# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
github.setup sleuthkit sleuthkit 4.7.0 sleuthkit-
checksums rmd160 73898f5cea21bc411f8cb439d277b368e35447bb \
sha256 ef49f9da608a910b54444c84d964cea9e141fc179b85500476362217d9a4b32b \
homepage https://www.sleuthkit.org/sleuthkit/
description Forensic toolkit
long_description The Sleuth Kit (previously known as TASK) is a collection \
of UNIX-based command line file system and media management forensic \
analysis tools. The file system tools allow you to examine file systems of \
a suspect computer in a non-intrusive fashion. Because the tools do not \
rely on the operating system to process the file systems, deleted and \
hidden content is shown. \
The media management tools allow you to examine the layout of disks and \
other media. The Sleuth Kit supports DOS partitions, BSD partitions (disk \
labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT \
disks. With these tools, you can identify where partitions are located and \
extract them so that they can be analyzed with file system analysis tools.
depends_lib-append port:afflib \
path:lib/libssl.dylib:openssl \
# for the 'sorter' script:
depends_run-append port:perl5
patchfiles patch-tsk-img-ewf.cpp.diff
configure.args --disable-java