úÎHûE 6      !"#$%&'()*+,-./012345(c) 2016 Al ZohaliBSD3Al Zohali <zohl@fmap.me> experimentalNone!"%&,0:DLRT16Options that determine authentication mechanisms. Use 6$ to get default value of this type.,Name of a cookie which stores session objectSession cookie's flagsLFor how long the cookie will be valid (corresponds to Max-Age  attribute).Expiration format as in 7.6Scope of the cookie (corresponds to Path  attribute).$Hash algorithm that will be used in hmac.1Symmetric cipher that will be used in encryption. Algorithm to encrypt cookies. Algorithm to decrypt cookies. A wrapper of self-resetting 82 of random symbols suitable for concurrent usage. A wrapper of self-resetting 9 suitable for concurrent usage.:.Tag for base64 serialized and encrypted cookie;Tag encrypted cookie DThe exception is thrown when something goes wrong with this package.Could not make < for block cipher.&Could not initialize a cipher context.yThe key is too short for current cipher algorithm. Arguments of this constructor: minimal key length, actual key length.=Thrown when Message Authentication Code (MAC) is not correct.-Thrown when expiration time cannot be parsed. Thrown when J has expired. Arguments of the constructor: expiration time, actual time.This is thrown when = or > blows up.A newtype wrapper over 8Cookie representation.The initialization vectorThe cookie's expiration time The payload-A type family that maps user-defined data to ?.<A type for encryption and decryption functions operating on 8s. An empty Constructor for   value. !Extract pseudo-random bytes from  .!Constructor for   value."Constructor for   value using predefined key.#Extract value from  .@An initializer of   state.$Encrypt given  with server key.:The function can throw the following exceptions (of type  ):% Decrypt a  from 8.:The function can throw the following exceptions (of type  ):&RPack session object into a cookie. The function can throw the same exceptions as $.'SUnpack session value from a cookie. The function can throw the same exceptions as %.(NAdd cookie header to response. The function can throw the same exceptions as &.)PAdd cookie session to error allowing to set cookie even if response is not 200.*(Request handler that checks cookies. If  is just missing, you get A-, but if something is wrong with its format, *# can throw the same exceptions as '.+Render session cookie to 8.,Cookie authentication handler.BApplies C algorithm to given data.DTruncates given 8 according to E2 or raises | error if the key is not long enough.F?Applies given encryption or decryption algorithm to given data.G"Return bottom of type provided as H tag.; I J:; KL)How to get deterministic random generator<Threshold (number of bytes to be generated before resetting)New   value The source of random numbers!How many random bytes to generate!The generated bytes in form of a 8!Size of the server keyExpiration time (A is eternity)New  "Predefined keyNew  #The  Its random symbol@Size of the server keyExpiration time (A is eternity)$ Options, see   to useThe  to encrypt Encrypted  is form of 8% Options, see   to useThe 8 to decryptThe decrypted & Options, see Random source to use  to use Session value Serialized and encrypted session' Options, see   to useCookie in binary formUnpacked session value( Options, see Random source to use  to useThe session valueResponse to add session toResponse with the session added) Options, see Random source to use  to useThe session value"Servant error to add the cookie to* Options, see   to use The request The result+, Options, see   to useBThe hash algorithm to useDKey size specifierThe 8 to truncateThe resulting 8FThe cipher algorithm to apply8 from which to create < Proper keyCookie payloadThe resulting 8G-./-  !"#$%&'()*+,-   !"# $%&'()*+,#  I J:; KL !"#@$%&'()*+,BDFG-./M      !"#$%&'()*+,-./0123456789:;<=>?@AB>CDEFGHIJKLMNOPQR>STU>VWXYOZ[  \]^-servant-auth-cookie-0.4-K9BrPaFluOqxkVIUi3OVh'Servant.Server.Experimental.Auth.CookieAuthCookieSettingsacsSessionFieldacsCookieFlags acsMaxAgeacsExpirationFormatacsPathacsHashAlgorithm acsCipheracsEncryptAlgorithmacsDecryptAlgorithm ServerKey RandomSourceAuthCookieException CannotMakeIV BadProperKeyTooShortProperKey IncorrectMACCannotParseExpirationTime CookieExpiredSessionDeserializationFailedEncryptedSessionCookiecookieIVcookieExpirationTime cookiePayloadAuthCookieDataCipherAlgorithmemptyEncryptedSessionmkRandomSourcegetRandomBytes mkServerKeymkServerKeyFromBytes getServerKey encryptCookie decryptCookieencryptSessiondecryptSession addSessionaddSessionToErr getSession renderSessiondefaultAuthHandler$fDefaultAuthCookieSettings$fExceptionAuthCookieException$fToByteStringEncryptedSession $fEqCookie $fShowCookie$fEqEncryptedSession$fShowEncryptedSession$fEqAuthCookieException$fShowAuthCookieException1data-default-class-0.1.2.0-FYQpjIylblBDctdkHAFeXAData.Default.Classdef time-1.6.0.1Data.Time.Format formatTimebytestring-0.10.8.1Data.ByteString.Internal ByteString%cryptonite-0.20-L0WtRxCVTKUzsOFseop3bCrypto.Random.TypesDRGSerializedEncryptedCookieEncryptedCookieCrypto.Cipher.Types.BlockIV%cereal-0.5.3.0-90KodwwwQanJlL7equBhpBData.Serialize.GetrunGet0base64-bytestring-1.0.0.1-In9M41tLtcS9QYt3QpGpNYData.ByteString.Base64decode+servant-server-0.8.1-FnF0uvFUCQXDvjemqQsJ0l Servant.Server.Experimental.AuthAuthServerDatamkServerKeyStatebaseGHC.BaseNothingsignCrypto.MAC.HMAChmac mkProperKeyCrypto.Cipher.Types.BaseKeySizeSpecifierapplyCipherAlgorithmunProxy Data.ProxyProxy base64Encode base64Decode