or promote products derived from this software
+ without specific prior written permission.
+ .
+ THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ SUCH DAMAGE.
+
+Files: src/misc/md5.*
+Copyright: (C) 1991-1992 RSA Data Security, Inc.
+License: Other
+ License to copy and use this software is granted provided that it
+ is identified as the "RSA Data Security, Inc. MD5 Message-Digest
+ Algorithm" in all material mentioning or referencing this software
+ or this function.
+ .
+ License is also granted to make and use derivative works provided
+ that such works are identified as "derived from the RSA Data
+ Security, Inc. MD5 Message-Digest Algorithm" in all material
+ mentioning or referencing the derived work.
+ .
+ RSA Data Security, Inc. makes no representations concerning either
+ the merchantability of this software or the suitability of this
+ software for any particular purpose. It is provided "as is"
+ without express or implied warranty of any kind.
+ .
+ These notices must be retained in any copies of any part of this
+ documentation and/or software.
+
+Files: debian/*
+Copyright: (C) 2008 Daniel Baumann <daniel at debian.org>
+License: BSD
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted providing that the following conditions
+ are met:
+ .
+ 1. Redistributions of source code must retain the above copyright
+ notice, this list of conditions and the following disclaimer.
+ .
+ 2. Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in the
+ documentation and/or other materials provided with the distribution.
+ .
+ THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
+ DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
+ IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ POSSIBILITY OF SUCH DAMAGE.
diff --git a/debian/example/md5_image_maker.sh b/debian/example/md5_image_maker.sh
new file mode 100644
index 0000000..27aa195
--- /dev/null
+++ b/debian/example/md5_image_maker.sh
@@ -0,0 +1,23 @@
+#!/bin/sh
+
+# md5_image_maker: Produce raw images of partitions and store their appropriate
+# md5 sums in a separate file.
+# 2001-2002 Yotam Rubin <yotam at makif.omer.k12.il>
+#
+# Usage: md5_image_maker <partition> <partition> ...
+
+MD5SUM="/usr/bin/md5sum"
+
+if [ -z "${1}" ]
+then
+ echo "Usage: ${0} PARTITION [PARTITON ...]"
+ exit 1
+fi
+
+touch md5sums
+
+for PARTITION in ${@}
+do
+ dd if=/dev/${PARTITION} of=${PARTITION}.bin
+ ${MD5SUM} ${PARTITION}.bin >> md5sums
+done
diff --git a/debian/ils2mac.1 b/debian/ils2mac.1
deleted file mode 100644
index 429cdf6..0000000
--- a/debian/ils2mac.1
+++ /dev/null
@@ -1,23 +0,0 @@
-.TH ils2mac 1
-.ad
-.fi
-.SH NAME
-ils2mac
-\-
-Convert ils output to mactime parsable data
-.SH SYNOPSIS
-.na
-.nf
-\fBils2mac\fR
-.SH DESCRIPTION
-Take a stream of time machine formatted data from ils and re-arrange
-the fields into the fixed order that mactime expects.
-
-This program should not be necessary. The next version of mactime should
-understand time machine format instead of just pretending it does.
-
-Kludge: if the first line is not in time machine format assume that
-we are looking at output from the grave-robber which prepends a date
-line of its own (which is gross because time machine data already
-contains a time stamp, and the obvious fix is to fix grave-robber).
-.ad
diff --git a/debian/manpage/ils2mac.1 b/debian/manpage/ils2mac.1
new file mode 100644
index 0000000..dc3e8c8
--- /dev/null
+++ b/debian/manpage/ils2mac.1
@@ -0,0 +1,25 @@
+.TH ILS2MAC 1 "2008-11-27" "1.18" "convert ils to mactime"
+
+.SH NAME
+ils2mac \- Convert ils output to mactime parsable data
+
+.SH SYNOPSIS
+\fBils2mac\fR \fIINPUT\fR \fIOUTPUT\fR
+
+.SH DESCRIPTION
+Take a stream of time machine formatted data from ils and re\-arrange the fields into the fixed order that mactime expects.
+.PP
+This program should not be necessary. The next version of mactime should understand time machine format instead of just pretending it does.
+.PP
+Kludge: if the first line is not in time machine format assume that we are looking at output from the grave\-robber which prepends a date line of its own (which is gross because time machine data already contains a time stamp, and the obvious fix is to fix grave\-robber).
+
+.SH OPTIONS
+ils2mac has no options.
+
+.SH HOMEPAGE
+More information about ils2mac and the The Coroner's Toolkit (TCT) project can be found at <\fIhttp://www.porcupine.org/forensics/tct.html\fR>.
+
+.SH AUTHOR
+ils2mac was written by Dan Farmer and Wietse Venema.
+.PP
+This manual page was written by Daniel Baumann <\fIdaniel at debian.org\fR>, for the Debian project (but may be used by others).
diff --git a/debian/patches/00list b/debian/patches/00list
new file mode 100644
index 0000000..4926043
--- /dev/null
+++ b/debian/patches/00list
@@ -0,0 +1 @@
+01-conglomeration.dpatch
diff --git a/debian/patches/01-conglomeration.dpatch b/debian/patches/01-conglomeration.dpatch
new file mode 100644
index 0000000..cfc9fdc
--- /dev/null
+++ b/debian/patches/01-conglomeration.dpatch
@@ -0,0 +1,491 @@
+#!/bin/sh /usr/share/dpatch/dpatch-run
+## 01-conglomeration.dpatch
+##
+## DP: Needs to be broken out (FIXME).
+
+ at DPATCH@
+
+diff -Naurp tct.orig/bin/grave-robber tct/bin/grave-robber
+--- tct.orig/bin/grave-robber 2007-01-21 22:18:00.000000000 +0000
++++ tct/bin/grave-robber 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+
+ #
+ # Usage: $0 [-filmnpstvDEFIMOPVS] [-b body_file] [-c corpse_dir]
+@@ -118,7 +118,7 @@ else {
+ $TCT_HOME = "";
+ }
+
+- at INC = ("$TCT_HOME/lib", "$TCT_HOME/conf", @INC);
++ at INC = ("/etc/tct", "/usr/share/tct", @INC);
+
+ #
+ # get user input on what the program should do...
+@@ -415,10 +415,10 @@ print "going into grave_robber_init()\n"
+ #
+ &log_init_path($logfile);
+
+-$LIB = "$TCT_HOME/lib";
+-$BIN = "$TCT_HOME/bin";
+-$ETC = "$TCT_HOME/etc";
+-$CONFIG = "$TCT_HOME/conf";
++$LIB = "/usr/share/tct";
++$BIN = "/usr/bin";
++$ETC = "/etc";
++$CONFIG = "/etc/tct";
+
+ if (!$TCT_HOME) {
+ die "Can't find TCT_HOME - did you run reconfig?\n";
+diff -Naurp tct.orig/bin/mactime tct/bin/mactime
+--- tct.orig/bin/mactime 2007-01-21 22:18:00.000000000 +0000
++++ tct/bin/mactime 2008-11-28 07:58:27.000000000 +0000
+@@ -1,5 +1,5 @@
+-#!/usr/bin/perl5
+-#
++#!/usr/bin/perl
++
+ # A program that attempts to determine what files (taken from an already
+ # calculated DB; see the file "body") were mucked with at a given time...
