> http://build-failures.rhaalovely.net/powerpc/2019-07-14/security/aircrack-ng.log
On macppc: - we have AltiVec support - we don't (and won't) have POWER8 instructions The autotools magic works properly here. As such, it's just about removing the PFRAG entries. This indeed packages [0] once done. I can't test the runtime, the bwi(4) wifi card in my PowerBook is known to be almost unusable. REVISION bump is probably gratuitous. Comments/feedback are welcome! Charlène. [0] https://bin.charlenew.xyz/aircrack-ng.log Index: Makefile =================================================================== RCS file: /cvs/ports/security/aircrack-ng/Makefile,v retrieving revision 1.26 diff -u -p -u -p -r1.26 Makefile --- Makefile 12 Jul 2019 21:02:24 -0000 1.26 +++ Makefile 27 Jul 2019 21:19:34 -0000 @@ -2,7 +2,7 @@ COMMENT= 802.11 WEP and WPA-PSK keys cracking program DISTNAME= aircrack-ng-1.5.2 -REVISION= 1 +REVISION= 2 CATEGORIES= security HOMEPAGE= https://www.aircrack-ng.org/ Index: pkg/PFRAG.ppc =================================================================== RCS file: /cvs/ports/security/aircrack-ng/pkg/PFRAG.ppc,v retrieving revision 1.1 diff -u -p -u -p -r1.1 PFRAG.ppc --- pkg/PFRAG.ppc 23 Feb 2019 22:23:25 -0000 1.1 +++ pkg/PFRAG.ppc 27 Jul 2019 21:19:34 -0000 @@ -1,7 +1,4 @@ @comment $OpenBSD: PFRAG.ppc,v 1.1 2019/02/23 22:23:25 sebastia Exp $ -lib/libaircrack-crypto-ppc-power8-1.3.0.so -lib/libaircrack-crypto-ppc-power8.la -lib/libaircrack-crypto-ppc-power8.so lib/libaircrack-crypto-ppc-altivec-1.3.0.so lib/libaircrack-crypto-ppc-altivec.la lib/libaircrack-crypto-ppc-altivec.so
