aboutsummaryrefslogtreecommitdiffstats
path: root/testing/sleuthkit/30_fix-manpages.patch
blob: 38ac84f755142a3e1c92e315403818bcf3984f42 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
Description: Fixes formatting errors in manpages
Author: Julien Valroff <julien@debian.org>
Reviewed-by: Joao Eriberto Mota Filho <eriberto@debian.org>
Last-Update: 2015-11-12
Index: sleuthkit-4.2.0/man/hfind.1
===================================================================
--- sleuthkit-4.2.0.orig/man/hfind.1
+++ sleuthkit-4.2.0/man/hfind.1
@@ -72,64 +72,64 @@ The following input types are valid.  Fo
 sorted by.  The 'md5sum' value can also be used to sort and index "home made"
 databases.  'hfind' can take data in both common formats:
 
-	MD5 (test.txt) = 76b1f4de1522c20b67acc132937cf82e
+    MD5 (test.txt) = 76b1f4de1522c20b67acc132937cf82e
 
 and
 
-	76b1f4de1522c20b67acc132937cf82e        test.txt
+    76b1f4de1522c20b67acc132937cf82e        test.txt
 
 .SH EXAMPLES
 To create an MD5 index file for NIST NSRL:
 
-	# hfind \-i nsrl-md5 /usr/local/hash/nsrl/NSRLFile.txt
+    # hfind \-i nsrl-md5 /usr/local/hash/nsrl/NSRLFile.txt
 
 To lookup a value in the NSRL:
 
-	# hfind /usr/local/hash/nsrl/NSRLFile.txt 76b1f4de1522c20b67acc132937cf82e
+    # hfind /usr/local/hash/nsrl/NSRLFile.txt 76b1f4de1522c20b67acc132937cf82e
 
-	76b1f4de1522c20b67acc132937cf82e  Hash Not Found
+    76b1f4de1522c20b67acc132937cf82e  Hash Not Found
 
 You can even do both SHA-1 and MD5 if you want:
 
-	# hfind \-i nsrl-sha1 /usr/local/hash/nsrl/NSRLFile.txt
+    # hfind \-i nsrl-sha1 /usr/local/hash/nsrl/NSRLFile.txt
 
-	# hfind /usr/local/hash/nsrl/NSRLFile.txt
-	76b1f4de1522c20b67acc132937cf82e
-	80001A80B3F1B80076B297CEE8805AAA04E1B5BA
+    # hfind /usr/local/hash/nsrl/NSRLFile.txt
+    76b1f4de1522c20b67acc132937cf82e
+    80001A80B3F1B80076B297CEE8805AAA04E1B5BA
 
-	76b1f4de1522c20b67acc132937cf82e  Hash Not Found
+    76b1f4de1522c20b67acc132937cf82e  Hash Not Found
 
-	80001A80B3F1B80076B297CEE8805AAA04E1B5BA  thrdcore.cpp
+    80001A80B3F1B80076B297CEE8805AAA04E1B5BA  thrdcore.cpp
 
 To make a database of critical binaries of a trusted system, use 'md5sum':
 
-	# md5sum /bin/* /sbin/* /usr/bin/* /usr/bin/* /usr/local/bin/* /usr/local/sbin/* > system.md5
+    # md5sum /bin/* /sbin/* /usr/bin/* /usr/bin/* /usr/local/bin/* /usr/local/sbin/* > system.md5
 
-	# hfind \-i md5sum system.md5
+    # hfind \-i md5sum system.md5
 
 To look entries up, the following will work:
 
-	# hfind system.md5 76b1f4de1522c20b67acc132937cf82e
+    # hfind system.md5 76b1f4de1522c20b67acc132937cf82e
 
-	76b1f4de1522c20b67acc132937cf82e  Hash Not Found
+    76b1f4de1522c20b67acc132937cf82e  Hash Not Found
 
 or
 
-	# md5sum \-q /bin/* | hfind system.md5
+    # md5sum \-q /bin/* | hfind system.md5
 
-	928682269cd3edb1acdf9a7f7e606ff2  /bin/bash
+    928682269cd3edb1acdf9a7f7e606ff2  /bin/bash
 
-	<...>
+    <...>
 
 or
 
-	# md5sum \-q /bin/* > bin.md5
+    # md5sum \-q /bin/* > bin.md5
 
-	# hfind \-f bin.md5 system.md5
+    # hfind \-f bin.md5 system.md5
 
-	928682269cd3edb1acdf9a7f7e606ff2  /bin/bash
+    928682269cd3edb1acdf9a7f7e606ff2  /bin/bash
 
-	<...>
+    <...>
 
 
 .SH "SEE ALSO"
Index: sleuthkit-4.2.0/man/tsk_gettimes.1
===================================================================
--- sleuthkit-4.2.0.orig/man/tsk_gettimes.1
+++ sleuthkit-4.2.0/man/tsk_gettimes.1
@@ -16,7 +16,7 @@ tsk_gettimes - Collect MAC times from a
 .I image [images]
 .SH DESCRIPTION
 .B tsk_gettimes
-examines each of the file systems in a disk image and returns the data about them in the MACtime body format (the same as running 'fls -m' on each file system).  The output of this can be used as input to mactime to make a timeline of file activity. The data is printed to STDOUT, which can then be redirected to a file.
+examines each of the file systems in a disk image and returns the data about them in the MACtime body format (the same as running 'fls \-m' on each file system).  The output of this can be used as input to mactime to make a timeline of file activity. The data is printed to STDOUT, which can then be redirected to a file.
 
