rpcapd: remote packet capture daemon, allows windows wireshark to connect to a linux sniffer

This commit is contained in:
Zero_Chaos 2012-04-14 23:32:55 +00:00
parent 7d43a150d6
commit 22113e6398
2 changed files with 38 additions and 0 deletions

View file

@ -0,0 +1,2 @@
DIST WpcapSrc_4_1_2.zip 3833073 RMD160 80cacaaeb37617fa0d7a352f8832def9c59b3544 SHA1 9155687ab23dbb2348e7cf93caf8a84f51e94795 SHA256 2620a8731927422f643c7002361996dfcfcb6664cfc0f668c54fb1660b58b706
EBUILD rpcapd-4.1.2.ebuild 669 RMD160 f47c985d11deffe17b286001bf5a6df67e278f4b SHA1 b0814737b7729c1bc29ef8e78b03aca5284f2a69 SHA256 377e5fb3c747d3fab04ba8727eb11e621894ca3b7cad16a1383454cefa20dc65

View file

@ -0,0 +1,36 @@
# Copyright 1999-2012 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: $
EAPI=4
inherit flag-o-matic
DESCRIPTION="Remote packet capture daemon"
HOMEPAGE="http://www.winpcap.org/devel.htm"
SRC_URI="http://www.winpcap.org/install/bin/WpcapSrc_4_1_2.zip"
LICENSE=""
SLOT="0"
KEYWORDS="~amd64 ~x86"
IUSE=""
DEPEND=""
RDEPEND="${DEPEND}"
S="${WORKDIR}"/winpcap/wpcap/libpcap
src_prepare() {
fperms +x configure runlex.sh
}
src_compile() {
strip-flags
make CCOPT="${CFLAGS} ${LDFLAGS}"
cd rpcapd
emake CFLAGS="${CFLAGS} -pthread -DHAVE_REMOTE -DHAVE_SNPRINTF ${LDFLAGS}"
}
src_install() {
dosbin rpcapd/rpcapd
}