From patchwork Wed Jan 29 17:53:14 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Fabrice Fontaine X-Patchwork-Id: 1231041 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.138; helo=whitealder.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=GKHnJPMB; dkim-atps=neutral Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 487B0B4R98z9sPW for ; Thu, 30 Jan 2020 04:52:42 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 0C24B8759B; Wed, 29 Jan 2020 17:52:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NkZ0f-DPXo9v; Wed, 29 Jan 2020 17:52:37 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by whitealder.osuosl.org (Postfix) with ESMTP id 493F2875A2; Wed, 29 Jan 2020 17:52:37 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137]) by ash.osuosl.org (Postfix) with ESMTP id A99381BF420 for ; Wed, 29 Jan 2020 17:52:35 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by fraxinus.osuosl.org (Postfix) with ESMTP id A68C685FD0 for ; Wed, 29 Jan 2020 17:52:35 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from fraxinus.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IR5x0xnQE8pK for ; Wed, 29 Jan 2020 17:52:34 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by fraxinus.osuosl.org (Postfix) with ESMTPS id 3C9D785FC9 for ; Wed, 29 Jan 2020 17:52:34 +0000 (UTC) Received: by mail-wm1-f51.google.com with SMTP id c84so870154wme.4 for ; Wed, 29 Jan 2020 09:52:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=iI63cr5ha34NwTDV0SOUjUE5i/KPy3VW2+9xcUfiLiY=; b=GKHnJPMBbzzx0Q4f6f1tbkcQadm1dQWQUh6J28RD6Tig2you9NFww01tcwA7GLFoKs r/bCS8iHMmTQ2T8gusC7VkHmubNmuPV3l2s1JRdd4A8VmZdHChB8mAmk7T5fgEHrcopm /KhJL7DGaV5r7PQ+cRZDtyrSmE3y9QXh6NBWFAmS4dMvfKBQiV8p++iqxp11FFPVrR8O dvd8yyd3XAjTXAj45HQwf2osXb+IQKvv2p1Youou2NMxcn3G1w1h2aWsSgsQiPlyK04+ JccWohcspIhdLdvskxWTKp9NrBN49jRF+NI1tkyNQ4MqvWMQBdMKBorGBTQyO9dAsmW4 +DvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=iI63cr5ha34NwTDV0SOUjUE5i/KPy3VW2+9xcUfiLiY=; b=WUFnuaquiMJFJeHS7nY2gi/ZUF4ALhrMbTIWAcM7jE3ezbpcJwkwpgqHdeX0kyQDoD Z82R63zp2fd61pFICzDfjU/s8ahn4NmyepFIljwu9O+ICoMPunBSymPAS9gL35AnQWs7 7vD0Gw3NVU5nL/Pof6mu5IiuHINErgnxYOjUGRIPTU9o9FFRAeIcMGKS9bRX21FEVcIJ rWIcky4D+iM4MyN3dXFvLyIz6As9I81QbbUujOjluUpD25U50GgaHVcy10/gHSzqickd oBxKPwL4OgONh+sZHCYFnrrhgRKEOAg2UF5ZNZE2rEBUkkpmoXZ0r/l8KYFjsF7K7cs6 1JtA== X-Gm-Message-State: APjAAAWwtIGgZAitjpsLTMbRECaUetSyPNZNVJNVE8qLIHxxcRsDfCz9 uA7wY22N9k0i8V6t6gzCT2cXUukc X-Google-Smtp-Source: APXvYqwRqvFMTFC4+t3QU5REWLGkoWq45Y+UTiycyaDAFlFdwxy6uVHHmpPOlakzeQQHe/qjDRVNdw== X-Received: by 2002:a1c:5945:: with SMTP id n66mr409340wmb.98.1580320352218; Wed, 29 Jan 2020 09:52:32 -0800 (PST) Received: from kali.home (lfbn-ren-1-602-70.w81-53.abo.wanadoo.fr. [81.53.179.70]) by smtp.gmail.com with ESMTPSA id g18sm2962099wmh.48.2020.01.29.09.52.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Jan 2020 09:52:26 -0800 (PST) From: Fabrice Fontaine To: buildroot@buildroot.org Date: Wed, 29 Jan 2020 18:53:14 +0100 Message-Id: <20200129175314.129033-2-fontaine.fabrice@gmail.