ghc-hackage-security-devel-0.5.3.0-lp151.1.2.x86_64.rpm


Advertisement

Description

ghc-hackage-security-devel - Haskell hackage-security library development files

Property Value
Distribution openSUSE Leap 15.1
Repository openSUSE Oss all
Package filename ghc-hackage-security-devel-0.5.3.0-lp151.1.2.x86_64.rpm
Package name ghc-hackage-security-devel
Package version 0.5.3.0
Package release lp151.1.2
Package architecture x86_64
Package type rpm
Category Development/Libraries/Haskell
Homepage https://hackage.haskell.org/package/hackage-security
License BSD-3-Clause
Maintainer -
Download size 1.12 MB
Installed size 14.76 MB
This package provides the Haskell hackage-security library development
files.

Alternatives

Package Version Architecture Repository
ghc-hackage-security-devel - - -

Requires

Name Value
ghc-compiler = 8.6.4
ghc-devel(Cabal-2.4.0.1) -
ghc-devel(base-4.12.0.0) -
ghc-devel(base16-bytestring-0.1.1.6-17atVnUhDnM13pAkKbwL6I) -
ghc-devel(base64-bytestring-1.0.0.2-9zRsxWrEm5zGbLjNlDas) -
ghc-devel(bytestring-0.10.8.2) -
ghc-devel(containers-0.6.0.1) -
ghc-devel(cryptohash-sha256-0.11.101.0-4hEdGCusAXMBLiu8h413L1) -
ghc-devel(directory-1.3.3.0) -
ghc-devel(ed25519-0.0.5.0-JRZm9qkjuKdJzhMNs9MSTR) -
ghc-devel(filepath-1.4.2.1) -
ghc-devel(ghc-prim-0.5.3) -
ghc-devel(mtl-2.2.2) -
ghc-devel(network-2.8.0.0-AkCJm1aNSYz7ekXKYyI0pF) -
ghc-devel(network-uri-2.6.1.0-K75fCYvLQE41EntOQ30cqK) -
ghc-devel(parsec-3.1.13.0) -
ghc-devel(pretty-1.1.3.6) -
ghc-devel(tar-0.5.1.0-HaIVxa1LuWJqqT6yxHWqZ) -
ghc-devel(template-haskell-2.14.0.0) -
ghc-devel(time-1.8.0.2) -
ghc-devel(transformers-0.5.6.2) -
ghc-devel(zlib-0.6.2-BdOecmQ0rL1HOiGypdSgxY) -
ghc-hackage-security = 0.5.3.0-lp151.1.2

Provides

Name Value
ghc-devel(hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz) -
ghc-hackage-security-devel = 0.5.3.0-lp151.1.2
ghc-hackage-security-devel(x86-64) = 0.5.3.0-lp151.1.2

Download

Type URL
Mirror widehat.opensuse.org
Binary Package ghc-hackage-security-devel-0.5.3.0-lp151.1.2.x86_64.rpm
Source Package ghc-hackage-security-0.5.3.0-lp151.1.2.src.rpm

Install Howto

Install ghc-hackage-security-devel rpm package:

# zypper install ghc-hackage-security-devel

Files

Path
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Prelude.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Prelude.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Prelude.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/libHShackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz.a
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/libHShackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz_p.a
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/JSON.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/JSON.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/JSON.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Server.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Server.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Server.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Formats.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Formats.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Formats.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Verify.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Verify.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Verify.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Cache.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Cache.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Cache.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/HttpLib.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/HttpLib.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/HttpLib.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Local.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Local.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Local.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Remote.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Remote.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Client/Repository/Remote.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key/Env.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key/Env.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Key/Env.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Common.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Common.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Common.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileInfo.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileInfo.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileInfo.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileMap.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileMap.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/FileMap.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Header.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Header.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Header.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Mirrors.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Mirrors.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Mirrors.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Paths.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Paths.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Paths.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Patterns.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Patterns.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Patterns.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Root.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Root.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Root.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Signed.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Signed.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Signed.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Snapshot.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Snapshot.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Snapshot.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Targets.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Targets.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Targets.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Timestamp.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Timestamp.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Timestamp.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Cache.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Cache.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Cache.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Index.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Index.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Index.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Repo.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Repo.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/TUF/Layout/Repo.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted/TCB.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted/TCB.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Trusted/TCB.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Base64.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Base64.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Base64.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Checked.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Checked.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Checked.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Exit.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Exit.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Exit.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/FileLock.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/FileLock.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/FileLock.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/IO.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/IO.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/IO.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/JSON.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/JSON.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/JSON.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Lens.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Lens.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Lens.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Path.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Path.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Path.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Pretty.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Pretty.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Pretty.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Some.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Some.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Some.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Stack.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Stack.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/Stack.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/TypedEmbedded.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/TypedEmbedded.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Hackage/Security/Util/TypedEmbedded.p_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Text/
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Text/JSON/Canonical.dyn_hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Text/JSON/Canonical.hi
/usr/lib64/ghc-8.6.4/hackage-security-0.5.3.0-TM202UyM3V9WvHIUmcQVz/Text/JSON/Canonical.p_hi
/usr/lib64/ghc-8.6.4/package.conf.d/hackage-security-0.5.3.0.conf
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Formats.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Repository-Cache.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Repository-HttpLib.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Repository-Local.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Repository-Remote.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Repository.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client-Verify.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Client.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-JSON.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Key-Env.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Server.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-TUF-FileMap.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Trusted.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-Checked.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-IO.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-Lens.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-Path.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-Pretty.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Hackage-Security-Util-Some.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/Text-JSON-Canonical.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-33.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-60.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-A.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-All.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-B.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-C.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-D.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-E.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-F.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-G.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-H.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-I.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-J.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-K.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-L.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-M.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-N.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-O.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-P.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-R.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-S.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-T.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-U.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-V.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index-W.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/doc-index.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/hackage-security.haddock
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/hackage-security.txt
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/haddock-bundle.min.js
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/hslogo-16.png
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/index.html
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/meta.json
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/minus.gif
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/ocean.css
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/plus.gif
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/quick-jump.css
/usr/share/doc/ghc-8.6.4/html/libraries/hackage-security-0.5.3.0/synopsis.png
/usr/share/doc/packages/ghc-hackage-security-devel/ChangeLog.md