+ # probably to match when a user was logged in, but since logs get smashed,
+@@ -97,7 +97,7 @@
+ BEGIN {
+ $running_under_grave_robber = 1;
+ $TCT_HOME = "";
+-require "$TCT_HOME/conf/coroner.cf";
++require "/etc/tct/coroner.cf";
+ }
+
+ require "body_init.pl";
+diff -Naurp tct.orig/bin/strip_tct_home tct/bin/strip_tct_home
+--- tct.orig/bin/strip_tct_home 2007-01-21 22:18:00.000000000 +0000
++++ tct/bin/strip_tct_home 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+ #
+ # NOTE!!!
+ #
+diff -Naurp tct.orig/conf/coroner.cf tct/conf/coroner.cf
+--- tct.orig/conf/coroner.cf 2007-01-21 22:18:00.000000000 +0000
++++ tct/conf/coroner.cf 2008-11-28 07:58:27.000000000 +0000
+@@ -4,9 +4,9 @@
+
+ $TCT_HOME = "";
+
+-$ETC = "$TCT_HOME/etc" unless $ETC;
++$ETC = "/etc" unless $ETC;
+
+- at INC = ("$TCT_HOME/lib", "$TCT_HOME/conf", "$TCT_HOME", @INC);
++ at INC = ("/etc/tct", "/usr/share/tct", @INC);
+
+ #
+ # Where all the full pathnames to the various shell binaries used live
+diff -Naurp tct.orig/conf/grave-robber.cf tct/conf/grave-robber.cf
+--- tct.orig/conf/grave-robber.cf 2007-01-21 22:18:00.000000000 +0000
++++ tct/conf/grave-robber.cf 2008-11-28 07:58:27.000000000 +0000
+@@ -9,7 +9,7 @@ $BIN = "$TCT_HOME/bin" unless $BIN;
+ $ETC = "$TCT_HOME/etc" unless $ETC;
+ $CONFIG = "$TCT_HOME/conf" unless $CONFIG;
+
+- at INC = ("$TCT_HOME/lib", "$TCT_HOME/conf", @INC);
++ at INC = ("/etc/tct", "/usr/share/tct", @INC);
+
+ #
+ # Where all the full pathnames to the various shell binaries used live
+@@ -140,7 +140,7 @@ $strings_log = "strings_log";
+ #
+ # What tools/files do we want to investigate immediately?
+ #
+-$toolkit = "$CONFIG/look\@first";
++$toolkit = "/etc/tct/look\@first";
+
+ #
+ # I think BSD ps returns >= 12 fields (after header) when you do a ps -auxwwge
+diff -Naurp tct.orig/conf/look at first tct/conf/look at first
+--- tct.orig/conf/look at first 2000-07-30 23:39:20.000000000 +0000
++++ tct/conf/look at first 2008-11-28 07:58:27.000000000 +0000
+@@ -1,6 +1,6 @@
+ #
+ # These are dirs containing tools & files we want to investigate first,
+-# so we stat/whatever them first, and then we can fuck with them without
++# so we stat/whatever them first, and then we can muck with them without
+ # worrying about destroying forensic evidence.
+ #
+ # We automatically go through the $PATH variable of the user running
+diff -Naurp tct.orig/conf/paths.pl tct/conf/paths.pl
+--- tct.orig/conf/paths.pl 2007-01-21 22:18:00.000000000 +0000
++++ tct/conf/paths.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -13,7 +13,7 @@ $CP="/bin/cp";
+
+ $CRONTAB="/usr/bin/crontab";
+ $DATE="/bin/date";
+-$DMESG="/sbin/dmesg";
++$DMESG="/bin/dmesg";
+ $DOMAINNAME="/bin/domainname";
+ $ECHO="/bin/echo";
+
+@@ -23,34 +23,34 @@ $IFCONFIG="/sbin/ifconfig";
+ $IPCS="/usr/bin/ipcs";
+ $LAST="/usr/bin/last";
+
+-$LSOF="/usr/local/sbin/lsof";
++$LSOF="/usr/bin/lsof";
+ $MKDIR="/bin/mkdir";
+-$NETSTAT="/usr/bin/netstat";
++$NETSTAT="/bin/netstat";
+ $PS="/bin/ps";
+ $PWD="/bin/pwd";
+
+ $RPCINFO="/usr/bin/rpcinfo";
+-$SHOWMOUNT="/usr/bin/showmount";
++$SHOWMOUNT="/sbin/showmount";
+ $STRINGS="/usr/bin/strings";
+-$SU="/usr/bin/su";
++$SU="/bin/su";
+ $SYNC="/bin/sync";
+ $TEE="/usr/bin/tee";
+
+ $TOP="/usr/bin/top";
+-$UNAME="/usr/bin/uname";
++$UNAME="/bin/uname";
+ $UPTIME="/usr/bin/uptime";
+ $W="/usr/bin/w";
+ $WHO="/usr/bin/who";
+
+-$XAUTH="/usr/X11R6/bin/xauth";
+-$XHOST="/usr/X11R6/bin/xhost";
++$XAUTH="/usr/bin/xauth";
++$XHOST="/usr/bin/xhost";
+ $YPCAT="/usr/bin/ypcat";
+
+ # suns...
