@comment $OpenBSD: PLIST,v 1.2 2018/01/22 21:23:53 kili Exp $
@name hs-hackage-security-0.5.2.2p0
@version 2
@comment pkgpath=security/hs-hackage-security cdrom=yes ftp=yes
@arch i386
+DESC
@sha di977p2WKrdyZkULcB0HVhO/KSz1ge0v3Ta7Cx0ogQs=
@size 681
@depend archivers/hs-zlib:hs-zlib->=0.5,<0.7:hs-zlib-0.5.4.2p3
@depend devel/hs-base16-bytestring:hs-base16-bytestring->=0.1.1,<0.2:hs-base16-bytestring-0.1.1.5p5
@depend devel/hs-base64-bytestring:hs-base64-bytestring->=1.0,<1.1:hs-base64-bytestring-1.0.0.0p8
@depend devel/hs-mtl:hs-mtl->=2.2,<2.3:hs-mtl-2.2.1p3
@depend devel/hs-network-uri:hs-network-uri->=2.6,<2.7:hs-network-uri-2.6.0.3p3
@depend devel/hs-network:hs-network->=2.6,<2.7:hs-network-2.6.2.1p3
@depend devel/hs-parsec:hs-parsec->=3.1,<3.2:hs-parsec-3.1.9p4
@depend devel/hs-tar:hs-tar->=0.5,<0.6:hs-tar-0.5.0.3p0
@depend lang/ghc:ghc-=8.2.2:ghc-8.2.2p2
@depend security/hs-cryptohash-sha256:hs-cryptohash-sha256->=0.11,<0.12:hs-cryptohash-sha256-0.11.101.0
@depend security/hs-ed25519:hs-ed25519-*:hs-ed25519-0.0.5.0p0
@cwd /usr/local
lib/ghc/hackage-security-0.5.2.2/
lib/ghc/hackage-security-0.5.2.2/HShackage-security-0.5.2.2-2xPvTJk9eMUH8RAihmaWhK.o
@sha EJq9y/UDoK6CJBSiOA8k1aOJfCssdw8V8Hga2P45DxU=
@size 1525004
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client.hi
@sha RFG5bQNDu1Tt/W0qsT7fql+RB+ljpQDYnct77zKj818=
@size 104747
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client.p_hi
@sha rFdRqE7QA7HJhPpZqGQ/n0Vc7TtWDzTMmJ/gCssHORY=
@size 107603
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Formats.hi
@sha AOeTHIuE0/eUXxD/qb7z7r1WY4tgraFm5qqjYLrBH6g=
@size 28420
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Formats.p_hi
@sha GI+QYlxTLfh2AbPx4dcjHoWEQplRiRtQ/FUDutYCKwE=
@size 28559
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository.hi
@sha jA3BXr2rMZipO6PkxN1Rd/HUzcvh+StlPoAwEKBiS6c=
@size 70761
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository.p_hi
@sha QK+LomqZt5w99shqCFbb5lPzh3zNAloBUEn9GBoNsvM=
@size 72100
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Cache.hi
@sha xhtIgkQetgaGE9V7OnRzfqb/wQi2WniQ6TqhoZGRRr0=
@size 22094
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Cache.p_hi
@sha gVm37CIORrZtgBhDB0ZrMxK7TeGcFDrXrypss1/t4fo=
@size 24816
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/HttpLib.hi
@sha lB+PHIPBdfivkevxMUFg4fs3yQz1ROSlPMLZTiTe+/g=
@size 25330
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/HttpLib.p_hi
@sha RZfviCnJmoAci7VOtljkp49UGODHTfZhGeS5vx2nuyE=
@size 25430
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Local.hi
@sha cXyXFg/pvaGrBaBL/t6sN8703SBxh/WQOE+EqEPDv0s=
@size 19362
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Local.p_hi
@sha 9RBVlMggkBl67MGpWr7MW2idsTkl5KZPJdzl6kBY6E0=
@size 20505
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Remote.hi
@sha liHKta3W4JukL2pJyKsZLcFTPQYmY4NdkxBV9XnJsZk=
@size 48450
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Repository/Remote.p_hi
@sha RnJHWabe6gYuRblXu6KELXe67fpDcL+KFmzTpCVv4ws=
@size 48412
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Verify.hi
@sha j3QDE8DF2GbLYH1ixu6PR1HuvEy4y541xqE6pFLUonM=
@size 35690
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Client/Verify.p_hi
@sha 7cKCVVrCr4piFCdYK4sprwUrF1xV5Dkw+RYQTMJEH5g=
@size 34726
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/JSON.hi