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200129175314.129033-1-fontaine.fabrice@gmail.com> References: <20200129175314.129033-1-fontaine.fabrice@gmail.com> MIME-Version: 1.0 Subject: [Buildroot] [PATCH 2/2] package/snort3: new package X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Fabrice Fontaine Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" Snort 3 is the next generation Snort IPS (Intrusion Prevention System). - Support multiple packet processing threads - Shared configuration and attribute table - Use a simple, scriptable configuration - Make key components pluggable - Autodetect services for portless configuration - Support sticky buffers in rules - Autogenerate reference documentation - Provide better cross platform support https://www.snort.org/snort3 Signed-off-by: Fabrice Fontaine Reviewed-by: Heiko Thiery --- DEVELOPERS | 1 + package/Config.in | 1 + .../0001-Replace-u_int8_t-by-uint8_t.patch | 165 ++++++++++++++++++ ...cip_definitions.h-include-sys-time.h.patch | 29 +++ package/snort3/Config.in | 42 +++++ package/snort3/snort3.hash | 6 + package/snort3/snort3.mk | 57 ++++++ 7 files changed, 301 insertions(+) create mode 100644 package/snort3/0001-Replace-u_int8_t-by-uint8_t.patch create mode 100644 package/snort3/0002-cip_definitions.h-include-sys-time.h.patch create mode 100644 package/snort3/Config.in create mode 100644 package/snort3/snort3.hash create mode 100644 package/snort3/snort3.mk diff --git a/DEVELOPERS b/DEVELOPERS index e9cc2442ce..0a37857d0d 100644 --- a/DEVELOPERS +++ b/DEVELOPERS @@ -887,6 +887,7 @@ F: package/python-jedi/ F: package/python-parso/ F: package/rygel/ F: package/safeclib/ +F: package/snort3/ F: package/suricata/ F: package/tinycbor/ F: package/tinydtls/ diff --git a/package/Config.in b/package/Config.in index 31396650cf..91b378f91c 100644 --- a/package/Config.in +++ b/package/Config.in @@ -2138,6 +2138,7 @@ endif source "package/sngrep/Config.in" source "package/snmpclitools/Config.in" source "package/snort/Config.in" + source "package/snort3/Config.in" source "package/socat/Config.in" source "package/socketcand/Config.in" source "package/softether/Config.in" diff --git a/package/snort3/0001-Replace-u_int8_t-by-uint8_t.patch b/package/snort3/0001-Replace-u_int8_t-by-uint8_t.patch new file mode 100644 index 0000000000..f861e55914 --- /dev/null +++ b/package/snort3/0001-Replace-u_int8_t-by-uint8_t.patch @@ -0,0 +1,165 @@ +From cd2907c6c75fa43dd4d1016a04221e335e7a9f1f Mon Sep 17 00:00:00 2001 +From: Fabrice Fontaine +Date: Fri, 24 Jan 2020 22:47:39 +0100 +Subject: [PATCH] Replace u_int8_t by uint8_t + +u_int8_t is not supported on musl so replace it by uint8_t + +Signed-off-by: Fabrice Fontaine +[Upstream status: https://github.com/snort3/snort3/pull/113] +--- + src/host_tracker/host_tracker.cc | 4 ++-- + src/host_tracker/host_tracker.h | 10 +++++----- + src/host_tracker/test/host_tracker_test.cc | 6 +++--- + src/network_inspectors/rna/rna_logger.cc | 2 +- + src/network_inspectors/rna/rna_logger.h | 6 +++--- + src/network_inspectors/rna/rna_pnd.cc | 2 +- + src/network_inspectors/rna/rna_pnd.h | 2 +- + 7 files changed, 16 insertions(+), 16 deletions(-) + +diff --git a/src/host_tracker/host_tracker.cc b/src/host_tracker/host_tracker.cc +index ecf9d7843..012408225 100644 +--- a/src/host_tracker/host_tracker.cc ++++ b/src/host_tracker/host_tracker.cc +@@ -46,7 +46,7 @@ void HostTracker::update_last_event(uint32_t time) + last_event = time ? time : last_seen; + } + +-bool HostTracker::add_mac(const u_int8_t* mac, u_int8_t ttl, u_int8_t primary) ++bool HostTracker::add_mac(const uint8_t* mac, uint8_t ttl, uint8_t primary) + { + if ( !mac or !memcmp(mac, zero_mac, MAC_SIZE) ) + return