aboutsummaryrefslogtreecommitdiff
path: root/package/snort/Config.in
blob: d1a59d505004174294e843a4308217b944121a7c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
config BR2_PACKAGE_SNORT
	bool "snort"
	depends on BR2_USE_WCHAR
	depends on BR2_USE_MMU # fork()
	depends on !BR2_STATIC_LIBS # daq
	depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
	select BR2_PACKAGE_LIBPCAP
	select BR2_PACKAGE_DAQ
	select BR2_PACKAGE_PCRE
	select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
	help
	  Snort is a free and open source network intrusion
	  prevention system (IPS) and network intrusion detection
	  system (IDS). It can perform protocol analysis, content
	  searching/matching, and can be used to detect a variety
	  of attacks and probes, such as buffer overflows, stealth
	  port scans, CGI attacks, SMB probes, OS fingerprinting
	  attempts, and much more.

	  https://www.snort.org

comment "snort needs a toolchain w/ wchar, threads, dynamic library"
	depends on BR2_USE_MMU
	depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
		!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)