<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Home</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>Recent changes to Home</description><atom:link href="https://sourceforge.net/p/linux-ima/wiki/Home/feed" rel="self"/><language>en</language><lastBuildDate>Mon, 05 Feb 2018 23:49:55 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/linux-ima/wiki/Home/feed" rel="self" type="application/rss+xml"/><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v30
+++ v31
@@ -20,7 +20,7 @@

  -   **Audit** – audit the file hashes.

-The first three functions were introduced with Integrity Measurement Architecture ([IMA](#integrity-measurement-architecture-ima)) in 2.6.30. The last two features were originally posted as a single [EVM](#linux-extended-verification-module-evm)/[IMA-appraisal](#ima-appraisal) patch set for in the 2.6.36 timeframe, but were subsequently split. EVM was upstreamed in Linux 3.2, using a simplier and more secure method for loading the 'evm-key', based on the new Kernel Key Retention [Trusted and Encrypted keys](#creating-trusted-and-evm-encrypted-keys).   EVM support for protecting file metadata based on digital signatures was upstreamed in the Linux 3.3.  IMA-appraisal, the fourth aspect, appraising a file's integrity, was upstreamed in Linux 3.7.
+The first three functions were introduced with Integrity Measurement Architecture ([IMA](#integrity-measurement-architecture-ima)) in 2.6.30.   The "appraise" and "protect" features were originally posted as a single [EVM](#linux-extended-verification-module-evm)/[IMA-appraisal](#ima-appraisal) patch set for in the 2.6.36 timeframe, but were subsequently split.   EVM, the "protect" feature, was upstreamed in Linux 3.2, using a simplier and more secure method for loading the 'evm-key', based on the new Kernel Key Retention [Trusted and Encrypted keys](#creating-trusted-and-evm-encrypted-keys).   EVM support for protecting file metadata based on digital signatures was upstreamed in the Linux 3.3.  IMA-appraisal, the fourth aspect, appraising a file's integrity, was upstreamed in Linux 3.7.

 The goals, design, and benefits of these features are further described in the whitepaper ["An Overview of the Linux Integrity Subsystem"](http://downloads.sf.net/project/linux-ima/linux-ima/Integrity_overview.pdf "http://downloads.sf.net/project/linux-ima/linux-ima/Integrity_overview.pdf").

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 23:49:55 -0000</pubDate><guid>https://sourceforge.net54249f96560d4f22761d037872fa95be925b6a6e</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v29
+++ v30
@@ -356,9 +356,10 @@

 IMA-audit includes file hashes in the audit log, which can be used to augment existing system security analytics/forensics. IMA-audit extends the IMA policy ABI with the policy action keyword - "audit".

-Example policy to audit file hashes of all executables
-
-audit func=BPRM_CHECK
+Example policy to audit  executable file hashes
+
+    audit func=BPRM_CHECK
+    

 ## Linux Extended Verification Module (EVM)
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 23:43:03 -0000</pubDate><guid>https://sourceforge.net4118bf169afff6f07b46b458a83b0ee97c8e6e83</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v28
+++ v29
@@ -17,14 +17,22 @@
     “good” value stored in an extended attribute of the file.
 -   **Protect** – protect a file's security extended attributes
     (including appraisal hash) against off-line attack.
-
-The first three functions were introduced with Integrity Measurement Architecture ([IMA](#integrity-measurement-architecture-ima)) in 2.6.30. The last two features were originally posted as a single [EVM](#linux-extended-verification-module-evm)/[IMA-appraisal](#ima-appraisal) patch set for in the 2.6.36 timeframe, but were subsequently split. EVM was upstreamed in Linux 3.2, using a simplier and more secure method for loading the 'evm-key', based on the new Kernel Key Retention [Trusted and Encrypted keys](#creating-trusted-and-evm-encrypted-keys). Support for protecting file metadata based on digital signatures was upstreamed in the Linux 3.3. IMA-appraisal was upstreamed in Linux 3.7.
+ 
+ -   **Audit** – audit the file hashes.
+
+The first three functions were introduced with Integrity Measurement Architecture ([IMA](#integrity-measurement-architecture-ima)) in 2.6.30. The last two features were originally posted as a single [EVM](#linux-extended-verification-module-evm)/[IMA-appraisal](#ima-appraisal) patch set for in the 2.6.36 timeframe, but were subsequently split. EVM was upstreamed in Linux 3.2, using a simplier and more secure method for loading the 'evm-key', based on the new Kernel Key Retention [Trusted and Encrypted keys](#creating-trusted-and-evm-encrypted-keys).   EVM support for protecting file metadata based on digital signatures was upstreamed in the Linux 3.3.  IMA-appraisal, the fourth aspect, appraising a file's integrity, was upstreamed in Linux 3.7.

