| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: ghc-tls-prof | Distribution: openSUSE Tumbleweed |
| Version: 2.1.11 | Vendor: openSUSE |
| Release: 1.4 | Build date: Sat Jul 26 10:59:49 2025 |
| Group: Unspecified | Build host: reproducible |
| Size: 24278128 | Source RPM: ghc-tls-2.1.11-1.4.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: https://hackage.haskell.org/package/tls | |
| Summary: Haskell tls profiling library | |
This package provides the Haskell tls profiling library.
BSD-3-Clause
* Sat Jul 26 2025 Peter Simons <psimons@suse.com>
- Update tls to version 2.1.11.
[#]# Version 2.1.10
* Supporting the SSLKEYLOGFILE environment variable.
[#499](https://github.com/haskell-tls/hs-tls/pull/499)
[#]# Version 2.1.9
* Providing ECH(Encrypted Client Hello). See `sharedECHConfigList`,
`clientUseECH` and `serverECHKey`. Note that the `ech-gen` command,
`loadECHConfigList` and `loadECHSecretKeys` are provided by the
`ech-config` package.
* Tue Feb 25 2025 Peter Simons <psimons@suse.com>
- Update tls to version 2.1.8.
[#]# Version 2.1.8
* Moving `Limit` to `Shared` to maintain backward compatibility
of `TLSParams` class.
* Deprecating 2.1.7.
* Sun Jan 26 2025 Peter Simons <psimons@suse.com>
- Update tls to version 2.1.7.
[#] Change log for "tls"
[#]# Version 2.1.7
* Introducing `Limit` parameter.
* Implementing "Record Size Limit Extension for TLS" (RFC8449).
Set `limitRecordSize` use it.
* Implementing "TLS Certificate Compression" (RFC 8879).
This feature is automatically used if the peer supports it.
* More tests with `tlsfuzzer` especially for client authentication
and 0-RTT.
* Implementing a utility funcation, `validateClientCertificate`, for
client authentication.
* Bug fix for echo back logic of Cookie extension.
* More pretty show for the internal `Handshake` structure for debugging.
* Tue Jan 07 2025 Peter Simons <psimons@suse.com>
- Update tls to version 2.1.6.
[#]# Version 2.1.6
* Testing with "tlsfuzzer" again. Now don't send an alert agaist to
peer's alert. Double locking (aka self dead-lock) is fixed. Sending
an alert for known-but-cannot-parse extensions. Other corner cases
are also fixed.
* `tls-client -d` and `tls-server -d` pretty-prints `Handshake`.
* Mon Nov 18 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.1.5.
[#]# Version 2.1.5
* Removing the dependency on the async package.
* Restore a few DHE_RSA ciphers.
[#493](https://github.com/haskell-tls/hs-tls/pull/493)
[#]# Version 2.1.4
* Exporting defaultValidationCache.
[#]# Version 2.1.3
* Remove `data-default` version constraint.
[#492](https://github.com/haskell-tls/hs-tls/pull/492)
* Exporting default variables.
[#448](https://github.com/haskell-tls/hs-tls/pull/488)
[#]# Version 2.1.2
* Using data-default instead of data-default-class.
[#]# Version 2.1.1
* `bye` directly calls `timeout recvHS13`, not spawning a thread for
`timeout recvHS13`. So, `bye` can receive an exception if thrown.
[#]# Version 2.1.0
* Breaking change: stop exporting constructors to maintain future
compatibilities. Field names are still exported, and values can be updated
with them using record syntax. Use `def` and `noSessionManager` as initial
values.
* `onServerFinished` is added to `ClientHooks`.
* `clientWantSessionResumeList` is added to `ClientParams` to support
multiple tickets for TLS 1.3.
* Wed May 22 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.6.
[#]# Version 2.0.6
* Setting `supportedCiphers` in `defaultSupported` to `ciphersuite_default`.
So, users don't have to override this value anymore by exporting
`Network.TLS.Extra.Cipher`.
[#471](https://github.com/haskell-tls/hs-tls/pull/471)
* `ciphersuite_default` is the same as `ciphersuite_strong`.
So, the duplicated definition is removed.
* Add missing modules for util/tls-client and util/tls-server.
* Fri Apr 26 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.5 revision 1.
Upstream has revised the Cabal build instructions on Hackage.
* Mon Apr 22 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.5.
[#]# Version 2.0.5
* Fixing handshake13_0rtt_fallback
* Client checks if the group of PSK is contained in Supported_Groups.
* HRR is not allowed for 0-RTT.
* Fri Apr 19 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.4.
[#]# Version 2.0.4
* More fix for 0-RTT when application data is available while receiving CF.
* New util/tls-client and util/tls-server.
* Thu Apr 18 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.3.
[#]# Version 2.0.3
* Fixing a bug where `timeout` in `bye` does not work.
* util/client -> util/tls-client
* util/server -> util/tls-server
* Thu Mar 28 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.2.
[#]# Version 2.0.2
* Client checks sessionMaxEarlyDataSize to decide 0-RTT
* Client checks the resumption cipher properly.
* Tue Mar 26 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.1 revision 2.
Upstream has revised the Cabal build instructions on Hackage.
* Fri Mar 01 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.1 revision 1.
Upstream has revised the Cabal build instructions on Hackage.
* Sun Feb 18 2024 Peter Simons <psimons@suse.com>
- Update tls to version 2.0.1.
[#]# Version 2.0.1
* Fix a leak of pending data to be sent.
