[Forensics-changes] [SCM] debian-forensics/tct branch, debian-sid, updated. upstream/1.18-3-gc8e79bd

Daniel Baumann daniel at debian.org
Sat Feb 9 18:54:16 UTC 2008


The following commit has been merged in the debian-sid branch:
commit c8e79bd3a50dbc0cc551c532272691375fdcca4c
Author: Daniel Baumann <daniel at debian.org>
Date:   Sat Feb 9 19:54:13 2008 +0100

    Removing useless whitespaces.

diff --git a/debian/changelog b/debian/changelog
index 9378a9e..3a1e92e 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -74,13 +74,13 @@ tct (1.07-11) unstable; urgency=low
 
 tct (1.07-10) unstable; urgency=low
 
-  * Updated contact address. 
+  * Updated contact address.
 
  -- Yotam Rubin <yotamr at bezeqint.net>  Wed, 22 May 2002 16:16:59 +0300
 
 tct (1.07-9) unstable; urgency=low
 
-  * Made timeout return the exit code of the forked command. 
+  * Made timeout return the exit code of the forked command.
     Closes: Bug#132927
   * Prevented signal recursion in timeout. Closes: Bug#132929, Bug#135165
   * Clarified the manual page. Closes: Bug#134999
@@ -108,7 +108,7 @@ tct (1.07-6) unstable; urgency=low
 
 tct (1.07-5) unstable; urgency=low
 
-  * Fixed alpha build problem. Patch from Christpoher Chimelis. 
+  * Fixed alpha build problem. Patch from Christpoher Chimelis.
     Closes: Bug#110341
 
  -- Yotam Rubin <yotam at makif.omer.k12.il>  Sat,  1 Sep 2001 17:29:44 +0300
@@ -147,6 +147,5 @@ tct (1.06-2) unstable; urgency=low
 tct (1.06-1) unstable; urgency=low
 
   * First Debian release
- 
+
  -- Yotam Rubin <yotam at makif.omer.k12.il>  Sat,  7 Apr 2001 03:34:36 +0200
- 
diff --git a/debian/contrib/md5_image_maker b/debian/contrib/md5_image_maker
index 234e828..89057f9 100644
--- a/debian/contrib/md5_image_maker
+++ b/debian/contrib/md5_image_maker
@@ -20,4 +20,3 @@ for partition in $@; do
     dd if=/dev/$partition of=$partition.bin
     $MD5SUM $partition.bin  >> md5sums
 done
-
diff --git a/debian/control b/debian/control
index 7921f2e..29fa297 100644
--- a/debian/control
+++ b/debian/control
@@ -21,8 +21,8 @@ Description: Forensics related utilities.
  essential forensic data before you begin.
  .
  Tools contained within this package: grave-robber, lazarus,
- inode-cat (ex icat), ils, unrm and pcat.  
- 
+ inode-cat (ex icat), ils, unrm and pcat.
+
 Package: timeout
 Architecture: any
 Depends: ${shlibs:Depends}
diff --git a/debian/ils2mac.1 b/debian/ils2mac.1
index 429cdf6..4f48fa0 100644
--- a/debian/ils2mac.1
+++ b/debian/ils2mac.1
@@ -1,4 +1,4 @@
-.TH ils2mac 1 
+.TH ils2mac 1
 .ad
 .fi
 .SH NAME
@@ -8,13 +8,13 @@ Convert ils output to mactime parsable data
 .SH SYNOPSIS
 .na
 .nf
-\fBils2mac\fR 
+\fBils2mac\fR
 .SH DESCRIPTION
 Take a stream of time machine formatted data from ils and re-arrange
 the fields into the fixed order that mactime expects.
 
 This program should not be necessary. The next version of mactime should
-understand time machine format instead of just pretending it does. 
+understand time machine format instead of just pretending it does.
 