 The goals, design, and benefits of these features are further described in the whitepaper ["An Overview of the Linux Integrity Subsystem"](http://downloads.sf.net/project/linux-ima/linux-ima/Integrity_overview.pdf "http://downloads.sf.net/project/linux-ima/linux-ima/Integrity_overview.pdf").

 ### Components

-IMA-measurement, one component of the kernel's integrity subsystem, is part of an overall Integrity Architecture based on the Trusted Computing Group's open standards, including Trusted Platform Module (TPM), Trusted Boot, Trusted Software Stack (TSS), Trusted Network Connect (TNC), and Platform Trust Services (PTS). The linux-ima project page contains a [diagram](http://linux-ima.sourceforge.net/) showing how these standards relate, and provides links to the respective specifications and open source implementations. IMA and EVM can still run on platforms without a hardware TPM, although without the hardware guarantee of compromise detection.
+IMA-measurement, one component of the kernel's integrity subsystem, is part of an overall Integrity Architecture based on the Trusted Computing Group's open standards, including Trusted Platform Module (TPM), Trusted Boot, Trusted Software Stack (TSS), Trusted Network Connect (TNC), and Platform Trust Services (PTS). The linux-ima project page contains a [diagram](http://linux-ima.sourceforge.net/) showing how these standards relate, and provides links to the respective specifications and open source implementations. IMA-measurement and EVM can still run on platforms without a hardware TPM, although without the hardware guarantee of compromise detection.
+
+IMA-appraisal, a second component of the kernel's integrity subsystem,  extends the "secure boot" concept of verifying  a file's integrity, before transferring control or allowing the file to be accessed by the OS.
+
+IMA-audit, another component of the kernel's integrity subsystem, includes file hashes in the system audit logs, which can be used to augment existing system security analytics/forensics.
+
+The IMA-measurement, IMA-appraisal, and IMA-audit aspects of the kernel's integrity subsystem complement each other, but can be configured and used independently of each other.

 ## Integrity Measurement Architecture (IMA-measurement)

@@ -42,9 +50,9 @@
 IMA is controlled with several kernel command line parameters:

-ima_audit= audit control
+ima_audit= informational audit logging
  Format: { "0" | "1" }
- 0 -- integrity auditing messages. (Default)
+ 0 -- normal integrity auditing messages. (Default)
  1 -- enable additional informational integrity auditing messages.

  (eg. Although file measurements are only added to the measurement list once and cached, if the inode is flushed, subsequent access to the inode will result in re-measuring the file and attempting to add the measurement again to the measurement list. Enabling ima_audit will log such attempts.)
@@ -343,6 +351,15 @@
 ### Signing IMA-appraisal keys

 ( Place holder )
+
+## IMA-audit
+
+IMA-audit includes file hashes in the audit log, which can be used to augment existing system security analytics/forensics. IMA-audit extends the IMA policy ABI with the policy action keyword - "audit".
+
+Example policy to audit file hashes of all executables
+
+audit func=BPRM_CHECK
+

 ## Linux Extended Verification Module (EVM)

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 23:30:53 -0000</pubDate><guid>https://sourceforge.neta25c2ea9bd6ec4cb87d01791a65a86517cb20f38</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v27
+++ v28
@@ -198,7 +198,7 @@

 ### IMA re-measuring files

-Part of the TCG requirement is that all Trusted Computing Base (TCB) files be measured, and re-measured if the file has changed, before reading/executing the file. IMA detects file changes based on i_version. To re-measure a file after it has changed, the filesystem must be mounted with i_version support.
+Part of the TCG requirement is that all Trusted Computing Base (TCB) files be measured, and re-measured if the file has changed, before reading/executing the file. IMA detects file changes based on i_version. To re-measure a file after it has changed, the filesystem must support i_version and, if needed, be mounted with i_version (eg. ext3, ext4).  Not all filesystems require the explicit mount option.   With commit a2a2c3c8580a ("ima: Use i_version only when filesystem supports it") i_version is considered an optimization.  If i_version is not enabled, either because the local filesystem does not support it or the filesystem was not mounted with i_version, the file will now always be re-measured, whether or not the file changed, but only new measurements will be added to the measurement list.