 The arguments are as follows:
 .IP -v
Index: sleuthkit-4.2.0/man/tsk_loaddb.1
===================================================================
--- sleuthkit-4.2.0.orig/man/tsk_loaddb.1
+++ sleuthkit-4.2.0/man/tsk_loaddb.1
@@ -16,11 +16,11 @@ tsk_loaddb - populate a SQLite database
 .B tsk_loaddb
 loads disk information from 
 .I image
-to a SQLite database.  This database can then be used by tools in other languages for analysis. By default, the database is stored in the same directory as the image with ".db" appended to the name or the database name can be specified with '-d'. 
+to a SQLite database.  This database can then be used by tools in other languages for analysis. By default, the database is stored in the same directory as the image with ".db" appended to the name or the database name can be specified with '\-d'. 
 
 The arguments are as follows:
 .IP "-a"
-Adds image to an existing database instead of creating a new one.  Requires that -d be also specified.
+Adds image to an existing database instead of creating a new one.  Requires that \-d be also specified.
 .IP "-d database"
 Path for the database (default is the same directory as the image with name derived from image name
 .IP -v
Index: sleuthkit-4.2.0/man/tsk_recover.1
===================================================================
--- sleuthkit-4.2.0.orig/man/tsk_recover.1
+++ sleuthkit-4.2.0/man/tsk_recover.1
@@ -47,7 +47,7 @@ Sector offset for a volume to recover (r
 If not given, will attempt to recover all volumes in image and save them
 to different folders. 
 .IP "-d dir_inum"
-Directory inum to recover from (must also specify a specific partition using -o or there must not be a volume system)
+Directory inum to recover from (must also specify a specific partition using \-o or there must not be a volume system)
 .IP "image [images]"
 The disk or partition image to read, whose format is given with '\-i'.
 Multiple image file names can be given if the image is split into multiple segments.
Index: sleuthkit-4.2.0/man/mactime.1
===================================================================
--- sleuthkit-4.2.0.orig/man/mactime.1
+++ sleuthkit-4.2.0/man/mactime.1
@@ -1,8 +1,8 @@
-.TH MACTIME 1 
+.TH MACTIME 1
 .SH NAME
 mactime \- Create an ASCII time line of file activity
 .SH SYNOPSIS
-.B  mactime [-b 
+.B  mactime [-b
 .I body
 .B ] [-g 
 .I group file
@@ -17,7 +17,7 @@ mactime \- Create an ASCII time line of
 .B mactime
 creates an ASCII time line of file activity based on the body file
 specified by '\-b' or from STDIN.  The time line is written to STDOUT.
-The body file must be in the time machine format that is created 
+The body file must be in the time machine format that is created
 by 'ils \-m', 'fls \-m', or the mac-robber tool.
 
 .SH ARGUMENTS
@@ -29,13 +29,13 @@ tools can also be used to generate the f
 Specify the location of the group file.  mactime will display the group
 name instead of the GID if this is given.
 .IP "-p password file"
-Specify the location of the passwd file.  mactime will display the 
-user name instead of the UID of this is given.  
+Specify the location of the passwd file.  mactime will display the
+user name instead of the UID of this is given.
 .IP "-i day|hour index file"
-Specify the location of an index file to write to.  The first argument 
+Specify the location of an index file to write to.  The first argument
 specifies the granularity, either an hourly summary or daily.  If the
 \'\-d\' flag is given, then the summary will be separated by a ',' to
-import into a spread sheet. 
+import into a spread sheet.
 .IP -d
 Display timeline and index files in comma delimited format.  This is used
 to import the data into a spread sheet for presentations or graphs.
@@ -43,14 +43,14 @@ to import the data into a spread sheet f
 Display header info about the session including time range, input source,
 and passwd or group files.
 .IP -V
-Display version to STDOUT. 
+Display version to STDOUT.
 .IP -m
-The month is given as a number instead of name (does not work with -y).
+The month is given as a number instead of name (does not work with \-y).
 .IP -y
 The date is displayed in ISO8601 format.
 .IP "-z TIME_ZONE"
 The timezone from where the data was collected.  The name of this argument
-is system dependent (examples include EST5EDT, GMT+1).  Does not work with -y.
+is system dependent (examples include EST5EDT, GMT+1).  Does not work with \-y.
 .IP "-z list"
 List valid timezones.
 .IP DATE_RANGE
@@ -61,7 +61,7 @@ Date can contain time, use format yyyy-m
 ending date.
 
 .SH LICENSE
-The changes from mactime in TCT and mac-daddy are distributed under the Common Public License, found in the 
+The changes from mactime in TCT and mac-daddy are distributed under the Common Public License, found in the
 .I cpl1.0.txt
 file in the The Sleuth Kit licenses directory.