# ChangeLog for sys-process/audit
# Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.16 2007/02/25 11:29:26 robbat2 Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.17 2007/02/25 11:34:42 robbat2 Exp $
+
+ 25 Feb 2007; Robin H. Johnson <robbat2@gentoo.org>
+ -files/auditd.confd-0.7.2-r1, -files/auditd.initd-0.7.2-r1,
+ -files/audit-0.9.14-header.patch, -files/audit-1.1.3-compilefix.patch,
+ -files/audit-1.2.3-syscall-partial.patch, -files/auditd.confd,
+ -files/auditd.initd, -audit-0.7.2-r1.ebuild, -audit-0.7.3.ebuild,
+ -audit-0.7.4.ebuild, -audit-0.8.ebuild, -audit-0.8.1.ebuild,
+ -audit-0.9.1.ebuild, -audit-1.1.6.ebuild, -audit-1.2.1.ebuild,
+ -audit-1.2.3.ebuild, -audit-1.2.5.ebuild:
+ Cleanup all of the old stuff.
*audit-1.2.9-r2 (25 Feb 2007)
-AUX audit-0.9.14-header.patch 8276 RMD160 c5d0b446003cc828255a85ffad5b99bb0d57a884 SHA1 7b67435b4044649784c8cd5c16edb751f1595a89 SHA256 2bcb6fa6d7f65fac77d169859da4ad7cfbb8a69be8347ec40e606931c868f6a2
-MD5 3060e7e99fc090bc2cc13597db2a8d29 files/audit-0.9.14-header.patch 8276
-RMD160 c5d0b446003cc828255a85ffad5b99bb0d57a884 files/audit-0.9.14-header.patch 8276
-SHA256 2bcb6fa6d7f65fac77d169859da4ad7cfbb8a69be8347ec40e606931c868f6a2 files/audit-0.9.14-header.patch 8276
-AUX audit-1.1.3-compilefix.patch 3742 RMD160 dd0a5338aaac12850e771d6baa9d0bfb5d3a4925 SHA1 ae6175e2ea2d2f1bbffdb6a9a7a2f332511d4b3d SHA256 8ffe02eb9ee988996c9cb4ccdcc3ee39903131173260b13b72b94298fb3afff4
-MD5 fe4a6c96f2df7f9126c1f043610399f2 files/audit-1.1.3-compilefix.patch 3742
-RMD160 dd0a5338aaac12850e771d6baa9d0bfb5d3a4925 files/audit-1.1.3-compilefix.patch 3742
-SHA256 8ffe02eb9ee988996c9cb4ccdcc3ee39903131173260b13b72b94298fb3afff4 files/audit-1.1.3-compilefix.patch 3742
-AUX audit-1.2.3-syscall-partial.patch 401 RMD160 470099c106338cfbfc1555bfd98e0b222424fbc4 SHA1 e359ff27c1f2c57c582231305ee7bde836614447 SHA256 b1aa50a65dd94c34c4c77484571a8878d94c555d8d1714339b20a2c5b101e4ad
-MD5 18673b7580bce6ca3409f8debdb8e999 files/audit-1.2.3-syscall-partial.patch 401
-RMD160 470099c106338cfbfc1555bfd98e0b222424fbc4 files/audit-1.2.3-syscall-partial.patch 401
-SHA256 b1aa50a65dd94c34c4c77484571a8878d94c555d8d1714339b20a2c5b101e4ad files/audit-1.2.3-syscall-partial.patch 401
AUX audit.h-2.6.18-rc4 19390 RMD160 3f7bc0e9b1f393d5f286e24f5253e5bcc1123137 SHA1 14f86c26b41262f2f551b0c2c76b1085211903e0 SHA256 21ce510f2245af00aa251946fd2109738009d0a072c7c7fcc8f6fd45c5b326e7
MD5 ea765c5ab187d21da7d54a66598b6b93 files/audit.h-2.6.18-rc4 19390
RMD160 3f7bc0e9b1f393d5f286e24f5253e5bcc1123137 files/audit.h-2.6.18-rc4 19390
MD5 4d59af7e92ad04817ebdf9cd75067270 files/auditd-init.d-1.2.3 1136
RMD160 ceddd2ce12be248183722b59240d662f507a16eb files/auditd-init.d-1.2.3 1136
SHA256 fd5e01b4aa83d848a2e97832b0ff0610610b7857ec7f0201f0f7cbeff8eec725 files/auditd-init.d-1.2.3 1136
-AUX auditd.confd 474 RMD160 c50759bdfda42fb58caedda86a16b37f8c7e4cf9 SHA1 6b5b3fdcdfef958ba3f9b570213b99d440f9d4a9 SHA256 4e1377ee330a3f5e16c9eeaf3f9c56ab9edc76fc7b65140f0f1d917fd77169f4
-MD5 d0c04da868c3fe0dff941187f054ecf6 files/auditd.confd 474
-RMD160 c50759bdfda42fb58caedda86a16b37f8c7e4cf9 files/auditd.confd 474
-SHA256 4e1377ee330a3f5e16c9eeaf3f9c56ab9edc76fc7b65140f0f1d917fd77169f4 files/auditd.confd 474
-AUX auditd.confd-0.7.2-r1 483 RMD160 dcf9352e4c9a82768ebd0290c98d3e89b539b638 SHA1 d82d62f3733f09387721d495a151597d93091577 SHA256 dce987232ae7bf4545b2aedcd73c4f1023bba949e5335dc7fa60927effa9fc62
-MD5 402bf22e8e90b45f8a8349314cd61068 files/auditd.confd-0.7.2-r1 483
-RMD160 dcf9352e4c9a82768ebd0290c98d3e89b539b638 files/auditd.confd-0.7.2-r1 483
-SHA256 dce987232ae7bf4545b2aedcd73c4f1023bba949e5335dc7fa60927effa9fc62 files/auditd.confd-0.7.2-r1 483
-AUX auditd.initd 708 RMD160 64bc9edad5e5367b5b8685ea677974a861982432 SHA1 6660220311e88f853015194c36283b8498bb6353 SHA256 8bd37af8033abf07eaec1214fe56f607561ee2b436fca05002d0cdc222c27cfc
-MD5 7c1f1f14a4750e7d8bbc1de62b3fcf59 files/auditd.initd 708
-RMD160 64bc9edad5e5367b5b8685ea677974a861982432 files/auditd.initd 708
-SHA256 8bd37af8033abf07eaec1214fe56f607561ee2b436fca05002d0cdc222c27cfc files/auditd.initd 708
-AUX auditd.initd-0.7.2-r1 709 RMD160 b13f83a40faa483b060e9f888a81138c573618e2 SHA1 81ad1f580f211198a099b82b7a2c7ecf4402650d SHA256 4c00b21e22add54e3c5f9a3b95fda9f5c2f03e51b0e6555cb941a8a4d76d6f8e
-MD5 d50e111e375e27af12b1c200175cd7b6 files/auditd.initd-0.7.2-r1 709
-RMD160 b13f83a40faa483b060e9f888a81138c573618e2 files/auditd.initd-0.7.2-r1 709
