<pre style='margin:0'>
Rainer Müller (raimue) pushed a commit to branch master
in repository macports-ports.

</pre>
<p><a href="https://github.com/macports/macports-ports/commit/1dccc72af9907e07889521b2f068472873af1b1e">https://github.com/macports/macports-ports/commit/1dccc72af9907e07889521b2f068472873af1b1e</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'>     new 1dccc72  afl: new port
</span>1dccc72 is described below

<span style='display:block; white-space:pre;color:#808000;'>commit 1dccc72af9907e07889521b2f068472873af1b1e
</span>Author: Steven Myint <git@stevenmyint.com>
AuthorDate: Sat May 20 17:40:43 2017 -0700

<span style='display:block; white-space:pre;color:#404040;'>    afl: new port
</span>---
 devel/afl/Portfile | 46 ++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 46 insertions(+)

<span style='display:block; white-space:pre;color:#808080;'>diff --git a/devel/afl/Portfile b/devel/afl/Portfile
</span>new file mode 100644
<span style='display:block; white-space:pre;color:#808080;'>index 0000000..1762e9a
</span><span style='display:block; white-space:pre;background:#ffe0e0;'>--- /dev/null
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/devel/afl/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -0,0 +1,46 @@
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+PortSystem          1.0
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+name                afl
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+version             2.41b
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+categories          devel security
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+platforms           darwin
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+maintainers         {stevenmyint.com:git @myint} openmaintainer
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+license             Apache-2
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+description         Instrumentation-driven fuzzer
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+long_description    American fuzzy lop is a security-oriented fuzzer that \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    employs a novel type of compile-time instrumentation and \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    genetic algorithms to automatically discover clean, \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    interesting test cases that trigger new internal states \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    in the targeted binary.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+homepage            http://lcamtuf.coredump.cx/afl
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+master_sites        ${homepage}/releases
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+extract.suffix      .tgz
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+checksums           rmd160 170b4c304f698d6461fb9572962f8b58fc6649bd \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    sha256 0670b13235264e688a7ccfbeeee257e9c57dcc86ead676247d92d199c194968f
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+use_configure       no
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+build.env           CC=${configure.cc} \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    CXX="${configure.cxx}" \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    CFLAGS="${configure.cflags} [get_canonical_archflags cc]" \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    CXXFLAGS="${configure.cxxflags} [get_canonical_archflags cxx]" \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    LDFLAGS="${configure.ldflags} [get_canonical_archflags ld]" \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+                    PREFIX=${prefix}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+destroot.env        PREFIX=${prefix}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+livecheck.type      regex
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+livecheck.url       ${master_sites}
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+livecheck.regex     afl-(\\d+(?:\\.\\d+)*b).tgz
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+notes "
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+WARNING: Fuzzing on MacOS X is slow because of the unusually high overhead of \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+fork() on this OS. Consider using Linux or *BSD. You can also use VirtualBox \
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+(virtualbox.org) to put AFL inside a Linux or *BSD VM.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+"
</span></pre><pre style='margin:0'>

</pre>