+ $EEPROM="/usr/sbin/eeprom";
+ $FORMAT="/etc/format";
+ $SHOWREV="/bin/showrev";
+-$NFSSTAT="/usr/bin/nfsstat";
++$NFSSTAT="/usr/sbin/nfsstat";
+
+ # solaris
+ $SWAP="/etc/swap";
+@@ -61,7 +61,8 @@ $DEVINFO="/usr/sbin/devinfo";
+ $PSTAT="/usr/sbin/pstat";
+
+ # linux
+-$RPM="/usr/local/bin/rpm";
++$DPKG="/usr/bin/dpkg";
++$RPM="/usr/bin/rpm";
+ $KSYMS="/sbin/ksyms";
+ $LSMOD="/sbin/lsmod";
+
+@@ -77,12 +78,12 @@ $DF="/bin/df";
+ #
+ # our stuff
+ #
+-$FILE = "$TCT_HOME/bin/file";
+-$MD5 = "$TCT_HOME/bin/md5";
+-$PCAT = "$TCT_HOME/bin/pcat";
+-$ICAT = "$TCT_HOME/bin/icat";
+-$ILS = "$TCT_HOME/bin/ils";
+-$LASTCOMM = "$TCT_HOME/bin/lastcomm";
+-$MAJ_MIN = "$TCT_HOME/bin/major_minor";
+-$TIMEOUT = "$TCT_HOME/bin/timeout";
++$FILE = "/bin/file";
++$MD5 = "/bin/md5sum";
++$PCAT = "/bin/pcat";
++$ICAT = "/bin/icat";
++$ILS = "/bin/ils";
++$LASTCOMM = "/bin/lastcomm";
++$MAJ_MIN = "/bin/major_minor";
++$TIMEOUT = "/bin/timeout";
+
+diff -Naurp tct.orig/extras/bdf tct/extras/bdf
+--- tct.orig/extras/bdf 2007-01-21 22:18:00.000000000 +0000
++++ tct/extras/bdf 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+
+ #
+ # Goes through text & binaries files, looking for executables
+diff -Naurp tct.orig/extras/ils2mac tct/extras/ils2mac
+--- tct.orig/extras/ils2mac 2007-01-21 22:18:00.000000000 +0000
++++ tct/extras/ils2mac 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+
+ #
+ # Take a stream of time machine formatted data from ils and re-arrange
+@@ -17,7 +17,7 @@ $debug = 0;
+ $running_under_grave_robber = 1;
+
+ $TCT_HOME = "";
+-require "$TCT_HOME/conf/coroner.cf";
++require "/etc/tct/coroner.cf";
+ require "tm_misc.pl";
+ require "hostname.pl";
+ require "crunch.pl";
+diff -Naurp tct.orig/extras/realpath tct/extras/realpath
+--- tct.orig/extras/realpath 2007-01-21 22:18:00.000000000 +0000
++++ tct/extras/realpath 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+
+ #
+ # Prints out the real pathname of file(s); usage:
+diff -Naurp tct.orig/lazarus/lazarus tct/lazarus/lazarus
+--- tct.orig/lazarus/lazarus 2007-01-21 22:18:00.000000000 +0000
++++ tct/lazarus/lazarus 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/bin/perl5
++#!/usr/bin/perl
+ #
+ # Lazarus - tries to revive things that have died and gone into the
+ # binary spirit world... deleted files, data in memory, swap, etc.
+@@ -66,6 +66,7 @@
+ # [...]
+ #
+
++ at INC = ("/etc/tct", "/usr/share/tct", @INC);
+ $TCT_HOME = "";
+
+ $| = 1;
+@@ -77,7 +78,7 @@ if (!$TCT_HOME) {
+ die "Can't find TCT_HOME - did you run reconfig?\n";
+ }
+ else {
+- require "$TCT_HOME/conf/coroner.cf";
++ require "/etc/tct/coroner.cf";
+ }
+
+ require "lazarus.cf";
+diff -Naurp tct.orig/lib/linux.pl tct/lib/linux.pl
+--- tct.orig/lib/linux.pl 2001-03-16 19:25:04.000000000 +0000
++++ tct/lib/linux.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -35,6 +35,7 @@ print "Running all sorts of commands on
+ &df();
+
+ &ipcs();
++&dpkg();
+ &rpm();
+ &lsmod();
+
+@@ -260,6 +261,22 @@ if (-x $IPCS) {
+ }
+ }
+
++sub dpkg {
++
++if (-x $DPKG ) {
++ if (!$CORPSE) {
++ &date_stamp("$COMM_OUT/dpkg");
++ &redirect_command($DPKG, "-l", ">>$COMM_OUT/dpkg");
++ &sign_it("$COMM_OUT/dpkg");
++ }
++ else {
++ &date_stamp("$COMM_OUT/dpkg");
++ &redirect_command($DPKG, "--root", "$CORPSE", "-l", ">>$COMM_OUT/dpkg");
++ &sign_it("$COMM_OUT/dpkg");
++ }
++ }
++}
++
+ sub rpm {
+
+ if (-x $RPM ) {
+diff -Naurp tct.orig/lib/ostype.pl tct/lib/ostype.pl
+--- tct.orig/lib/ostype.pl 2003-08-30 23:17:11.000000000 +0000
++++ tct/lib/ostype.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,3 @@
+-#!/bin/perl
+ #
+ # Simple test that uses uname to determine what we're running on...
+ #
+diff -Naurp tct.orig/lib/process_dirs.pl tct/lib/process_dirs.pl
+--- tct.orig/lib/process_dirs.pl 2000-07-30 23:39:20.000000000 +0000
++++ tct/lib/process_dirs.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -1,4 +1,3 @@
+-#!/usr/local/bin/perl
+
+ #
+ # given a dir, suck in all the executable files in there
+diff -Naurp tct.orig/lib/save_the_files.pl tct/lib/save_the_files.pl
+--- tct.orig/lib/save_the_files.pl 2000-07-30 23:39:20.000000000 +0000
++++ tct/lib/save_the_files.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -30,6 +30,7 @@ while (<STF>) {
+ print "next file: $files\n" if $debug;
+
+ while (<${files}>) {
++ next if (/^\Q$DATA\E/o);
+ print "Going into while...\n" if $debug;
+
+
+diff -Naurp tct.orig/lib/system_stubs.pl tct/lib/system_stubs.pl
+--- tct.orig/lib/system_stubs.pl 2000-07-30 23:39:20.000000000 +0000
++++ tct/lib/system_stubs.pl 2008-11-28 07:58:35.000000000 +0000
+@@ -1,4 +1,4 @@
+-#!/usr/local/bin/perl
++#!/usr/bin/perl
+
+ #
+ # a simple set of stub routines to call the real functions that do
+diff -Naurp tct.orig/lib/tree.pl tct/lib/tree.pl
+--- tct.orig/lib/tree.pl 2001-02-22 16:19:40.000000000 +0000
++++ tct/lib/tree.pl 2008-11-28 07:58:27.000000000 +0000
+@@ -150,9 +150,9 @@ sub do_first_looks {
+
+ print "\nStarting preprocessing paths and filenames on $hostname...\n";
+
+-die "Can't open $TCT_HOME/conf/paths.pl (in do_first_looks())!\n" unless open (PATHS, "$TCT_HOME/conf/paths.pl");
++die "Can't open $CONFIG/paths.pl (in do_first_looks())!\n" unless open (PATHS, "$CONFIG/paths.pl");
+
+-print "\tpreprocessing $TCT_HOME/conf/paths.pl\n" if $verbose;
++print "\tpreprocessing $CONFIG/paths.pl\n" if $verbose;
+
+ while (<PATHS>) {
+ next if (/^\s*#/ || /^\s*$/);
+diff -Naurp tct.orig/man/man1/timeout.1 tct/man/man1/timeout.1
+--- tct.orig/man/man1/timeout.1 2004-10-18 14:59:46.000000000 +0000
++++ tct/man/man1/timeout.1 2008-11-28 07:58:27.000000000 +0000
+@@ -20,16 +20,16 @@ Arguments:
+ .IP \fI-signal\fR
+ Specify an optional signal to send to the controlled process.
+ By default, \fBtimeout\fR sends SIGKILL, which cannot be caught
+-or ignored.
++or ignored. The signal must be provided in its numerical value.
