Your message dated Tue, 01 Mar 2005 17:33:10 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#297410: fixed in cl-ssl 0.2+cvs.2004.01.05 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 28 Feb 2005 19:05:43 +0000 >From [EMAIL PROTECTED] Mon Feb 28 11:05:43 2005 Return-path: <[EMAIL PROTECTED]> Received: from (boa.b9.com) [216.184.11.2] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D5qD9-0000mk-00; Mon, 28 Feb 2005 11:05:43 -0800 Received: from tiger.med-info.com (tiger.med-info.com [216.184.11.129]) by boa.b9.com (8.13.3/8.13.3/Debian-6) with SMTP id j1SJ5Cso022890 for <[EMAIL PROTECTED]>; Mon, 28 Feb 2005 12:05:12 -0700 Received: from tiger.med-info.com ([EMAIL PROTECTED] [127.0.0.1]) by tiger.med-info.com (8.13.3/8.13.3/Debian-7) with ESMTP id j1SJ5C72001787 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for <[EMAIL PROTECTED]>; Mon, 28 Feb 2005 12:05:12 -0700 Received: (from [EMAIL PROTECTED]) by tiger.med-info.com (8.13.3/8.13.3/Submit) id j1SJ5Csp001784; Mon, 28 Feb 2005 12:05:12 -0700 Message-Id: <[EMAIL PROTECTED]> X-Authentication-Warning: tiger.med-info.com: kevin set sender to [EMAIL PROTECTED] using -f Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Kevin M. Rosenberg" <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: O: cl-ssl -- Common Lisp interface to OpenSSL package X-Mailer: reportbug 3.8 Date: Mon, 28 Feb 2005 12:05:12 -0700 X-Scanned-By: MIMEDefang 2.51 on 172.16.1.2 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: wnpp Severity: normal I intend to orphan the cl-ssl package. The package description is: This package includes functions for accessing the OpenSSL library. It uses UFFI to be compatible across several Common Lisp implementations. -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) --------------------------------------- Received: (at 297410-close) by bugs.debian.org; 1 Mar 2005 22:38:08 +0000 >From [EMAIL PROTECTED] Tue Mar 01 14:38:08 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1D6G0F-0002ux-00; Tue, 01 Mar 2005 14:38:08 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1D6FvS-0001Tg-00; Tue, 01 Mar 2005 17:33:10 -0500 From: Peter Van Eynde <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#297410: fixed in cl-ssl 0.2+cvs.2004.01.05 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 01 Mar 2005 17:33:10 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: cl-ssl Source-Version: 0.2+cvs.2004.01.05 We believe that the bug you reported is fixed in the latest version of cl-ssl, which is due to be installed in the Debian FTP archive: cl-ssl_0.2+cvs.2004.01.05.dsc to pool/main/c/cl-ssl/cl-ssl_0.2+cvs.2004.01.05.dsc cl-ssl_0.2+cvs.2004.01.05.tar.gz to pool/main/c/cl-ssl/cl-ssl_0.2+cvs.2004.01.05.tar.gz cl-ssl_0.2+cvs.2004.01.05_i386.deb to pool/main/c/cl-ssl/cl-ssl_0.2+cvs.2004.01.05_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Peter Van Eynde <[EMAIL PROTECTED]> (supplier of updated cl-ssl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 1 Mar 2005 10:19:58 +0100 Source: cl-ssl Binary: cl-ssl Architecture: source i386 Version: 0.2+cvs.2004.01.05 Distribution: unstable Urgency: low Maintainer: Peter Van Eynde <[EMAIL PROTECTED]> Changed-By: Peter Van Eynde <[EMAIL PROTECTED]> Description: cl-ssl - Common Lisp interface to OpenSSL package Closes: 297410 Changes: cl-ssl (0.2+cvs.2004.01.05) unstable; urgency=low . * New maintainer. (Closes: #297410: O: cl-ssl -- Common Lisp interface to OpenSSL package) * Adopted by Peter Van Eynde Files: 560f8bbdb0e225b309410fb3c1aa001d 531 devel optional cl-ssl_0.2+cvs.2004.01.05.dsc 4f608407ca8045c2bdbd2658d478a982 16943 devel optional cl-ssl_0.2+cvs.2004.01.05.tar.gz 678920dee15715ab8e0cd2f77a9eb6a1 15540 devel optional cl-ssl_0.2+cvs.2004.01.05_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCJNQi11ldN0tyliURAih8AKCUOEKCWL+vV3Khs1cDnijn+zhHswCgm53z W0F2Ruf7saoyouD4KMXxe9E= =/P9F -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]