From 5e011a7c315a7fb79e8ed312878ff882dda5db63450946f0cbc5b58b5d2d1be2 Mon Sep 17 00:00:00 2001
From: Peter Simons <peter.simons@suse.com>
Date: Mon, 2 Apr 2018 15:06:32 +0000
Subject: [PATCH] osc copypac from project:devel:languages:haskell:lts:11
 package:ghc-tls revision:3, using keep-link

OBS-URL: https://build.opensuse.org/package/show/devel:languages:haskell/ghc-tls?expand=0&rev=37
---
 ghc-tls.changes | 146 +-----------------------------------------------
 1 file changed, 1 insertion(+), 145 deletions(-)

diff --git a/ghc-tls.changes b/ghc-tls.changes
index 9553f56..661de9f 100644
--- a/ghc-tls.changes
+++ b/ghc-tls.changes
@@ -1,150 +1,6 @@
 -------------------------------------------------------------------
-Mon Mar  5 03:01:38 UTC 2018 - psimons@suse.com
+Wed Mar 14 16:57:00 UTC 2018 - psimons@suse.com
 
 - Update tls to version 1.4.1.
   A more detailed change log is not available.
 
--------------------------------------------------------------------
-Thu Dec 21 19:10:36 UTC 2017 - psimons@suse.com
-
-- Update to version 1.4.0.
-  A more detailed change log is not available.
-
--------------------------------------------------------------------
-Thu Aug  3 15:38:38 UTC 2017 - psimons@suse.com
-
-- Updated with latest spec-cleaner version 0.9.8-8-geadfbbf.
-
--------------------------------------------------------------------
-Fri Jun 30 03:01:57 UTC 2017 - psimons@suse.com
-
-- Update to version 1.3.11.
-
--------------------------------------------------------------------
-Wed Apr 26 15:04:39 UTC 2017 - psimons@suse.com
-
-- Update to version 1.3.10 revision 2 with cabal2obs.
-
--------------------------------------------------------------------
-Mon Mar 27 12:38:43 UTC 2017 - psimons@suse.com
-
-- Update to version 1.3.10 revision 1 with cabal2obs.
-
--------------------------------------------------------------------
-Wed Jan 18 09:00:21 UTC 2017 - psimons@suse.com
-
-- Update to version 1.3.9 with cabal2obs.
-
--------------------------------------------------------------------
-Sun Jul 10 16:56:12 UTC 2016 - psimons@suse.com
-
-- Update to version 1.3.8 revision 0 with cabal2obs.
-
--------------------------------------------------------------------
-Fri May 13 12:53:41 UTC 2016 - mimi.vx@gmail.com
-
-- update to 1.3.8 
-
--------------------------------------------------------------------
-Wed May 11 15:35:33 UTC 2016 - mimi.vx@gmail.com
-
-- update to 1.3.7
-* Disable SHA384 based cipher, as they don't work properly yet.
-
--------------------------------------------------------------------
-Sun May  8 11:22:31 UTC 2016 - mimi.vx@gmail.com
-
-- update to 1.3.6
-* Add new ciphers
-* Improve some debugging and outputs
-
--------------------------------------------------------------------
-Sun Apr 10 19:02:03 UTC 2016 - mimi.vx@gmail.com
-
-- update to 1.3.5
-* Fix a bug with ECDHE based cipher where serialization
-* Improve tests
-* Debugging: Add a way to print random seed and a way to side-load 
-    a seed for replayability
-
--------------------------------------------------------------------
-Tue Dec 15 20:50:00 UTC 2015 - mimi.vx@gmail.com
-
-- update to 1.3.4
-* Add support for Hans (Haskell Network Stack)
-* Add support for ECDSA signature
-* Add support for ECDSA-ECDHE Cipher
-* Improve parsing of ECC related structure
-
--------------------------------------------------------------------
-Mon Aug 31 08:14:19 UTC 2015 - mimi.vx@gmail.com
-
-- update to 1.3.2
-* Add cipher suites for forward secrecy on more clients (Aaron Friel)
-* Maintain more handshake information to be queried by protocol (Adam Wick)
-* handle SCSV on client and server side (Kazu Yamamoto)
-* Cleanup renegotiation logic (Kazu Yamamoto)
-* Various testing improvements with the openssl test parts
-* Cleanup AEAD handling for future support of other ciphers
-
--------------------------------------------------------------------
-Thu Aug  6 20:43:26 UTC 2015 - mimi.vx@gmail.com
-
-- update to 1.3.1
-* Repair DHE RSA handling on the cipher by creating signature properly
-* modernize the crypto stack by using cryptonite.
-
--------------------------------------------------------------------
-Sun Jun 21 16:56:51 UTC 2015 - mimi.vx@gmail.com
-
-- update to 1.2.18
-* add more tests (network, local)
-* cleanup cipher / bulk code, certificate verify / creation, and digitall signed handling
-* fix handling of DHE ciphers with MS SSL stack that serialize leading zero.
-
--------------------------------------------------------------------
-Thu Apr 23 18:32:31 UTC 2015 - mimi.vx@gmail.com
-
-- update to 1.2.17
-* Fix an issue with stream cipher not correctly calculating the internal state,
-      resulting systematically in bad record mac failure during handshake
-* support chain certificate in credentials
-* adding ALPN extension
-* adding support for AEAD, and particularly AES128-GCM
-* Adding support for ECDH
-* Do not support SSL3 by default for security reason.
-* add EnumSafe8 and 16 for specific sized Enum instance that are safer
-* export signatureAndHash parser/encoder
-* add a "known" list of extensions
-* add SignatureAlgorithms extension
-* add Heartbeat extension
-* add support for EC curves and point format extensions
-* add preliminary SessionTicket extension
-* Propagate asynchronous exception
-* Export TLSParams and HasBackend type names
-* Added FlexibleContexts flag required by ghc-7.9
-* debug: add support for specifying the timeout length in milliseconds.
-* debug: add support for 3DES in simple client
-* add support for 3DES-EDE-CBC-SHA1 (cipher 0xa)
-* repair retrieve certificate validation, and improve fingerprints
-* remove groom from dependency
-* make RecordM an instance of Applicative
-* Fixes the Error_EOF partial pattern match error in exception handling
-* Fixed socket backend endless loop when the server does not close connection
-     properly at the TLS level with the close notify alert.
-* Catch Error_EOF in recvData and return empty data.
-* Fixed Server key exchange data being parsed without the correct
-    context, leading to not knowing how to parse the structure.
-    The bug happens on efficient server that happens to send the ServerKeyXchg
-    message together with the ServerHello in the same handshake packet.
-    This trigger parsing of all the messages without having set the pending cipher.
-    Delay parsing, when this happen, until we know what to do with it.
-* Fixed unrecognized name non-fatal alert after client hello.
-* Add SSL3 to the supported list of version by default.
-* Fixed handshake records not being able to span multiples records.
-
--------------------------------------------------------------------
-Mon Oct  7 07:12:32 UTC 2013 - sbahling@suse.com
-
-- Initial package - version 1.1.5
-