1 DESCRIPTION
= "Nmap is a command line portscanner."
2 HOMEPAGE
= "http://www.insecure.org/nmap/"
3 SECTION
= "console/network"
5 DEPENDS
= "libpcap libpcre"
10 SRC_URI
= "http://download.insecure.org/nmap/dist-old/nmap-${PV}.tar.bz2 \
11 file://autofoo.patch \
12 file://remove_gtk.patch"
13 S
= "${WORKDIR}/nmap-${PV}"
15 EXTRA_OECONF
= "--with-pcap=linux \
16 --with-libpcap=${STAGING_LIBDIR}/.. \
17 --with-libpcre=${STAGING_LIBDIR}/.. \
20 EXTRA_OEMAKE
= "STRIPPROG=${STRIP}"
24 CXXFLAGS_append
= " -fpermissive"
25 # Ugly hack follows
-- their configure.ac doesnt match their configure ..
26 # doesnt
include a check
for the length
type in recvfrom
, so we hack it here
27 CPPFLAGS_append
= " -Drecvfrom6_t=socklen_t"
30 oe_runmake 'prefix
=$
{D
}$
{prefix
}' \
31 'exec_prefix
=$
{D
}$
{exec_prefix
}' \
32 'bindir
=$
{D
}$
{bindir
}' \
33 'sbindir
=$
{D
}$
{sbindir
}' \
34 'mandir
=$
{D
}$
{mandir
}' \
35 'datadir
=$
{D
}$
{datadir
}' \
36 'nmapdatadir
=$
{D
}$
{datadir
}/nmap' \
40 SRC_URI
[md5sum
] = "0713306dda85aee2c95ef31b4b7d2838"
41 SRC_URI
[sha256sum
] = "1cfb120008f636a874b871f1625409082badaaf64177c9ac873480630390356c"