 Kludge: if the first line is not in time machine format assume that
 we are looking at output from the grave-robber which prepends a date
diff --git a/debian/rules b/debian/rules
index 73073b2..f1c065f 100755
--- a/debian/rules
+++ b/debian/rules
@@ -1,4 +1,4 @@
-#!/usr/bin/make -f 
+#!/usr/bin/make -f
 
 # This makes the other DH_OPTIONS lines work
 export DH_OPTIONS
diff --git a/debian/tct.copyright b/debian/tct.copyright
index f6f0feb..77a8237 100644
--- a/debian/tct.copyright
+++ b/debian/tct.copyright
@@ -5,8 +5,8 @@ from sources obtained from:
 All binary and source files which do not explicitly state otherwise include the
 following copyright:
 
-Copyright 1999 by Dan Farmer.  All rights reserved.  Some individual 
-files may be covered by other copyrights (this will be noted in the 
+Copyright 1999 by Dan Farmer.  All rights reserved.  Some individual
+files may be covered by other copyrights (this will be noted in the
 file itself.)
 
 Redistribution and use in source and binary forms are permitted
@@ -35,20 +35,20 @@ PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
 
 1.  DEFINITIONS
 
-"Contribution" means:  
-    a) in the case of International Business Machines Corporation ("IBM"), 
-       the Original Program, and 
-    b) in the case of each Contributor, 
+"Contribution" means:
+    a) in the case of International Business Machines Corporation ("IBM"),
+       the Original Program, and
+    b) in the case of each Contributor,
        i)  changes to the Program, and
        ii) additions to the Program;
            where such changes and/or additions to the Program originate
-           from and are distributed by that particular Contributor.  
-           A Contribution 'originates' from a Contributor if it was added 
-           to the Program by such Contributor itself or anyone acting on 
-           such Contributor's behalf.  
+           from and are distributed by that particular Contributor.
+           A Contribution 'originates' from a Contributor if it was added
+           to the Program by such Contributor itself or anyone acting on
+           such Contributor's behalf.
     Contributions do not include additions to the Program which:
-       (i)  are separate modules of software distributed in conjunction 
-            with the Program under their own license agreement, and 
+       (i)  are separate modules of software distributed in conjunction
+            with the Program under their own license agreement, and
        (ii) are not derivative works of the Program.
 
 "Contributor" means IBM and any other entity that distributes the Program.
@@ -63,7 +63,7 @@ and documentation, if any.
 
 "Program" means the Original Program and Contributions.
 
-"Recipient" means anyone who receives the Program under this Agreement, 
+"Recipient" means anyone who receives the Program under this Agreement,
 including all Contributors.
 
 2.  GRANT OF RIGHTS
@@ -107,7 +107,7 @@ including all Contributors.
 
 3.  REQUIREMENTS
 
-A Contributor may choose to distribute the Program in object code form 
+A Contributor may choose to distribute the Program in object code form
 under its own license agreement, provided that:
     a) it complies with the terms and conditions of this Agreement; and
     b) its license agreement:
@@ -116,31 +116,31 @@ under its own license agreement, provided that:
             warranties or conditions of title and non-infringement, and
             implied warranties or conditions of merchantability and fitness
             for a particular purpose;
-       ii)  effectively excludes on behalf of all Contributors all 
-            liability for damages, including direct, indirect, special, 
-            incidental and consequential damages, such as lost profits; 
-       iii) states that any provisions which differ from this Agreement 
-            are offered by that Contributor alone and not by any other 
+       ii)  effectively excludes on behalf of all Contributors all
+            liability for damages, including direct, indirect, special,
+            incidental and consequential damages, such as lost profits;
+       iii) states that any provisions which differ from this Agreement
+            are offered by that Contributor alone and not by any other
             party; and
-       iv)  states that source code for the Program is available from 
-            such Contributor, and informs licensees how to obtain it in a 
-            reasonable manner on or through a medium customarily used for 
-            software exchange. 
+       iv)  states that source code for the Program is available from
+            such Contributor, and informs licensees how to obtain it in a
+            reasonable manner on or through a medium customarily used for
+            software exchange.
 
