From 835a56a86c90319399b98e915be0be5846c11dfaf4cbf608ec570a7b53d9807c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ond=C5=99ej=20S=C3=BAkup?= Date: Sat, 28 Dec 2019 14:42:13 +0000 Subject: [PATCH 1/3] osc copypac from project:devel:languages:haskell:ghc-8.8.x package:ghc-tls revision:3, using keep-link OBS-URL: https://build.opensuse.org/package/show/devel:languages:haskell/ghc-tls?expand=0&rev=58 --- ghc-tls.changes | 214 +----------------------------------------------- 1 file changed, 3 insertions(+), 211 deletions(-) diff --git a/ghc-tls.changes b/ghc-tls.changes index c85e2c4..19ed611 100644 --- a/ghc-tls.changes +++ b/ghc-tls.changes @@ -1,10 +1,5 @@ ------------------------------------------------------------------- -Fri Nov 8 16:15:03 UTC 2019 - Peter Simons - -- Drop obsolete group attributes. - -------------------------------------------------------------------- -Tue Oct 15 02:03:13 UTC 2019 - psimons@suse.com +Tue Oct 15 02:02:59 UTC 2019 - psimons@suse.com - Update tls to version 1.5.2. Upstream has edited the change log file since the last release in @@ -13,210 +8,7 @@ Tue Oct 15 02:03:13 UTC 2019 - psimons@suse.com http://hackage.haskell.org/package/tls-1.5.2/src/CHANGELOG.md ------------------------------------------------------------------- -Sun Jul 28 02:01:08 UTC 2019 - psimons@suse.com +Wed Aug 28 17:31:17 UTC 2019 - psimons@suse.com -- Update tls to version 1.5.1. - ## Version 1.5.1 +- Add tls at version 1.5.1. - - Post-handshake authentication [#363](https://github.com/vincenthz/hs-tls/pull/363) - - Fixing memory leak [#366](https://github.com/vincenthz/hs-tls/pull/366) - - Improve version negotiation [#368](https://github.com/vincenthz/hs-tls/pull/368) - - Don't send 0-RTT data when ticket is expired [#370](https://github.com/vincenthz/hs-tls/pull/370) - - Handshake packet fragmentation [#371](https://github.com/vincenthz/hs-tls/pull/371) - -------------------------------------------------------------------- -Sun Jun 2 02:01:34 UTC 2019 - psimons@suse.com - -- Update tls to version 1.5.0. - Upstream has edited the change log file since the last release in - a non-trivial way, i.e. they did more than just add a new entry - at the top. You can review the file at: - http://hackage.haskell.org/package/tls-1.5.0/src/CHANGELOG.md - -------------------------------------------------------------------- -Sat Oct 20 11:32:09 UTC 2018 - Peter Simons - -- Use https URL to refer to bugs.opensuse.org. - -------------------------------------------------------------------- -Wed Jul 18 14:26:45 UTC 2018 - psimons@suse.com - -- Cosmetic: replace tabs with blanks, strip trailing white space, - and update copyright headers with spec-cleaner. - -------------------------------------------------------------------- -Mon May 14 17:02:11 UTC 2018 - psimons@suse.com - -- Update tls to version 1.4.1. - - Enable X25519 in default parameters [#265](https://github.com/vincenthz/hs-tls/pull/265) - - Checking EOF in bye [#262] (https://github.com/vincenthz/hs-tls/pull/262) - - Improving validation in DH key exchange [#256](https://github.com/vincenthz/hs-tls/pull/256) - - Handle TCP reset during handshake [#251](https://github.com/vincenthz/hs-tls/pull/251) - - Accepting hlint suggestions. - - Wrap renegotiation failures with HandshakeFailed [#237](https://github.com/vincenthz/hs-tls/pull/237) - - Improve selection of server certificate and use "signature_algorithms" extension [#236](https://github.com/vincenthz/hs-tls/pull/236) - - Change Bytes to ByteString and deprecate the Bytes type alias [#230](https://github.com/vincenthz/hs-tls/pull/230) - - Session compression and SNI [#223](https://github.com/vincenthz/hs-tls/pull/223) - - Deprecating ciphersuite_medium. Putting WARNING to ciphersuite_all since this includes RC4 [#153](https://github.com/vincenthz/hs-tls/pull/153) [#222](https://github.com/vincenthz/hs-tls/pull/222) - - Removing NPN [#214](https://github.com/vincenthz/hs-tls/pull/214) - - Supporting RSAPSS defined in TLS 1.3 [#207](https://github.com/vincenthz/hs-tls/pull/207) - - Supporting X25519 and X448 in the IES style. [#205](https://github.com/vincenthz/hs-tls/pull/205) - - Strip leading zeros in DHE premaster