this repo has no description
1opam-version: "2.0" 2homepage: "https://github.com/mirleft/ocaml-tls" 3dev-repo: "git+https://github.com/mirleft/ocaml-tls.git" 4bug-reports: "https://github.com/mirleft/ocaml-tls/issues" 5doc: "https://mirleft.github.io/ocaml-tls/doc" 6author: ["David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"] 7maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"] 8license: "BSD-2-Clause" 9 10build: [ 11 [ "ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "false" 12 "--with-lwt" "%{lwt+ptime:installed}%" 13 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] 14 ["ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "true" 15 "--with-lwt" "%{lwt+ptime:installed}%" 16 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] {with-test} 17 ["ocaml" "pkg/pkg.ml" "test"] {with-test} 18] 19 20depends: [ 21 "ocaml" {>= "4.04.2" & < "4.12.0"} 22 "ocamlfind" {build} 23 "ocamlbuild" {build} 24 "topkg" {build} 25 "ppx_sexp_conv" 26 "ppx_deriving" 27 "ppx_cstruct" {>= "3.0.0"} 28 "cstruct" {>= "4.0.0" & < "6.0.0"} 29 "cstruct-sexp" 30 "sexplib" 31 "nocrypto" {>= "0.5.4"} 32 "x509" {>= "0.7.0" & < "0.9.0"} 33 "domain-name" {>= "0.3.0"} 34 "fmt" 35 "cstruct-unix" {with-test & >= "3.0.0"} 36 "ounit" {with-test} 37 "lwt" {>= "2.4.8"} 38 "lwt" {with-test & < "5.0.0"} 39] 40depopts: [ 41 "mirage-flow-lwt" 42 "mirage-kv-lwt" 43 "mirage-clock" 44 "ptime" 45] 46conflicts: [ 47 "mirage-net-xen" {<"1.3.0"} 48 "mirage-types" {<"3.0.0"} 49 "mirage-kv-lwt" {<"2.0.0"} 50 "sexplib" {= "v0.9.0"} 51 "ppx_sexp_conv" {= "v0.11.0"} 52 "ptime" {< "0.8.1"} 53 "mirage-clock" {>= "3.0.0"} 54] 55 56tags: [ "org:mirage"] 57synopsis: "Transport Layer Security purely in OCaml" 58description: """ 59Transport Layer Security (TLS) is probably the most widely deployed security 60protocol on the Internet. It provides communication privacy to prevent 61eavesdropping, tampering, and message forgery. Furthermore, it optionally 62provides authentication of the involved endpoints. TLS is commonly deployed for 63securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails, 64virtual private networks, and wireless networks. 65 66TLS uses asymmetric cryptography to exchange a symmetric key, and optionally 67authenticate (using X.509) either or both endpoints. It provides algorithmic 68agility, which means that the key exchange method, symmetric encryption 69algorithm, and hash algorithm are negotiated. 70 71Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak). 72""" 73url { 74archive: "https://github.com/mirleft/ocaml-tls/releases/download/0.10.3/tls-0.10.3.tbz" 75checksum: [ 76 "sha256=314429b95203b054507beeeba18a58d79489b6a47a3bcac95971bc2b1b49c19c" 77 "sha512=5a49aa720038e85238586240d7d099688544122e741f3d4279ea1927a88ae745ff9442999b85ac33858dd4f322104cc1d0545b902d93c221dff5318306d64a81" 78 ] 79}