[#]# Version 2.0.0
* `tls` now only supports TLS 1.2 and TLS 1.3 with safe cipher suites.
* Security: BREAKING CHANGE: TLS 1.0 and TLS 1.1 are removed.
* Security: BREAKING CHANGE: all CBC cipher suite are removed.
* Security: BREAKING CHANGE: RC4 and 3DES are removed.
* Security: BREAKING CHANGE: DSS(digital signature standard) is removed.
* Security: BREAKING CHANGE: TLS 1.2 servers require
EMS(extended main secret) by default.
`supportedExtendedMasterSec` is renamed to
`supportedExtendedMainSecret`.
* BREAKING CHANGE: the package is now complied with `Strict` and `StrictData`.
* BREAKING CHANGE: Many data structures are re-defined with
`PatternSynonyms` for extensibility.
* BREAKING CHANGE: the structure of `SessionManager` is changed
to support session tickets.
* API: BREAKING CHANGE: `sendData` can send early data (0-RTT).
`clientEarlyData` is removed.
To send early data via `sendData`, set `clientUseEarlyData` to `True`.
[#466](https://github.com/haskell-tls/hs-tls/issues/466)
* API: `handshake` can receive an alert of client authentication failure
for TLS 1.3.
[#463](https://github.com/haskell-tls/hs-tls/pull/463)
* API: `bye` can receive NewSessionTicket for TLS 1.3.
* Channel binding: `getFinished` and `getPeerFinished` are deprecated.
Use `getTLSUnique` instead.
[#462](https://github.com/haskell-tls/hs-tls/pull/462)
* Channel binding: `getTLSExporter` and `getTLSServerEndPoint` are provided.
[#462](https://github.com/haskell-tls/hs-tls/pull/462)
* Refactoring: the monolithic `handshake` is divided to follow
the diagram of TLS 1.2 and 1.3 for readability.
* Refactoring: test cases are refactored for maintenability
and readablity. `hspec` is used instead of `tasty`.
* Code format: `fourmolu` is used as an official formatter.
* Catching up RFC8446bis-09.
[#467](https://github.com/haskell-tls/hs-tls/issues/467)
* Tue Sep 05 2023 Peter Simons <psimons@suse.com>
- Update tls to version 1.9.0.
[#]# Version 1.9.0
* BREAKING CHANGE: The type of the `Error_Protocol` constructor of `TLSError` has changed.
The "warning" case has been split off into a new `Error_Protocol_Warning` constructor.
[#460](https://github.com/haskell-tls/hs-tls/pull/460)
[#]# Version 1.8.0
* BREAKING CHANGE: Remove `Exception` instance for `TLSError`.
The library now throws `TLSException` only.
If you need to change your code, please refer to
[this example](https://github.com/snoyberg/http-client/commit/73d1a4eb451c089878ba95e96371d0b18287ffb8) first.
[#457](https://github.com/haskell-tls/hs-tls/pull/457)
[#]# Version 1.7.1
* NOP on UserCanceled event
[#454](https://github.com/haskell-tls/hs-tls/pull/454)
[#]# Version 1.7.0
* Major version up because "crypton" is used instead of "cryptonite"
* Thu Mar 30 2023 Peter Simons <psimons@suse.com>
- Updated spec file to conform with ghc-rpm-macros-2.5.2.
* Mon Jun 06 2022 Peter Simons <psimons@suse.com>
- Update tls to version 1.6.0.
[#]# Version 1.6.0
- Major version up because of disabling SSL3
- Some fixes against tlsfuzzer
[#]# Version 1.5.8
- Require mtl-2.2.1 or newer
[#448](https://github.com/haskell-tls/hs-tls/pull/448)
* Thu Jan 20 2022 Peter Simons <psimons@suse.com>
- Update tls to version 1.5.7.
[#]# Version 1.5.7
- New APIs: getFinished and getPeerFinished
[#445](https://github.com/vincenthz/hs-tls/pull/445)
[#]# Version 1.5.6
- Dynamically setting enctypted extensions
[#444](https://github.com/vincenthz/hs-tls/pull/444)
/usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Backend.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Cipher.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Compression.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Context.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Context/Internal.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Core.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Credentials.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Crypto.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Crypto/DH.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Crypto/IES.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Crypto/Types.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/ErrT.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Error.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Extension.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Extra.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Extra/Cipher.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Extra/FFDHE.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Certificate.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client/ClientHello.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client/Common.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client/ServerHello.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client/TLS12.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Client/TLS13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Common.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Common13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Control.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Key.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Random.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/ClientHello.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/ClientHello12.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/ClientHello13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/Common.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/ServerHello12.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/ServerHello13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/TLS12.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Server/TLS13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/Signature.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/State.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/State13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Handshake/TranscriptHash.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/HashAndSignature.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Hooks.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/IO.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/IO/Decode.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/IO/Encode.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Imports.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Internal.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/KeySchedule.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/MAC.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Measurement.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Packet.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Packet13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Parameters.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/PostHandshake.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/QUIC.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/RNG.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Decrypt.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Encrypt.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Layer.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Recv.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Send.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/State.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Record/Types.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Session.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/State.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Struct.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Struct13.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Types.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Types/Cipher.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Types/Secret.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Types/Session.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Types/Version.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Util.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Util/ASN1.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Util/Serialization.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/Wire.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/Network/TLS/X509.p_hi /usr/lib64/ghc-9.12.2/lib/tls-2.1.11/libHStls-2.1.11-Ae4H7V2evUB50fcrEPa8Ua_p.a
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Oct 19 22:42:15 2025