19 Commits

Author SHA1 Message Date
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00
kili
b0a4a2c130 Fix plist and bump 2014-12-20 01:43:17 +00:00
jasper
f8f5401c99 drop maintainership of ports i haven't used in a long time and have no use for anymore 2014-09-08 17:04:50 +00:00
ajacoutot
e3edfdd3aa Remove SECURITY files. They have served their purpose in the past but
have become pretty useless nowadays (and the pkg tools do not display
them anyway).
Some which contained valuable information have been turned into READMEs.

ok jasper@ sthen@
input/ok naddy@
2013-11-07 07:08:59 +00:00
kili
bee21f147b Bump after update of textproc/hs-attoparsec.
Greetings to espie@ (btw: it's ghc that sucks, not haskell).
2013-05-04 21:17:17 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
kili
be7ce949cf Regenerate plist for profiling libs. 2013-01-20 17:56:05 +00:00
kili
2acb3c8385 Move the @exec and @unexec lines running the {,un}register.sh scripts
and the line with the unregister.sh script down to the bottom of
the plist. Silences all the blurb about ".../*.haddock doesn't exist
or isn't a file."
2012-10-28 23:24:28 +00:00
kili
1ced715c56 Bump. 2012-04-28 19:34:54 +00:00
kili
e1cdb4c06a This needs a bump after the update of hs-attoparsec. 2012-01-21 12:03:15 +00:00
kili
2e0de0ca17 Update to hs-certificate-0.8.1.
ok (portswise) ajacoutot@, sthen@
2012-01-20 20:34:21 +00:00
espie
46d3548829 normalize pkgpath 2011-09-16 11:41:38 +00:00
jasper
7020d8df39 - update to 0.6.1 2011-05-03 19:04:04 +00:00
kili
ab954ec4cf New distinfo after DIST_SUBDIR change in ghc.port.mk. 2011-04-23 20:22:13 +00:00
kili
67047fb4b8 Depend on and use mtl-2 from devel/hs-mtl. 2011-04-23 14:32:50 +00:00
jasper
71a13fe024 this doesn't depend on hs-AES anymore, instead it's using hs-cryptocipher 2011-04-12 11:15:20 +00:00
jasper
ef071f94f0 - update to 0.6.0 2011-04-12 10:43:19 +00:00
kili
f20fe3fa2a Bump after ghc update. 2011-04-11 14:45:14 +00:00
jasper
548620df41 import hs-tls 0.3.1
Native TLS protocol implementation, focusing on purity and more
type-checking.
Currently implement the SSL3.0, TLS1.0 and TLS1.1 protocol. Not yet
properly secure and missing some features. Do not yet use as replacement
to more mature implementation.
Only RSA supported as Key exchange for now.

ok kili@
2010-12-09 16:07:50 +00:00