<?php
/***************************************************************************
*   Copyright (C) 2008 by Edward O'Callaghan   *
*   victoredwardocallaghan@gmail.com   *
*                                                                         *
*   Permission is hereby granted, free of charge, to any person obtaining *
*   a copy of this software and associated documentation files (the       *
*   "Software"), to deal in the Software without restriction, including   *
*   without limitation the rights to use, copy, modify, merge, publish,   *
*   distribute, sublicense, and/or sell copies of the Software, and to    *
*   permit persons to whom the Software is furnished to do so, subject to *
*   the following conditions:                                             *
*                                                                         *
*   The above copyright notice and this permission notice shall be        *
*   included in all copies or substantial portions of the Software.       *
*                                                                         *
*   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,       *
*   EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF    *
*   MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. *
*   IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR     *
*   OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, *
*   ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR *
*   OTHER DEALINGS IN THE SOFTWARE.                                       *
***************************************************************************/

//Man page - portaudit ;
//http://www.freebsd.org/cgi/man.cgi?query=portaudit&sektion=1&manpath=FreeBSD+6.2-RELEASE+and+Ports

function portaudit_fetch_current_db()
{
    $fp = popen("/usr/local/sbin/portaudit -Fd", "r");
    $status = fpassthru($fp);
    pclose($fp);
    return $status;
}//This need to be done as Root. fix needed !?

function portaudit_vuln_report()
{
    echo "<b>************** NOTICE: ****************</b>\n";
    $fp = popen("/usr/local/sbin/portaudit -a", "r");
    $status = fpassthru($fp);
    echo "<b>*********** End Of NOTICE. *************</b>\n";
    pclose($fp);
    return $status;
}
?>