secret [#201](https://github.com/vincenthz/hs-tls/pull/201) - - RSASSA-PSS signatures can be enabled with `supportedHashSignatures`. This - uses assignments from TLS 1.3, for example `(HashIntrinsic, SignatureRSApssSHA256)`. - - Diffie-Hellman with elliptic curves X25519 and X448: This can be enabled with - `supportedGroups`, which also gives control over curve preference. - - ECDH with curve P-256 now uses optimized C implementation from package `cryptonite`. - - API CHANGES: - - - Cipher list `ciphersuite_medium` is now deprecated, users are advised to use - `ciphersuite_default` or `ciphersuite_strong`. List `ciphersuite_all` is kept - for compatibility with old servers but this is discouraged and generates a - warning (this includes RC4 ciphers, see [#153](https://github.com/vincenthz/hs-tls/pull/153) - for reference). - - Support for NPN (Next Protocol Negotiation) has been removed. The replacement - is ALPN (Application-Layer Protocol Negotiation). - - Data type `SessionData` now contains fields for compression algorithm and - client SNI. A `SessionManager` implementation that serializes/deserializes - `SessionData` values must deal with the new fields. - - Module `Network.TLS` exports a type alias named `Bytes` which is now deprecated. - The replacement is to use strict `ByteString` directly. - -------------------------------------------------------------------- -Thu Aug 3 15:38:38 UTC 2017 - psimons@suse.com - -- Updated with latest spec-cleaner version 0.9.8-8-geadfbbf. - -------------------------------------------------------------------- -Fri Jun 30 03:01:57 UTC 2017 - psimons@suse.com - -- Update to version 1.3.11. - -------------------------------------------------------------------- -Wed Apr 26 15:04:39 UTC 2017 - psimons@suse.com - -- Update to version 1.3.10 revision 2 with cabal2obs. - -------------------------------------------------------------------- -Mon Mar 27 12:38:43 UTC 2017 - psimons@suse.com - -- Update to version 1.3.10 revision 1 with cabal2obs. - -------------------------------------------------------------------- -Wed Jan 18 09:00:21 UTC 2017 - psimons@suse.com - -- Update to version 1.3.9 with cabal2obs. - -------------------------------------------------------------------- -Sun Jul 10 16:56:12 UTC 2016 - psimons@suse.com - -- Update to version 1.3.8 revision 0 with cabal2obs. - -------------------------------------------------------------------- -Fri May 13 12:53:41 UTC 2016 - mimi.vx@gmail.com - -- update to 1.3.8 - -------------------------------------------------------------------- -Wed May 11 15:35:33 UTC 2016 - mimi.vx@gmail.com - -- update to 1.3.7 -* Disable SHA384 based cipher, as they don't work properly yet. - -------------------------------------------------------------------- -Sun May 8 11:22:31 UTC 2016 - mimi.vx@gmail.com - -- update to 1.3.6 -* Add new ciphers -* Improve some debugging and outputs - -------------------------------------------------------------------- -Sun Apr 10 19:02:03 UTC 2016 - mimi.vx@gmail.com - -- update to 1.3.5 -* Fix a bug with ECDHE based cipher where serialization -* Improve tests -* Debugging: Add a way to print random seed and a way to side-load - a seed for replayability - -------------------------------------------------------------------- -Tue Dec 15 20:50:00 UTC 2015 - mimi.vx@gmail.com - -- update to 1.3.4 -* Add support for Hans (Haskell Network Stack) -* Add support for ECDSA signature -* Add support for ECDSA-ECDHE Cipher -* Improve parsing of ECC related structure - -------------------------------------------------------------------- -Mon Aug 31 08:14:19 UTC 2015 - mimi.vx@gmail.com - -- update to 1.3.2 -* Add cipher suites for forward secrecy on more clients (Aaron Friel) -* Maintain more handshake information to be queried by protocol (Adam Wick) -* handle SCSV on client and server side (Kazu Yamamoto) -* Cleanup renegotiation logic (Kazu Yamamoto) -* Various testing improvements with the openssl test parts -* Cleanup AEAD handling for future support of other ciphers - -------------------------------------------------------------------- -Thu Aug 6 20:43:26 UTC 2015 - mimi.vx@gmail.com - -- update to 1.3.1 -* Repair DHE RSA handling