false; +@@ -130,7 +130,7 @@ static inline string to_time_string(uint32_t p_time) + return buffer; + } + +-static inline string to_mac_string(const u_int8_t* mac) ++static inline string to_mac_string(const uint8_t* mac) + { + char mac_addr[18]; + snprintf(mac_addr, 18, "%02X:%02X:%02X:%02X:%02X:%02X", +diff --git a/src/host_tracker/host_tracker.h b/src/host_tracker/host_tracker.h +index 60d6ce309..149283686 100644 +--- a/src/host_tracker/host_tracker.h ++++ b/src/host_tracker/host_tracker.h +@@ -53,13 +53,13 @@ extern const uint8_t zero_mac[MAC_SIZE]; + + struct HostMac + { +- HostMac(u_int8_t p_ttl, const u_int8_t* p_mac, u_int8_t p_primary, uint32_t p_last_seen) ++ HostMac(uint8_t p_ttl, const uint8_t* p_mac, uint8_t p_primary, uint32_t p_last_seen) + : ttl(p_ttl), primary(p_primary), last_seen (p_last_seen) { memcpy(mac, p_mac, MAC_SIZE); } + + // the type and order below should match logger's serialization +- u_int8_t ttl; +- u_int8_t mac[MAC_SIZE]; +- u_int8_t primary; ++ uint8_t ttl; ++ uint8_t mac[MAC_SIZE]; ++ uint8_t primary; + uint32_t last_seen; + }; + +@@ -98,7 +98,7 @@ public: + } + + // Returns true if a new mac entry is added, false otherwise +- bool add_mac(const u_int8_t* mac, u_int8_t ttl, u_int8_t primary); ++ bool add_mac(const uint8_t* mac, uint8_t ttl, uint8_t primary); + + // The caller owns and deletes the copied list of mac addresses + void copy_data(uint8_t& p_hops, uint32_t& p_last_seen, std::list*& p_macs); +diff --git a/src/host_tracker/test/host_tracker_test.cc b/src/host_tracker/test/host_tracker_test.cc +index 9ac2b1fe3..01b05129d 100644 +--- a/src/host_tracker/test/host_tracker_test.cc ++++ b/src/host_tracker/test/host_tracker_test.cc +@@ -81,7 +81,7 @@ TEST(host_tracker, copy_data_test) + { + test_time = 1562198400; + HostTracker ht; +- u_int8_t mac[6] = {254, 237, 222, 173, 190, 239}; ++ uint8_t mac[6] = {254, 237, 222, 173, 190, 239}; + ht.add_mac(mac, 50, 1); + + uint8_t p_hops = 0; +@@ -107,8 +107,8 @@ TEST(host_tracker, stringify) + test_time = 1562198400; // this time will be updated and should not be seen in stringify + HostTracker ht; + +- u_int8_t mac1[6] = {254, 237, 222, 173, 190, 239}; +- u_int8_t mac2[6] = {202, 254, 192, 255, 238, 0}; ++ uint8_t mac1[6] = {254, 237, 222, 173, 190, 239}; ++ uint8_t mac2[6] = {202, 254, 192, 255, 238, 0}; + test_time = 1562198404; // this time should be the time of the first mac address + ht.update_last_seen(); + ht.add_mac(mac1, 9, 0); +diff --git a/src/network_inspectors/rna/rna_logger.cc b/src/network_inspectors/rna/rna_logger.cc +index bd1708ddb..fe750c9d6 100644 +--- a/src/network_inspectors/rna/rna_logger.cc ++++ b/src/network_inspectors/rna/rna_logger.cc +@@ -36,7 +36,7 @@ + using namespace snort; + + bool RnaLogger::log(uint16_t type, uint16_t subtype, const Packet* p, RnaTracker* ht, +- const struct in6_addr* src_ip, const u_int8_t* src_mac, uint32_t event_time, ++ const struct in6_addr* src_ip, const uint8_t* src_mac, uint32_t event_time, + void* cond_var) + { + if ( !enabled ) +diff --git a/src/network_inspectors/rna/rna_logger.h b/src/network_inspectors/rna/rna_logger.h +index 0b72de6af..a8e984e09 100644 +--- a/src/network_inspectors/rna/rna_logger.h ++++ b/src/network_inspectors/rna/rna_logger.h +@@ -34,11 +34,11 @@ using RnaTracker = std::shared_ptr; + struct RnaLoggerEvent : public Event + { + RnaLoggerEvent(uint16_t