+ .IP \fItime\fR
+-The elapsed time limit after which the command is terminated.
++The elapsed time limit in seconds after which the command is terminated.
+ .IP \fIcommand\fR
+ The command to be executed.
+ .SH DIAGNOSTICS
+ .ad
+ .fi
+-The command exit status is the exit status of the command
+-(status 1 in case of a usage error).
++timeout's exit status is the exit status of the specified command or 1 in
++case of a usage error.
+ .SH LICENSE
+ .na
+ .nf
+diff -Naurp tct.orig/reconfig tct/reconfig
+--- tct.orig/reconfig 2001-09-15 20:48:51.000000000 +0000
++++ tct/reconfig 2008-11-28 07:58:27.000000000 +0000
+@@ -39,7 +39,7 @@ $other_dirs="bin:/etc:/usr/ccs/bin:/bin:
+ "find", "ftp", "format", "ifconfig", "ipcs", "last", "ls", "lsof",
+ "lsmod", "modinfo", "modstat",
+ "mkdir", "mv", "netstat", "nfsstat", "nslookup", "pkginfo", "ping",
+- "ps", "pstat", "pwd", "rm", "rpm", "rpcinfo", "rusers", "sed", "sh",
++ "ps", "pstat", "pwd", "rm", "dpkg", "rpm", "rpcinfo", "rusers", "sed", "sh",
+ "showmount", "showrev", "sort", "strings", "su", "swap", "sync",
+ "test", "top", "touch", "uname", "uniq", "uudecode", "uptime",
+ "w", "who", "whoami", "xhost", "xauth", "ypcat", "ypwhich");
+@@ -81,7 +81,7 @@ print "\nPerl5 is in $PERL\n";
+
+ for (@perl5_src) { $perl5_src .= "$_ "; }
+ print "\nchanging the source in: $perl5_src\n";
+-system "$PERL -pi -e \"s@^#!.*/perl.*@#!$PERL@;\" $perl5_src";
++#system "$PERL -pi -e \"s@^#!.*/perl.*@#!$PERL@;\" $perl5_src";
+
+ # make sure things are executable...
+ system("chmod +x $perl5_src");
+@@ -94,7 +94,7 @@ for $command (@all_commands) {
+ # special case rsh/remsh; if we can find remsh, ignore rsh
+ if ($command eq "rsh") {
+ # print "looking for rsh/remsh ($dir/$command)\n";
+- if (-x "$dir/remsh") {
++ if (-x "$dir/remsh" and -f _) {
+ # this converts to upper case
+ ($upper = $command) =~ y/[a-z]/[A-Z]/;
+ $found="true";
+@@ -167,7 +167,7 @@ for $file (@files2reconfig) {
+ die "Can't open $file for reading\n" unless open(FILE, $file);
+ while (<FILE>) {
+ if (/^\s*\$TCT_HOME\s*=/ && !$done) {
+- $file{$n++} = "\$TCT_HOME = \"$cwd\";\n";
++ $file{$n++} = "\$TCT_HOME = \"/var/cache/tct\";\n";
+ $done = 1;
+ next;
+ }
+diff -Naurp tct.orig/src/file/compress.c tct/src/file/compress.c
+--- tct.orig/src/file/compress.c 2000-07-30 23:39:20.000000000 +0000
++++ tct/src/file/compress.c 2008-11-28 07:58:27.000000000 +0000
+@@ -11,6 +11,7 @@
+ #include <unistd.h>
+ #include <string.h>
+ #include <sys/wait.h>
++#include <errno.h>
+
+ #include "file.h"
+
+diff -Naurp tct.orig/src/file/file.c tct/src/file/file.c
+--- tct.orig/src/file/file.c 2000-07-30 23:39:20.000000000 +0000
++++ tct/src/file/file.c 2008-11-28 07:58:27.000000000 +0000
+@@ -36,6 +36,7 @@ static char *moduleid =
+ #include <sys/param.h> /* for MAXPATHLEN */
+ #include <sys/stat.h>
+ #include <fcntl.h> /* for open() */
++#include <errno.h>
+ #if (__COHERENT__ >= 0x420)
+ #include <sys/utime.h>
+ #else
+diff -Naurp tct.orig/src/file/fsmagic.c tct/src/file/fsmagic.c
+--- tct.orig/src/file/fsmagic.c 2000-07-30 23:39:20.000000000 +0000
++++ tct/src/file/fsmagic.c 2008-11-28 07:58:27.000000000 +0000
+@@ -31,6 +31,7 @@
+ #include <sys/stat.h>
+ #include <unistd.h>
+ #include <stdlib.h>
++#include <errno.h>
+ #ifndef major /* if `major' not defined in types.h, */
+ #include <sys/sysmacros.h> /* try this one. */
+ #endif
+diff -Naurp tct.orig/src/fstools/fs_tools.h tct/src/fstools/fs_tools.h
+--- tct.orig/src/fstools/fs_tools.h 2007-04-09 13:30:32.000000000 +0000
++++ tct/src/fstools/fs_tools.h 2008-11-28 07:58:27.000000000 +0000
+@@ -201,7 +201,7 @@ extern int optind;
+ */
+ #if defined(LINUX2)
+ #define SUPPORTED
+-#include <linux/ext2_fs.h>
++#include <ext2fs/ext2_fs.h>
+ #define HAVE_EXT2FS
+ #define HAVE_DTIME
+ #if (_FILE_OFFSET_BITS == 64)
+diff -Naurp tct.orig/src/fstools/mylseek.c tct/src/fstools/mylseek.c
+--- tct.orig/src/fstools/mylseek.c 2006-06-26 21:07:45.000000000 +0000
++++ tct/src/fstools/mylseek.c 2008-11-28 07:58:27.000000000 +0000
+@@ -30,9 +30,9 @@
+ * This is LINUX, live on the bleeding edge and watch your software break
+ * with the next release...