on the cipher by creating signature properly -* modernize the crypto stack by using cryptonite. - -------------------------------------------------------------------- -Sun Jun 21 16:56:51 UTC 2015 - mimi.vx@gmail.com - -- update to 1.2.18 -* add more tests (network, local) -* cleanup cipher / bulk code, certificate verify / creation, and digitall signed handling -* fix handling of DHE ciphers with MS SSL stack that serialize leading zero. - -------------------------------------------------------------------- -Thu Apr 23 18:32:31 UTC 2015 - mimi.vx@gmail.com - -- update to 1.2.17 -* Fix an issue with stream cipher not correctly calculating the internal state, - resulting systematically in bad record mac failure during handshake -* support chain certificate in credentials -* adding ALPN extension -* adding support for AEAD, and particularly AES128-GCM -* Adding support for ECDH -* Do not support SSL3 by default for security reason. -* add EnumSafe8 and 16 for specific sized Enum instance that are safer -* export signatureAndHash parser/encoder -* add a "known" list of extensions -* add SignatureAlgorithms extension -* add Heartbeat extension -* add support for EC curves and point format extensions -* add preliminary SessionTicket extension -* Propagate asynchronous exception -* Export TLSParams and HasBackend type names -* Added FlexibleContexts flag required by ghc-7.9 -* debug: add support for specifying the timeout length in milliseconds. -* debug: add support for 3DES in simple client -* add support for 3DES-EDE-CBC-SHA1 (cipher 0xa) -* repair retrieve certificate validation, and improve fingerprints -* remove groom from dependency -* make RecordM an instance of Applicative -* Fixes the Error_EOF partial pattern match error in exception handling -* Fixed socket backend endless loop when the server does not close connection - properly at the TLS level with the close notify alert. -* Catch Error_EOF in recvData and return empty data. -* Fixed Server key exchange data being parsed without the correct - context, leading to not knowing how to parse the structure. - The bug happens on efficient server that happens to send the ServerKeyXchg - message together with the ServerHello in the same handshake packet. - This trigger parsing of all the messages without having set the pending cipher. - Delay parsing, when this happen, until we know what to do with it. -* Fixed unrecognized name non-fatal alert after client hello. -* Add SSL3 to the supported list of version by default. -* Fixed handshake records not being able to span multiples records. - -------------------------------------------------------------------- -Mon Oct 7 07:12:32 UTC 2013 - sbahling@suse.com - -- Initial package - version 1.1.5 From 94f1d439fe70369e99d02733dc9ebb3aeac908d3fc44e13f1daba1a3926226c6 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Sun, 29 Dec 2019 02:03:56 +0000 Subject: [PATCH 2/3] osc copypac from project:devel:languages:haskell:ghc-8.6.x package:ghc-tls revision:9, using keep-link OBS-URL: https://build.opensuse.org/package/show/devel:languages:haskell/ghc-tls?expand=0&rev=59 --- ghc-tls.changes | 214 +++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 211 insertions(+), 3 deletions(-) diff --git a/ghc-tls.changes b/ghc-tls.changes index 19ed611..c85e2c4 100644 --- a/ghc-tls.changes +++ b/ghc-tls.changes @@ -1,5 +1,10 @@ ------------------------------------------------------------------- -Tue Oct 15 02:02:59 UTC 2019 - psimons@suse.com +Fri Nov 8 16:15:03 UTC 2019 - Peter Simons + +- Drop obsolete group attributes. + +------------------------------------------------------------------- +Tue Oct 15 02:03:13 UTC 2019 - psimons@suse.com - Update tls to version 1.5.2. Upstream has edited the change log file since the last release in @@ -8,7 +13,210 @@ Tue Oct 15 02:02:59 UTC 2019 - psimons@suse.com http://hackage.haskell.org/package/tls-1.5.2/src/CHANGELOG.md ------------------------------------------------------------------- -Wed Aug 28 17:31:17 UTC 2019 - psimons@suse.com +Sun Jul 28 02:01:08 UTC 2019 - psimons@suse.com -- Add tls at version 1.5.1. +- Update tls to version 1.5.1. + ## Version 1.5.1 + - Post-handshake authentication [#363](https://github.com/vincenthz/hs-tls/pull/363) + - Fixing memory leak [#366](https://github.com/vincenthz/hs-tls/pull/366) + - Improve version negotiation [#368](https://github.com/vincenthz/hs-tls/pull/368) + - Don't send 0-RTT data when ticket is expired [#370](https://github.com/vincenthz/hs-tls/pull/370) + - Handshake packet fragmentation [#371](https://github.com/vincenthz/hs-tls/pull/371) + +------------------------------------------------------------------- +Sun Jun 2 02:01:34 UTC 2019 - psimons@suse.com + +- Update tls to version 1.5.0. + Upstream has edited the change log file since the last release in + a non-trivial way, i.e. they did more than just add a new entry + at the top. You can review the file at: + http://hackage.haskell.org/package/tls-1.5.0/src/CHANGELOG.md + +------------------------------------------------------------------- +Sat Oct 20 11:32:09 UTC 2018 - Peter Simons + +- Use https URL to refer to bugs.opensuse.org. + +------------------------------------------------------------------- +Wed Jul 18 14:26:45 UTC 2018 - psimons@suse.com + +- Cosmetic: replace tabs with blanks, strip trailing white space, + and update copyright headers with spec-cleaner. + +------------------------------------------------------------------- +Mon May 14 17:02:11 UTC 2018 - psimons@suse.com + +- Update tls to version 1.4.1. + - Enable X25519 in default parameters [#265](https://github.com/vincenthz/hs-tls/pull/265) + - Checking EOF in bye [#262] (https://github.com/vincenthz/hs-tls/pull/262) + - Improving validation in DH key exchange [#256](https://github.com/vincenthz/hs-tls/pull/256) + - Handle TCP reset during handshake [#251](https://github.com/vincenthz/hs-tls/pull/251) + - Accepting hlint suggestions. + - Wrap renegotiation failures with HandshakeFailed [#237](https://github.com/vincenthz/hs-tls/pull/237) + - Improve selection of server certificate and use "signature_algorithms" extension [#236](https://github.com/vincenthz/hs-tls/pull/236) + - Change Bytes to ByteString and deprecate the Bytes type alias [#230](https://github.com/vincenthz/hs-tls/pull/230) + - Session compression and SNI [#223](https://github.com/vincenthz/hs-tls/pull/223) + - Deprecating ciphersuite_medium. Putting WARNING to ciphersuite_all since this includes RC4 [#153](https://github.com/vincenthz/hs-tls/pull/153) [#222](https://github.com/vincenthz/hs-tls/pull/222) + - Removing NPN [#214](https://github.com/vincenthz/hs-tls/pull/214) + - Supporting RSAPSS defined in TLS 1.3 [#207](https://github.com/vincenthz/hs-tls/pull/207) + - Supporting X25519 and X448 in the IES style. [#205](https://github.com/vincenthz/hs-tls/pull/205) + - Strip leading zeros in DHE premaster secret [#201](https://github.com/vincenthz/hs-tls/pull/201) + - RSASSA-PSS signatures can be enabled with `supportedHashSignatures`. This + uses assignments from TLS 1.3, for example `(HashIntrinsic, SignatureRSApssSHA256)`. + - Diffie-Hellman with elliptic curves X25519 and X448: This can be enabled with + `supportedGroups`, which also gives control over curve preference. + - ECDH with curve P-256 now uses optimized C implementation from package `cryptonite`. + + API CHANGES: + + - Cipher list `ciphersuite_medium` is now deprecated, users are advised to use + `ciphersuite_default` or `ciphersuite_strong`. List `ciphersuite_all` is kept + for compatibility with old servers but this is discouraged and generates a + warning (this includes RC4 ciphers, see [#153](https://github.com/vincenthz/hs-tls/pull/153) + for reference). + - Support for NPN (Next Protocol Negotiation) has been removed. The replacement + is ALPN (Application-Layer Protocol Negotiation). + - Data type `SessionData` now contains fields for compression algorithm and + client SNI. A `SessionManager` implementation that serializes/deserializes + `SessionData` values must deal with the new fields. + - Module `Network.TLS` exports a type alias named `Bytes` which is now deprecated. + The replacement is to use strict `ByteString` directly. + +------------------------------------------------------------------- +Thu Aug 3 15:38:38 UTC 2017 - psimons@suse.com + +- Updated with latest spec-cleaner version 