@sha cPKh2KoQUM6oyKZHRh86gUK4iirfjQxzBuTDRMejyPA=
@size 129435
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/JSON.p_hi
@sha JXibEt3Zw3f0AUZAZdTQMMFyZp6MT8ouMzYqOfMqxsU=
@size 130623
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Key/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Key.hi
@sha IbCbIuWS0WaeW43qBWwopWbHufnJAgnqc7kXCWyrX/0=
@size 68733
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Key.p_hi
@sha 1HMbrqUArMsj6Dgfq5y1d7dysiPEBYmTe9VVyG/pGSI=
@size 70084
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Key/Env.hi
@sha JZnB14bBzwiWWMcxU8ChurCNOs8f2aY1k1GC/qw0hvM=
@size 20451
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Key/Env.p_hi
@sha xeG7EMbKsM5EqjJaFwtoh5iiwe1mGiOsUAEesnng2ns=
@size 20515
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Server.hi
@sha 7N9DX/E6Lb96mGIczZS3e/a8l3dKyZcYT6g0+YpcPjc=
@size 19694
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Server.p_hi
@sha dZZrrr9r5fznIQqUXQBKl660y3C1fYq0TRBBc9lerok=
@size 19698
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF.hi
@sha IGz0tlg+jr6YqEJFumZ/cAieGnbcoPun31d3DfH+bI8=
@size 16746
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF.p_hi
@sha aaH8SVb1ARZB+N3H7skeW4u1hYdaspsjNI7DP628Ubo=
@size 16750
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Common.hi
@sha RP8qzRUCec4iuhFYoFcd8+so9n+dVoSLRXkAWMvqN0Y=
@size 23816
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Common.p_hi
@sha O0hmlsqPhouJrIzO1cT2qN6Rp4L5FqFi/o47htwNWxM=
@size 23847
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/FileInfo.hi
@sha +f3kFbkRDHPXpFPCYFd56E2ZkgLphDMU81CHF0iPl94=
@size 30461
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/FileInfo.p_hi
@sha g5i/6jeQSMzlK7iFQYv9VoBjBZVzJ9EPeoM0rrPEGTQ=
@size 30976
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/FileMap.hi
@sha LALFIXhCeGzfS9YZ9eUIym7BncVhUW0azeqIS4OOKwE=
@size 32527
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/FileMap.p_hi
@sha sjP4kGDG1V45g4xW14Nf/TcLZMa2efi0NiL19sXhuCM=
@size 33078
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Header.hi
@sha dYBylNOIg0WcEIjCOTcRSGzVq9bYwnjzOMzAj29dHB0=
@size 35885
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Header.p_hi
@sha NpHP0ImBw7P1vdmpPWhJ4dEnDSr35nixGreEiP9GI7Y=
@size 36242
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Cache.hi
@sha vsnARmfIuHDgLt8Z6HQ4tioVEcXCOfi8F197eu/2+9o=
@size 8220
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Cache.p_hi
@sha S4y1ICKNEy0CjoLckrjJU/eesZA4omiTtAg7arwqD4U=
@size 9554
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Index.hi
@sha F3T4pvoQ32lZnUmBzAcQMhFcuW45FCaN9XmikuiM5zY=
@size 20760
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Index.p_hi
@sha kKI8DrpKy9iA+cVqrZs+Y1YYjlI9sLR728ewjL+28n4=
@size 21063
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Repo.hi
@sha IU2YffVJBTcHAvDe3U7wr5i+leDsZ8+rEgJ8E2PPY7A=
@size 11342
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Layout/Repo.p_hi
@sha AEqXRqvy2z2Iimz2fcy+DFVoxwQIzbwYPBxD83Rh3m0=
@size 12691
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Mirrors.hi
@sha cZInB2NxhNcjKyE/cMPYGY7x5dwZTPIlpsCl3pXn/As=
@size 25858
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Mirrors.p_hi
@sha zWDgwBrgr7rsLeA5Na6ehAee9Tex2i36dHIz5IOdHrE=
@size 25690
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Paths.hi
