xref: /OK3568_Linux_fs/buildroot/package/snort/Config.in (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyunconfig BR2_PACKAGE_SNORT
2*4882a593Smuzhiyun	bool "snort"
3*4882a593Smuzhiyun	depends on BR2_USE_WCHAR
4*4882a593Smuzhiyun	depends on BR2_USE_MMU # fork()
5*4882a593Smuzhiyun	depends on !BR2_STATIC_LIBS # daq
6*4882a593Smuzhiyun	depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
7*4882a593Smuzhiyun	select BR2_PACKAGE_LIBDNET
8*4882a593Smuzhiyun	select BR2_PACKAGE_LIBPCAP
9*4882a593Smuzhiyun	select BR2_PACKAGE_DAQ
10*4882a593Smuzhiyun	select BR2_PACKAGE_PCRE
11*4882a593Smuzhiyun	select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
12*4882a593Smuzhiyun	select BR2_PACKAGE_ZLIB
13*4882a593Smuzhiyun	help
14*4882a593Smuzhiyun	  Snort is a free and open source network intrusion
15*4882a593Smuzhiyun	  prevention system (IPS) and network intrusion detection
16*4882a593Smuzhiyun	  system (IDS). It can perform protocol analysis, content
17*4882a593Smuzhiyun	  searching/matching, and can be used to detect a variety
18*4882a593Smuzhiyun	  of attacks and probes, such as buffer overflows, stealth
19*4882a593Smuzhiyun	  port scans, CGI attacks, SMB probes, OS fingerprinting
20*4882a593Smuzhiyun	  attempts, and much more.
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun	  https://www.snort.org
23*4882a593Smuzhiyun
24*4882a593Smuzhiyuncomment "snort needs a toolchain w/ wchar, threads, dynamic library"
25*4882a593Smuzhiyun	depends on BR2_USE_MMU
26*4882a593Smuzhiyun	depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
27*4882a593Smuzhiyun		!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)
28