Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: ghc-tls | Distribution: openSUSE:Factory:zSystems |
Version: 2.1.5 | Vendor: openSUSE |
Release: 1.4 | Build date: Mon Nov 18 03:13:36 2024 |
Group: Unspecified | Build host: reproducible |
Size: 8177705 | Source RPM: ghc-tls-2.1.5-1.4.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://hackage.haskell.org/package/tls | |
Summary: TLS protocol native implementation |
Native Haskell TLS 1.2/1.3 protocol implementation for servers and clients.
BSD-3-Clause
* Mon Nov 18 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.1.5. [#]# Version 2.1.5 * Removing the dependency on the async package. * Restore a few DHE_RSA ciphers. [#493](https://github.com/haskell-tls/hs-tls/pull/493) [#]# Version 2.1.4 * Exporting defaultValidationCache. [#]# Version 2.1.3 * Remove `data-default` version constraint. [#492](https://github.com/haskell-tls/hs-tls/pull/492) * Exporting default variables. [#448](https://github.com/haskell-tls/hs-tls/pull/488) [#]# Version 2.1.2 * Using data-default instead of data-default-class. [#]# Version 2.1.1 * `bye` directly calls `timeout recvHS13`, not spawning a thread for `timeout recvHS13`. So, `bye` can receive an exception if thrown. [#]# Version 2.1.0 * Breaking change: stop exporting constructors to maintain future compatibilities. Field names are still exported, and values can be updated with them using record syntax. Use `def` and `noSessionManager` as initial values. * `onServerFinished` is added to `ClientHooks`. * `clientWantSessionResumeList` is added to `ClientParams` to support multiple tickets for TLS 1.3. * Wed May 22 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.6. [#]# Version 2.0.6 * Setting `supportedCiphers` in `defaultSupported` to `ciphersuite_default`. So, users don't have to override this value anymore by exporting `Network.TLS.Extra.Cipher`. [#471](https://github.com/haskell-tls/hs-tls/pull/471) * `ciphersuite_default` is the same as `ciphersuite_strong`. So, the duplicated definition is removed. * Add missing modules for util/tls-client and util/tls-server. * Fri Apr 26 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.5 revision 1. Upstream has revised the Cabal build instructions on Hackage. * Mon Apr 22 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.5. [#]# Version 2.0.5 * Fixing handshake13_0rtt_fallback * Client checks if the group of PSK is contained in Supported_Groups. * HRR is not allowed for 0-RTT. * Fri Apr 19 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.4. [#]# Version 2.0.4 * More fix for 0-RTT when application data is available while receiving CF. * New util/tls-client and util/tls-server. * Thu Apr 18 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.3. [#]# Version 2.0.3 * Fixing a bug where `timeout` in `bye` does not work. * util/client -> util/tls-client * util/server -> util/tls-server * Thu Mar 28 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.2. [#]# Version 2.0.2 * Client checks sessionMaxEarlyDataSize to decide 0-RTT * Client checks the resumption cipher properly. * Tue Mar 26 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.1 revision 2. Upstream has revised the Cabal build instructions on Hackage. * Fri Mar 01 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.1 revision 1. Upstream has revised the Cabal build instructions on Hackage. * Sun Feb 18 2024 Peter Simons <psimons@suse.com> - Update tls to version 2.0.1. [#]# Version 2.0.1 * Fix a leak of pending data to be sent. [#]# Version 2.0.0 * `tls` now only supports TLS 1.2 and TLS 1.3 with safe cipher suites. * Security: BREAKING CHANGE: TLS 1.0 and TLS 1.1 are removed. * Security: BREAKING CHANGE: all CBC cipher suite are removed. * Security: BREAKING CHANGE: RC4 and 3DES are removed. * Security: BREAKING CHANGE: DSS(digital signature standard) is removed. * Security: BREAKING CHANGE: TLS 1.2 servers require EMS(extended main secret) by default. `supportedExtendedMasterSec` is renamed