-SHA256 4c00b21e22add54e3c5f9a3b95fda9f5c2f03e51b0e6555cb941a8a4d76d6f8e files/auditd.initd-0.7.2-r1 709
AUX elf-em.h-2.6.18-rc4 1571 RMD160 9c397b86fb3c604b42e704fcb7d335e2b504325d SHA1 e2162ff6012b74168570be5d8e74df9484e63c28 SHA256 039326066a1e0a6ecbfd0a9023a140a3041c138efcf165aac0dded5444beb31c
MD5 ba15d4db52d12f7214ae4a35e3320790 files/elf-em.h-2.6.18-rc4 1571
RMD160 9c397b86fb3c604b42e704fcb7d335e2b504325d files/elf-em.h-2.6.18-rc4 1571
SHA256 039326066a1e0a6ecbfd0a9023a140a3041c138efcf165aac0dded5444beb31c files/elf-em.h-2.6.18-rc4 1571
-DIST audit-0.7.2.tar.gz 70184 RMD160 d13d8e93972f91386ced42e8204fb8ad4225f087 SHA1 04c92f1744da92a8d83a75bdec8013bf4f03b470 SHA256 fc2855e4504efeb60ec61aef414719eb9f94ef00496418a8873f3f8dc3e0628f
-DIST audit-0.7.3.tar.gz 72496 RMD160 035a95e73e333abbd119667c2b987b0321600273 SHA1 51919bfbc826582849d28bb613bc09722f764eb7 SHA256 c24eae64555a32d2725f3af2aaf551fc6ffa1ea67e0bdbe735a739f36b9fcf8a
-DIST audit-0.7.4.tar.gz 72751 RMD160 8c0d60f24da68372760cd33a46c9fe3f8acaf286 SHA1 63628e4e24a5e5ea0efb6d3f267e249792031273 SHA256 3fa0aadadb7163b868d435bdb03f73df7d19f2f4d98cb86e7c8ed445c39f5f95
-DIST audit-0.8.1.tar.gz 75487 RMD160 e5b9ed8cca8d4d3c4b379144633f9cba70fefd76 SHA1 aeade27682cbc7d6fb9ad17dd6f1ed3e5cc5f055 SHA256 bf33acf43bc8ce64a25d5b624814a84022df131f2062327cdc311788aadc51dc
-DIST audit-0.8.tar.gz 74782 RMD160 fa9c23fb864eaa3987743535e0fa51c2294c02fc SHA1 3fe79cbba93e78b504cb175a2e2c5401ce1ab1ce SHA256 a70523be883acfc07410b2d4ec1b3a958de73c0a609d40621e695c3156641aee
-DIST audit-0.9.1.tar.gz 82578 RMD160 beab2380723213bba3ad8dca21ebee1155a49900 SHA1 d23d3593b55ddd9689250d1e34dfc441805a8377 SHA256 88fdb0883f552dccb968bb953f6467f14bddb33cba22bad807649e4c039f1fab
-DIST audit-1.1.6.tar.gz 274815 RMD160 8f420b47347d1c00b4b4c114dc4f913704a9205e SHA1 f8cc0340cfe570d96d4de973a1927e4aaff567f3 SHA256 44c152fc652567c64c5937335122b37250694152bd47d44628b11f1f65c16e04
-DIST audit-1.2.1.tar.gz 274432 RMD160 14f70c58239f6ed2eba3d902630f4bd4112c4fba SHA1 22c3b6a5c4e237cb91381abeb5e3074aae9cdbf9 SHA256 bba5d255d81ca36245464b83e977ba6bd05b1528cad07559fcc0367d39b2d26f
-DIST audit-1.2.3.tar.gz 276977 RMD160 2fbc483dbff0ad5cd4022b4ccb5d3c082cccc0ef SHA1 9f40b82744915ab3df4255de7de69500e924fe18 SHA256 3bb70258c9e5ae2a0ebc43dc96542cd5494e169dc0d03d91bd9a7cd2a9f37b25
-DIST audit-1.2.5.tar.gz 232383 RMD160 8dd8bca46c918f0805756dfdfd898eb19b09f7e9 SHA1 9e34202e4304ac03e574af6b90b437fcaf2c7462 SHA256 6b9fd472ca97c07e319338a73b3f0adbe5f53506a15adba2ac2ad3c7db7b0eef
DIST audit-1.2.9.tar.gz 240266 RMD160 329692787d24469b86107377e0004bfae380e0ea SHA1 a654638c49effc2514bc4b4c711fedf3af82a352 SHA256 3660d1220246e81df1e140867acefc82a61418009c740d92e56af2ae0baa4aff
-EBUILD audit-0.7.2-r1.ebuild 1571 RMD160 f6fa25c23fbd547be702bd294d49fb2463840422 SHA1 f3ab3fe38d34872b26653709bf249c289331a9dc SHA256 487c009299e82b28b743e2d1892b76051d13a5159d3b9fd4525af0a4c7e5f0c2
-MD5 b7ae6b273342ab1c9a026a88c13cafa1 audit-0.7.2-r1.ebuild 1571
-RMD160 f6fa25c23fbd547be702bd294d49fb2463840422 audit-0.7.2-r1.ebuild 1571
-SHA256 487c009299e82b28b743e2d1892b76051d13a5159d3b9fd4525af0a4c7e5f0c2 audit-0.7.2-r1.ebuild 1571
-EBUILD audit-0.7.3.ebuild 1564 RMD160 304ba124145a91718380c3323dba7a750c60a743 SHA1 c302386a5cbdc5f7c132c7f820aa3cc322baaace SHA256 4c0ec3c67541629d804eb5aa768cc3fb77b7397ab30c35a7289c792314ad6c18
-MD5 7b7ff6f6407bc96c457a91f20a6f0c28 audit-0.7.3.ebuild 1564
-RMD160 304ba124145a91718380c3323dba7a750c60a743 audit-0.7.3.ebuild 1564
-SHA256 4c0ec3c67541629d804eb5aa768cc3fb77b7397ab30c35a7289c792314ad6c18 audit-0.7.3.ebuild 1564
-EBUILD audit-0.7.4.ebuild 1564 RMD160 8548886ca10bd324cc969887359b243ee1ec72b5 SHA1 1f8f6687238d4ee589fe24786bdefa8f11ae1b38 SHA256 ce7620877d6609ff0a045f41cb0bf8afff6ca4b6bb31091c9aa6aba36600b999
-MD5 800dc38b7b284025611145ab70338ae7 audit-0.7.4.ebuild 1564
-RMD160 8548886ca10bd324cc969887359b243ee1ec72b5 audit-0.7.4.ebuild 1564
-SHA256 ce7620877d6609ff0a045f41cb0bf8afff6ca4b6bb31091c9aa6aba36600b999 audit-0.7.4.ebuild 1564
-EBUILD audit-0.8.1.ebuild 1568 RMD160 7a33b02295170287c912e63061843a7180a626d3 SHA1 cbee458cd7b3fbd510e21c00fd461cabf3d4b62e SHA256 bd5b99c939ab394f891c7bece7c71dcf6b1f537263c774bc15c92ec8bc38a3f9
-MD5 23a5c32533900128dac2ca45b5889521 audit-0.8.1.ebuild 1568
-RMD160 7a33b02295170287c912e63061843a7180a626d3 audit-0.8.1.ebuild 1568
-SHA256 bd5b99c939ab394f891c7bece7c71dcf6b1f537263c774bc15c92ec8bc38a3f9 audit-0.8.1.ebuild 1568
