hs-tls/Network/TLS
Vincent Hanquez c6154ae126 fix a bug with SSL3 during the creation of crypt state.
The test for partition was too strict, and the SSL3 generator
is quite likely to generate more data whereas the TLS generator
generate the correct amount every time.

now bigger bytestring than necessary are now valid as well.
2011-02-20 08:49:23 +00:00
..
Cap.hs add a cap file to differenciate protocol version capabilities. 2010-09-26 08:46:09 +01:00
Cipher.hs use AES in cryptocipher 0.2.5 2011-02-20 08:13:53 +00:00
Client.hs move to certificate >= 0.6 2011-02-20 08:35:14 +00:00
Compression.hs initial import 2010-09-09 22:47:19 +01:00
Crypto.hs Generalize key exchange and use in-house RSA. 2010-11-04 19:10:00 +00:00
MAC.hs depends on cryptohash 0.6 and adapt to the new modules location. 2010-10-24 12:02:41 +01:00
Packet.hs move to certificate >= 0.6 2011-02-20 08:35:14 +00:00
Receiving.hs add a dedicated fromJust 2011-02-20 08:37:19 +00:00
Sending.hs add a dedicated fromJust 2011-02-20 08:37:19 +00:00
Server.hs move to certificate >= 0.6 2011-02-20 08:35:14 +00:00
SRandom.hs use AES in cryptocipher 0.2.5 2011-02-20 08:13:53 +00:00
State.hs add a dedicated fromJust 2011-02-20 08:37:19 +00:00
Struct.hs move to certificate >= 0.6 2011-02-20 08:35:14 +00:00
Util.hs fix a bug with SSL3 during the creation of crypt state. 2011-02-20 08:49:23 +00:00
Wire.hs use strict bytestring instead of lazy bytestring. 2010-09-26 10:34:47 +01:00