this repo has no description
1opam-version: "2.0"
2homepage: "https://github.com/mirleft/ocaml-tls"
3dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
4bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
5doc: "https://mirleft.github.io/ocaml-tls/doc"
6author: ["David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"]
7maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
8license: "BSD-2-Clause"
9
10build: [
11 [ "ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "false"
12 "--with-lwt" "%{lwt+ptime:installed}%"
13 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ]
14 ["ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "true"
15 "--with-lwt" "%{lwt+ptime:installed}%"
16 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] {with-test}
17 ["ocaml" "pkg/pkg.ml" "test"] {with-test}
18]
19
20depends: [
21 "ocaml" {>= "4.04.2" & < "4.12.0"}
22 "ocamlfind" {build}
23 "ocamlbuild" {build}
24 "topkg" {build}
25 "ppx_sexp_conv"
26 "ppx_deriving"
27 "ppx_cstruct" {>= "3.0.0"}
28 "cstruct" {>= "4.0.0" & < "6.0.0"}
29 "cstruct-sexp"
30 "sexplib"
31 "nocrypto" {>= "0.5.4"}
32 "x509" {>= "0.7.0" & < "0.9.0"}
33 "domain-name" {>= "0.3.0"}
34 "fmt"
35 "cstruct-unix" {with-test & >= "3.0.0"}
36 "ounit" {with-test}
37 "lwt" {>= "2.4.8"}
38 "lwt" {with-test & < "5.0.0"}
39]
40depopts: [
41 "mirage-flow-lwt"
42 "mirage-kv-lwt"
43 "mirage-clock"
44 "ptime"
45]
46conflicts: [
47 "mirage-net-xen" {<"1.3.0"}
48 "mirage-types" {<"3.0.0"}
49 "mirage-kv-lwt" {<"2.0.0"}
50 "sexplib" {= "v0.9.0"}
51 "ppx_sexp_conv" {= "v0.11.0"}
52 "ptime" {< "0.8.1"}
53 "mirage-clock" {>= "3.0.0"}
54]
55
56tags: [ "org:mirage"]
57synopsis: "Transport Layer Security purely in OCaml"
58description: """
59Transport Layer Security (TLS) is probably the most widely deployed security
60protocol on the Internet. It provides communication privacy to prevent
61eavesdropping, tampering, and message forgery. Furthermore, it optionally
62provides authentication of the involved endpoints. TLS is commonly deployed for
63securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails,
64virtual private networks, and wireless networks.
65
66TLS uses asymmetric cryptography to exchange a symmetric key, and optionally
67authenticate (using X.509) either or both endpoints. It provides algorithmic
68agility, which means that the key exchange method, symmetric encryption
69algorithm, and hash algorithm are negotiated.
70
71Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak).
72"""
73url {
74archive: "https://github.com/mirleft/ocaml-tls/releases/download/0.10.3/tls-0.10.3.tbz"
75checksum: [
76 "sha256=314429b95203b054507beeeba18a58d79489b6a47a3bcac95971bc2b1b49c19c"
77 "sha512=5a49aa720038e85238586240d7d099688544122e741f3d4279ea1927a88ae745ff9442999b85ac33858dd4f322104cc1d0545b902d93c221dff5318306d64a81"
78 ]
79}