-EBUILD audit-0.8.ebuild 1562 RMD160 fe1045f4888da8e3c9c475bde582667f41934c96 SHA1 ca3bb0b218c6d35c2eaeb8aa724e10af78e0e757 SHA256 e61f879a74d4ad8597c836768a009029fd73eca50cc361248aabc2a00cdc0eb9
-MD5 f72d5400e4239d7aa72c76c188ecc7c0 audit-0.8.ebuild 1562
-RMD160 fe1045f4888da8e3c9c475bde582667f41934c96 audit-0.8.ebuild 1562
-SHA256 e61f879a74d4ad8597c836768a009029fd73eca50cc361248aabc2a00cdc0eb9 audit-0.8.ebuild 1562
-EBUILD audit-0.9.1.ebuild 1564 RMD160 02e47ad08ae4f58d9f82b2773cf854d9a3aced53 SHA1 a5059cec53835df24c58174c6917c0ad9815d4f3 SHA256 a01bf8e0f27c70b7d40183f587bf59c1734ea60bb11733353900632fe9131389
-MD5 ccaf6e8614e3b817335570e1085e2a9a audit-0.9.1.ebuild 1564
-RMD160 02e47ad08ae4f58d9f82b2773cf854d9a3aced53 audit-0.9.1.ebuild 1564
-SHA256 a01bf8e0f27c70b7d40183f587bf59c1734ea60bb11733353900632fe9131389 audit-0.9.1.ebuild 1564
-EBUILD audit-1.1.6.ebuild 1912 RMD160 e5d15902c85f22103f500ae69e0a4cfdece7f26c SHA1 508e26c518ff7cb71347880a2398b8620cfe9b18 SHA256 29f53cbef435af1596618803bd6d4519d53edf691bef483320d7db7ca6815f1c
-MD5 3a1f2c34a499b8a9dd5e43928f3eef9d audit-1.1.6.ebuild 1912
-RMD160 e5d15902c85f22103f500ae69e0a4cfdece7f26c audit-1.1.6.ebuild 1912
-SHA256 29f53cbef435af1596618803bd6d4519d53edf691bef483320d7db7ca6815f1c audit-1.1.6.ebuild 1912
-EBUILD audit-1.2.1.ebuild 1668 RMD160 b5516041db7911acc6847b86735bb76d15194f6b SHA1 b6fd2609ef2868a8c15688a3cc035e21c0756cb4 SHA256 331bd0e375083d2af0a70ee4fb628ddf247a9d3e5f708d874812a0f6dc6561f2
-MD5 5cac2cd08a185d624afc17083adea76e audit-1.2.1.ebuild 1668
-RMD160 b5516041db7911acc6847b86735bb76d15194f6b audit-1.2.1.ebuild 1668
-SHA256 331bd0e375083d2af0a70ee4fb628ddf247a9d3e5f708d874812a0f6dc6561f2 audit-1.2.1.ebuild 1668
-EBUILD audit-1.2.3.ebuild 1988 RMD160 5c1510293de62d2c70aa4021790af21cb476172f SHA1 2f5941b14a0ac253568556fefc481b72549a073b SHA256 690349c3f66045833e72e4a5b09143a60a451ea698df8c8bd2844a4e006d4a4a
-MD5 1a1cec11bb2e687d498dbccb4f91367a audit-1.2.3.ebuild 1988
-RMD160 5c1510293de62d2c70aa4021790af21cb476172f audit-1.2.3.ebuild 1988
-SHA256 690349c3f66045833e72e4a5b09143a60a451ea698df8c8bd2844a4e006d4a4a audit-1.2.3.ebuild 1988
-EBUILD audit-1.2.5.ebuild 2186 RMD160 8f0393ca14113c5462dc618487fdcc5cec8e8736 SHA1 3810d4b933a6a828276940985bb2965de01c2aa6 SHA256 6a2a2cffa597104bbaf6c293c968d65958dac0ed9ca3f535ff8063b898d7af4a
-MD5 527821e5b7740443b0386d62f4849e4e audit-1.2.5.ebuild 2186
-RMD160 8f0393ca14113c5462dc618487fdcc5cec8e8736 audit-1.2.5.ebuild 2186
-SHA256 6a2a2cffa597104bbaf6c293c968d65958dac0ed9ca3f535ff8063b898d7af4a audit-1.2.5.ebuild 2186
EBUILD audit-1.2.9-r1.ebuild 2149 RMD160 198117c42393baa577bd85583e80485ac1845220 SHA1 81b172e40fef80cc4b1a355883b2464368529810 SHA256 72e9ca2aaf3cd8f895b5cba9f65a35aec684ec9c451a64ec3ec0a5855d338d14
MD5 4ccb78e8fcc59b2e2a4d4709dec29378 audit-1.2.9-r1.ebuild 2149
RMD160 198117c42393baa577bd85583e80485ac1845220 audit-1.2.9-r1.ebuild 2149
MD5 855d7b9a8025d3a984a8c8fd4275ad1b audit-1.2.9.ebuild 2105
RMD160 97de566a99d9b20dc82af1205457e02a9943780c audit-1.2.9.ebuild 2105
SHA256 b1831bd74bcf219f062b7a572b7e21c6a3383c44b360650803d764f8ccb92fe1 audit-1.2.9.ebuild 2105
-MISC ChangeLog 3233 RMD160 b4e6d155222147fd4b5b4a2eb5676def2643f443 SHA1 95f6a3f1dba49d62634d2dfb1dce9246273467c6 SHA256 a8b10b46aaed5b53bd39e8c63daffee3e71e5fe78001d7f9a53a54aa01e9a70a
-MD5 fa233e8885fce5623ab6b2acaff82fb0 ChangeLog 3233
-RMD160 b4e6d155222147fd4b5b4a2eb5676def2643f443 ChangeLog 3233
-SHA256 a8b10b46aaed5b53bd39e8c63daffee3e71e5fe78001d7f9a53a54aa01e9a70a ChangeLog 3233
+MISC ChangeLog 3759 RMD160 76a59b66aa710630e59ea3f0d9d1c2cf45b1d053 SHA1 c1745e62bbdc5557bda2bda3f0a09ab98a8100f7 SHA256 98fe271d6eb3b89b48f91c774dbfe2b24a29f607f4844bf4de1186215bed9732
+MD5 75b66e107ea5e3847a03535e4fd6db13 ChangeLog 3759
+RMD160 76a59b66aa710630e59ea3f0d9d1c2cf45b1d053 ChangeLog 3759
+SHA256 98fe271d6eb3b89b48f91c774dbfe2b24a29f607f4844bf4de1186215bed9732 ChangeLog 3759
MISC metadata.xml 231 RMD160 e78f0580e975fa82702433055e1498b0d9228104 SHA1 de14a9907da991c933aed57aeba714d7b7ce28c6 SHA256 f62f6487425736b6d2f27bb84ee09ccee245c1abf74462b6fbcb90f2c368ad2e
MD5 426b16b0f03a2c3b0fa6864a71876999 metadata.xml 231
RMD160 e78f0580e975fa82702433055e1498b0d9228104 metadata.xml 231
SHA256 f62f6487425736b6d2f27bb84ee09ccee245c1abf74462b6fbcb90f2c368ad2e metadata.xml 231
-MD5 c3b764781bc327cd347573729a52e4bd files/digest-audit-0.7.2-r1 232
