Name: cmospwd Version: 5.0 Release: 1%{?dist} Summary: BIOS password cracker utility Group: System Environment/Base License: GPLv2+ URL: http://www.cgsecurity.org/wiki/CmosPwd Source0: http://www.cgsecurity.org/%{name}-%{version}.tar.bz2 BuildRoot: %(mktemp -ud %{_tmppath}/%{name}-%{version}-%{release}-XXXXXX) # Fails to build on other arches and not useful there either, I think ExclusiveArch: %{ix86} x86_64 BuildRequires: dos2unix %description CmosPwd decrypts password stored in cmos used to access BIOS SETUP. Works with the following BIOSes * ACER/IBM BIOS * AMI BIOS * AMI WinBIOS 2.5 * Award 4.5x/4.6x/6.0 * Compaq (1992) * Compaq (New version) * IBM (PS/2, Activa, Thinkpad) * Packard Bell * Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107 * Phoenix 4 release 6 (User) * Gateway Solo - Phoenix 4.0 release 6 * Toshiba * Zenith AMI With CmosPwd, you can also backup, restore and erase/kill cmos. %prep %setup -q rm src/%{name} dos2unix %{name}.txt iconv -f iso-8859-1 -t utf-8 %{name}.txt > %{name}.new touch -r %{name}.txt %{name}.new mv %{name}.new %{name}.txt %build cd src make CFLAGS="%{optflags}" %{?_smp_mflags} %install rm -rf $RPM_BUILD_ROOT install -D -m 755 src/%{name} $RPM_BUILD_ROOT%{_sbindir}/%{name} %clean rm -rf $RPM_BUILD_ROOT %files %defattr(-,root,root,-) %doc COPYING %{name}.txt %{_sbindir}/%{name} %changelog * Thu Oct 15 2009 Alexey Torkhov - 5.0-1 - Initial packaging