transient-universe-tls alternatives and similar packages
Based on the "network" category.
Alternatively, view transient-universe-tls alternatives based on common mentions on social networks and blogs.
-
compendium-client
Mu (μ) is a purely functional framework for building micro services. -
network-msgpack-rpc
A MessagePack-RPC Implementation -
javascript-bridge
Bridge to JavaScript on the browser -
spacecookie
gopher library & server written in Haskell -
dmcc
Haskell bindings for AVAYA DMCC API and WebSockets server for AVAYA -
resolv
Domain Name Service (DNS) lookup via the libresolv standard library routines -
nakadi-client
Haskell Client Library for the Nakadi Event Broker -
cci
Haskell bindings to the CCI reference implementation library. -
network-address
IP data structures and textual representation -
network-data
Network data structures in Haskell (IP, UDP, TCP headers, etc) -
windns
Domain Name Service (DNS) lookup via the Windows dnsapi standard library -
network-uri-json
FromJSON and ToJSON Instances for Network.URI -
hatexmpp3
XMPP client with synthetic filesystem (9P) and (optional) graphical (GTK3) interfaces -
LDAPv3
Lightweight Directory Access Protocol V3 (LDAPv3) RFC4511 implementation -
hsendxmpp
sendxmpp clone and drop-in replacement, sending XMPP messages via CLI -
network-voicetext
VoiceText Web API Haskell wrapper library -
goggles
High-level, extensible Haskell interface to Web APIs. -
oauth2-jwt-bearer
OAuth2 jwt-bearer client flow as per rfc7523. -
iwlib
A binding to the iw library for getting info about the current WiFi connection. -
network-simple-wss
Simple Haskell interface to TLS secured WebSockets -
attoparsec-uri
A compositional URI parser / printer for attoparsec -
network-uri-lenses
lenses for http://hackage.haskell.org/package/network-uri -
postmark-streams
Send email via Postmark using io-streams
Access the most powerful time series database as a service
Do you think we are missing an alternative of transient-universe-tls or a related project?
README
transient-universe-tls
Secure communications for transient-universe.
initTLS
must be called before using any communication. Then any connection with other nodes is atempted to be secure. It is necessary a certificate and a key for the node at the folder where it is executed. Certificate verification from calling nodes is disabled in this version, so encription of messages among nodes, and not verification is the goal initially.
upon initTLS has been called, any connect
will try to establish a secure connection or will fail.
Connection from web nodes accept https
requests. If a connection is secure, socket communications are encripted too.
In order to generate a self-signed certificate for testing, try the following:
openssl genrsa -out key.pem 2048
openssl req -new -key key.pem -out certificate.csr
openssl x509 -req -in certificate.csr -signkey key.pem -out certificate.pem