-RMD160 26a030277dd0bea549f1b248b6d6a15e15192d00 files/digest-audit-0.7.2-r1 232
-SHA256 314456dddc68f722b0b8bf0ac04ada58f6c76673890082875146fab204f1214f files/digest-audit-0.7.2-r1 232
-MD5 b42d75fefc5c821bf0a3f826908ddf5c files/digest-audit-0.7.3 232
-RMD160 462b0676b1c4df80fb64c12a4fa323b11d819c72 files/digest-audit-0.7.3 232
-SHA256 6fd7698b406d5800282a3111776d9bfe6dcbe29af0881937ae46b4b0768257c5 files/digest-audit-0.7.3 232
-MD5 e947068fd556e0a653b9f41aad021aa8 files/digest-audit-0.7.4 232
-RMD160 4f6542d3198ec6e0f5de87c46ea6e76b9ca557ce files/digest-audit-0.7.4 232
-SHA256 508cc6bd3b5f2cf9723d29639b51b24fbbfee8af138626f3115f7e342511dc31 files/digest-audit-0.7.4 232
-MD5 8499458fe9b1e68cf696dab0a43b2197 files/digest-audit-0.8 226
-RMD160 4e787601fc9b20ec7b9d3140e133e6e1f35b3395 files/digest-audit-0.8 226
-SHA256 6315af70cc826c42d45fecffdb847558eff1802f3d4b6a05118901a19181f438 files/digest-audit-0.8 226
-MD5 0ba4cccaba7e5a512d8e805ccf385c31 files/digest-audit-0.8.1 232
-RMD160 515e22e7d2acb9e2634cd69b9ef0c037c31554ae files/digest-audit-0.8.1 232
-SHA256 9fe5f5e69f07a596b5be612a0351d889421681a102f324dc01381845dbbdf027 files/digest-audit-0.8.1 232
-MD5 34abf88bb06b37ecb3afd5cdeadfc23f files/digest-audit-0.9.1 232
-RMD160 bf925294f921d82a35e61d7fd3e50535a3f847be files/digest-audit-0.9.1 232
-SHA256 1b1be2379dcb585eb3708ee7010530af15aef1602ea060457907a0cc4f5b3b00 files/digest-audit-0.9.1 232
-MD5 edb393f2e6c69e99ffb30cffd84f91c6 files/digest-audit-1.1.6 235
-RMD160 9bd14ae6d5fa05e220d76edbe6141b738998f545 files/digest-audit-1.1.6 235
-SHA256 9771919111067a75162be5c8bcab827d83de60d3ee7d7b8b873372d17fa43320 files/digest-audit-1.1.6 235
-MD5 ded2fc0aedbcc841885edf0c30fbd5d5 files/digest-audit-1.2.1 235
-RMD160 ea0cbbfccc546049070cb9e5cba2e2935d26308d files/digest-audit-1.2.1 235
-SHA256 76c086afac2d22489c3f0e77d4b499adeb0e8e388dabd59d4bc45d050e05bf20 files/digest-audit-1.2.1 235
-MD5 2422b3460ec6face2b31b0469617075e files/digest-audit-1.2.3 235
-RMD160 fa6eadcc99cfc0497998a595515f2f804edbd207 files/digest-audit-1.2.3 235
-SHA256 d26e65bffa752bc78c9352d26e41fe0a25d201b6c4d135dc86c4c3d0de917956 files/digest-audit-1.2.3 235
-MD5 d851cba34d82b43ae3090ac44d0e302f files/digest-audit-1.2.5 235
-RMD160 e2c725a5626023f210634d16a3334f615ccd7100 files/digest-audit-1.2.5 235
-SHA256 9e98699429a16d24851405209afdb55f9e91e99cdf29486adf5b864b2ce0f289 files/digest-audit-1.2.5 235
MD5 6680465051b7c6f77446364536f6d36f files/digest-audit-1.2.9 235
RMD160 6151f479783510a59a0974d3133d50a648cfd363 files/digest-audit-1.2.9 235
SHA256 45a8955de9c405232ff0c416b2bbe7025b986788532130d1a4c35a91402c3f24 files/digest-audit-1.2.9 235
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.2-r1.ebuild,v 1.1 2005/05/01 03:20:47 robbat2 Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.3.ebuild,v 1.1 2005/05/07 07:05:52 beu Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.4.ebuild,v 1.1 2005/05/09 05:45:13 beu Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.1.ebuild,v 1.1 2005/05/19 18:15:39 robbat2 Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.ebuild,v 1.1 2005/05/15 14:55:30 beu Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.9.1.ebuild,v 1.1 2005/06/06 01:39:22 beu Exp $
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~x86"
-IUSE=""
-
-DEPEND="sys-devel/libtool
- virtual/os-headers
- >=sys-devel/automake-1.9
- >=sys-devel/autoconf-2.59"
-RDEPEND=""
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- WANT_AUTOMAKE="1.9" \
- autoreconf -fv --install || die "autoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR=${D} install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- # remove RH garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- # restrictive perms for security
- chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${D}/etc/{auditd.conf,audit.rules}
-}
-
-pkg_postinst() {
- # upstream wants these to have restrictive perms
- chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/
- chmod 0640 /etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.1.6.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $
-
-inherit eutils autotools
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-HEADER_KV="2.6.18-rc4"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="-*"
-IUSE=""
-
-RDEPEND=">=dev-lang/python-2.4"
-DEPEND="${RDEPEND}
- dev-lang/swig"
-# Do not use os-headers as this is linux specific
-# linux-headers 2.6.17_rc1 is NOT in the tree yet.
