Changelog for
ghc-tls-doc-2.0.6-dlh.101.3.noarch.rpm :
* Wed May 22 2024 Peter Simons
- Update tls to version 2.0.6. [#]# Version 2.0.6
* Setting `supportedCiphers` in `defaultSupported` to `ciphersuite_default`. So, users don\'t have to override this value anymore by exporting `Network.TLS.Extra.Cipher`. [#471](https://github.com/haskell-tls/hs-tls/pull/471)
* `ciphersuite_default` is the same as `ciphersuite_strong`. So, the duplicated definition is removed.
* Add missing modules for util/tls-client and util/tls-server.
* Fri Apr 26 2024 Peter Simons - Update tls to version 2.0.5 revision 1. Upstream has revised the Cabal build instructions on Hackage.
* Mon Apr 22 2024 Peter Simons - Update tls to version 2.0.5. [#]# Version 2.0.5
* Fixing handshake13_0rtt_fallback
* Client checks if the group of PSK is contained in Supported_Groups.
* HRR is not allowed for 0-RTT.
* Fri Apr 19 2024 Peter Simons - Update tls to version 2.0.4. [#]# Version 2.0.4
* More fix for 0-RTT when application data is available while receiving CF.
* New util/tls-client and util/tls-server.
* Thu Apr 18 2024 Peter Simons - Update tls to version 2.0.3. [#]# Version 2.0.3
* Fixing a bug where `timeout` in `bye` does not work.
* util/client -> util/tls-client
* util/server -> util/tls-server
* Thu Mar 28 2024 Peter Simons - Update tls to version 2.0.2. [#]# Version 2.0.2
* Client checks sessionMaxEarlyDataSize to decide 0-RTT
* Client checks the resumption cipher properly.
* Tue Mar 26 2024 Peter Simons - Update tls to version 2.0.1 revision 2. Upstream has revised the Cabal build instructions on Hackage.
* Fri Mar 01 2024 Peter Simons - Update tls to version 2.0.1 revision 1. Upstream has revised the Cabal build instructions on Hackage.
* Sun Feb 18 2024 Peter Simons - Update tls to version 2.0.1. [#]# Version 2.0.1
* Fix a leak of pending data to be sent. [#]# Version 2.0.0
* `tls` now only supports TLS 1.2 and TLS 1.3 with safe cipher suites.
* Security: BREAKING CHANGE: TLS 1.0 and TLS 1.1 are removed.
* Security: BREAKING CHANGE: all CBC cipher suite are removed.
* Security: BREAKING CHANGE: RC4 and 3DES are removed.
* Security: BREAKING CHANGE: DSS(digital signature standard) is removed.
* Security: BREAKING CHANGE: TLS 1.2 servers require EMS(extended main secret) by default. `supportedExtendedMasterSec` is renamed to `supportedExtendedMainSecret`.
* BREAKING CHANGE: the package is now complied with `Strict` and `StrictData`.
* BREAKING CHANGE: Many data structures are re-defined with `PatternSynonyms` for extensibility.
* BREAKING CHANGE: the structure of `SessionManager` is changed to support session tickets.
* API: BREAKING CHANGE: `sendData` can send early data (0-RTT). `clientEarlyData` is removed. To send early data via `sendData`, set `clientUseEarlyData` to `True`. [#466](https://github.com/haskell-tls/hs-tls/issues/466)
* API: `handshake` can receive an alert of client authentication failure for TLS 1.3. [#463](https://github.com/haskell-tls/hs-tls/pull/463)
* API: `bye` can receive NewSessionTicket for TLS 1.3.
* Channel binding: `getFinished` and `getPeerFinished` are deprecated. Use `getTLSUnique` instead. [#462](https://github.com/haskell-tls/hs-tls/pull/462)
* Channel binding: `getTLSExporter` and `getTLSServerEndPoint` are provided. [#462](https://github.com/haskell-tls/hs-tls/pull/462)
* Refactoring: the monolithic `handshake` is divided to follow the diagram of TLS 1.2 and 1.3 for readability.
* Refactoring: test cases are refactored for maintenability and readablity. `hspec` is used instead of `tasty`.
* Code format: `fourmolu` is used as an official formatter.
* Catching up RFC8446bis-09. [#467](https://github.com/haskell-tls/hs-tls/issues/467)
* Tue Sep 05 2023 Peter Simons - Update tls to version 1.9.0. [#]# Version 1.9.0
* BREAKING CHANGE: The type of the `Error_Protocol` constructor of `TLSError` has changed. The \"warning\" case has been split off into a new `Error_Protocol_Warning` constructor. [#460](https://github.com/haskell-tls/hs-tls/pull/460) [#]# Version 1.8.0
* BREAKING CHANGE: Remove `Exception` instance for `TLSError`. The library now throws `TLSException` only. If you need to change your code, please refer to [this example](https://github.com/snoyberg/http-client/commit/73d1a4eb451c089878ba95e96371d0b18287ffb8) first. [#457](https://github.com/haskell-tls/hs-tls/pull/457) [#]# Version 1.7.1
* NOP on UserCanceled event [#454](https://github.com/haskell-tls/hs-tls/pull/454) [#]# Version 1.7.0
* Major version up because \"crypton\" is used instead of \"cryptonite\"
* Thu Mar 30 2023 Peter Simons - Updated spec file to conform with ghc-rpm-macros-2.5.2.
* Mon Jun 06 2022 Peter Simons - Update tls to version 1.6.0. [#]# Version 1.6.0 - Major version up because of disabling SSL3 - Some fixes against tlsfuzzer [#]# Version 1.5.8 - Require mtl-2.2.1 or newer [#448](https://github.com/haskell-tls/hs-tls/pull/448)
* Thu Jan 20 2022 Peter Simons - Update tls to version 1.5.7. [#]# Version 1.5.7 - New APIs: getFinished and getPeerFinished [#445](https://github.com/vincenthz/hs-tls/pull/445) [#]# Version 1.5.6 - Dynamically setting enctypted extensions [#444](https://github.com/vincenthz/hs-tls/pull/444)
* Mon Feb 08 2021 psimonsAATTsuse.com- Update tls to version 1.5.5. [#]# Version 1.5.5 - QUIC support [#419](https://github.com/vincenthz/hs-tls/pull/419) [#427](https://github.com/vincenthz/hs-tls/pull/427) [#428](https://github.com/vincenthz/hs-tls/pull/428) [#430](https://github.com/vincenthz/hs-tls/pull/430) [#433](https://github.com/vincenthz/hs-tls/pull/433) [#441](https://github.com/vincenthz/hs-tls/pull/441) - Server ECDSA for P-256 [#436](https://github.com/vincenthz/hs-tls/pull/436) - Sort ciphersuites based on hardware-acceleration support [#439](https://github.com/vincenthz/hs-tls/pull/439) - Sending no_application_protocol [#440](https://github.com/vincenthz/hs-tls/pull/440) - Internal improvements [#426](https://github.com/vincenthz/hs-tls/pull/426) [#431](https://github.com/vincenthz/hs-tls/pull/431)