+ */
+-static _syscall5(int, _llseek, unsigned int, fd, unsigned long, offset_high,
+- unsigned long, offset_low, OFF_T *, result,
+- unsigned int, origin)
++#define _llseek(fd, offset_high, offset_low, result, origin) \
++ syscall(SYS__llseek, fd, offset_high, offset_low, result, origin)
++
+ /* mylseek - seek beyond the 32-bit barrier */
+
+ OFF_T mylseek(int fd, OFF_T offset, int whence)
+diff -Naurp tct.orig/src/lastcomm/sys_defs.h tct/src/lastcomm/sys_defs.h
+--- tct.orig/src/lastcomm/sys_defs.h 2003-08-30 23:18:31.000000000 +0000
++++ tct/src/lastcomm/sys_defs.h 2008-11-28 07:58:27.000000000 +0000
+@@ -77,10 +77,14 @@ extern int getopt();
+ #define NODEV 0xffff
+ #define HAVE_COMP_MAJOR_PFLTS
+ #define HAVE_COMP_EXIT_STATUS
++
++#ifndef __alpha__
+ #define HAVE_COMP_MEMORY_USAGE
+ #define HAVE_COMP_CHAR_IO_COUNT
+ #define HAVE_COMP_BLOCK_RW_COUNT
+ #define HAVE_COMP_SWAP_USAGE
++#endif
++
+ #define HAVE_EXIT_STATUS
+ #define PRINT_LINESIZE 8
+ #define PRINT_NAMESIZE 8
diff --git a/debian/rules b/debian/rules
index 2aea5e8..28f8da2 100755
--- a/debian/rules
+++ b/debian/rules
@@ -1,66 +1,57 @@
-#!/usr/bin/make -f
+#!/usr/bin/make -f
-# This makes the other DH_OPTIONS lines work
-export DH_OPTIONS
-export DH_VERBOSE
+include /usr/share/dpatch/dpatch.make
-ifneq (,$(findstring noopt,$(DEB_BUILD_OPTIONS)))
- CFLAGS += -O0
-else
- CFLAGS += -O2
-endif
-
-clean:
- dh_testroot
+clean: unpatch
dh_testdir
- dh_clean
+ dh_testroot
+ rm -f build-stamp
+
+ cp conf/paths.pl conf/paths.pl.debian
+
$(MAKE) tidy
- chmod 755 debian/rules
+ chmod 0755 debian/rules
+
+ mv conf/paths.pl.debian conf/paths.pl
-build:
+ set -e; for SCRIPT in bin/mactime bin/grave-robber bin/strip_tct_home extras/bdf extras/realpath extras/ils2mac lazarus/lazarus; \
+ do \
+ sed -i -e 's|^#!/usr/bin/perl.*$$|#!/usr/bin/perl5|' $$SCRIPT; \
+ done
+
+ dh_clean
+
+build: build-stamp
+build-stamp: patch-stamp
dh_testdir
+
$(MAKE) OPT="$(CFLAGS)" DEBUG=-g
- touch build-stamp
-binary: binary-indep binary-arch
+ touch build-stamp
-binary-indep: build
- dh_testroot
+install:
-binary-arch: binary-tct binary-timeout
+binary: binary-arch
-binary-tct: DH_OPTIONS = -p tct
-binary-tct: build
+binary-arch: build
+ dh_testdir
dh_testroot
- dh_installdirs
- dh_installdocs
dh_installchangelogs CHANGES
- dh_installman
+ dh_installdocs
+ dh_installexamples
dh_install
- find debian/tct -name 'icat*' -print0 | \
- xargs -0 rename 's(/icat)(/inode-cat)'
- dh_fixperms
- dh_compress
- dh_strip
- dh_perl usr/share/tct
- dh_shlibdeps
- dh_gencontrol
- dh_installdeb
- dh_md5sums
- dh_builddeb
-
-binary-timeout: DH_OPTIONS = -p timeout
-binary-timeout: build
dh_installdirs
- dh_installdocs
- dh_installchangelogs
dh_installman
- dh_install
+ dh_link
dh_strip
dh_compress
dh_fixperms
+ dh_installdeb
dh_shlibdeps
dh_gencontrol
- dh_installdeb
dh_md5sums
dh_builddeb
+
+binary-indep:
+
+.PHONY: clean build install binary binary-arch binary-indep
diff --git a/debian/tct.copyright b/debian/tct.copyright
deleted file mode 100644
index f6f0feb..0000000
--- a/debian/tct.copyright
+++ /dev/null
@@ -1,250 +0,0 @@
-This package was produced by Yotam Rubin <yotam at makif.omer.k12.il>
-from sources obtained from:
-<http://www.porcupine.org/forensics/...>
-
-All binary and source files which do not explicitly state otherwise include the
-following copyright:
-
-Copyright 1999 by Dan Farmer. All rights reserved. Some individual
-files may be covered by other copyrights (this will be noted in the
-file itself.)
-
-Redistribution and use in source and binary forms are permitted
-provided that this entire copyright notice is duplicated in all such
-copies.
-
-THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
-WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
-MERCHANTABILITY AND FITNESS FOR ANY PARTICULAR PURPOSE.
-
-IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
-(INCLUDING, BUT NOT LIMITED TO, LOSS OF USE, DATA, OR PROFITS OR
-BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
-WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
-OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
-ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Some binaries and sources have the following copyright:
-
-IBM PUBLIC LICENSE VERSION 1.0 - CORONER TOOLKIT UTILITIES
-
-THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS IBM PUBLIC
-LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE
-PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
-
-1. DEFINITIONS
-
-"Contribution" means:
- a) in the case of International Business Machines Corporation ("IBM"),
- the Original Program, and
- b) in the case of each Contributor,
- i) changes to the Program, and
- ii) additions to the Program;
- where such changes and/or additions to the Program originate
- from and are distributed by that particular Contributor.
- A Contribution 'originates' from a Contributor if it was added
- to the Program by such Contributor itself or anyone acting on
- such Contributor's behalf.
- Contributions do not include additions to the Program which:
- (i) are separate modules of software distributed in conjunction
- with the Program under their own license agreement, and
- (ii) are not derivative works of the Program.
-
-"Contributor" means IBM and any other entity that distributes the Program.
-
-"Licensed Patents " mean patent claims licensable by a Contributor which
-are necessarily infringed by the use or sale of its Contribution alone
-or when combined with the Program.
-
-"Original Program" means the original version of the software accompanying
-this Agreement as released by IBM, including source code, object code
-and documentation, if any.
-
-"Program" means the Original Program and Contributions.
-
-"Recipient" means anyone who receives the Program under this Agreement,
-including all Contributors.
-
-2. GRANT OF RIGHTS
-
- a) Subject to the terms of this Agreement, each Contributor hereby
- grants Recipient a non-exclusive, worldwide, royalty-free copyright
- license to reproduce, prepare derivative works of, publicly display,
- publicly perform, distribute and sublicense the Contribution of such
- Contributor, if any, and such derivative works, in source code and
- object code form.
-
- b) Subject to the terms of this Agreement, each Contributor hereby
- grants Recipient a non-exclusive, worldwide, royalty-free patent
- license under Licensed Patents to make, use, sell, offer to sell,
- import and otherwise transfer the Contribution of such Contributor,
- if any, in source code and object code form. This patent license
- shall apply to the combination of the Contribution and the Program
- if, at the time the Contribution is added by the Contributor, such
- addition of the Contribution causes such combination to be covered
- by the Licensed Patents. The patent license shall not apply to any
- other combinations which include the Contribution. No hardware per
- se is licensed hereunder.
-
- c) Recipient understands that although each Contributor grants the
- licenses to its Contributions set forth herein, no assurances are
- provided by any Contributor that the Program does not infringe the
- patent or other intellectual property rights of any other entity.
