blob: fc74efcfedf56f75d626c9c95262f3d6938c4c14 [file] [log] [blame]
config BR2_PACKAGE_SNORT
bool "snort"
depends on BR2_USE_WCHAR
depends on BR2_USE_MMU # fork()
depends on !BR2_STATIC_LIBS # daq
depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
select BR2_PACKAGE_LIBDNET
select BR2_PACKAGE_LIBPCAP
select BR2_PACKAGE_DAQ
select BR2_PACKAGE_PCRE
select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
select BR2_PACKAGE_ZLIB
help
Snort is a free and open source network intrusion
prevention system (IPS) and network intrusion detection
system (IDS). It can perform protocol analysis, content
searching/matching, and can be used to detect a variety
of attacks and probes, such as buffer overflows, stealth
port scans, CGI attacks, SMB probes, OS fingerprinting
attempts, and much more.
https://www.snort.org
comment "snort needs a toolchain w/ wchar, threads, dynamic library"
depends on BR2_USE_MMU
depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)