# Watch: https://github.com/devttys0/binwalk/tags
           SPELL=binwalk
         VERSION=2.3.4
  SECURITY_PATCH=1
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=https://github.com/devttys0/$SPELL/archive/v$VERSION.tar.gz
     SOURCE_HASH=sha512:5a5e16035dfc05b94ae4ee3969a337336c550606b71e20fcb1f150c4b38ef2084b6a823ce2a8050f4b41616b7d7c31cfb04bf43e7f2c977ab1a634aba9d67fec
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
        WEB_SITE=http://code.google.com/p/binwalk/
      LICENSE[0]=MIT
         ENTERED=20121219
           SHORT="firmware analysis tool"
cat << EOF
Binwalk is a tool for searching a given binary image for embedded files and
executable code. Specifically, it is designed for identifying files and code
embedded inside of firmware images. Binwalk uses the libmagic library, so it
is compatible with magic signatures created for the Unix file utility.

Binwalk also includes a custom magic signature file which contains improved
signatures for files that are commonly found in firmware images such as
compressed/archived files, firmware headers, Linux kernels, bootloaders,
filesystems, etc.
EOF