 -   Attempt to mount a filesystem with i_version support.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 21:09:46 -0000</pubDate><guid>https://sourceforge.netc5f7d10b40edf0a1926dcad8cd52e56e8c0f21f5</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v26
+++ v27
@@ -131,7 +131,7 @@

 ### Verifying IMA Measurements

-The IMA tests programs are part of the [Linux Test Project.](http://ltp.sourceforge.net/wiki "https://github.com/linux-test-project/ltp/wiki")
+The IMA tests programs are part of the [Linux Test Project.](https://github.com/linux-test-project/ltp/wiki)

 - Download, compile, and install the standalone version of the IMA LTP test programs in /usr/local/bin.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 19:18:17 -0000</pubDate><guid>https://sourceforge.nete165020e5ae37974493d206f574b802288908103</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v25
+++ v26
@@ -50,7 +50,7 @@
  (eg. Although file measurements are only added to the measurement list once and cached, if the inode is flushed, subsequent access to the inode will result in re-measuring the file and attempting to add the measurement again to the measurement list. Enabling ima_audit will log such attempts.)

 ima_policy= builtin policy
-Format:  ["tcb"|"appraise_tcb"|"secure-boot"]
+Format:  {"tcb" | "appraise_tcb" | "secure-boot"}
 **NEW** Linux-4.13 default: no policy

 ima_template= template used
@@ -62,7 +62,7 @@
   'ima' template default: "sha1"
   Linux 3.13 default: "sha256"

- ima_tcb [deprecated]
+ ima_tcb  (deprecated)
  If specified, enables the TCB policy, which meets the needs of the Trusted Computing Base. This means IMA will measure all programs exec'd, files mmap'd for exec, and all files opened for read by uid=0.

 ### IMA Measurement List
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 19:05:03 -0000</pubDate><guid>https://sourceforge.net803a861d2ee20e50bcf7d9e95020817daaeb1dc4</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v24
+++ v25
@@ -24,20 +24,20 @@

 ### Components

-IMA measurement, one component of the kernel's integrity subsystem, is part of an overall Integrity Architecture based on the Trusted Computing Group's open standards, including Trusted Platform Module (TPM), Trusted Boot, Trusted Software Stack (TSS), Trusted Network Connect (TNC), and Platform Trust Services (PTS). The linux-ima project page contains a [diagram](http://linux-ima.sourceforge.net/) showing how these standards relate, and provides links to the respective specifications and open source implementations. IMA and EVM can still run on platforms without a hardware TPM, although without the hardware guarantee of compromise detection.
-
-## Integrity Measurement Architecture (IMA)
-
-
-IMA is an open source trusted computing component. IMA maintains a runtime measurement list and, if anchored in a hardware Trusted Platform Module(TPM), an aggregate integrity value over this list. The benefit of anchoring the aggregate integrity value in the TPM is that the measurement list cannot be compromised by any software attack, without being detectable. Hence, on a trusted boot system, IMA can be used to attest to the system's runtime integrity.
-
-### Enabling IMA
-
-IMA was first included in the 2.6.30 kernel. For distros that enable IMA by default in their kernels, collecting IMA measurements simply requires rebooting the kernel with the boot command line parameter 'ima_tcb'. (Fedora/RHEL may also require the boot command line parameter 'ima=on'.)
+IMA-measurement, one component of the kernel's integrity subsystem, is part of an overall Integrity Architecture based on the Trusted Computing Group's open standards, including Trusted Platform Module (TPM), Trusted Boot, Trusted Software Stack (TSS), Trusted Network Connect (TNC), and Platform Trust Services (PTS). The linux-ima project page contains a [diagram](http://linux-ima.sourceforge.net/) showing how these standards relate, and provides links to the respective specifications and open source implementations. IMA and EVM can still run on platforms without a hardware TPM, although without the hardware guarantee of compromise detection.
+
+## Integrity Measurement Architecture (IMA-measurement)
+
+
+IMA-measurement is an open source trusted computing component. IMA maintains a runtime measurement list and, if anchored in a hardware Trusted Platform Module(TPM), an aggregate integrity value over this list. The benefit of anchoring the aggregate integrity value in the TPM is that the measurement list cannot be compromised by any software attack, without being detectable. Hence, on a trusted boot system, IMA-measurement can be used to attest to the system's runtime integrity.
+
+### Enabling IMA-measurement
+
+IMA was first included in the 2.6.30 kernel. For distros that enable IMA by default in their kernels, collecting IMA measurements simply requires rebooting the kernel with a builtin  "ima_policy=" on the boot command line. (Fedora/RHEL may also require the boot command line parameter 'ima=on'.)