p_type, uint16_t p_subtype, const RnaTracker* p_ht, +- const u_int8_t* p_mac) : type(p_type), subtype(p_subtype), ht(p_ht), mac(p_mac) { } ++ const uint8_t* p_mac) : type(p_type), subtype(p_subtype), ht(p_ht), mac(p_mac) { } + uint16_t type; + uint16_t subtype; + const RnaTracker* ht; +- const u_int8_t* mac; ++ const uint8_t* mac; + const struct in6_addr* ip; + void* cond_var = nullptr; + }; +@@ -48,7 +48,7 @@ class RnaLogger + public: + RnaLogger(const bool enable) : enabled(enable) { } + bool log(uint16_t type, uint16_t subtype, const snort::Packet* p, RnaTracker* ht, +- const struct in6_addr* src_ip, const u_int8_t* src_mac, ++ const struct in6_addr* src_ip, const uint8_t* src_mac, + uint32_t event_time = 0, void* cond_var = nullptr); + + private: +diff --git a/src/network_inspectors/rna/rna_pnd.cc b/src/network_inspectors/rna/rna_pnd.cc +index 1dd6c5ecd..f74ac4c9c 100644 +--- a/src/network_inspectors/rna/rna_pnd.cc ++++ b/src/network_inspectors/rna/rna_pnd.cc +@@ -141,7 +141,7 @@ void RnaPnd::discover_network_udp(const Packet* p) + discover_network(p, ip_api.ttl()); + } + +-void RnaPnd::discover_network(const Packet* p, u_int8_t ttl) ++void RnaPnd::discover_network(const Packet* p, uint8_t ttl) + { + bool new_host = false; + const auto& src_ip = p->ptrs.ip_api.get_src(); +diff --git a/src/network_inspectors/rna/rna_pnd.h b/src/network_inspectors/rna/rna_pnd.h +index 5abe5d6b1..e00bf1520 100644 +--- a/src/network_inspectors/rna/rna_pnd.h ++++ b/src/network_inspectors/rna/rna_pnd.h +@@ -62,7 +62,7 @@ private: + void discover_network_non_ip(const snort::Packet* p); + void discover_network_tcp(const snort::Packet* p); + void discover_network_udp(const snort::Packet* p); +- void discover_network(const snort::Packet* p, u_int8_t ttl); ++ void discover_network(const snort::Packet* p, uint8_t ttl); + + RnaLogger logger; + DiscoveryFilter filter; +-- +2.24.1 + diff --git a/package/snort3/0002-cip_definitions.h-include-sys-time.h.patch b/package/snort3/0002-cip_definitions.h-include-sys-time.h.patch new file mode 100644 index 0000000000..1d146c989b --- /dev/null +++ b/package/snort3/0002-cip_definitions.h-include-sys-time.h.patch @@ -0,0 +1,29 @@ +From cb13e85aebb5848e42580314c9a5953868c7c3ef Mon Sep 17 00:00:00 2001 +From: Fabrice Fontaine +Date: Fri, 24 Jan 2020 23:07:41 +0100 +Subject: [PATCH] cip_definitions.h: include + +Fix build on musl by including to be able to use timeval + +Signed-off-by: Fabrice Fontaine +[Upstream status: https://github.com/snort3/snort3/pull/114] +--- + src/service_inspectors/cip/cip_definitions.h | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/src/service_inspectors/cip/cip_definitions.h b/src/service_inspectors/cip/cip_definitions.h +index b9bba15f9..0cda06ca2 100644 +--- a/src/service_inspectors/cip/cip_definitions.h ++++ b/src/service_inspectors/cip/cip_definitions.h +@@ -23,6 +23,8 @@ + #ifndef CIP_DEFINITIONS_H + #define CIP_DEFINITIONS_H + ++#include ++ + namespace snort + { + struct Packet; +-- +2.24.1 + diff --git a/package/snort3/Config.in b/package/snort3/Config.in new file mode 100644 index 0000000000..ca9815deaa --- /dev/null +++ b/package/snort3/Config.in @@ -0,0 +1,42 @@ +config BR2_PACKAGE_SNORT3 + bool "snort3" + depends on BR2_PACKAGE_LUAJIT_ARCH_SUPPORTS # luajit + depends on !