Changelog

2018-10-19 - Peter Simons <psimons@suse.com>
- Update Cabal build instructions to support ghc-8.6.1.
2018-08-07 - psimons@suse.com
- Update Cabal build information to support Cabal 2.4.x.
2018-07-18 - psimons@suse.com
- Cosmetic: replace tabs with blanks, strip trailing white space,
and update copyright headers with spec-cleaner.
2018-07-18 - psimons@suse.com
- Revise cabal build file to specify more accurate dependencies.
2018-05-14 - psimons@suse.com
- Update hackage-security to version 0.5.3.0.
* Use `flock(2)`-based locking where available
(compat-shim taken from `cabal-install`'s code-base) (#207)
* Improve handling of async exceptions (#187)
* Detect & recover from local corruption of uncompressed index tarball (#196)
* Support `base-4.11`
2017-08-03 - psimons@suse.com
- Updated with latest spec-cleaner version 0.9.8-8-geadfbbf.
2017-05-22 - psimons@suse.com
- Update to version 0.5.2.2 revision 4 with cabal2obs.
2017-04-19 - psimons@suse.com
- Update to version 0.5.2.2 revision 3 with cabal2obs.
2017-02-20 - psimons@suse.com
- Update to version 0.5.2.2 revision 2 with cabal2obs.
2016-12-28 - psimons@suse.com
- Update to version 0.5.2.2 revision 1 with cabal2obs.

See Also

Package Description
ghc-haddock-library-1.7.0-lp151.1.2.x86_64.rpm Library exposing some functionality of Haddock
ghc-haddock-library-devel-1.7.0-lp151.1.2.x86_64.rpm Haskell haddock-library library development files
ghc-hashable-1.2.7.0-lp151.1.2.x86_64.rpm A class for types that can be converted to a hash value
ghc-hashable-devel-1.2.7.0-lp151.1.2.x86_64.rpm Haskell hashable library development files
ghc-haskeline-0.7.4.3-lp151.3.13.x86_64.rpm Haskell haskeline library
ghc-haskeline-devel-0.7.4.3-lp151.3.13.x86_64.rpm Haskell haskeline library development files
ghc-haskell-src-exts-1.21.0-lp151.1.2.x86_64.rpm Manipulating Haskell source: abstract syntax, lexer, parser, and pretty-printer
ghc-haskell-src-exts-devel-1.21.0-lp151.1.2.x86_64.rpm Haskell haskell-src-exts library development files
ghc-hinotify-0.4-lp151.1.2.x86_64.rpm Haskell binding to inotify
ghc-hinotify-devel-0.4-lp151.1.2.x86_64.rpm Haskell hinotify library development files
ghc-hostname-1.0-lp151.3.2.x86_64.rpm A very simple package providing a cross-platform means of determining the hostname
ghc-hostname-devel-1.0-lp151.3.2.x86_64.rpm Haskell hostname library development files
ghc-hourglass-0.2.12-lp151.1.2.x86_64.rpm Simple performant time related library
ghc-hourglass-devel-0.2.12-lp151.1.2.x86_64.rpm Haskell hourglass library development files
ghc-hpack-0.31.1-lp151.1.4.x86_64.rpm Haskell hpack library
Advertisement
Advertisement