Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: ghc-tls | Distribution: openSUSE Tumbleweed |
Version: 1.5.5 | Vendor: openSUSE |
Release: 1.8 | Build date: Wed Jun 23 22:12:10 2021 |
Group: Unspecified | Build host: armbuild21 |
Size: 4247405 | Source RPM: ghc-tls-1.5.5-1.8.src.rpm |
Packager: http://bugs.opensuse.org | |
Url: https://hackage.haskell.org/package/tls | |
Summary: TLS/SSL protocol native implementation (Server and Client) |
Native Haskell TLS and SSL protocol implementation for server and client. This provides a high-level implementation of a sensitive security protocol, eliminating a common set of security issues through the use of the advanced type system, high level constructions and common Haskell features. Currently implement the SSL3.0, TLS1.0, TLS1.1, TLS1.2 and TLS 1.3 protocol, and support RSA and Ephemeral (Elliptic curve and regular) Diffie Hellman key exchanges, and many extensions. Some debug tools linked with tls, are available through the <http://hackage.haskell.org/package/tls-debug/>.
BSD-3-Clause
* Mon Feb 08 2021 psimons@suse.com - Update tls to version 1.5.5. [#]# Version 1.5.5 - QUIC support [#419](https://github.com/vincenthz/hs-tls/pull/419) [#427](https://github.com/vincenthz/hs-tls/pull/427) [#428](https://github.com/vincenthz/hs-tls/pull/428) [#430](https://github.com/vincenthz/hs-tls/pull/430) [#433](https://github.com/vincenthz/hs-tls/pull/433) [#441](https://github.com/vincenthz/hs-tls/pull/441) - Server ECDSA for P-256 [#436](https://github.com/vincenthz/hs-tls/pull/436) - Sort ciphersuites based on hardware-acceleration support [#439](https://github.com/vincenthz/hs-tls/pull/439) - Sending no_application_protocol [#440](https://github.com/vincenthz/hs-tls/pull/440) - Internal improvements [#426](https://github.com/vincenthz/hs-tls/pull/426) [#431](https://github.com/vincenthz/hs-tls/pull/431) * Thu Dec 17 2020 Ondřej Súkup <mimi.vx@gmail.com> - disable %{ix86} build * Tue Aug 18 2020 Peter Simons <psimons@suse.com> - Replace %setup -q with the more modern %autosetup macro. * Tue Jun 16 2020 Peter Simons <psimons@suse.com> - Re-generate file with latest version of spec-cleaner. * Thu Feb 27 2020 psimons@suse.com - Update tls to version 1.5.4. [#]# Version 1.5.4 - Restore interoperability with early Java 6 [#422](https://github.com/vincenthz/hs-tls/pull/422) - Test cleanups for timeout and async usage [#416](https://github.com/vincenthz/hs-tls/pull/416) * Thu Jan 09 2020 psimons@suse.com - Update tls to version 1.5.3. [#]# Version 1.5.3 - Additional verification regarding EC signatures [#412](https://github.com/vincenthz/hs-tls/pull/412) - Fixing ALPN [#411](https://github.com/vincenthz/hs-tls/pull/411) - Check SSLv3 padding length [#410](https://github.com/vincenthz/hs-tls/pull/410) - Exposing getClientCertificateChain [#407](https://github.com/vincenthz/hs-tls/pull/407) - Extended Master Secret [#406](https://github.com/vincenthz/hs-tls/pull/406) - Brushing up the documentation [#404](https://github.com/vincenthz/hs-tls/pull/404) [#408](https://github.com/vincenthz/hs-tls/pull/408) - Improving tests [#403](https://github.com/vincenthz/hs-tls/pull/403) - Avoid calling onServerNameIndication twice with HRR [#402](https://github.com/vincenthz/hs-tls/pull/402) - Enable X448 and FFDHE groups [#401](https://github.com/vincenthz/hs-tls/pull/401) - Refactoring [#400](https://github.com/vincenthz/hs-tls/pull/400) [#399](https://github.com/vincenthz/hs-tls/pull/399) * Fri Nov 08 2019 Peter Simons <psimons@suse.com> - Drop obsolete group attributes. * Tue Oct 15 2019 psimons@suse.com - Update tls to version 1.5.2. Upstream has edited the change log file since the last release in a non-trivial way, i.e. they did more than just add a new entry at the top. You can review the file at: http://hackage.haskell.org/package/tls-1.5.2/src/CHANGELOG.md * Sun Jul 28 2019 psimons@suse.com - Update tls to