úÎr¥o›     None]n‹GAbstract type representing the configuration settings for a TLS server.Use   to construct a  value, and   to update it.GAbstract type representing the configuration settings for a TLS client.Use  or  to obtain a  value.Get the system default  for a particular .:Defaults: No client credentials, system certificate store.See 0 to better understand the default settings used.Make defaults .(Certificate chain validation is done by  from the Data.X509.Validation module.:The Server Name Indication (SNI) TLS extension is enabled.4The supported cipher suites are those enumerated by %, in decreasing order of preference. Secure renegotiation is enabled. Only the TLS 1.1 and TLS 1.2$ protocols are supported by default.7If you are unsatisfied with any of these settings, use  to change them.)Update advanced TLS client configuration .See the  Network.TLS module for details.A # into the TLS client configuration .See the  Network.TLS and the lens package for details.  Make default .4The supported cipher suites are those enumerated by X, in decreasing order of preference. The cipher suite preferred by the server is used.pSecure renegotiation initiated by the server is enabled, but renegotiation initiated by the client is disabled. Only the TLS 1.1 and TLS 1.2$ protocols are supported by default.7If you are unsatisfied with any of these settings, use   to change them. )Update advanced TLS server configuration .See the  Network.TLS module for details. A # into the TLS server configuration  . See the  Network.TLS and the lens package for details. ~Start a TLS-secured TCP server that accepts incoming connections and handles each of them concurrently, in different threads.ÿJAny acquired network resources are properly closed and discarded when done or in case of exceptions. This function binds a listening socket, accepts an incoming connection, performs a TLS handshake and then safely closes the connection when done or in case of exceptions. You don't need to perform any of those steps manually. AAccepts a single incomming TLS-secured TCP connection and use it.üA TLS handshake is performed immediately after establishing the TCP connection and the TLS and TCP connections are properly closed when done or in case of exceptions. If you need to manage the lifetime of the connection resources yourself, then use  instead.Like  a, except it uses a different thread to performs the TLS handshake and run the given computation.:Connect to a TLS-secured TCP server and use the connectionüA TLS handshake is performed immediately after establishing the TCP connection and the TLS and TCP connections are properly closed when done or in case of exceptions. If you need to manage the lifetime of the connection resources yourself, then use  instead.CEstalbishes a TCP connection to a remote server and returns a TLS ) configured on top of it using the given +. The remote end address is also returned.Prefer to use # if you will be using the obtained  within a limited scope.5You need to perform a TLS handshake on the resulting v before using it for communication purposes, and gracefully close the TLS and TCP connections afterwards using. The ,  and  can help you with that.Make a client-side TLS 2 for the given settings, on top of the given TCP  connected to the remote end.5Accepts an incoming TCP connection and returns a TLS * configured on top of it using the given +. The remote end address is also returned.Prefer to use  # if you will be using the obtained  within a limited scope.5You need to perform a TLS handshake on the resulting v before using it for communication purposes, and gracefully close the TLS and TCP connections afterwards using. The ,  and  can help you with that.Make a server-side TLS 2 for the given settings, on top of the given TCP  connected to the remote end.%Perform a TLS handshake on the given T, then perform the given action and at last gracefully close the TLS session using  .UThis function does not close the underlying TCP connection when done. Prefer to use  or 6 if you need that behavior. Otherwise, you must call ! yourself at some point.Like ;, except it also fully closes the TCP connection when done. Similar to >, except it performs the all the IO actions in a new thread.Use this instead of forking 2 yourself, as that won't give the right behavior.(Receives decrypted bytes from the given  . Returns " on EOF.Up to 16384* decrypted bytes will be received at once.Encrypts the given strict # and sends it through the .$Like   from the  Network.TLS module, except it ignores %K errors which might happen if the remote peer closes the connection first.&Makes an TLS context ' from a .  ~ ((, #) ‹Identification of the connection consisting of the fully qualified host name for the server (e.g. www.example.com) and an optional suffix.²It is important that the hostname part is properly filled for security reasons, as it allow to properly associate the remote side with the given certificate during a handshake.ÜThe suffix is used to identity a certificate per service on a specific host. For example, a same host might have different certificates on differents ports (443 and 995). For TCP connections, it's recommended to use: :port, or :service for the blob (e.g., @":443",  ":https"@).[Credentials to provide to the server if requested. Only credentials matching the server's ) will be submitted.'Initial credentials can be loaded with **CAs used to verify the server certificate.Use ++ to obtain the operating system's defaults. Server credential.*CAs used to verify the client certificate.QIf specified, then a valid client certificate will be expected during handshake.Use ++ to obtain the operating system's defaults.  TLS settings.Preferred host to bind.Service port to bind.½Computation to run in a different thread once an incomming connection is accepted and a TLS-secured communication is established. Takes the TLS connection context and remote end address.  TLS settings.Listening and bound socket.½Computation to run in a different thread once an incomming connection is accepted and a TLS-secured communication is established. Takes the TLS connection context and remote end address. TLS settings.Listening and bound socket.½Computation to run in a different thread once an incomming connection is accepted and a TLS-secured communication is established. Takes the TLS connection context and remote end address. TLS settings.Server hostname.Server service port.‘Computation to run after establishing TLS-secured TCP connection to the remote server. Takes the TLS connection context and remote end address. TLS settings.Server hostname.Service port to bind. TLS settings.Listening and bound socket.#(,-./012    34567  !"#$%&'%() *+ ,- *. /012 34 /56789:;<6=>? @ABCDEF GHIJBK1L MN MO MP MQ MRSTU-network-simple-tls-0.3-G4XTAMFWZu88P56HtPqEDNNetwork.Simple.TCP.TLS Control.LensLensTParams&network-2.6.3.2-Elf6Dxkfz0iKjb1zv5eBTPNetwork.Socket.Internal withSocketsDo+network-simple-0.4.1-9BpOfT2R0S0HHLfE7aXmcpNetwork.Simple.TCPlisten tls-1.4.1-EIHS0XyRJM6IayR0Dru77vNetwork.TLS.Credentials CredentialsServerSettingsClientSettingsgetDefaultClientSettingsmakeClientSettingsupdateClientParams clientParamsmakeServerSettingsupdateServerParams serverParamsserveaccept acceptForkconnect connectTlsmakeClientContext acceptTlsmakeServerContextuseTlsuseTlsThenCloseuseTlsThenCloseForkrecvsend-x509-validation-1.6.10-EPNAdUipHaKKsNrofRWN05Data.X509.Validation.Types ServiceIDData.X509.ValidationvalidateDefaultNetwork.TLS.Extra.Cipherciphersuite_defaultNetwork.TLS.Parameters ClientParamsciphersuite_strongNetwork.TLS.Context.InternalContextNetwork.Socket.TypesSocketNetwork.TLS.Corebye contextClosebaseGHC.BaseNothingbytestring-0.10.8.2Data.ByteString.Internal ByteString silentByeForeign.C.ErrorePIPE socketBackendNetwork.TLS.BackendBackendNetwork.SocketHostName!x509-1.7.3-Kq2Ytdck5ntC7pghowb4tkData.X509.DistinguishedNameDistinguishedNamecredentialLoadX509(x509-system-1.6.6-1e9pRL6o09aENRGE61FEPESystem.X509.UnixgetSystemCertificateStore ServiceNameSockAddrNetwork.Simple.InternalHostPreferenceHostAnyHostIPv4HostIPv6HostunServerSettingsunClientSettings