Tested on Beaglebone Black. Build-tested with test-pkg. Patch to fix cross-compilation errors submitted upstream [1]. [1] https://lists.snort.org/pipermail/snort-devel/2018-January/011025.html Signed-off-by: Sergio Prado <sergio.prado@e-labworks.com> [Romain: - split patch by build issues - convert AC_RUN_IFELSE to AC_CHECK_MEMBERS (ThomasP) - convert AC_RUN_IFELSE to AC_COMPILE_IFELSE (ThomasP) - remove most make variable from SNORT_CONF_ENV - remove SNORT_SOURCE default value] Signed-off-by: Romain Naour <romain.naour@smile.fr> Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
26 lines
969 B
Plaintext
26 lines
969 B
Plaintext
config BR2_PACKAGE_SNORT
|
|
bool "snort"
|
|
depends on BR2_USE_WCHAR
|
|
depends on BR2_USE_MMU # fork()
|
|
depends on !BR2_STATIC_LIBS # daq
|
|
depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
|
|
select BR2_PACKAGE_LIBPCAP
|
|
select BR2_PACKAGE_DAQ
|
|
select BR2_PACKAGE_PCRE
|
|
select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
|
|
help
|
|
Snort is a free and open source network intrusion
|
|
prevention system (IPS) and network intrusion detection
|
|
system (IDS). It can perform protocol analysis, content
|
|
searching/matching, and can be used to detect a variety
|
|
of attacks and probes, such as buffer overflows, stealth
|
|
port scans, CGI attacks, SMB probes, OS fingerprinting
|
|
attempts, and much more.
|
|
|
|
https://www.snort.org
|
|
|
|
comment "snort needs a toolchain w/ wchar, threads, dynamic library"
|
|
depends on BR2_USE_MMU
|
|
depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
|
|
!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)
|