head	1.2;
access;
symbols
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1
	RELEASE_8_1_0:1.1
	RELEASE_7_3_0:1.1
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1
	RELEASE_5_4_0:1.1
	RELEASE_4_11_0:1.1
	RELEASE_5_3_0:1.1
	RELEASE_4_10_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2011.09.30.09.12.32;	author dougb;	state dead;
branches;
next	1.1;

1.1
date	2004.01.23.19.15.05;	author krion;	state Exp;
branches;
next	;


desc
@@


1.2
log
@As previously advertised, delete ports that have
vulnerabilities listed in portaudit, and those
that depend on them - part 1

math/mupad
	Relies on xpm, vulnerable since 2004-09-15
net-p2p/torrentflux
	Vulnerable since 2006-10-07
net/tptest
	Vulnerable since 2009-12-17
security/pgp6
	Vulnerable since 2005-07-31
www/p5-RTx-RightsMatrix
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Shredder
	Only works with www/rt36, which is FORBIDDEN
www/p5-RTx-Statistics
	Only works with www/rt36, which is FORBIDDEN
www/plone
	Vulnerable since 2011-02-10
www/pyblosxom
	Vulnerable since 2009-02-11
www/rt36
	Vulnerable since 2009-12-09
www/zope-archetypes
	Depends on www/plone, which is FORBIDDEN
www/zope-calendaring
	Depends on www/plone, which is FORBIDDEN
www/zope-coreblog2
	Depends on www/plone, which is FORBIDDEN
www/zope-i18nlayer
	Depends on www/plone, which is FORBIDDEN
www/zope-plonelanguagetool
	Depends on www/plone, which is FORBIDDEN
www/zope-simpleblog
	Depends on www/plone, which is FORBIDDEN
@
text
@--- clients/pgp/cmdline/doencode.c Thu Sep 30 20:10:21 1999
+++ clients/pgp/cmdline/doencode.c Thu Jan 11 20:50:20 2001
@@@@ -283,6 +283,7 @@@@
     PGPBoolean batchmode = pgpenvGetInt( env, PGPENV_BATCHMODE, &pri, &err );
     PGPBoolean verbose = pgpenvGetInt( env, PGPENV_VERBOSE, &pri, &err );
     PGPBoolean quietmode = pgpenvGetInt( env, PGPENV_NOOUT, &pri, &err);
+    PGPBoolean force = pgpenvGetInt( env, PGPENV_FORCE, &pri, &err);
     PGPKeySetRef tmpset;
 
     err = PGPNewEmptyKeySet( toSet, &tmpset );
@@@@ -317,7 +318,7 @@@@
         if(verbose)
             pgpShowKeyValidity( filebPtr, key );
 
-        if( validity < kPGPValidity_Marginal ) {
+        if( validity < kPGPValidity_Marginal && !force) {
             char useridstr[ kPGPMaxUserIDSize ];
             PGPBoolean answer;
             err = pgpGetUserIDStringFromKey( key, useridstr );
@


1.1
log
@- Fix build on 5.x

PR:		ports/61762
Submitted by:	maintainer
@
text
@@