0.9.8-8-geadfbbf. + +------------------------------------------------------------------- +Fri Jun 30 03:01:57 UTC 2017 - psimons@suse.com + +- Update to version 1.3.11. + +------------------------------------------------------------------- +Wed Apr 26 15:04:39 UTC 2017 - psimons@suse.com + +- Update to version 1.3.10 revision 2 with cabal2obs. + +------------------------------------------------------------------- +Mon Mar 27 12:38:43 UTC 2017 - psimons@suse.com + +- Update to version 1.3.10 revision 1 with cabal2obs. + +------------------------------------------------------------------- +Wed Jan 18 09:00:21 UTC 2017 - psimons@suse.com + +- Update to version 1.3.9 with cabal2obs. + +------------------------------------------------------------------- +Sun Jul 10 16:56:12 UTC 2016 - psimons@suse.com + +- Update to version 1.3.8 revision 0 with cabal2obs. + +------------------------------------------------------------------- +Fri May 13 12:53:41 UTC 2016 - mimi.vx@gmail.com + +- update to 1.3.8 + +------------------------------------------------------------------- +Wed May 11 15:35:33 UTC 2016 - mimi.vx@gmail.com + +- update to 1.3.7 +* Disable SHA384 based cipher, as they don't work properly yet. + +------------------------------------------------------------------- +Sun May 8 11:22:31 UTC 2016 - mimi.vx@gmail.com + +- update to 1.3.6 +* Add new ciphers +* Improve some debugging and outputs + +------------------------------------------------------------------- +Sun Apr 10 19:02:03 UTC 2016 - mimi.vx@gmail.com + +- update to 1.3.5 +* Fix a bug with ECDHE based cipher where serialization +* Improve tests +* Debugging: Add a way to print random seed and a way to side-load + a seed for replayability + +------------------------------------------------------------------- +Tue Dec 15 20:50:00 UTC 2015 - mimi.vx@gmail.com + +- update to 1.3.4 +* Add support for Hans (Haskell Network Stack) +* Add support for ECDSA signature +* Add support for ECDSA-ECDHE Cipher +* Improve parsing of ECC related structure + +------------------------------------------------------------------- +Mon Aug 31 08:14:19 UTC 2015 - mimi.vx@gmail.com + +- update to 1.3.2 +* Add cipher suites for forward secrecy on more clients (Aaron Friel) +* Maintain more handshake information to be queried by protocol (Adam Wick) +* handle SCSV on client and server side (Kazu Yamamoto) +* Cleanup renegotiation logic (Kazu Yamamoto) +* Various testing improvements with the openssl test parts +* Cleanup AEAD handling for future support of other ciphers + +------------------------------------------------------------------- +Thu Aug 6 20:43:26 UTC 2015 - mimi.vx@gmail.com + +- update to 1.3.1 +* Repair DHE RSA handling on the cipher by creating signature properly +* modernize the crypto stack by using cryptonite. + +------------------------------------------------------------------- +Sun Jun 21 16:56:51 UTC 2015 - mimi.vx@gmail.com + +- update to 1.2.18 +* add more tests (network, local) +* cleanup cipher / bulk code, certificate verify / creation, and digitall signed handling +* fix handling of DHE ciphers with MS SSL stack that serialize leading zero. + +------------------------------------------------------------------- +Thu Apr 23 18:32:31 UTC 2015 - mimi.vx@gmail.com + +- update to 1.2.17 +* Fix an issue with stream cipher not correctly calculating the internal state, + resulting systematically in bad record mac failure during handshake +* support chain certificate in credentials +* adding ALPN extension +* adding support for AEAD, and particularly AES128-GCM +* Adding support for ECDH +* Do not support SSL3 by default for security reason. +* add EnumSafe8 and 16 for specific sized Enum instance that are safer +* export signatureAndHash parser/encoder +* add a "known" list of extensions +* add SignatureAlgorithms extension +* add Heartbeat extension +* add support for EC curves and point format extensions +* add preliminary SessionTicket extension +* Propagate asynchronous exception +* Export TLSParams and HasBackend type names +* Added FlexibleContexts flag required by ghc-7.9 +* debug: add support for specifying the timeout length in milliseconds. +* debug: add support for 3DES