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- for i in audit.h elf-em.h; do
- cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i}
- done
- sed -i -e 's,<linux/elf-em.h>,"elf-em.h",g' ${S}/lib/audit.h
- sed -i -e 's,<linux/audit.h>,"audit.h",g' ${S}/lib/libaudit.h
- cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/
- eautoreconf || die "eautoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la
- # remove RedHat garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/*
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- lockdown_perms ${D}
-}
-
-pkg_postinst() {
- lockdown_perms /
-}
-
-lockdown_perms() {
- # upstream wants these to have restrictive perms
- basedir="$1"
- chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.1.ebuild,v 1.1 2006/04/19 23:17:16 robbat2 Exp $
-
-inherit eutils autotools
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="-*"
-IUSE=""
-
-RDEPEND=">=dev-lang/python-2.4"
-DEPEND="${RDEPEND}
- dev-lang/swig
- >=sys-kernel/linux-headers-2.6.17_rc1"
-# Do not use os-headers as this is linux specific
-# linux-headers 2.6.17_rc1 is NOT in the tree yet.
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- eautoreconf || die "eautoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la
- # remove RedHat garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/*
- # scripts
- newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd
- newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd
- # audit logs go here
- keepdir /var/log/audit/
- lockdown_perms ${D}
-}
-
-pkg_postinst() {
- lockdown_perms /
-}
-
-lockdown_perms() {
- # upstream wants these to have restrictive perms
- basedir="$1"
- chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/
- chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules}
-}
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.3.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $
-
-inherit eutils autotools toolchain-funcs
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="-*"
-IUSE=""
-
-RDEPEND=">=dev-lang/python-2.4"
-DEPEND="${RDEPEND}
- dev-lang/swig
- >=sys-kernel/linux-headers-2.6.17_p3"
-# Do not use os-headers as this is linux specific
-# linux-headers 2.6.17_p3 is NOT in the tree yet.
-# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- epatch ${FILESDIR}/${P}-syscall-partial.patch
- cd ${S} || die "cd '${S}' failed"
- eautoreconf || die "eautoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la
- gen_usr_ldscript libaudit.so libauparse.so
- # remove RedHat garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/*
- # scripts
- newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd
- newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd
- # Gentoo rules
- insinto /etc/audit/
- doins ${FILESDIR}/audit.rules*
- # audit logs go here
- keepdir /var/log/audit/
- # Security
- lockdown_perms ${D}
-}
-
-pkg_postinst() {
- lockdown_perms /
-}
-
-lockdown_perms() {
- # upstream wants these to have restrictive perms
- basedir="$1"
- chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null
- chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null
- chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null
-}
+++ /dev/null
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.5.ebuild,v 1.1 2006/11/13 11:41:07 robbat2 Exp $
-
-inherit eutils autotools toolchain-funcs
-
-DESCRIPTION="Userspace utilities for storing and processing auditing records."
-HOMEPAGE="http://people.redhat.com/sgrubb/audit/"
-SRC_URI="${HOMEPAGE}${P}.tar.gz"
-
-HEADER_KV="2.6.18-rc4"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="-*"
-IUSE=""
-
-RDEPEND=">=dev-lang/python-2.4"
-DEPEND="${RDEPEND}
- dev-lang/swig"
-# Do not use os-headers as this is linux specific
-# linux-headers 2.6.17_p3 is NOT in the tree yet.
-# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch
-
-src_unpack() {
- unpack ${A} || die "unpack failed"
- cd ${S} || die "cd '${S}' failed"
- for i in audit.h elf-em.h; do
- cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i}
- done
- sed -i -e 's,<linux/elf-em.h>,"elf-em.h",g' ${S}/lib/audit.h
- sed -i -e 's,<linux/audit.h>,"audit.h",g' ${S}/lib/libaudit.h
- cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/
- eautoreconf || die "eautoreconf failed"
-}
-
-src_compile() {
- econf --sbindir=/sbin --libdir=/lib || die "econf failed"
- emake || die "emake failed"
-}
-
-src_install() {
- emake DESTDIR="${D}" install || die "emake install failed"
- dodir /usr/lib
- mv ${D}/lib/*.a ${D}/usr/lib
- rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la
- gen_usr_ldscript libaudit.so libauparse.so
- # remove RedHat garbage
- rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig
- # docs
- dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/*
- # scripts
- newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd
- newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd
- # Gentoo rules
- insinto /etc/audit/
- doins ${FILESDIR}/audit.rules*
- # audit logs go here
- keepdir /var/log/audit/
- # Security
- lockdown_perms ${D}
-}
-
-pkg_postinst() {
- lockdown_perms /
-}
-
-lockdown_perms() {
- # upstream wants these to have restrictive perms
- basedir="$1"
- chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null
- chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null
- chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null
-}
+++ /dev/null
-diff -ur audit-0.9.14/lib/libaudit.h /opt/audit-0.9.14/lib/libaudit.h
---- audit-0.9.14/lib/libaudit.h 2005-06-21 17:50:54.000000000 -0400
-+++ /opt/audit-0.9.14/lib/libaudit.h 2005-06-28 14:26:57.000000000 -0400
-@@ -1,3 +1,196 @@
-+/* NOTE: This file is really 2 that are combined temporarily. */
-+
-+/* audit.h -- Auditing support
-+ *
-+ * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina.
-+ * All Rights Reserved.
-+ *
-+ * This program is free software; you can redistribute it and/or modify
-+ * it under the terms of the GNU General Public License as published by
-+ * the Free Software Foundation; either version 2 of the License, or
-+ * (at your option) any later version.
-+ *
-+ * This program is distributed in the hope that it will be useful,
-+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
-+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-+ * GNU General Public License for more details.
-+ *
-+ * You should have received a copy of the GNU General Public License
-+ * along with this program; if not, write to the Free Software
-+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
-+ *
-+ * Written by Rickard E. (Rik) Faith <faith@redhat.com>
-+ *
-+ */
-+
-+#ifndef _LINUX_AUDIT_H_
-+#define _LINUX_AUDIT_H_
-+
-+#include <elf.h>
-+
-+/* The netlink messages for the audit system is divided into blocks:
-+ * 1000 - 1099 are for commanding the audit system
-+ * 1100 - 1199 user space trusted application messages
-+ * 1200 - 1299 messages internal to the audit daemon
-+ * 1300 - 1399 audit event messages
-+ * 1400 - 1499 SE Linux use
-+ * 1500 - 1999 future use
-+ * 2000 is for otherwise unclassified kernel audit messages
-+ *
-+ * Messages from 1000-1199 are bi-directional. 1200-1299 are exclusively user
-+ * space. Anything over that is kernel --> user space communication.
