===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
ima-evm-utils-1.1/INSTALL-173-directory configuration variables that were expressed in terms of
ima-evm-utils-1.1/INSTALL:174:`${prefix}'.  Any directories that were specified during `configure',
ima-evm-utils-1.1/INSTALL-175-but not in terms of `${prefix}', must each be overridden at install
##############################################
ima-evm-utils-1.1/README-360-    # search for IMA trusted keyring, then for untrusted
ima-evm-utils-1.1/README:361:    ima_id="`awk '/\.ima/ { printf "%d", "0x"$1; }' /proc/keys`"
ima-evm-utils-1.1/README-362-    if [ -z "$ima_id" ]; then
##############################################
ima-evm-utils-1.1/README-397-    # protecting IMA key from revoking (against DoS)
ima-evm-utils-1.1/README:398:    ima_key=`evmctl import /etc/keys/x509_ima.der $ima_id`
ima-evm-utils-1.1/README-399-    keyctl setperm $ima_key 0x0b0b0000