to `supportedExtendedMainSecret`. * BREAKING CHANGE: the package is now complied with `Strict` and `StrictData`. * BREAKING CHANGE: Many data structures are re-defined with `PatternSynonyms` for extensibility. * BREAKING CHANGE: the structure of `SessionManager` is changed to support session tickets. * API: BREAKING CHANGE: `sendData` can send early data (0-RTT). `clientEarlyData` is removed. To send early data via `sendData`, set `clientUseEarlyData` to `True`. [#466](https://github.com/haskell-tls/hs-tls/issues/466) * API: `handshake` can receive an alert of client authentication failure for TLS 1.3. [#463](https://github.com/haskell-tls/hs-tls/pull/463) * API: `bye` can receive NewSessionTicket for TLS 1.3. * Channel binding: `getFinished` and `getPeerFinished` are deprecated. Use `getTLSUnique` instead. [#462](https://github.com/haskell-tls/hs-tls/pull/462) * Channel binding: `getTLSExporter` and `getTLSServerEndPoint` are provided. [#462](https://github.com/haskell-tls/hs-tls/pull/462) * Refactoring: the monolithic `handshake` is divided to follow the diagram of TLS 1.2 and 1.3 for readability. * Refactoring: test cases are refactored for maintenability and readablity. `hspec` is used instead of `tasty`. * Code format: `fourmolu` is used as an official formatter. * Catching up RFC8446bis-09. [#467](https://github.com/haskell-tls/hs-tls/issues/467) * Tue Sep 05 2023 Peter Simons <psimons@suse.com> - Update tls to version 1.9.0. [#]# Version 1.9.0 * BREAKING CHANGE: The type of the `Error_Protocol` constructor of `TLSError` has changed. The "warning" case has been split off into a new `Error_Protocol_Warning` constructor. [#460](https://github.com/haskell-tls/hs-tls/pull/460) [#]# Version 1.8.0 * BREAKING CHANGE: Remove `Exception` instance for `TLSError`. The library now throws `TLSException` only. If you need to change your code, please refer to [this example](https://github.com/snoyberg/http-client/commit/73d1a4eb451c089878ba95e96371d0b18287ffb8) first. [#457](https://github.com/haskell-tls/hs-tls/pull/457) [#]# Version 1.7.1 * NOP on UserCanceled event [#454](https://github.com/haskell-tls/hs-tls/pull/454) [#]# Version 1.7.0 * Major version up because "crypton" is used instead of "cryptonite" * Thu Mar 30 2023 Peter Simons <psimons@suse.com> - Updated spec file to conform with ghc-rpm-macros-2.5.2. * Mon Jun 06 2022 Peter Simons <psimons@suse.com> - Update tls to version 1.6.0. [#]# Version 1.6.0 - Major version up because of disabling SSL3 - Some fixes against tlsfuzzer [#]# Version 1.5.8 - Require mtl-2.2.1 or newer [#448](https://github.com/haskell-tls/hs-tls/pull/448) * Thu Jan 20 2022 Peter Simons <psimons@suse.com> - Update tls to version 1.5.7. [#]# Version 1.5.7 - New APIs: getFinished and getPeerFinished [#445](https://github.com/vincenthz/hs-tls/pull/445) [#]# Version 1.5.6 - Dynamically setting enctypted extensions [#444](https://github.com/vincenthz/hs-tls/pull/444) * Mon Feb 08 2021 psimons@suse.com - Update tls to version 1.5.5. [#]# Version 1.5.5 - QUIC support [#419](https://github.com/vincenthz/hs-tls/pull/419) [#427](https://github.com/vincenthz/hs-tls/pull/427) [#428](https://github.com/vincenthz/hs-tls/pull/428) [#430](https://github.com/vincenthz/hs-tls/pull/430) [#433](https://github.com/vincenthz/hs-tls/pull/433) [#441](https://github.com/vincenthz/hs-tls/pull/441) - Server ECDSA for P-256 [#436](https://github.com/vincenthz/hs-tls/pull/436) - Sort ciphersuites based on hardware-acceleration support [#439](https://github.com/vincenthz/hs-tls/pull/439) - Sending no_application_protocol [#440](https://github.com/vincenthz/hs-tls/pull/440) - Internal improvements [#426](https://github.com/vincenthz/hs-tls/pull/426) [#431](https://github.com/vincenthz/hs-tls/pull/431)
/usr/lib64/ghc-9.10.1/lib/libHStls-2.1.5-Fn7uKHQw5qt7FKE9D58dcQ-ghc9.10.1.so /usr/share/licenses/ghc-tls /usr/share/licenses/ghc-tls/LICENSE
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Jan 8 00:25:28 2025