@sha nDNS7SAyvTv1JgtqugLF9T3TuVKBOiDuJkGTTETHMu4=
@size 8406
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Paths.p_hi
@sha vsORMdnAz39C5HuUBhINLpCMRhEz7TldhXrShOFo2IA=
@size 9458
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Patterns.hi
@sha IVXL2063QjqW1l114+nHXXDvAJLl2HPGypyJgVQbgaQ=
@size 38853
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Patterns.p_hi
@sha 30QCsKyEmlNhxCzVM1HsCrDFd/HOCcSu5A9iDgu3sqo=
@size 38882
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Root.hi
@sha x3WhY7NvMIucdEuGNC7KSs1KlJSbon6DJIoLG8iOaI8=
@size 32960
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Root.p_hi
@sha vf0hflHpf7Juk6qxsuqhqSjMO+5urPXCuyCt1VYazQ4=
@size 33853
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Signed.hi
@sha A3oABV15Dq9VA+kt7YSAbU1bJRxq3iL8bjWlSUml2t4=
@size 43041
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Signed.p_hi
@sha ms2aLYp4ul83X08P2xbTyihtXWbGTLxE2KJlXaNDIqM=
@size 45722
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Snapshot.hi
@sha OEm+ssIhUa3MJ79L8lz/OqFAA70nQw6wSUXaTp23WXw=
@size 13846
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Snapshot.p_hi
@sha dIwrL13dzK0A+7zYRU6RzANdfgebe3xUfCLgnccjN7E=
@size 14066
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Targets.hi
@sha RaeFHsKO1/dZAoEL8aKc+kd697A9JKmMpcVI0BYhdV0=
@size 36223
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Targets.p_hi
@sha sac/iFxW/Mc0BmN5okLAs5c5aQZ5PMVOHgwvG3JLayQ=
@size 37120
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Timestamp.hi
@sha Ss3mGztvf2DZ42jGRmkceQhddOgXkmF8Z+v6MYWRjD0=
@size 16563
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/TUF/Timestamp.p_hi
@sha yLvL7b/eDpB/LTxAQzS/V1Kbx6kA4KdE9fEat7SI69s=
@size 16768
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Trusted/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Trusted.hi
@sha XdaBcjLOVAQ9ij9PN0EL/i4o0+jwaYUmw7i5W+0L6Bc=
@size 17691
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Trusted.p_hi
@sha ZfdqJImDh6/xbFJ0LB1a3jcA9K7IlOv105rsEVf0FmE=
@size 17845
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Trusted/TCB.hi
@sha 9mZM+dAnNXjDN2Hrzrp1KDCZ3vNqfthebtltjPaprpA=
@size 40212
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Trusted/TCB.p_hi
@sha MD4z7TycPOZKLDDuGLvIIC6IjDO/o44p4bmnAaM0Flc=
@size 40337
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Base64.hi
@sha CQ+tF79CeAfQ2a9gRhf5Xf5lELwOfoMKA3Ene1u53HU=
@size 9091
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Base64.p_hi
@sha C2nRkw5fcSs8uTXvtLgFo8C0WDsVdJ6fFuxVgN9lKk0=
@size 8780
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Checked.hi
@sha gVxn4OLru84m/DzpfzrOBOs5sRPyE9nipG12nsRUl60=
@size 14807
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Checked.p_hi
@sha Qr0+XgsXI8zQpCmmW88aaYncoPbH6b6pzIGPwXQ+Bjo=
@size 16351
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/IO.hi
@sha llarAU9xxiOM12FjaCB3EImDvU6zoYS31T5+iLkbmGg=
@size 14436
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/IO.p_hi
@sha AhwhESzySAoRWmDPBOqyz7F2ugSJW12kb+muixU+zFk=
@size 14425
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/JSON.hi
@sha hDNNpjxzra+nUVwXnyTjoiXTH6CVBgvMeqaIDAfsK54=
@size 39940
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/JSON.p_hi
@sha zBUKAjI3Bxj28Mp4kQvNrE6kEL1cNwaV2xq+qAGaDwY=
@size 40139
