this repo has no description
1opam-version: "2.0"
2homepage: "https://github.com/mirleft/ocaml-tls"
3dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
4bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
5doc: "https://mirleft.github.io/ocaml-tls/doc"
6maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
7license: "BSD-2-Clause"
8
9build: [
10 [ "ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "false"
11 "--with-lwt" "%{lwt+ptime:installed}%"
12 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ]
13 ["ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "true"
14 "--with-lwt" "%{lwt+ptime+astring:installed}%"
15 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] {with-test}
16 ["ocaml" "pkg/pkg.ml" "test"] {with-test}
17]
18
19depends: [
20 "ocaml" {>= "4.04.2" & < "4.12.0"}
21 "ocamlfind" {build}
22 "ocamlbuild" {build}
23 "topkg" {build}
24 "ppx_sexp_conv"
25 "ppx_deriving"
26 "ppx_cstruct" {>= "3.0.0"}
27 "cstruct" {>= "4.0.0" & < "6.0.0"}
28 "cstruct-sexp"
29 "sexplib"
30 "nocrypto" {>= "0.5.4"}
31 "x509" {>= "0.6.1" & < "0.7.0"}
32 "cstruct-unix" {with-test & >= "3.0.0"}
33 "ounit" {with-test}
34 "lwt" {>= "2.4.8"}
35 "lwt" {with-test & < "5.0.0"}
36]
37depopts: [
38 "mirage-flow-lwt"
39 "mirage-kv-lwt"
40 "mirage-clock"
41 "ptime"
42 "astring" {with-test}
43]
44conflicts: [
45 "mirage-net-xen" {<"1.3.0"}
46 "mirage-types" {<"3.0.0"}
47 "mirage-kv-lwt" {<"2.0.0"}
48 "sexplib" {= "v0.9.0"}
49 "ppx_sexp_conv" {= "v0.11.0"}
50 "ptime" {< "0.8.1"}
51 "mirage-clock" {>= "3.0.0"}
52]
53
54tags: [ "org:mirage"]
55synopsis: "Transport Layer Security purely in OCaml"
56description: """
57Transport Layer Security (TLS) is probably the most widely deployed security
58protocol on the Internet. It provides communication privacy to prevent
59eavesdropping, tampering, and message forgery. Furthermore, it optionally
60provides authentication of the involved endpoints. TLS is commonly deployed for
61securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails,
62virtual private networks, and wireless networks.
63
64TLS uses asymmetric cryptography to exchange a symmetric key, and optionally
65authenticate (using X.509) either or both endpoints. It provides algorithmic
66agility, which means that the key exchange method, symmetric encryption
67algorithm, and hash algorithm are negotiated.
68
69Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak).
70"""
71url {
72 src:
73 "https://github.com/mirleft/ocaml-tls/releases/download/0.10.2/tls-0.10.2.tbz"
74 checksum: [
75 "sha256=d5f7deef9445e6d0d877a98a64ba36b610cab3b4bbd01520aff7934611994e7b"
76 "md5=3d7dfafe777c20cf9314eef704c3650b"
77 ]
78}
79authors: [
80 "David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"
81]