head	1.3;
access;
symbols
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.2
	RELEASE_6_4_0:1.2
	RELEASE_5_EOL:1.2
	RELEASE_7_0_0:1.2
	RELEASE_6_3_0:1.2
	PRE_XORG_7:1.2
	RELEASE_4_EOL:1.2
	RELEASE_6_2_0:1.2
	RELEASE_6_1_0:1.2
	RELEASE_5_5_0:1.2
	RELEASE_6_0_0:1.2
	RELEASE_5_4_0:1.2
	RELEASE_4_11_0:1.2
	RELEASE_5_3_0:1.2
	RELEASE_4_10_0:1.2
	RELEASE_5_2_1:1.2
	RELEASE_5_2_0:1.2
	RELEASE_4_9_0:1.2
	RELEASE_5_1_0:1.2
	RELEASE_4_8_0:1.2
	RELEASE_5_0_0:1.2
	RELEASE_4_7_0:1.2
	RELEASE_4_6_2:1.2
	RELEASE_4_6_1:1.2
	RELEASE_4_6_0:1.2
	RELEASE_5_0_DP1:1.2
	RELEASE_4_5_0:1.2
	RELEASE_4_4_0:1.2
	RELEASE_4_3_0:1.2
	RELEASE_4_2_0:1.1
	RELEASE_4_1_1:1.1
	RELEASE_4_1_0:1.1
	RELEASE_3_5_0:1.1;
locks; strict;
comment	@# @;


1.3
date	2011.09.30.09.12.32;	author dougb;	state dead;
branches;
next	1.2;

1.2
date	2001.01.25.19.41.23;	author sf;	state Exp;
branches;
next	1.1;

1.1
date	2000.05.29.06.17.54;	author will;	state Exp;
branches;
next	;


desc
@@


1.3
log
@As previously advertised, delete ports that have
vulnerabilities listed in portaudit, and those
that depend on them - part 1

math/mupad
	Relies on xpm, vulnerable since 2004-09-15
net-p2p/torrentflux
	Vulnerable since 2006-10-07
net/tptest
	Vulnerable since 2009-12-17
security/pgp6
	Vulnerable since 2005-07-31
www/p5-RTx-RightsMatrix
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Shredder
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Statistics
	Only works with www/rt36, which is FORBIDDEN
www/plone
	Vulnerable since 2011-02-10
www/pyblosxom
	Vulnerable since 2009-02-11
www/rt36
	Vulnerable since 2009-12-09
www/zope-archetypes
	Depends on www/plone, which is FORBIDDEN
www/zope-calendaring
	Depends on www/plone, which is FORBIDDEN
www/zope-coreblog2
	Depends on www/plone, which is FORBIDDEN
www/zope-i18nlayer
	Depends on www/plone, which is FORBIDDEN
www/zope-plonelanguagetool
	Depends on www/plone, which is FORBIDDEN
www/zope-simpleblog
	Depends on www/plone, which is FORBIDDEN
@
text
@--- clients/pgp/cmdline/Makefile.in.orig	Fri Sep  1 14:11:16 2000
+++ clients/pgp/cmdline/Makefile.in	Fri Sep 29 21:06:48 2000
@@@@ -48,7 +48,7 @@@@
         -I$(SDKDIR)/priv/include/opaque \
         -I$(RSAINC)
 
-LIBDIRS+=-L$(PFLDIR) -L$(SDKDIR)/unix -L$(RSALIBRARY)$(RSA_OS)
+LIBDIRS+=-L$(PFLDIR) -L$(SDKDIR)/unix
 
 LIBS=-lPGPui -lPGPsdkNetwork -lPGPsdk -lpfl @@THREADLIB@@ $(RSALIBS) @@LIBS@@
 
@@@@ -73,7 +73,7 @@@@
 CFLAGS=@@CFLAGS@@
 LDFLAGS=@@LDFLAGS@@
 
-CFLAGS+= -g
+CFLAGS+= -g -pthread
 
 TARGET=pgp
 
@


1.2
log
@update to 6.5.8.

PR:		21656
Submitted by:	Cy Schubert <cschuber@@uumail.gov.bc.ca>
maintainer seems unreachable:
<mike@@fate.com>: host fate.com[192.153.249.5] said: 550 <mike@@fate.com>...
    Relaying denied
@
text
@@


1.1
log
@Update to PGP (International version) 6.5.1i.  This is actually a new
port, repo-copied from security/pgp5 by asami.

I added a bunch of the intl mirrors to make this port super-available.

PR:		16377
Submitted by:	Mike Sherwood <mike@@fate.com>
@
text
@d1 20
a20 19
*** clients/pgp/cmdline/Makefile.in	2000/01/26 03:55:17	1.1
--- clients/pgp/cmdline/Makefile.in	2000/01/26 03:55:41	1.2
***************
*** 51,57 ****
  CFLAGS=@@CFLAGS@@
  LDFLAGS=@@LDFLAGS@@
  
! CFLAGS+= -g
  
  TARGET=pgp
  
--- 51,57 ----
  CFLAGS=@@CFLAGS@@
  LDFLAGS=@@LDFLAGS@@
  
! CFLAGS+= -g -pthread
  
  TARGET=pgp
  
@

