From c153e80ea1325be2644d939f52373a73010af45d Mon Sep 17 00:00:00 2001 From: Vivek Goyal Date: Sep 06 2013 14:24:54 +0000 Subject: Initial import of ima-evm-utils --- diff --git a/.gitignore b/.gitignore index e69de29..1427743 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1 @@ +/ima-evm-utils-0.6.tar.gz diff --git a/ima-evm-utils.spec b/ima-evm-utils.spec new file mode 100644 index 0000000..f7b1383 --- /dev/null +++ b/ima-evm-utils.spec @@ -0,0 +1,39 @@ +Summary: IMA/EVM support utilities +Name: ima-evm-utils +Version: 0.6 +Release: 1%{?dist} +License: GPLv2 +Url: http://linux-ima.sourceforge.net/ +Source: http://sourceforge.net/projects/linux-ima/files/ima-evm-utils/%{name}-%{version}.tar.gz +Group: Applications/Internet +BuildRequires: autoconf automake libtool m4 +BuildRequires: openssl-devel libattr-devel keyutils-libs-devel + +%description +The Trusted Computing Group(TCG) run-time Integrity Measurement Architecture +(IMA) maintains a list of hash values of executables and other sensitive +system files, as they are read or executed. These are stored in the file +systems extended attributes. The Extended Verification Module (EVM) prevents +unauthorized changes to these extended attributes on the file system. +ima-evm-utils is used to prepare the file system for these extended attributes. + +%prep +%setup -q + +%build +#Is running autoreconf a good idea +mkdir -p m4 +autoreconf -f -i +%configure +make %{?_smp_mflags} + +%install +make DESTDIR=%{buildroot} install + +%files +%doc ChangeLog README AUTHORS COPYING +%{_bindir}/* + +%changelog +* Tue Aug 27 2013 Vivek Goyal - 0.6-1 +- Initial package diff --git a/sources b/sources index e69de29..059e6bd 100644 --- a/sources +++ b/sources @@ -0,0 +1 @@ +8245c48675792a074f11552affc8db9b ima-evm-utils-0.6.tar.gz