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Lens.hi
@sha JHhvGABevByXg+H408Av6eSaUZ8XQeoPq4Qgvo0ZHYk=
@size 5451
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Lens.p_hi
@sha hpRFA430gy7a3Xf6M10RLifN4iP5nJaKazdsefyqa/4=
@size 5576
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Path.hi
@sha vMwXsj46F9fKJARRZlyiFUGDxd9L54j3lAbw+zftto0=
@size 52565
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Path.p_hi
@sha AuVbIqFlEKP1kx1aq0e0gu31FdLOVQsqa+6fyJzPzJo=
@size 55757
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Pretty.hi
@sha adyYHWNM6qU++2yPD4pkSjODe1rbhigBPUYxBYtMp8g=
@size 2845
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Pretty.p_hi
@sha rRj168N/tjwaJycoUsrns87+ng5eRKyd6vXE2oxaum8=
@size 2849
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Some.hi
@sha JLfkWMJI2eFf72H+TGFUBgkrnYu2W9a3yR4c4VRBECc=
@size 15069
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Some.p_hi
@sha 013xT0YnEgH8IbgcdBgtK7xUld2pa43lnssDPvut+rY=
@size 15100
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Stack.hi
@sha qWzLIss2sidWit/lJAWBwYLmInbV0mrpcrWUBTmZYos=
@size 9445
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/Stack.p_hi
@sha 7OoATRcysvVGG6ZRjibC5eZ3wz68JOLj1+6tMnm3l+c=
@size 9449
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/TypedEmbedded.hi
@sha evXWIV9QRFChbMCuGfSC6VXHGRU7NudBuROGaLhWUBo=
@size 5947
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Hackage/Security/Util/TypedEmbedded.p_hi
@sha 1ZUw2Lz+N8sMNX/W3tAgSmGIKsJt+rHFYpVR+SBpb9I=
@size 5951
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Prelude.hi
@sha VDtGR7kYkC73Kn+HIfHcVIX/j9E2IxWUDcLznMmimOg=
@size 8355
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Prelude.p_hi
@sha RQIIXSl6O6Okhra4qdTGC6wrRYoDqVkZsuIs1WfKgHU=
@size 8359
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/Text/
lib/ghc/hackage-security-0.5.2.2/Text/JSON/
lib/ghc/hackage-security-0.5.2.2/Text/JSON/Canonical.hi
@sha OG0ZhpSjnlhoWGkOjRxYAMN4wQESzzyGn8GTac8cbD8=
@size 47251
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/Text/JSON/Canonical.p_hi
@sha IV6Dc/0U9Kg4UMAcGMaNIy1/Hys0sCQOrq9ub62KyQc=
@size 48589
@ts 1539413879
lib/ghc/hackage-security-0.5.2.2/libHShackage-security-0.5.2.2-2xPvTJk9eMUH8RAihmaWhK.a
@sha V8cYBxi47vyZ8OLDIlmpI7aMao34o7XQJAxOuu+j3bg=
@size 2547962
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/libHShackage-security-0.5.2.2-2xPvTJk9eMUH8RAihmaWhK_p.a
@sha u/2g8KtszVGHIrOr7+rphOpLm+W+eMLCbC/dGiDW71E=
@size 4108732
@ts 1539413880
lib/ghc/hackage-security-0.5.2.2/register.sh
@sha 2r8dvpifc+6cl3njzeqkedqxc/sG0933NsnNnxWdLB4=
@size 5698
@ts 1539413880
share/doc/hs-hackage-security-0.5.2.2/
share/doc/hs-hackage-security-0.5.2.2/LICENSE
@sha xdCXnNa4FcGBqkNaFZ45mBqQTZuG9gGU82PoPlJDlK4=
@size 1526
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Formats.html
@sha IdfnqPkvDLT8lTnW49re2qOBJmO61E3RE8AdNZpLsbQ=
@size 23678
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Repository-Cache.html
@sha ugAFMM5SGAWT4U1IgnONVkUWDEj+GaSa4Z7/72EZ7nY=
@size 11304
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Repository-HttpLib.html
@sha oFKsQsR8+K3mEfH8yLhKt6vdYRc4+WsTVBkbtooi0y0=
@size 28883
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Repository-Local.html
@sha 7C9L0v6h/z5EzxabglHmnMYkANNO0VsHhulee0ZfFro=
@size 7849
