> http://build-failures.rhaalovely.net/powerpc/2019-07-14/security/aircrack-ng.log

On macppc:

- we have AltiVec support
- we don't (and won't) have POWER8 instructions

The autotools magic works properly here. As such, it's just about
removing the PFRAG entries. This indeed packages [0] once done.

I can't test the runtime, the bwi(4) wifi card in my PowerBook is
known to be almost unusable.

REVISION bump is probably gratuitous.

Comments/feedback are welcome!

Charlène.

[0] https://bin.charlenew.xyz/aircrack-ng.log



Index: Makefile
===================================================================
RCS file: /cvs/ports/security/aircrack-ng/Makefile,v
retrieving revision 1.26
diff -u -p -u -p -r1.26 Makefile
--- Makefile    12 Jul 2019 21:02:24 -0000      1.26
+++ Makefile    27 Jul 2019 21:19:34 -0000
@@ -2,7 +2,7 @@
 
 COMMENT=               802.11 WEP and WPA-PSK keys cracking program
 DISTNAME=              aircrack-ng-1.5.2
-REVISION=              1
+REVISION=              2
 CATEGORIES=            security
 
 HOMEPAGE=              https://www.aircrack-ng.org/
Index: pkg/PFRAG.ppc
===================================================================
RCS file: /cvs/ports/security/aircrack-ng/pkg/PFRAG.ppc,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 PFRAG.ppc
--- pkg/PFRAG.ppc       23 Feb 2019 22:23:25 -0000      1.1
+++ pkg/PFRAG.ppc       27 Jul 2019 21:19:34 -0000
@@ -1,7 +1,4 @@
 @comment $OpenBSD: PFRAG.ppc,v 1.1 2019/02/23 22:23:25 sebastia Exp $
-lib/libaircrack-crypto-ppc-power8-1.3.0.so
-lib/libaircrack-crypto-ppc-power8.la
-lib/libaircrack-crypto-ppc-power8.so
 lib/libaircrack-crypto-ppc-altivec-1.3.0.so
 lib/libaircrack-crypto-ppc-altivec.la
 lib/libaircrack-crypto-ppc-altivec.so

Reply via email to