1*4882a593Smuzhiyunconfig BR2_PACKAGE_SNORT 2*4882a593Smuzhiyun bool "snort" 3*4882a593Smuzhiyun depends on BR2_USE_WCHAR 4*4882a593Smuzhiyun depends on BR2_USE_MMU # fork() 5*4882a593Smuzhiyun depends on !BR2_STATIC_LIBS # daq 6*4882a593Smuzhiyun depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc 7*4882a593Smuzhiyun select BR2_PACKAGE_LIBDNET 8*4882a593Smuzhiyun select BR2_PACKAGE_LIBPCAP 9*4882a593Smuzhiyun select BR2_PACKAGE_DAQ 10*4882a593Smuzhiyun select BR2_PACKAGE_PCRE 11*4882a593Smuzhiyun select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC 12*4882a593Smuzhiyun select BR2_PACKAGE_ZLIB 13*4882a593Smuzhiyun help 14*4882a593Smuzhiyun Snort is a free and open source network intrusion 15*4882a593Smuzhiyun prevention system (IPS) and network intrusion detection 16*4882a593Smuzhiyun system (IDS). It can perform protocol analysis, content 17*4882a593Smuzhiyun searching/matching, and can be used to detect a variety 18*4882a593Smuzhiyun of attacks and probes, such as buffer overflows, stealth 19*4882a593Smuzhiyun port scans, CGI attacks, SMB probes, OS fingerprinting 20*4882a593Smuzhiyun attempts, and much more. 21*4882a593Smuzhiyun 22*4882a593Smuzhiyun https://www.snort.org 23*4882a593Smuzhiyun 24*4882a593Smuzhiyuncomment "snort needs a toolchain w/ wchar, threads, dynamic library" 25*4882a593Smuzhiyun depends on BR2_USE_MMU 26*4882a593Smuzhiyun depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \ 27*4882a593Smuzhiyun !(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC) 28