	   SPELL=usr-systrace
         VERSION=1.6d
          SOURCE=${SPELL/usr-}-${VERSION}.tar.gz
          SOURCE2=$SOURCE.sig
SOURCE_DIRECTORY=${BUILD_DIRECTORY}/systrace-$VERSION
   SOURCE_URL[0]=http://www.citi.umich.edu/u/provos/systrace/$SOURCE
   SOURCE2_URL[0]=${SOURCE_URL[0]}.sig
      SOURCE_GPG="provos.gpg:$SOURCE.sig:UPSTREAM_KEY"
  SOURCE2_IGNORE=signature
      LICENSE[0]=BSD
         ENTERED=20030728
        WEB_SITE=http://www.citi.umich.edu/u/provos/systrace/
        KEYWORDS="security"
           SHORT="Current snapshot of systrace userland."
cat << EOF
Systrace enforces system call policies for applications by 
constraining the application's access to the system. The 
policy is generated interactively. Operations not covered 
by the policy raise an alarm, allowing an user to refine 
the currently configured policy.
(See home page for more info about systrace userland utilities) 
EOF