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Repository-Remote.html
@sha Cn8hxOosMPfEsMeTvgibpJkJwwjiVytzZ4PG+PzsLAU=
@size 16372
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Repository.html
@sha Gch1LvH0IppbY7r/N1YOwKQaLx8ezQAynMdLbBWaHDA=
@size 84294
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client-Verify.html
@sha ZvVQEOYsrhVQSkALWfVfEf4EfdT7+bk5GrMMiwKV/U0=
@size 14286
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Client.html
@sha MhQkHVYWrqigJtTHbI4HrfnqfnakZl6cj9vqTxYTCN8=
@size 444694
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-JSON.html
@sha sqrJhkp5xEasdrcdjNDlGlekod+QSxBrYs1QbGBfy+o=
@size 228265
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Key-Env.html
@sha z4IgJqUPUkUVdRIsE1/qdHphj+eG97s2OewLw5GpIt4=
@size 10742
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Server.html
@sha 2VuDS+sTpSz6vxIhYFFCywN/c/+6SDFcb89Tv+mE+TA=
@size 330032
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-TUF-FileMap.html
@sha jF8fAct2pKuH3cDfEQNTWq9JznIQ2vCwXaL7SOIpxjY=
@size 24220
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Trusted.html
@sha hAg/dWFbhpX1eN8aMeW5oHBAhbOeXzKdT/WGModZg9A=
@size 48752
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-Checked.html
@sha L9hp18PHliXSJ+TLubMjepnafHE8gvYBjJA4fTxZcw0=
@size 10384
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-IO.html
@sha 12oCNDjIJTBbDM7vkFA+cOVrmIoIJPt7sgVbhFYseac=
@size 5605
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-Lens.html
@sha C/D3X4YF73pud5SM1xP3bx7+UuE/j176l0Xkue0d6PM=
@size 5093
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-Path.html
@sha 1aUPuGL0vZMFUuWURBBPTGKvMAweut2SYoDfgrRvEbg=
@size 126466
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-Pretty.html
@sha eR6gtxWnR4gwgRrxjiaasgAuehNaF23qNa8p+dzcrCE=
@size 23330
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Hackage-Security-Util-Some.html
@sha 9ltflgbzUHuZl01QKPD0NSFZlu8+/ZYwvDC6HRBK1LU=
@size 27230
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/Text-JSON-Canonical.html
@sha iaDPGvsLLBkFb5amXjldRbmzICwqBuh+a9gBaGKrcpY=
@size 60676
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-33.html
@sha nX/O4SLjFogj0nb2HjwJhauu3gvuQy/VO4xAFoF1als=
@size 2353
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-60.html
@sha 2nzDcZrqKakFqFq7ptSOLqpAOmm1bHf0bhdnASlAw1A=
@size 2669
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-A.html
@sha ecpUr4KjsyjQUNqzOJg2DSBX25JdOQ2tVSiYaTz12lg=
@size 4231
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-All.html
@sha nn7JzdzY6n8Spq5We5RO4oqD328kEdVUrYOGLmkrP3Q=
@size 115921
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-B.html
@sha WW4llBxzztoNXj0dD+dYVj4/ytZ/iJFylm29epT5UFQ=
@size 3193
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-C.html
@sha JqUdQRv3p9a2+r7vIjPgc66ic7eD+Om3WudLUSTSUbQ=
@size 9762
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-D.html
@sha 5wwKwL6taNS90tCE9wnMmm5OT1cNDujddp//Y5Siol8=
@size 11035
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-E.html
@sha 8vJvcFk8CAk/2NpoWtc7DHl36LxfqEXLglRRn+sv3sE=
@size 3645
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-F.html
@sha V1E1m3LHfEkJR6c9i7hW3O1VQjC8pmJjkVgqqYlO5D0=
@size 12895
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-G.html
@sha Lr4J1KCDmHzt8o8334uPEOWj3gI/AsnosdydVQaXV2Q=
@size 4334
