Package: libgnutls11 Version: 1.0.16-13 Followup-For: Bug #286610
This bug report should be moved to libgcrypt, since the blocking calls for /dev/random are there and cannot be handled by libgnutls. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.9 Locale: LANG=C, LC_CTYPE=C (ignored: LC_ALL set to C) Versions of packages libgnutls11 depends on: ii libc6 2.3.2.ds1-19 GNU C Library: Shared libraries an ii libgcrypt11 1.2.0-6 LGPL Crypto library - runtime libr ii libgpg-error0 1.0-1 library for common error values an ii liblzo1 1.08-1 A real-time data compression libra ii libopencdk8 0.5.5-10 Open Crypto Development Kit (OpenC ii libtasn1-2 0.2.10-4 Manage ASN.1 structures (runtime) ii zlib1g 1:1.2.1.2-1 compression library - runtime -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]