- Each Contributor disclaims any liability to Recipient for claims
- brought by any other entity based on infringement of intellectual
- property rights or otherwise. As a condition to exercising the rights
- and licenses granted hereunder, each Recipient hereby assumes sole
- responsibility to secure any other intellectual property rights
- needed, if any. For example, if a third party patent license
- is required to allow Recipient to distribute the Program, it is
- Recipient's responsibility to acquire that license before distributing
- the Program.
-
- d) Each Contributor represents that to its knowledge it has sufficient
- copyright rights in its Contribution, if any, to grant the copyright
- license set forth in this Agreement.
-
-3. REQUIREMENTS
-
-A Contributor may choose to distribute the Program in object code form
-under its own license agreement, provided that:
- a) it complies with the terms and conditions of this Agreement; and
- b) its license agreement:
- i) effectively disclaims on behalf of all Contributors all
- warranties and conditions, express and implied, including
- warranties or conditions of title and non-infringement, and
- implied warranties or conditions of merchantability and fitness
- for a particular purpose;
- ii) effectively excludes on behalf of all Contributors all
- liability for damages, including direct, indirect, special,
- incidental and consequential damages, such as lost profits;
- iii) states that any provisions which differ from this Agreement
- are offered by that Contributor alone and not by any other
- party; and
- iv) states that source code for the Program is available from
- such Contributor, and informs licensees how to obtain it in a
- reasonable manner on or through a medium customarily used for
- software exchange.
-
-When the Program is made available in source code form:
- a) it must be made available under this Agreement; and
- b) a copy of this Agreement must be included with each copy of the
- Program.
-
-Each Contributor must include the following in a conspicuous location
-in the Program:
-
- Copyright (c) 1997,1998,1999, International Business Machines
- Corporation and others. All Rights Reserved.
-
-In addition, each Contributor must identify itself as the originator of
-its Contribution, if any, in a manner that reasonably allows subsequent
-Recipients to identify the originator of the Contribution.
-
-4. COMMERCIAL DISTRIBUTION
-
-Commercial distributors of software may accept certain responsibilities
-with respect to end users, business partners and the like. While this
-license is intended to facilitate the commercial use of the Program, the
-Contributor who includes the Program in a commercial product offering
-should do so in a manner which does not create potential liability for
-other Contributors. Therefore, if a Contributor includes the Program in
-a commercial product offering, such Contributor ("Commercial Contributor")
-hereby agrees to defend and indemnify every other Contributor
-("Indemnified Contributor") against any losses, damages and costs
-(collectively "Losses") arising from claims, lawsuits and other legal
-actions brought by a third party against the Indemnified Contributor to
-the extent caused by the acts or omissions of such Commercial Contributor
-in connection with its distribution of the Program in a commercial
-product offering. The obligations in this section do not apply to any
-claims or Losses relating to any actual or alleged intellectual property
-infringement. In order to qualify, an Indemnified Contributor must:
- a) promptly notify the Commercial Contributor in writing of such claim,
-and
- b) allow the Commercial Contributor to control, and cooperate with
- the Commercial Contributor in, the defense and any related
- settlement negotiations. The Indemnified Contributor may
- participate in any such claim at its own expense.
-
-For example, a Contributor might include the Program in a commercial
-product offering, Product X. That Contributor is then a Commercial
-Contributor. If that Commercial Contributor then makes performance
-claims, or offers warranties related to Product X, those performance
-claims and warranties are such Commercial Contributor's responsibility
-alone. Under this section, the Commercial Contributor would have to
-defend claims against the other Contributors related to those performance
-claims and warranties, and if a court requires any other Contributor to
-pay any damages as a result, the Commercial Contributor must pay those
-damages.
-
-5. NO WARRANTY
-
-EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED
-ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER
-EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
-CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
-PARTICULAR PURPOSE. Each Recipient is solely responsible for determining
-the appropriateness of using and distributing the Program and assumes
-all risks associated with its exercise of rights under this Agreement,
-including but not limited to the risks and costs of program errors,
-compliance with applicable laws, damage to or loss of data, programs or
-equipment, and unavailability or interruption of operations.
-
-6. DISCLAIMER OF LIABILITY
-
-EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR
-ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT,
-INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING
-WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
-LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION
-OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF
-ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
-7. GENERAL
-
-If any provision of this Agreement is invalid or unenforceable under
-applicable law, it shall not affect the validity or enforceability of
-the remainder of the terms of this Agreement, and without further action
-by the parties hereto, such provision shall be reformed to the minimum
-extent necessary to make such provision valid and enforceable.
-
-If Recipient institutes patent litigation against a Contributor with
-respect to a patent applicable to software (including a cross-claim or
-counterclaim in a lawsuit), then any patent licenses granted by that
-Contributor to such Recipient under this Agreement shall terminate
-as of the date such litigation is filed. In addition, If Recipient
-institutes patent litigation against any entity (including a cross-claim
-or counterclaim in a lawsuit) alleging that the Program itself (excluding
-combinations of the Program with other software or hardware) infringes
-such Recipient's patent(s), then such Recipient's rights granted under
-Section 2(b) shall terminate as of the date such litigation is filed.
-
-All Recipient's rights under this Agreement shall terminate if it fails
-to comply with any of the material terms or conditions of this Agreement
-and does not cure such failure in a reasonable period of time after
-becoming aware of such noncompliance. If all Recipient's rights under
-this Agreement terminate, Recipient agrees to cease use and distribution
-of the Program as soon as reasonably practicable. However, Recipient's
-obligations under this Agreement and any licenses granted by Recipient
-relating to the Program shall continue and survive.
-
-IBM may publish new versions (including revisions) of this Agreement
-from time to time. Each new version of the Agreement will be given a
-distinguishing version number. The Program (including Contributions)
-may always be distributed subject to the version of the Agreement under
-which it was received. In addition, after a new version of the Agreement
-is published, Contributor may elect to distribute the Program (including
-its Contributions) under the new version. No one other than IBM has the
-right to modify this Agreement. Except as expressly stated in Sections
-2(a) and 2(b) above, Recipient receives no rights or licenses to the
-intellectual property of any Contributor under this Agreement, whether
-expressly, by implication, estoppel or otherwise. All rights in the
-Program not expressly granted under this Agreement are reserved.