 To determine if your distro enables IMA by default, mount securityfs (mount -t securityfs security /sys/kernel/security), if it isn't already mounted, and then check if '&amp;lt;securityfs&amp;gt;/integrity/ima' exists. If it exists, IMA is indeed enabled. On systems without IMA enabled, [recompile the kernel](#compiling-the-kernel-with-evmima-appraisal-enabled) with the config option 'CONFIG_IMA' enabled.

-### Controlling IMA
+### Controlling IMA-measurement

 IMA is controlled with several kernel command line parameters:

@@ -49,21 +49,25 @@

  (eg. Although file measurements are only added to the measurement list once and cached, if the inode is flushed, subsequent access to the inode will result in re-measuring the file and attempting to add the measurement again to the measurement list. Enabling ima_audit will log such attempts.)

+ima_policy= builtin policy
+Format:  ["tcb"|"appraise_tcb"|"secure-boot"]
+**NEW** Linux-4.13 default: no policy
+
 ima_template= template used
  Format: { "ima" | "ima-ng" | "ima-sig" }
- **NEW** Linux 3.13 default: "ima-ng"
+ Linux 3.13 default: "ima-ng"

 ima_hash= hash used
  Format: { "sha1" | "md5" | "sha256" | "sha512" | "wp512" | ... }
   'ima' template default: "sha1"
-  **NEW** Linux 3.13 default: "sha256"
-
- ima_tcb
+  Linux 3.13 default: "sha256"
+
+ ima_tcb [deprecated]
  If specified, enables the TCB policy, which meets the needs of the Trusted Computing Base. This means IMA will measure all programs exec'd, files mmap'd for exec, and all files opened for read by uid=0.

-### IMA Measurements
-
-IMA maintains a runtime measurement list, which can be displayed as shown below.
+### IMA Measurement List
+
+IMA-measurements maintains a runtime measurement list, which can be displayed as shown below.

 - mount securityfs as /sys/kernel/security

@@ -74,7 +78,7 @@

 - display the runtime measurement list    (Only root is allowed access to securityfs files.)

-Example 1: ** NEW ** 'ima-ng' template
+Example 1: 'ima-ng' template
     $ su -c 'head -5 /sys/kernel/security/ima/ascii_runtime_measurements'

     PCR     template-hash                           filedata-hash                           filename-hint
@@ -87,7 +91,15 @@
 template-hash: sha1 hash(filedata-hash length, filedata-hash, pathname length, pathname)
 filedata-hash: sha256 hash(filedata)

-Example 2: 'ima' template
+
+Example 2:  'ima-sig' template (same format as ima-ng, but with an appended signature when present)
+
+    PCR     template-hash                           filedata-hash                           filename-hint                         file-signature
+    10 f63c10947347c71ff205ebfde5971009af27b0ba ima-sig sha256:6c118980083bccd259f069c2b3c3f3a2f5302d17a685409786564f4cf05b3939 /usr/lib64/libgspell-1.so.1.0.0   0302046e6c10460100aa43a4b1136f45735669632ad ...
+    10 595eb9bf805874b459ce073af158378f274ea961 ima-sig sha256:8632769297867a80a9614caa98034d992441e723f0b383ca529faa306c640638 /usr/lib64/gedit/plugins/libmodelines.so 0302046e6c104601002394b70ab93 ...
+
+
+Example 3: *original* 'ima' template

     PCR     template-hash                           filedata-hash                           filename-hint
     10 7971593a7ad22a7cce5b234e4bc5d71b04696af4 ima b5a166c10d153b7cc3e5b4f1eab1f71672b7c524 boot_aggregate
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 19:01:08 -0000</pubDate><guid>https://sourceforge.netd602b571961b7869c0282c01e2322cbeda53b513</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v23
+++ v24
@@ -119,7 +119,7 @@

 ### Verifying IMA Measurements

-The IMA tests programs are part of the [Linux Test Project.](http://ltp.sourceforge.net/wiki "http://ltp.sourceforge.net/wiki")
+The IMA tests programs are part of the [Linux Test Project.](http://ltp.sourceforge.net/wiki "https://github.com/linux-test-project/ltp/wiki")