-+ */
-+#define AUDIT_GET 1000 /* Get status */
-+#define AUDIT_SET 1001 /* Set status (enable/disable/auditd) */
-+#define AUDIT_LIST 1002 /* List syscall filtering rules */
-+#define AUDIT_ADD 1003 /* Add syscall filtering rule */
-+#define AUDIT_DEL 1004 /* Delete syscall filtering rule */
-+#define AUDIT_USER 1005 /* Message from userspace -- deprecated */
-+#define AUDIT_LOGIN 1006 /* Define the login id and information */
-+#define AUDIT_WATCH_INS 1007 /* Insert file/dir watch entry */
-+#define AUDIT_WATCH_REM 1008 /* Remove file/dir watch entry */
-+#define AUDIT_WATCH_LIST 1009 /* List all file/dir watches */
-+#define AUDIT_SIGNAL_INFO 1010 /* Get info about sender of signal to auditd */
-+
-+#define AUDIT_FIRST_USER_MSG 1100 /* Userspace messages uninteresting to kernel */
-+#define AUDIT_LAST_USER_MSG 1199
-+
-+#define AUDIT_DAEMON_START 1200 /* Daemon startup record */
-+#define AUDIT_DAEMON_END 1201 /* Daemon normal stop record */
-+#define AUDIT_DAEMON_ABORT 1202 /* Daemon error stop record */
-+#define AUDIT_DAEMON_CONFIG 1203 /* Daemon config change */
-+
-+#define AUDIT_SYSCALL 1300 /* Syscall event */
-+#define AUDIT_FS_WATCH 1301 /* Filesystem watch event */
-+#define AUDIT_PATH 1302 /* Filname path information */
-+#define AUDIT_IPC 1303 /* IPC record */
-+#define AUDIT_SOCKETCALL 1304 /* sys_socketcall arguments */
-+#define AUDIT_CONFIG_CHANGE 1305 /* Audit system configuration change */
-+#define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */
-+
-+#define AUDIT_AVC 1400 /* SE Linux avc denial or grant */
-+#define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */
-+#define AUDIT_AVC_PATH 1402 /* dentry, vfsmount pair from avc */
-+
-+#define AUDIT_KERNEL 2000 /* Asynchronous audit record. NOT A REQUEST. */
-+
-+/* Rule flags */
-+#define AUDIT_PER_TASK 0x01 /* Apply rule at task creation (not syscall) */
-+#define AUDIT_AT_ENTRY 0x02 /* Apply rule at syscall entry */
-+#define AUDIT_AT_EXIT 0x04 /* Apply rule at syscall exit */
-+#define AUDIT_PREPEND 0x10 /* Prepend to front of list */
-+
-+/* Rule actions */
-+#define AUDIT_NEVER 0 /* Do not build context if rule matches */
-+#define AUDIT_POSSIBLE 1 /* Build context if rule matches */
-+#define AUDIT_ALWAYS 2 /* Generate audit record if rule matches */
-+
-+/* Rule structure sizes -- if these change, different AUDIT_ADD and
-+ * AUDIT_LIST commands must be implemented. */
-+#define AUDIT_MAX_FIELDS 64
-+#define AUDIT_BITMASK_SIZE 64
-+#define AUDIT_WORD(nr) ((uint32_t)((nr)/32))
-+#define AUDIT_BIT(nr) (1 << ((nr) - AUDIT_WORD(nr)*32))
-+
-+/* Rule fields */
-+ /* These are useful when checking the
-+ * task structure at task creation time
-+ * (AUDIT_PER_TASK). */
-+#define AUDIT_PID 0
-+#define AUDIT_UID 1
-+#define AUDIT_EUID 2
-+#define AUDIT_SUID 3
-+#define AUDIT_FSUID 4
-+#define AUDIT_GID 5
-+#define AUDIT_EGID 6
-+#define AUDIT_SGID 7
-+#define AUDIT_FSGID 8
-+#define AUDIT_LOGINUID 9
-+#define AUDIT_PERS 10
-+#define AUDIT_ARCH 11
-+
-+ /* These are ONLY useful when checking
-+ * at syscall exit time (AUDIT_AT_EXIT). */
-+#define AUDIT_DEVMAJOR 100
-+#define AUDIT_DEVMINOR 101
-+#define AUDIT_INODE 102
-+#define AUDIT_EXIT 103
-+#define AUDIT_SUCCESS 104 /* exit >= 0; value ignored */
-+
-+#define AUDIT_ARG0 200
-+#define AUDIT_ARG1 (AUDIT_ARG0+1)
-+#define AUDIT_ARG2 (AUDIT_ARG0+2)
-+#define AUDIT_ARG3 (AUDIT_ARG0+3)
-+
-+#define AUDIT_NEGATE 0x80000000
-+
-+
-+/* Status symbols */
-+ /* Mask values */
-+#define AUDIT_STATUS_ENABLED 0x0001
-+#define AUDIT_STATUS_FAILURE 0x0002
-+#define AUDIT_STATUS_PID 0x0004
-+#define AUDIT_STATUS_RATE_LIMIT 0x0008
-+#define AUDIT_STATUS_BACKLOG_LIMIT 0x0010
-+ /* Failure-to-log actions */
-+#define AUDIT_FAIL_SILENT 0
-+#define AUDIT_FAIL_PRINTK 1
-+#define AUDIT_FAIL_PANIC 2
-+
-+/* distinguish syscall tables */
-+#define __AUDIT_ARCH_64BIT 0x80000000
-+#define __AUDIT_ARCH_LE 0x40000000
-+#define AUDIT_ARCH_ALPHA (EM_ALPHA|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_ARM (EM_ARM|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_ARMEB (EM_ARM)
-+#define AUDIT_ARCH_CRIS (EM_CRIS|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_FRV (EM_FRV)
-+#define AUDIT_ARCH_H8300 (EM_H8_300)
-+#define AUDIT_ARCH_I386 (EM_386|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_IA64 (EM_IA_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_M32R (EM_M32R)
-+#define AUDIT_ARCH_M68K (EM_68K)
-+#define AUDIT_ARCH_MIPS (EM_MIPS)
-+#define AUDIT_ARCH_MIPSEL (EM_MIPS|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_MIPS64 (EM_MIPS|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_MIPSEL64 (EM_MIPS|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_PARISC (EM_PARISC)
-+#define AUDIT_ARCH_PARISC64 (EM_PARISC|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_PPC (EM_PPC)
-+#define AUDIT_ARCH_PPC64 (EM_PPC64|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_S390 (EM_S390)
-+#define AUDIT_ARCH_S390X (EM_S390|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_SH (EM_SH)
-+#define AUDIT_ARCH_SHEL (EM_SH|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_SH64 (EM_SH|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_SHEL64 (EM_SH|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_SPARC (EM_SPARC)
-+#define AUDIT_ARCH_SPARC64 (EM_SPARC64|__AUDIT_ARCH_64BIT)
-+#define AUDIT_ARCH_V850 (EM_V850|__AUDIT_ARCH_LE)
-+#define AUDIT_ARCH_X86_64 (EM_X86_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE)
-+
-+struct audit_status {
-+ uint32_t mask; /* Bit mask for valid entries */
-+ uint32_t enabled; /* 1 = enabled, 0 = disabled */
-+ uint32_t failure; /* Failure-to-log action */
-+ uint32_t pid; /* pid of auditd process */
-+ uint32_t rate_limit; /* messages rate limit (per second) */
-+ uint32_t backlog_limit; /* waiting messages limit */
-+ uint32_t lost; /* messages lost */
-+ uint32_t backlog; /* messages waiting in queue */
-+};
-+
-+struct audit_rule { /* for AUDIT_LIST, AUDIT_ADD, and AUDIT_DEL */
-+ uint32_t flags; /* AUDIT_PER_{TASK,CALL}, AUDIT_PREPEND */
-+ uint32_t action; /* AUDIT_NEVER, AUDIT_POSSIBLE, AUDIT_ALWAYS */
-+ uint32_t field_count;
-+ uint32_t mask[AUDIT_BITMASK_SIZE];
-+ uint32_t fields[AUDIT_MAX_FIELDS];
-+ uint32_t values[AUDIT_MAX_FIELDS];
-+};
-+
-+#endif /* _LINUX_AUDIT_H_ */
-+
- /* libaudit.h --
- * Copyright 2004, 2005 Red Hat Inc., Durham, North Carolina.