-
-This Agreement is governed by the laws of the State of New York and the
-intellectual property laws of the United States of America. No party to
-this Agreement will bring a legal action under this Agreement more than
-one year after the cause of action arose. Each party waives its rights
-to a jury trial in any resulting litigation.
diff --git a/debian/tct.dirs b/debian/tct.dirs
index 99ddd5f..819a053 100644
--- a/debian/tct.dirs
+++ b/debian/tct.dirs
@@ -1,6 +1 @@
-etc/tct
-usr/bin
-var/cache/tct/data
-usr/share/tct
-usr/share/doc/tct/contrib
-usr/share/man/man1
+/var/cache/tct/data
diff --git a/debian/tct.examples b/debian/tct.examples
new file mode 100644
index 0000000..a8342fe
--- /dev/null
+++ b/debian/tct.examples
@@ -0,0 +1 @@
+debian/example/*
diff --git a/debian/tct.install b/debian/tct.install
index d092d49..dd5c6c0 100644
--- a/debian/tct.install
+++ b/debian/tct.install
@@ -1,6 +1,18 @@
-lazarus/lazarus usr/bin/
-extras/ils2mac usr/bin
-bin/{grave-robber,mactime,unrm,pcat,ils,major_minor,icat} usr/bin
-conf/{save_these_files,look at first,lazarus.cf,grave-robber.cf,coroner.cf,paths.pl} etc/tct/
-lib/* usr/share/tct/
-debian/contrib/md5_image_maker usr/share/doc/tct/contrib/
+conf/coroner.cf /etc/tct
+conf/grave-robber.cf /etc/tct
+conf/lazarus.cf /etc/tct
+conf/look at first /etc/tct
+conf/paths.pl /etc/tct
+conf/save_these_files /etc/tct
+
+bin/grave-robber /usr/bin
+bin/icat /usr/bin
+bin/ils /usr/bin
+bin/mactime /usr/bin
+bin/major_minor /usr/bin
+bin/pcat /usr/bin
+bin/unrm /usr/bin
+extras/ils2mac /usr/bin
+lazarus/lazarus /usr/bin
+
+lib/* /usr/share/tct
diff --git a/debian/tct.links b/debian/tct.links
new file mode 100644
index 0000000..53f8cf1
--- /dev/null
+++ b/debian/tct.links
@@ -0,0 +1,2 @@
+/usr/bin/icat /usr/bin/inode-cat
+/usr/share/man/man1/icat.1.gz /usr/share/man/man1/inode-cat.1.gz
diff --git a/debian/tct.manpages b/debian/tct.manpages
index 2ce4f4d..dd1b7b5 100644
--- a/debian/tct.manpages
+++ b/debian/tct.manpages
@@ -1,2 +1,10 @@
-man/man1/{ils,icat,mactime,unrm,grave-robber,lazarus,pcat,major_minor}.1
-debian/ils2mac.1
+man/man1/ils.1
+man/man1/icat.1
+man/man1/mactime.1
+man/man1/unrm.1
+man/man1/grave-robber.1
+man/man1/lazarus.1
+man/man1/pcat.1
+man/man1/major_minor.1
+
+debian/manpage/*
diff --git a/debian/tct.postrm b/debian/tct.postrm
index 1e0da00..909ce78 100644
--- a/debian/tct.postrm
+++ b/debian/tct.postrm
@@ -1,17 +1,26 @@
-#! /bin/sh
+#!/bin/sh
set -e
-#DEBHELPER#
-
-case "$1" in
- remove)
- ;;
+case "${1}" in
purge)
echo "Purging grave-robber databases..."
- rm -rf /var/cache/tct /etc/tct
+
+ rm -rf /etc/tct /var/cache/tct
+
+ echo " done."
;;
- upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
+
+ remove|upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
+
+ ;;
+
+ *)
+ echo "postrm called with unknown argument \`$1'" >&2
+ exit 1
;;
esac
+#DEBHELPER#
+
+exit 0
diff --git a/debian/tct.preinst b/debian/tct.preinst
deleted file mode 100644
index fc80989..0000000
--- a/debian/tct.preinst
+++ /dev/null
@@ -1,18 +0,0 @@
-#! /bin/sh
-
-set -e
-
-if [ "$1" = "upgrade" ] ; then
- if dpkg --compare-versions "$2" lt "1.11-5"; then
- # Move /etc/tct/*.conf to /etc/tct/*.cf
- for f in grave-robber lazarus coroner; do
- oldfile=/etc/tct/$f.conf
- newfile=/etc/tct/$f.cf
- if [ ! -f $newfile ] && [ -f $oldfile ]; then
- mv $oldfile $newfile
- fi
- done
- fi
-fi
-
-#DEBHELPER#
diff --git a/debian/timeout.copyright b/debian/timeout.copyright
deleted file mode 100644
index 9b5db7a..0000000
--- a/debian/timeout.copyright
+++ /dev/null
@@ -1,227 +0,0 @@
-This package was produced by Yotam Rubin <yotam at makif.omer.k12.il>
-from sources obtained from:
-<http://www.porcupine.org/forensics/...>
-
-timeout is Copyright 2001 Wietse Venema and is under the following license:
-
-IBM PUBLIC LICENSE VERSION 1.0 - CORONER TOOLKIT UTILITIES
-
-THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS IBM PUBLIC
-LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE
-PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
-
-1. DEFINITIONS
-
-"Contribution" means:
- a) in the case of International Business Machines Corporation ("IBM"),
- the Original Program, and
- b) in the case of each Contributor,
- i) changes to the Program, and
- ii) additions to the Program;
- where such changes and/or additions to the Program originate
- from and are distributed by that particular Contributor.
- A Contribution 'originates' from a Contributor if it was added
- to the Program by such Contributor itself or anyone acting on
- such Contributor's behalf.
- Contributions do not include additions to the Program which:
- (i) are separate modules of software distributed in conjunction
- with the Program under their own license agreement, and
- (ii) are not derivative works of the Program.
-
-"Contributor" means IBM and any other entity that distributes the Program.
-
-"Licensed Patents " mean patent claims licensable by a Contributor which
-are necessarily infringed by the use or sale of its Contribution alone
-or when combined with the Program.
-
-"Original Program" means the original version of the software accompanying
-this Agreement as released by IBM, including source code, object code
-and documentation, if any.
-
-"Program" means the Original Program and Contributions.
-
-"Recipient" means anyone who receives the Program under this Agreement,
-including all Contributors.
-
-2. GRANT OF RIGHTS
-
- a) Subject to the terms of this Agreement, each Contributor hereby
- grants Recipient a non-exclusive, worldwide, royalty-free copyright
- license to reproduce, prepare derivative works of, publicly display,
- publicly perform, distribute and sublicense the Contribution of such
- Contributor, if any, and such derivative works, in source code and
- object code form.
-
- b) Subject to the terms of this Agreement, each Contributor hereby
- grants Recipient a non-exclusive, worldwide, royalty-free patent
- license under Licensed Patents to make, use, sell, offer to sell,
- import and otherwise transfer the Contribution of such Contributor,
- if any, in source code and object code form. This patent license
- shall apply to the combination of the Contribution and the Program
- if, at the time the Contribution is added by the Contributor, such
- addition of the Contribution causes such combination to be covered
- by the Licensed Patents. The patent license shall not apply to any
- other combinations which include the Contribution. No hardware per
- se is licensed hereunder.
-
- c) Recipient understands that although each Contributor grants the
- licenses to its Contributions set forth herein, no assurances are
- provided by any Contributor that the Program does not infringe the
- patent or other intellectual property rights of any other entity.
