Package: libgnutls11
Version: 1.0.16-13
Followup-For: Bug #286610

This bug report should be moved to libgcrypt, since the blocking calls
for /dev/random are there and cannot be handled by libgnutls.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.9
Locale: LANG=C, LC_CTYPE=C (ignored: LC_ALL set to C)

Versions of packages libgnutls11 depends on:
ii  libc6                       2.3.2.ds1-19 GNU C Library: Shared libraries an
ii  libgcrypt11                 1.2.0-6      LGPL Crypto library - runtime libr
ii  libgpg-error0               1.0-1        library for common error values an
ii  liblzo1                     1.08-1       A real-time data compression libra
ii  libopencdk8                 0.5.5-10     Open Crypto Development Kit (OpenC
ii  libtasn1-2                  0.2.10-4     Manage ASN.1 structures (runtime)
ii  zlib1g                      1:1.2.1.2-1  compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to