this repo has no description
1opam-version: "2.0" 2homepage: "https://github.com/mirleft/ocaml-tls" 3dev-repo: "git+https://github.com/mirleft/ocaml-tls.git" 4bug-reports: "https://github.com/mirleft/ocaml-tls/issues" 5doc: "https://mirleft.github.io/ocaml-tls/doc" 6author: ["David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"] 7maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"] 8license: "BSD-2-Clause" 9 10build: [ 11 [ "ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "false" 12 "--with-lwt" "%{lwt+ptime:installed}%" 13 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] 14 ["ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "true" 15 "--with-lwt" "%{lwt+ptime:installed}%" 16 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] {with-test} 17 ["ocaml" "pkg/pkg.ml" "test"] {with-test} 18] 19 20depends: [ 21 "ocaml" {>= "4.04.2" & < "4.12.0"} 22 "ocamlfind" {build} 23 "ocamlbuild" {build} 24 "topkg" {build} 25 "ppx_sexp_conv" 26 "ppx_deriving" 27 "ppx_cstruct" {>= "3.0.0"} 28 "cstruct" {>= "4.0.0" & < "6.0.0"} 29 "cstruct-sexp" 30 "sexplib" 31 "nocrypto" {>= "0.5.4"} 32 "x509" {>= "0.7.0" & < "0.9.0"} 33 "domain-name" {>= "0.3.0"} 34 "fmt" 35 "cstruct-unix" {with-test & >= "3.0.0"} 36 "ounit" {with-test} 37 "lwt" {>= "2.4.8"} 38 "lwt" {with-test & < "5.0.0"} 39] 40depopts: [ 41 "mirage-flow-lwt" 42 "mirage-kv-lwt" 43 "mirage-clock" 44 "ptime" 45] 46conflicts: [ 47 "mirage-net-xen" {<"1.3.0"} 48 "mirage-types" {<"3.0.0"} 49 "mirage-kv-lwt" {<"2.0.0"} 50 "sexplib" {= "v0.9.0"} 51 "ppx_sexp_conv" {= "v0.11.0"} 52 "ptime" {< "0.8.1"} 53 "mirage-clock" {>= "3.0.0"} 54] 55 56tags: [ "org:mirage"] 57synopsis: "Transport Layer Security purely in OCaml" 58description: """\ 59 60Transport Layer Security (TLS) is probably the most widely deployed security 61protocol on the Internet. It provides communication privacy to prevent 62eavesdropping, tampering, and message forgery. Furthermore, it optionally 63provides authentication of the involved endpoints. TLS is commonly deployed for 64securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails, 65virtual private networks, and wireless networks. 66 67TLS uses asymmetric cryptography to exchange a symmetric key, and optionally 68authenticate (using X.509) either or both endpoints. It provides algorithmic 69agility, which means that the key exchange method, symmetric encryption 70algorithm, and hash algorithm are negotiated. 71 72Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak). 73""" 74url { 75archive: "https://github.com/mirleft/ocaml-tls/releases/download/0.10.4/tls-0.10.4.tbz" 76checksum: [ 77 "sha256=24d5f7200ceb526bc8d1513c72dbe641a15012d3b0bba3387b85aaee9e052317" 78 "sha512=c0e246c3e5e81cb8ba6f171869694d83ae948757098b144009c7e357b3deb722b42393270a20434f1d2c82769ff519c64aa6374c471b04c38d39a5729bf60a21" 79] 80}