- Each Contributor disclaims any liability to Recipient for claims
- brought by any other entity based on infringement of intellectual
- property rights or otherwise. As a condition to exercising the rights
- and licenses granted hereunder, each Recipient hereby assumes sole
- responsibility to secure any other intellectual property rights
- needed, if any. For example, if a third party patent license
- is required to allow Recipient to distribute the Program, it is
- Recipient's responsibility to acquire that license before distributing
- the Program.
-
- d) Each Contributor represents that to its knowledge it has sufficient
- copyright rights in its Contribution, if any, to grant the copyright
- license set forth in this Agreement.
-
-3. REQUIREMENTS
-
-A Contributor may choose to distribute the Program in object code form
-under its own license agreement, provided that:
- a) it complies with the terms and conditions of this Agreement; and
- b) its license agreement:
- i) effectively disclaims on behalf of all Contributors all
- warranties and conditions, express and implied, including
- warranties or conditions of title and non-infringement, and
- implied warranties or conditions of merchantability and fitness
- for a particular purpose;
- ii) effectively excludes on behalf of all Contributors all
- liability for damages, including direct, indirect, special,
- incidental and consequential damages, such as lost profits;
- iii) states that any provisions which differ from this Agreement
- are offered by that Contributor alone and not by any other
- party; and
- iv) states that source code for the Program is available from
- such Contributor, and informs licensees how to obtain it in a
- reasonable manner on or through a medium customarily used for
- software exchange.
-
-When the Program is made available in source code form:
- a) it must be made available under this Agreement; and
- b) a copy of this Agreement must be included with each copy of the
- Program.
-
-Each Contributor must include the following in a conspicuous location
-in the Program:
-
- Copyright (c) 1997,1998,1999, International Business Machines
- Corporation and others. All Rights Reserved.
-
-In addition, each Contributor must identify itself as the originator of
-its Contribution, if any, in a manner that reasonably allows subsequent
-Recipients to identify the originator of the Contribution.
-
-4. COMMERCIAL DISTRIBUTION
-
-Commercial distributors of software may accept certain responsibilities
-with respect to end users, business partners and the like. While this
-license is intended to facilitate the commercial use of the Program, the
-Contributor who includes the Program in a commercial product offering
-should do so in a manner which does not create potential liability for
-other Contributors. Therefore, if a Contributor includes the Program in
-a commercial product offering, such Contributor ("Commercial Contributor")
-hereby agrees to defend and indemnify every other Contributor
-("Indemnified Contributor") against any losses, damages and costs
-(collectively "Losses") arising from claims, lawsuits and other legal
-actions brought by a third party against the Indemnified Contributor to
-the extent caused by the acts or omissions of such Commercial Contributor
-in connection with its distribution of the Program in a commercial
-product offering. The obligations in this section do not apply to any
-claims or Losses relating to any actual or alleged intellectual property
-infringement. In order to qualify, an Indemnified Contributor must:
- a) promptly notify the Commercial Contributor in writing of such claim,
-and
- b) allow the Commercial Contributor to control, and cooperate with
- the Commercial Contributor in, the defense and any related
- settlement negotiations. The Indemnified Contributor may
- participate in any such claim at its own expense.
-
-For example, a Contributor might include the Program in a commercial
-product offering, Product X. That Contributor is then a Commercial
-Contributor. If that Commercial Contributor then makes performance
-claims, or offers warranties related to Product X, those performance
-claims and warranties are such Commercial Contributor's responsibility
-alone. Under this section, the Commercial Contributor would have to
-defend claims against the other Contributors related to those performance
-claims and warranties, and if a court requires any other Contributor to
-pay any damages as a result, the Commercial Contributor must pay those
-damages.
-
-5. NO WARRANTY
-
-EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED
-ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER
-EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR
-CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
-PARTICULAR PURPOSE. Each Recipient is solely responsible for determining
-the appropriateness of using and distributing the Program and assumes
-all risks associated with its exercise of rights under this Agreement,
-including but not limited to the risks and costs of program errors,
-compliance with applicable laws, damage to or loss of data, programs or
-equipment, and unavailability or interruption of operations.
-
-6. DISCLAIMER OF LIABILITY
-
-EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR
-ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT,
-INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING
-WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF
-LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION
-OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF
-ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-
-7. GENERAL
-
-If any provision of this Agreement is invalid or unenforceable under
-applicable law, it shall not affect the validity or enforceability of
-the remainder of the terms of this Agreement, and without further action
-by the parties hereto, such provision shall be reformed to the minimum
-extent necessary to make such provision valid and enforceable.
-
-If Recipient institutes patent litigation against a Contributor with
-respect to a patent applicable to software (including a cross-claim or
-counterclaim in a lawsuit), then any patent licenses granted by that
-Contributor to such Recipient under this Agreement shall terminate
-as of the date such litigation is filed. In addition, If Recipient
-institutes patent litigation against any entity (including a cross-claim
-or counterclaim in a lawsuit) alleging that the Program itself (excluding
-combinations of the Program with other software or hardware) infringes
-such Recipient's patent(s), then such Recipient's rights granted under
-Section 2(b) shall terminate as of the date such litigation is filed.
-
-All Recipient's rights under this Agreement shall terminate if it fails
-to comply with any of the material terms or conditions of this Agreement
-and does not cure such failure in a reasonable period of time after
-becoming aware of such noncompliance. If all Recipient's rights under
-this Agreement terminate, Recipient agrees to cease use and distribution
-of the Program as soon as reasonably practicable. However, Recipient's
-obligations under this Agreement and any licenses granted by Recipient
-relating to the Program shall continue and survive.
-
-IBM may publish new versions (including revisions) of this Agreement
-from time to time. Each new version of the Agreement will be given a
-distinguishing version number. The Program (including Contributions)
-may always be distributed subject to the version of the Agreement under
-which it was received. In addition, after a new version of the Agreement
-is published, Contributor may elect to distribute the Program (including
-its Contributions) under the new version. No one other than IBM has the
-right to modify this Agreement. Except as expressly stated in Sections
-2(a) and 2(b) above, Recipient receives no rights or licenses to the
-intellectual property of any Contributor under this Agreement, whether
-expressly, by implication, estoppel or otherwise. All rights in the
-Program not expressly granted under this Agreement are reserved.
-
-This Agreement is governed by the laws of the State of New York and the
-intellectual property laws of the United States of America. No party to
-this Agreement will bring a legal action under this Agreement more than
-one year after the cause of action arose. Each party waives its rights
-to a jury trial in any resulting litigation.
diff --git a/debian/timeout.dirs b/debian/timeout.dirs
deleted file mode 100644
index 321862c..0000000
--- a/debian/timeout.dirs
+++ /dev/null
@@ -1,2 +0,0 @@
-usr/bin
-usr/share/doc/timeout
diff --git a/debian/timeout.install b/debian/timeout.install
index 4c88640..0c85861 100644
--- a/debian/timeout.install
+++ b/debian/timeout.install
@@ -1 +1 @@
-bin/timeout usr/bin/
+bin/timeout /usr/bin
--
Forensics related utilities
More information about the forensics-changes
mailing list