History log of /external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
3610b0452cd71935f87ef0d910576493c889a67a 06-Dec-2014 Zeng Linggang <zenglg.jy@cn.fujitsu.com> ima_measurements.sh: Some cleanup

* Use 'tst_check_cmds' instead of 'exists'.

* Use 'test_resm' instead of 'tst_res'.

* Use '$()' instead of '``'.

* Delete 'cat' and '<(file input)' while use 'sha1sum'.

* Delete 'TST_COUNT' which has been defined in 'test.sh'.

* Delete some unuseful comments.

* Some cleanup.

Signed-off-by: Zeng Linggang <zenglg.jy@cn.fujitsu.com>
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
4548c6cf9bcdd96d8303caa4130ab638b61f8a30 19-Oct-2012 Wanlong Gao <gaowanlong@cn.fujitsu.com> Update FSF address

find . -type f -exec sed -i 's/675 Mass Ave, Cambridge, MA 02139, USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \;
find . -type f -exec sed -i 's/59 Temple Place, Suite 330, Boston, MA 02111-1307 USA/51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA/g' {} \;

Signed-off-by: Wanlong Gao <gaowanlong@cn.fujitsu.com>
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
2aa40f7e10518977881b933cc93b8f50847cf3cf 19-Feb-2010 Garrett Cooper <yanegomi@gmail.com> Avoid sudo blocking for tty input indefinitely; this issue will need to
be `properly' fixed by not having a password for the sudo'er's acct.

Signed-off-by: Garrett Cooper <yanegomi@gmail.com>
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
58f3c4b973695325b88a090d20f3f648ecd11a88 19-Oct-2009 yaberauneya <yaberauneya> The attached patch fixes my issues, but I can't easily verify whether or not it fixes the positive behavior of the testcase itself under all conditions:

<<<test_start>>>
tag=ima01 stime=1255926150
cmdline=" ima_measurements.sh"
contacts=""
analysis=exit
<<<test_output>>>
setup 1 TBROK : Failed to mkdir /sys/kernel/security
setup 1 TBROK : Cannot mount securityfs
setup 0 TINFO : CLEAN: removing /tmp/ltp-VdWwjzuH1v/ima
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=1 corefile=no
cutime=0 cstime=0
<<<test_end>>>
<<<test_start>>>
tag=ima02 stime=1255926150
cmdline=" ima_policy.sh"
contacts=""
analysis=exit
<<<test_output>>>
setup 1 TBROK : Failed to mkdir /sys/kernel/security
setup 1 TBROK : Cannot mount securityfs
setup 0 TINFO : CLEAN: removing /tmp/ltp-VdWwjzuH1v/ima
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=1 corefile=no
cutime=0 cstime=2
<<<test_end>>>
<<<test_start>>>
tag=ima03 stime=1255926150
cmdline=" ima_tpm.sh"
contacts=""
analysis=exit
<<<test_output>>>
setup 1 TBROK : Failed to mkdir /sys/kernel/security
setup 1 TBROK : Cannot mount securityfs
setup 0 TINFO : CLEAN: removing /tmp/ltp-VdWwjzuH1v/ima
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=1 corefile=no
cutime=1 cstime=1
<<<test_end>>>
<<<test_start>>>
tag=ima04 stime=1255926150
cmdline=" ima_violations.sh"
contacts=""
analysis=exit
<<<test_output>>>
setup 1 TBROK : Failed to mkdir /sys/kernel/security
setup 1 TBROK : Cannot mount securityfs
setup 0 TINFO : CLEAN: removing /tmp/ltp-VdWwjzuH1v/ima
incrementing stop
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=1 corefile=no
cutime=0 cstime=1
<<<test_end>>>

Either way, it's a positive move forward so I'm checking this into cvs now.

Signed-off-by: Garrett Cooper <yanegomi@gmail.com>
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
4febd5e7bc60e3a4371a232744ab504b221f38b4 30-Jul-2009 subrata_modak <subrata_modak> - Replace bashisms: source, uid, substr, '&>' - redirection, '=='.
- To create a file using 'sudo -u', some platforms require 'user' to exist.
- Document verifying PCR-10 fails on Ubuntu on reboot due to kexec.
- Determine if the entire boot-aggregate hash value is zero, not just the first couple of characters.
- Add a space before the continuation mark on wrapped lines.
- Explicity verify file open return codes, making sure that only one open succeeded (tpm_policy.sh: test02).
Signed-off-by: Mimi Zohar <zohar@us.ibm.com>.
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh
3a8efbcc46ed70f7a9b278edd44972b649f3b0ae 31-Mar-2009 subrata_modak <subrata_modak> This patch adds Integrity Measurement Architecture(IMA) testing support:
Changes:
- updated README
- add test for existence of openssl-devel (m4/ltp-crypto.m4)
- add support for finding an audit message in different log files
Signed-off-by: Mimi Zohar <zohar@us.ibm.com>.
/external/ltp/testcases/kernel/security/integrity/ima/tests/ima_measurements.sh