in simple client +* add support for 3DES-EDE-CBC-SHA1 (cipher 0xa) +* repair retrieve certificate validation, and improve fingerprints +* remove groom from dependency +* make RecordM an instance of Applicative +* Fixes the Error_EOF partial pattern match error in exception handling +* Fixed socket backend endless loop when the server does not close connection + properly at the TLS level with the close notify alert. +* Catch Error_EOF in recvData and return empty data. +* Fixed Server key exchange data being parsed without the correct + context, leading to not knowing how to parse the structure. + The bug happens on efficient server that happens to send the ServerKeyXchg + message together with the ServerHello in the same handshake packet. + This trigger parsing of all the messages without having set the pending cipher. + Delay parsing, when this happen, until we know what to do with it. +* Fixed unrecognized name non-fatal alert after client hello. +* Add SSL3 to the supported list of version by default. +* Fixed handshake records not being able to span multiples records. + +------------------------------------------------------------------- +Mon Oct 7 07:12:32 UTC 2013 - sbahling@suse.com + +- Initial package - version 1.1.5 From c5bef7bc62c9d83fb1eb20dddbd96d46a69cab76a1274384103b2dd6d7029c86 Mon Sep 17 00:00:00 2001 From: Peter Simons Date: Fri, 10 Jan 2020 02:01:32 +0000 Subject: [PATCH 3/3] osc copypac from project:devel:languages:haskell:ghc-8.8.x package:ghc-tls revision:5, using keep-link OBS-URL: https://build.opensuse.org/package/show/devel:languages:haskell/ghc-tls?expand=0&rev=60 --- ghc-tls.changes | 29 +++++++++++++++++++++++++++++ ghc-tls.spec | 4 ++-- tls-1.5.2.tar.gz | 3 --- tls-1.5.3.tar.gz | 3 +++ 4 files changed, 34 insertions(+), 5 deletions(-) delete mode 100644 tls-1.5.2.tar.gz create mode 100644 tls-1.5.3.tar.gz diff --git a/ghc-tls.changes b/ghc-tls.changes index c85e2c4..4edc2ca 100644 --- a/ghc-tls.changes +++ b/ghc-tls.changes @@ -1,3 +1,32 @@ +------------------------------------------------------------------- +Thu Jan 9 03:03:11 UTC 2020 - psimons@suse.com + +- Update tls to version 1.5.3. + ## Version 1.5.3 + + - Additional verification regarding EC signatures + [#412](https://github.com/vincenthz/hs-tls/pull/412) + - Fixing ALPN + [#411](https://github.com/vincenthz/hs-tls/pull/411) + - Check SSLv3 padding length + [#410](https://github.com/vincenthz/hs-tls/pull/410) + - Exposing getClientCertificateChain + [#407](https://github.com/vincenthz/hs-tls/pull/407) + - Extended Master Secret + [#406](https://github.com/vincenthz/hs-tls/pull/406) + - Brushing up the documentation + [#404](https://github.com/vincenthz/hs-tls/pull/404) + [#408](https://github.com/vincenthz/hs-tls/pull/408) + - Improving tests + [#403](https://github.com/vincenthz/hs-tls/pull/403) + - Avoid calling onServerNameIndication twice with HRR + [#402](https://github.com/vincenthz/hs-tls/pull/402) + - Enable X448 and FFDHE groups + [#401](https://github.com/vincenthz/hs-tls/pull/401) + - Refactoring + [#400](https://github.com/vincenthz/hs-tls/pull/400) + [#399](https://github.com/vincenthz/hs-tls/pull/399) + ------------------------------------------------------------------- Fri Nov 8 16:15:03 UTC 2019 - Peter Simons diff --git a/ghc-tls.spec b/ghc-tls.spec index 20ee76b..470e411 100644 --- a/ghc-tls.spec +++ b/ghc-tls.spec @@ -1,7 +1,7 @@ # # spec file for package ghc-tls # -# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -19,7 +19,7 @@ %global pkg_name tls %bcond_with tests Name: ghc-%{pkg_name} -Version: 1.5.2 +Version: 1.5.3 Release: 0 Summary: TLS/SSL protocol native implementation (Server and Client) License: BSD-3-Clause diff --git a/tls-1.5.2.tar.gz b/tls-1.5.2.tar.gz deleted file mode 100644 index 8827b7f..0000000 --- a/tls-1.5.2.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:eb90db5034baac136b1fc5f307e6ec89adf3d1918ed1f1bc9f20368d55984330 -size 145694 diff --git a/tls-1.5.3.tar.gz b/tls-1.5.3.tar.gz new file mode 100644 index 0000000..2c0507c --- /dev/null +++ b/tls-1.5.3.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0c9c4af3ec46fe6633aa22155d44a79d521fa8cfe14ec6ee40af053a53e34a9c +size 149838