This file is indexed.

/usr/share/doc/libaws3.3.2.2-dev/README.Debian is in libaws3.3.2.2-dev 17.2.2017-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Ada Web Server for Debian - maintainer's notes

The Ada Web Server library  can use either libopenssl or libgnutls for
strong  cryptography.  This enables  support for  the HTTPS  and other
encrypted  protocols.   Unfortunately  there  are problems  with  both
libraries.

libopenssl  is  licensed under  terms  incompatible  with the  General
Public License,  while libaws is  licensed under the  GPL.  Therefore,
Debian cannot ship binaries of libaws linked with libopenssl.

Linking libaws with libgnutls has  a technical problem which I haven't
been able to correct.  The  symptom is that both ada2wsdl and wsdl2aws
segfault during  elaboration.  The  segmentation fault takes  place in
the call to gcry_control which is at aws-net-ssl__gnutls.adb:1000.

Ted Dennison writes:

> Obviously there could be a million reasons for this. However, I know
> a common cause of this particular symptom in an Ada program is a
> task having too small of a stack for the amount of data being
> declared in it.  There's usually a global default, which can be
> changed for a given task with pragma Storage_Size.

> Most tasks are created and have their stack variables built during
> elaboration. The exception would be task objects (of a defined task
> type) that are dynamically allocated. Even those *could* be created
> during an elaboration, if the coder allocates them inside a
> package's "begin...end" block.

If you would like to help solve this problem, please send email to
aws@lists.adacore.com (I'm on that list, so you don't need to CC me).

-- 
Ludovic Brenta, 2008-06-01

Debian/rules parses debian/control to detect libgnutls28-dev, else
libssl-dev and set SSL=[gnutls|openssl|dummy] accordingly.  You may
override by setting SSL on the command line or in the environment.

 -- Nicolas Boulenguez <nicolas@debian.org>, Sat, 16 Aug 2014 04:03:24 +0200