Your message dated Thu, 15 Jun 2006 03:06:47 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#362957: fixed in libcrypt-openssl-random-perl 0.03-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Luk Claes <[EMAIL PROTECTED]>

* Package name    : libcrypt-openssl-random-perl
  Version         : 0.03
  Upstream Author : Ian Roberts <[EMAIL PROTECTED]>
* URL             : http://cpan.org/
* License         : like Perl
  Programming Lang: Perl
  Description     : Perl module for accessing the OpenSSL pseudo-random
  number generator.

Provides the ability to seed and query the OpenSSL library's
pseudo-random number generator.

Cheers

Luk


--- End Message ---
--- Begin Message ---
Source: libcrypt-openssl-random-perl
Source-Version: 0.03-1

We believe that the bug you reported is fixed in the latest version of
libcrypt-openssl-random-perl, which is due to be installed in the Debian FTP 
archive:

libcrypt-openssl-random-perl_0.03-1.diff.gz
  to 
pool/main/libc/libcrypt-openssl-random-perl/libcrypt-openssl-random-perl_0.03-1.diff.gz
libcrypt-openssl-random-perl_0.03-1.dsc
  to 
pool/main/libc/libcrypt-openssl-random-perl/libcrypt-openssl-random-perl_0.03-1.dsc
libcrypt-openssl-random-perl_0.03-1_i386.deb
  to 
pool/main/libc/libcrypt-openssl-random-perl/libcrypt-openssl-random-perl_0.03-1_i386.deb
libcrypt-openssl-random-perl_0.03.orig.tar.gz
  to 
pool/main/libc/libcrypt-openssl-random-perl/libcrypt-openssl-random-perl_0.03.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Luk Claes <[EMAIL PROTECTED]> (supplier of updated libcrypt-openssl-random-perl 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 15 May 2006 04:40:52 +0200
Source: libcrypt-openssl-random-perl
Binary: libcrypt-openssl-random-perl
Architecture: source i386
Version: 0.03-1
Distribution: unstable
Urgency: low
Maintainer: Luk Claes <[EMAIL PROTECTED]>
Changed-By: Luk Claes <[EMAIL PROTECTED]>
Description: 
 libcrypt-openssl-random-perl - Access to the OpenSSL pseudo-random number 
generator
Closes: 362957
Changes: 
 libcrypt-openssl-random-perl (0.03-1) unstable; urgency=low
 .
   * Initial release (Closes: #362957).
Files: 
 abf215caa814b64cd3ebb675905f4048 645 perl optional 
libcrypt-openssl-random-perl_0.03-1.dsc
 c6bae9c3ced1e08ffcd57120bf247a7a 3245 perl optional 
libcrypt-openssl-random-perl_0.03.orig.tar.gz
 5881201f9260f3fd8f352b20d1ce57ef 1462 perl optional 
libcrypt-openssl-random-perl_0.03-1.diff.gz
 798f77e2edd28b9937ad110ddb0ab492 10998 perl optional 
libcrypt-openssl-random-perl_0.03-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEaUC55UTeB5t8Mo0RAhLbAJ41pqklaHyeSrtMIIqydsM9NQh88QCfV9R7
mmuZ8cqj3kfLmcuilXGIrA4=
=V5hq
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to