version 1.5.1. [#]# Version 1.5.1 - Post-handshake authentication [#363](https://github.com/vincenthz/hs-tls/pull/363) - Fixing memory leak [#366](https://github.com/vincenthz/hs-tls/pull/366) - Improve version negotiation [#368](https://github.com/vincenthz/hs-tls/pull/368) - Don't send 0-RTT data when ticket is expired [#370](https://github.com/vincenthz/hs-tls/pull/370) - Handshake packet fragmentation [#371](https://github.com/vincenthz/hs-tls/pull/371) * Sun Jun 02 2019 psimons@suse.com - Update tls to version 1.5.0. Upstream has edited the change log file since the last release in a non-trivial way, i.e. they did more than just add a new entry at the top. You can review the file at: http://hackage.haskell.org/package/tls-1.5.0/src/CHANGELOG.md * Sat Oct 20 2018 Peter Simons <psimons@suse.com> - Use https URL to refer to bugs.opensuse.org. * Wed Jul 18 2018 psimons@suse.com - Cosmetic: replace tabs with blanks, strip trailing white space, and update copyright headers with spec-cleaner. * Mon May 14 2018 psimons@suse.com - Update tls to version 1.4.1. - Enable X25519 in default parameters [#265](https://github.com/vincenthz/hs-tls/pull/265) - Checking EOF in bye [#262] (https://github.com/vincenthz/hs-tls/pull/262) - Improving validation in DH key exchange [#256](https://github.com/vincenthz/hs-tls/pull/256) - Handle TCP reset during handshake [#251](https://github.com/vincenthz/hs-tls/pull/251) - Accepting hlint suggestions. - Wrap renegotiation failures with HandshakeFailed [#237](https://github.com/vincenthz/hs-tls/pull/237) - Improve selection of server certificate and use "signature_algorithms" extension [#236](https://github.com/vincenthz/hs-tls/pull/236) - Change Bytes to ByteString and deprecate the Bytes type alias [#230](https://github.com/vincenthz/hs-tls/pull/230) - Session compression and SNI [#223](https://github.com/vincenthz/hs-tls/pull/223) - Deprecating ciphersuite_medium. Putting WARNING to ciphersuite_all since this includes RC4 [#153](https://github.com/vincenthz/hs-tls/pull/153) [#222](https://github.com/vincenthz/hs-tls/pull/222) - Removing NPN [#214](https://github.com/vincenthz/hs-tls/pull/214) - Supporting RSAPSS defined in TLS 1.3 [#207](https://github.com/vincenthz/hs-tls/pull/207) - Supporting X25519 and X448 in the IES style. [#205](https://github.com/vincenthz/hs-tls/pull/205) - Strip leading zeros in DHE premaster secret [#201](https://github.com/vincenthz/hs-tls/pull/201) - RSASSA-PSS signatures can be enabled with `supportedHashSignatures`. This uses assignments from TLS 1.3, for example `(HashIntrinsic, SignatureRSApssSHA256)`. - Diffie-Hellman with elliptic curves X25519 and X448: This can be enabled with `supportedGroups`, which also gives control over curve preference. - ECDH with curve P-256 now uses optimized C implementation from package `cryptonite`. API CHANGES: - Cipher list `ciphersuite_medium` is now deprecated, users are advised to use `ciphersuite_default` or `ciphersuite_strong`. List `ciphersuite_all` is kept for compatibility with old servers but this is discouraged and generates a warning (this includes RC4 ciphers, see [#153](https://github.com/vincenthz/hs-tls/pull/153) for reference). - Support for NPN (Next Protocol Negotiation) has been removed. The replacement is ALPN (Application-Layer Protocol Negotiation). - Data type `SessionData` now contains fields for compression algorithm and client SNI. A `SessionManager` implementation that serializes/deserializes `SessionData` values must deal with the new fields. - Module `Network.TLS` exports a type alias named `Bytes` which is now deprecated. The replacement is to use strict `ByteString` directly.
/usr/lib/ghc-8.10.4/tls-1.5.5 /usr/lib/ghc-8.10.4/tls-1.5.5/libHStls-1.5.5-DRDCKSDRRMBLUOsPMYMqJy-ghc8.10.4.so /usr/share/licenses/ghc-tls /usr/share/licenses/ghc-tls/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Mar 9 09:46:30 2025