 When the Program is made available in source code form:
-    a) it must be made available under this Agreement; and 
-    b) a copy of this Agreement must be included with each copy of the 
-       Program.  
+    a) it must be made available under this Agreement; and
+    b) a copy of this Agreement must be included with each copy of the
+       Program.
 
-Each Contributor must include the following in a conspicuous location 
-in the Program: 
+Each Contributor must include the following in a conspicuous location
+in the Program:
 
     Copyright (c) 1997,1998,1999, International Business Machines
     Corporation and others. All Rights Reserved.
 
 In addition, each Contributor must identify itself as the originator of
 its Contribution, if any, in a manner that reasonably allows subsequent
-Recipients to identify the originator of the Contribution. 
+Recipients to identify the originator of the Contribution.
 
 4.  COMMERCIAL DISTRIBUTION
 
@@ -161,10 +161,10 @@ product offering.  The obligations in this section do not apply to any
 claims or Losses relating to any actual or alleged intellectual property
 infringement.  In order to qualify, an Indemnified Contributor must:
     a) promptly notify the Commercial Contributor in writing of such claim,
-and 
+and
     b) allow the Commercial Contributor to control, and cooperate with
-       the Commercial Contributor in, the defense and any related 
-       settlement negotiations.  The Indemnified Contributor may 
+       the Commercial Contributor in, the defense and any related
+       settlement negotiations.  The Indemnified Contributor may
        participate in any such claim at its own expense.
 
 For example, a Contributor might include the Program in a commercial
@@ -189,7 +189,7 @@ the appropriateness of using and distributing the Program and assumes
 all risks associated with its exercise of rights under this Agreement,
 including but not limited to the risks and costs of program errors,
 compliance with applicable laws, damage to or loss of data, programs or
-equipment, and unavailability or interruption of operations. 
+equipment, and unavailability or interruption of operations.
 
 6.  DISCLAIMER OF LIABILITY
 
@@ -228,7 +228,7 @@ becoming aware of such noncompliance.  If all Recipient's rights under
 this Agreement terminate, Recipient agrees to cease use and distribution
 of the Program as soon as reasonably practicable.  However, Recipient's
 obligations under this Agreement and any licenses granted by Recipient
-relating to the Program shall continue and survive. 
+relating to the Program shall continue and survive.
 
 IBM may publish new versions (including revisions) of this Agreement
 from time to time.  Each new version of the Agreement will be given a
@@ -247,4 +247,4 @@ This Agreement is governed by the laws of the State of New York and the
 intellectual property laws of the United States of America. No party to
 this Agreement will bring a legal action under this Agreement more than
 one year after the cause of action arose.  Each party waives its rights
-to a jury trial in any resulting litigation. 
+to a jury trial in any resulting litigation.
diff --git a/debian/tct.postrm b/debian/tct.postrm
index 1e0da00..57c52d0 100644
--- a/debian/tct.postrm
+++ b/debian/tct.postrm
@@ -14,4 +14,3 @@ case "$1" in
 	upgrade|failed-upgrade|abort-install|abort-upgrade|disappear)
 		;;
 esac
-
diff --git a/debian/timeout.copyright b/debian/timeout.copyright
index 9433152..441ccc8 100644
--- a/debian/timeout.copyright
+++ b/debian/timeout.copyright
@@ -2,8 +2,8 @@ This package was produced by Yotam Rubin <yotam at makif.omer.k12.il>
 from sources obtained from:
 <http://www.porcupine.org/forensics/...>
 
-Copyright 1999 by Dan Farmer.  All rights reserved.  Some individual 
-files may be covered by other copyrights (this will be noted in the 
+Copyright 1999 by Dan Farmer.  All rights reserved.  Some individual
+files may be covered by other copyrights (this will be noted in the
 file itself.)
 
 Redistribution and use in source and binary forms are permitted

-- 
debian-forensics/tct



More information about the forensics-changes mailing list