- * All Rights Reserved.
-@@ -27,7 +220,6 @@
- #include <stdint.h>
- #include <sys/socket.h>
- #include <linux/netlink.h>
--#include <linux/audit.h>
- #include <stdarg.h>
- #include <syslog.h>
- #include <linux/fs.h> /* For watch */
+++ /dev/null
-diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/lib/libaudit.h audit-1.1.3.new/lib/libaudit.h
---- audit-1.1.3/lib/libaudit.h 2006-01-05 13:19:20.000000000 -0800
-+++ audit-1.1.3.new/lib/libaudit.h 2006-01-31 18:12:49.057268514 -0800
-@@ -31,6 +31,7 @@ extern "C" {
- #include <asm/types.h>
- #include <stdint.h>
- #include <sys/socket.h>
-+#include <signal.h> /* to avoid redefinition of sigval/siginfo */
- #include <linux/netlink.h>
- #include <linux/audit.h>
- #include <stdarg.h>
-diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/auditctl-llist.c audit-1.1.3.new/src/auditctl-llist.c
---- audit-1.1.3/src/auditctl-llist.c 2006-01-04 08:27:42.000000000 -0800
-+++ audit-1.1.3.new/src/auditctl-llist.c 2006-01-31 18:07:52.367438434 -0800
-@@ -126,16 +126,16 @@ int list_find_item(llist *l, unsigned in
- void list_clear(llist* l)
- {
- lnode* nextnode;
-- register lnode* current;
-+ register lnode* curnode;
-
-- current = l->head;
-- while (current)
-+ curnode = l->head;
-+ while (curnode)
- {
-- nextnode=current->next;
-- if (current->w)
-- free(current->w);
-- free(current);
-- current=nextnode;
-+ nextnode=curnode->next;
-+ if (curnode->w)
-+ free(curnode->w);
-+ free(curnode);
-+ curnode=nextnode;
- }
- l->head = 0;
- l->cur = 0;
-diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-int.c audit-1.1.3.new/src/ausearch-int.c
---- audit-1.1.3/src/ausearch-int.c 2006-01-04 08:27:42.000000000 -0800
-+++ audit-1.1.3.new/src/ausearch-int.c 2006-01-31 18:09:11.607132293 -0800
-@@ -112,16 +112,16 @@ int ilist_find_item(ilist *l, unsigned i
- void ilist_clear(ilist* l)
- {
- int_node* nextnode;
-- register int_node* current;
-+ register int_node* curnode;
-
- if (l == NULL)
- return;
-
-- current = l->head;
-- while (current) {
-- nextnode=current->next;
-- free(current);
-- current=nextnode;
-+ curnode = l->head;
-+ while (curnode) {
-+ nextnode=curnode->next;
-+ free(curnode);
-+ curnode=nextnode;
- }
- l->head = NULL;
- l->cur = NULL;
-diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-llist.c audit-1.1.3.new/src/ausearch-llist.c
---- audit-1.1.3/src/ausearch-llist.c 2006-01-04 08:27:42.000000000 -0800
-+++ audit-1.1.3.new/src/ausearch-llist.c 2006-01-31 18:08:40.173666993 -0800
-@@ -136,15 +136,15 @@ int list_find_item(llist *l, unsigned in
- void list_clear(llist* l)
- {
- lnode* nextnode;
-- register lnode* current;
-+ register lnode* curnode;
-
-- current = l->head;
-- while (current) {
-- nextnode=current->next;
-- if (current->message)
-- free(current->message);
-- free(current);
-- current=nextnode;
-+ curnode = l->head;
-+ while (curnode) {
-+ nextnode=curnode->next;
-+ if (curnode->message)
-+ free(curnode->message);
-+ free(curnode);
-+ curnode=nextnode;
- }
- l->head = NULL;
- l->cur = NULL;
-diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-string.c audit-1.1.3.new/src/ausearch-string.c
---- audit-1.1.3/src/ausearch-string.c 2006-01-04 08:27:42.000000000 -0800
-+++ audit-1.1.3.new/src/ausearch-string.c 2006-01-31 18:08:54.386329531 -0800
-@@ -130,17 +130,17 @@ int slist_find_item(slist *l, unsigned i
- void slist_clear(slist* l)
- {
- snode* nextnode;
-- register snode* current;
-+ register snode* curnode;
-
-- current = l->head;
-- while (current) {
-- nextnode=current->next;
-- if (current->str)
-- free(current->str);
-- if (current->key)
-- free(current->key);
-- free(current);
-- current=nextnode;
-+ curnode = l->head;
-+ while (curnode) {
-+ nextnode=curnode->next;
-+ if (curnode->str)
-+ free(curnode->str);
-+ if (curnode->key)
-+ free(curnode->key);
-+ free(curnode);
-+ curnode=nextnode;
- }
- l->head = NULL;
- l->cur = NULL;
+++ /dev/null
---- audit-1.2.3/lib/libaudit.h~ 2006-05-24 08:19:30.000000000 -0700
-+++ audit-1.2.3/lib/libaudit.h 2006-06-21 23:01:18.219583784 -0700
-@@ -91,6 +91,8 @@
- #define AUDIT_FS_INODE 1308 /* File system inode */
- #ifndef AUDIT_EXECVE
- #define AUDIT_EXECVE 1309
-+#endif
-+#ifndef AUDIT_SYSCALL_PARTIAL
- #define AUDIT_SYSCALL_PARTIAL 1310 /* Partial syscall event */
- #endif
- #ifndef AUDIT_IPC_SET_PERM
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd,v 1.1 2005/05/01 02:19:00 robbat2 Exp $
-
-# Configuration options for auditd
-# -f for foreground mode
-# There are some other options as well, but you'll have to look in the source
-# code to find them As they aren't ready for use yet.