(BR2_PACKAGE_DAQ || BR2_PACKAGE_SNORT) + depends on BR2_USE_MMU # fork() + depends on BR2_INSTALL_LIBSTDCPP + depends on !BR2_STATIC_LIBS # daq3 + depends on BR2_TOOLCHAIN_GCC_AT_LEAST_4_9 # C++11 + depends on BR2_TOOLCHAIN_HAS_THREADS # hwloc + depends on BR2_USE_WCHAR + select BR2_PACKAGE_DAQ3 + select BR2_PACKAGE_HWLOC + select BR2_PACKAGE_LIBDNET + select BR2_PACKAGE_LIBPCAP + select BR2_PACKAGE_LUAJIT + select BR2_PACKAGE_PCRE + select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC + select BR2_PACKAGE_OPENSSL + select BR2_PACKAGE_ZLIB + help + Snort 3 is the next generation Snort IPS (Intrusion + Prevention System). + + - Support multiple packet processing threads + - Shared configuration and attribute table + - Use a simple, scriptable configuration + - Make key components pluggable + - Autodetect services for portless configuration + - Support sticky buffers in rules + - Autogenerate reference documentation + - Provide better cross platform support + + https://www.snort.org/snort3 + +comment "snort3 needs a toolchain w/ C++, wchar, threads, dynamic library, gcc >= 4.9" + depends on BR2_PACKAGE_LUAJIT_ARCH_SUPPORTS + depends on !(BR2_PACKAGE_DAQ || BR2_PACKAGE_SNORT) + depends on BR2_USE_MMU + depends on depends on !BR2_INSTALL_LIBSTDCPP || \ + !BR2_USE_WCHAR || BR2_STATIC_LIBS || \ + !BR2_TOOLCHAIN_HAS_THREADS || \ + !BR2_TOOLCHAIN_GCC_AT_LEAST_4_9 diff --git a/package/snort3/snort3.hash b/package/snort3/snort3.hash new file mode 100644 index 0000000000..e161e24165 --- /dev/null +++ b/package/snort3/snort3.hash @@ -0,0 +1,6 @@ +# Locally computed: +sha256 008bbce6d6901078f32f2e5511b8cf2204d10c7b8c941bd39640a2833f20073c snort3-3.0.0-267.tar.gz + +# Hash for license files: +sha256 3f1cbfb20bb2c608e1a474421880d08b8cba6abb00ab7736d22c481d71656a6d COPYING +sha256 f98260a6d3e5ef4ede8a2a6b698e5ac91d64c09243f7171e1c5b17b920a835c7 LICENSE diff --git a/package/snort3/snort3.mk b/package/snort3/snort3.mk new file mode 100644 index 0000000000..17571cf272 --- /dev/null +++ b/package/snort3/snort3.mk @@ -0,0 +1,57 @@ +################################################################################ +# +# snort3 +# +################################################################################ + +SNORT3_VERSION = 3.0.0-267 +SNORT3_SITE = $(call github,snort3,snort3,$(SNORT3_VERSION)) +SNORT3_LICENSE = GPL-2.0 +SNORT3_LICENSE_FILES = COPYING LICENSE + +SNORT3_DEPENDENCIES = \ + host-pkgconf daq3 hwloc libdnet libpcap luajit openssl pcre zlib + +SNORT3_CONF_OPTS = \ + -DENABLE_GDB=OFF \ + -DENABLE_STATIC_DAQ=OFF \ + -DMAKE_DOC=OFF + +ifeq ($(BR2_PACKAGE_FLATBUFFERS),y) +SNORT3_DEPENDENCIES += flatbuffers +SNORT3_CONF_OPTS += -DHAVE_FLATBUFFERS=ON +else +SNORT3_CONF_OPTS += -DHAVE_FLATBUFFERS=OFF +endif + +ifeq ($(BR2_PACKAGE_LIBICONV),y) +SNORT3_DEPENDENCIES += libiconv +SNORT3_CONF_OPTS += -DHAVE_ICONV=ON +endif + +ifeq ($(BR2_PACKAGE_LIBTIRPC),y) +SNORT3_DEPENDENCIES += libtirpc +endif + +ifeq ($(BR2_PACKAGE_SAFECLIB),y) +SNORT3_DEPENDENCIES += safeclib +SNORT3_CONF_OPTS += -DENABLE_SAFEC=ON +else +SNORT3_CONF_OPTS += -DENABLE_SAFEC=OFF +endif + +ifeq ($(BR2_PACKAGE_UTIL_LINUX_LIBUUID),y) +SNORT3_DEPENDENCIES += util-linux +SNORT3_CONF_OPTS += -DHAVE_UUID=ON +else +SNORT3_CONF_OPTS += -DHAVE_UUID=OFF +endif + +ifeq ($(BR2_PACKAGE_XZ),y) +SNORT3_DEPENDENCIES += xz +SNORT3_CONF_OPTS += -DHAVE_LZMA=ON +else +SNORT3_CONF_OPTS += -DHAVE_LZMA=OFF +endif + +$(eval $(cmake-package))