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-H.html
@sha Aihp9fCac4bkgSXOt8kJXgCJkhDg6TLxHUcCiQNAHrc=
@size 9964
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-I.html
@sha 5mFOfs9wMW/FAXC6RC/t2rln+rlDhKsgkBZYzSJUGk8=
@size 11500
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-J.html
@sha flecGLN91w0Aa8zkn9+tGuTKn39wEyNAGw9X8tNDLTU=
@size 3785
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-K.html
@sha nNpXmAxUspXX4QcY2UKKhIjcVRhPRE0SHEOxhYywFNk=
@size 5076
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-L.html
@sha yEb5lwyUa3xGU8O9thUBXXlvjzxE79HhOF5cEeLQ+6o=
@size 6749
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-M.html
@sha Vszn8hynV+/bOnCwNJyQFBs06vEG2lXMYxnkXaT0b1Q=
@size 6316
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-N.html
@sha u1kIhqGcAzoTkjwO4cNYYa3Rb4qPPOIJinHpnGEdAaQ=
@size 2640
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-O.html
@sha asI6nVxRNk7LMs+9rW60Ec9KnL9w1UqNSv8Rx+QOzN0=
@size 2534
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-P.html
@sha s4N4Gm4xU11ulyxDknOX0sdWt5DaZx5zF5xMG1HliS4=
@size 7073
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-R.html
@sha +OlKnRO9KDBTLn1KOmRo8iXeNQcmmh7XV6rz//v66eo=
@size 19170
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-S.html
@sha MpJpflkxTczNUCn40YuCuqW1VAHYHcQ9u2QbugxIPKU=
@size 10976
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-T.html
@sha UkH0IqQtjWMZDh9dSELYgkLF0T6fFxrVwP+oNya/bFg=
@size 10410
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-U.html
@sha 4iQUyzTtoOS9gYP/xanP5ZmFy242qwJRHfwdSHmNcOE=
@size 5328
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-V.html
@sha bwXGM3h7uZO1ijtP9uwp0i0P5HLEQkDkQ44uSBqwjoI=
@size 7117
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index-W.html
@sha ZnO/iAnI7CBTJmExNfu9OWKcj9KWE2H3ti4EFc6XWnE=
@size 5193
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/doc-index.html
@sha Gv5KHLAJd+7NxlKDAlzweN9+puXWBMmjoL8i3W1nbSQ=
@size 2142
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/hackage-security.haddock
@sha 4CcRAQciwlQuKBSOA4+IW343FZ4GIXxyTMAmCLOFDy8=
@size 261426
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/haddock-util.js
@sha dPMNC0bBWZyR487dpSJ7by+RzlGgI7GuUeChYfphcdY=
@size 4233
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/hslogo-16.png
@sha Tfq7bZTrU3GJ7OtNlcSE0XJIzjtFzyPyOXHJE21KuXM=
@size 1684
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/index.html
@sha Z4s+/gjaiRJNPxl+aOLqC7GB54+yRN2lsayD6uu5qu8=
@size 5933
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/minus.gif
@sha wK7JQx6CNewzD680lyCB5a8dmKek/5yPWDIpAA0P3QQ=
@size 56
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/ocean.css
@sha 2s8BSJIYywhu3AGkkY/CwqwvmAnOvuLsOoIBHncei6I=
@size 9494
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/plus.gif
@sha SeBqmMwZR2I0ACjDlER+bZtwK2zVS06/kG5tDPoQp24=
@size 59
@ts 1539413879
share/doc/hs-hackage-security-0.5.2.2/html/synopsis.png
@sha Oa/+b+4vXLi1YqUkEUXoni0yejYpKxJbyi4FicIAkmU=
@size 11327
@ts 1539413879
@exec /usr/bin/env HOME=/nonexistent %D/lib/ghc/hackage-security-0.5.2.2/register.sh -v0
@unexec /usr/bin/env HOME=/nonexistent %D/lib/ghc/hackage-security-0.5.2.2/unregister.sh -v0 --force
lib/ghc/hackage-security-0.5.2.2/unregister.sh
@sha yhP1kjb17Led0lkhdUZ0IIIs3YH46w0GdWMBaQo9va4=
@size 212
@ts 1539413880