 - Download, compile, and install the standalone version of the IMA LTP test programs in /usr/local/bin.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Mon, 05 Feb 2018 18:15:47 -0000</pubDate><guid>https://sourceforge.net3a6e5091fde29d60a49081305f818c7774badc85</guid></item><item><title>Discussion for Home page</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/?limit=25#a403</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;In Ubuntu 16.04 I do the following steps to digitally signed.&lt;/p&gt;
&lt;p&gt;@Enable EVM&lt;br/&gt;
echo "1" &amp;gt; /sys/kernel/security/evm&lt;/p&gt;
&lt;p&gt;@Create keys folder&lt;br/&gt;
$ su -c 'mkdir -p /etc/keys'&lt;/p&gt;
&lt;p&gt;@To create and save the kernel master key (user type):&lt;br/&gt;
$ su -c 'modprobe trusted encrypted'&lt;br/&gt;
$ su -c 'keyctl add user kmk-user "&lt;code&gt;dd if=/dev/urandom bs=1 count=32 2&amp;gt;/dev/null&lt;/code&gt;" @u'&lt;br/&gt;
$ su -c 'keyctl pipe &lt;code&gt;keyctl search @u user kmk-user&lt;/code&gt; &amp;gt; /etc/keys/kmk-user.blob'&lt;/p&gt;
&lt;p&gt;@Create the EVM encrypted key&lt;br/&gt;
$ su -c 'keyctl add encrypted evm-key "new user:kmk-user 32" @u'&lt;br/&gt;
$ su -c 'keyctl pipe &lt;code&gt;keyctl search @u encrypted evm-key&lt;/code&gt; &amp;gt;/etc/keys/evm-user.blob'&lt;/p&gt;
&lt;p&gt;@generate unencrypted private key&lt;br/&gt;
openssl genrsa -out privkey_evm.pem 1024&lt;/p&gt;
&lt;p&gt;@Image Labeling : whole file-system&lt;br/&gt;
sudo find / ( -fstype rootfs -o -fstype ext3 -o -fstype ext4 ) ! -path "/lib/modules/*" -type f -uid 0 -exec evmctl sign --imahash '{}' \;&lt;/p&gt;
&lt;p&gt;sudo find / ( -fstype rootfs -o -fstype ext3 -o -fstype ext4 ) ! -path "/lib/modules/*" -type f -uid 0 -exec evmctl ima_sign --imahash '{}' -print \;&lt;/p&gt;
&lt;p&gt;@check security.ima content&lt;br/&gt;
evmctl ima_sign --hashalgo sha256 --rsa --key /etc/keys/privkey_evm.pem -t f /home/my/test.sh&lt;br/&gt;
getfattr -e hex -m security -d /home/my/test.sh&lt;/p&gt;
&lt;p&gt;In the last step, i can see the signature for tset.sh file.&lt;br/&gt;
However, i have no idea how to enable system verification function to prevent the no signature file be executed.&lt;br/&gt;
Does anyone can help it?&lt;br/&gt;
THX&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">fpchct</dc:creator><pubDate>Thu, 21 Sep 2017 02:04:19 -0000</pubDate><guid>https://sourceforge.netbd5f554f92c618c35c89c5ee6c4b63d916373cbf</guid></item><item><title>Home modified by mzohar</title><link>https://sourceforge.net/p/linux-ima/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v22
+++ v23
@@ -123,17 +123,25 @@

 - Download, compile, and install the standalone version of the IMA LTP test programs in /usr/local/bin.

-    $ wget -O ltp-ima-standalone.tar http://downloads.sf.net/project/linux-ima/linux-ima/ltp-ima-standalone-v1.tar.gz
-    $ tar -xvzf ltp-ima-standalone.tar.gz
-    ima-tests/
-    ima-tests/test.h
+    $ wget -O ltp-ima-standalone-v2.tar.gz http://downloads.sf.net/project/linux-ima/linux-ima/ltp-ima-standalone-v2.tar.gz
+    $ tar -xvzf ltp-ima-standalone-v2.tar.gz
+    ima-tests/Makefile
     ima-tests/README
-    ima-tests/Makefile
-    ima-tests/ltp-tst-replacement.c
-    ima-tests/config.h
     ima-tests/ima_boot_aggregate.c
     ima-tests/ima_measure.c
     ima-tests/ima_mmap.c
+    ima-tests/ima_sigv2.c
+    ima-tests/ltp-tst-replacement.c
+    ima-tests/pkeys.c
+    ima-tests/rsa_oid.c
+    ima-tests/config.h
+    ima-tests/debug.h
+    ima-tests/hash_info.h
+    ima-tests/ima_sigv2.h
+    ima-tests/list.h
+    ima-tests/pkeys.h
+    ima-tests/rsa.h
+    ima-tests/test.h
     $ cd ima-tests
     $ make 
     $ su -c 'make install'
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">mzohar</dc:creator><pubDate>Thu, 08 Oct 2015 14:08:36 -0000</pubDate><guid>https://sourceforge.net432a3356dba9667d82ae659b90d7ad80c6f92f85</guid></item></channel></rss>