=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== ima-evm-utils-1.1/INSTALL-173-directory configuration variables that were expressed in terms of ima-evm-utils-1.1/INSTALL:174:`${prefix}'. Any directories that were specified during `configure', ima-evm-utils-1.1/INSTALL-175-but not in terms of `${prefix}', must each be overridden at install ############################################## ima-evm-utils-1.1/README-360- # search for IMA trusted keyring, then for untrusted ima-evm-utils-1.1/README:361: ima_id="`awk '/\.ima/ { printf "%d", "0x"$1; }' /proc/keys`" ima-evm-utils-1.1/README-362- if [ -z "$ima_id" ]; then ############################################## ima-evm-utils-1.1/README-397- # protecting IMA key from revoking (against DoS) ima-evm-utils-1.1/README:398: ima_key=`evmctl import /etc/keys/x509_ima.der $ima_id` ima-evm-utils-1.1/README-399- keyctl setperm $ima_key 0x0b0b0000