-extraoptions=''
-
-# Audit rules file
-rulefile=/etc/audit.rules
+++ /dev/null
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $
-
-# Configuration options for auditd
-# -f for foreground mode
-# There are some other options as well, but you'll have to look in the source
-# code to find them As they aren't ready for use yet.
-extraoptions=''
-
-# Audit rules file
-rulefile=/etc/audit.rules
+++ /dev/null
-#!/sbin/runscript
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd,v 1.2 2005/05/01 02:19:48 robbat2 Exp $
-
-start() {
- ebegin "Starting auditd"
- start-stop-daemon \
- --start --quiet --pidfile /var/run/auditd.pid \
- --exec /usr/sbin/auditd -- ${extraoptions}
- local ret=$?
- eend $ret
- if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then
- einfo "Loading audit rules from ${rulefile}"
- /usr/sbin/auditctl -R "${rulefile}"
- ret=$?
- fi
- return $ret
-}
-
-stop() {
- ebegin "Stopping auditd"
- start-stop-daemon \
- --stop --quiet --pidfile /var/run/auditd.pid
- eend $?
-}
+++ /dev/null
-#!/sbin/runscript
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $
-
-start() {
- ebegin "Starting auditd"
- start-stop-daemon \
- --start --quiet --pidfile /var/run/auditd.pid \
- --exec /sbin/auditd -- ${extraoptions}
- local ret=$?
- eend $ret
- if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then
- einfo "Loading audit rules from ${rulefile}"
- /sbin/auditctl -R "${rulefile}"
- ret=$?
- fi
- return $ret
-}
-
-stop() {
- ebegin "Stopping auditd"
- start-stop-daemon \
- --stop --quiet --pidfile /var/run/auditd.pid
- eend $?
-}
+++ /dev/null
-MD5 56c82cfe0d5af98a3313a8a76a08ed43 audit-0.7.2.tar.gz 70184
-RMD160 d13d8e93972f91386ced42e8204fb8ad4225f087 audit-0.7.2.tar.gz 70184
-SHA256 fc2855e4504efeb60ec61aef414719eb9f94ef00496418a8873f3f8dc3e0628f audit-0.7.2.tar.gz 70184
+++ /dev/null
-MD5 1fbed5d8a67b2ad7724e4d95174d451f audit-0.7.3.tar.gz 72496
-RMD160 035a95e73e333abbd119667c2b987b0321600273 audit-0.7.3.tar.gz 72496
-SHA256 c24eae64555a32d2725f3af2aaf551fc6ffa1ea67e0bdbe735a739f36b9fcf8a audit-0.7.3.tar.gz 72496
+++ /dev/null
-MD5 2a62ad468d504780da0899e15d1ea03c audit-0.7.4.tar.gz 72751
-RMD160 8c0d60f24da68372760cd33a46c9fe3f8acaf286 audit-0.7.4.tar.gz 72751
-SHA256 3fa0aadadb7163b868d435bdb03f73df7d19f2f4d98cb86e7c8ed445c39f5f95 audit-0.7.4.tar.gz 72751
+++ /dev/null
-MD5 e2930c151b3cddb563df50c69733c26f audit-0.8.tar.gz 74782
-RMD160 fa9c23fb864eaa3987743535e0fa51c2294c02fc audit-0.8.tar.gz 74782
-SHA256 a70523be883acfc07410b2d4ec1b3a958de73c0a609d40621e695c3156641aee audit-0.8.tar.gz 74782
+++ /dev/null
-MD5 d02b1e35fdbfa5de94fd7daf8e94845a audit-0.8.1.tar.gz 75487
-RMD160 e5b9ed8cca8d4d3c4b379144633f9cba70fefd76 audit-0.8.1.tar.gz 75487
-SHA256 bf33acf43bc8ce64a25d5b624814a84022df131f2062327cdc311788aadc51dc audit-0.8.1.tar.gz 75487
+++ /dev/null
-MD5 052dd2563e90cd787994aebc69545891 audit-0.9.1.tar.gz 82578
-RMD160 beab2380723213bba3ad8dca21ebee1155a49900 audit-0.9.1.tar.gz 82578
-SHA256 88fdb0883f552dccb968bb953f6467f14bddb33cba22bad807649e4c039f1fab audit-0.9.1.tar.gz 82578
+++ /dev/null
-MD5 19d208c284d6f6ae830f1943a74bbd7f audit-1.1.6.tar.gz 274815
-RMD160 8f420b47347d1c00b4b4c114dc4f913704a9205e audit-1.1.6.tar.gz 274815
-SHA256 44c152fc652567c64c5937335122b37250694152bd47d44628b11f1f65c16e04 audit-1.1.6.tar.gz 274815
+++ /dev/null
-MD5 537d4ee68428e2ba2f01a8c07287fb6e audit-1.2.1.tar.gz 274432
-RMD160 14f70c58239f6ed2eba3d902630f4bd4112c4fba audit-1.2.1.tar.gz 274432
-SHA256 bba5d255d81ca36245464b83e977ba6bd05b1528cad07559fcc0367d39b2d26f audit-1.2.1.tar.gz 274432
+++ /dev/null
-MD5 a121e66bf44a65af3c4a04220a176d2e audit-1.2.3.tar.gz 276977
-RMD160 2fbc483dbff0ad5cd4022b4ccb5d3c082cccc0ef audit-1.2.3.tar.gz 276977
-SHA256 3bb70258c9e5ae2a0ebc43dc96542cd5494e169dc0d03d91bd9a7cd2a9f37b25 audit-1.2.3.tar.gz 276977
+++ /dev/null
-MD5 d5d56d5e3189215dcd37a5eded761d12 audit-1.2.5.tar.gz 232383
-RMD160 8dd8bca46c918f0805756dfdfd898eb19b09f7e9 audit-1.2.5.tar.gz 232383
-SHA256 6b9fd472ca97c07e319338a73b3f0adbe5f53506a15adba2ac2ad3c7db7b0eef audit-1.2.5.tar.gz 232383