this repo has no description
1opam-version: "2.0"
2homepage: "https://github.com/mirleft/ocaml-tls"
3dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
4bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
5doc: "https://mirleft.github.io/ocaml-tls/doc"
6author: ["David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"]
7maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
8license: "BSD-2-Clause"
9
10build: [
11 [ "ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "false"
12 "--with-lwt" "%{lwt+ptime:installed}%"
13 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ]
14 ["ocaml" "pkg/pkg.ml" "build" "--pinned" "%{pinned}%" "--tests" "true"
15 "--with-lwt" "%{lwt+ptime:installed}%"
16 "--with-mirage" "%{mirage-flow-lwt+mirage-kv-lwt+mirage-clock+ptime:installed}%" ] {with-test}
17 ["ocaml" "pkg/pkg.ml" "test"] {with-test}
18]
19
20depends: [
21 "ocaml" {>= "4.04.2" & < "4.12.0"}
22 "ocamlfind" {build}
23 "ocamlbuild" {build}
24 "topkg" {build}
25 "ppx_sexp_conv"
26 "ppx_deriving"
27 "ppx_cstruct" {>= "3.0.0"}
28 "cstruct" {>= "4.0.0" & < "6.0.0"}
29 "cstruct-sexp"
30 "sexplib"
31 "nocrypto" {>= "0.5.4"}
32 "x509" {>= "0.7.0" & < "0.9.0"}
33 "domain-name" {>= "0.3.0"}
34 "fmt"
35 "cstruct-unix" {with-test & >= "3.0.0"}
36 "ounit" {with-test}
37 "lwt" {>= "2.4.8"}
38 "lwt" {with-test & < "5.0.0"}
39]
40depopts: [
41 "mirage-flow-lwt"
42 "mirage-kv-lwt"
43 "mirage-clock"
44 "ptime"
45]
46conflicts: [
47 "mirage-net-xen" {<"1.3.0"}
48 "mirage-types" {<"3.0.0"}
49 "mirage-kv-lwt" {<"2.0.0"}
50 "sexplib" {= "v0.9.0"}
51 "ppx_sexp_conv" {= "v0.11.0"}
52 "ptime" {< "0.8.1"}
53 "mirage-clock" {>= "3.0.0"}
54]
55
56tags: [ "org:mirage"]
57synopsis: "Transport Layer Security purely in OCaml"
58description: """\
59
60Transport Layer Security (TLS) is probably the most widely deployed security
61protocol on the Internet. It provides communication privacy to prevent
62eavesdropping, tampering, and message forgery. Furthermore, it optionally
63provides authentication of the involved endpoints. TLS is commonly deployed for
64securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails,
65virtual private networks, and wireless networks.
66
67TLS uses asymmetric cryptography to exchange a symmetric key, and optionally
68authenticate (using X.509) either or both endpoints. It provides algorithmic
69agility, which means that the key exchange method, symmetric encryption
70algorithm, and hash algorithm are negotiated.
71
72Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak).
73"""
74url {
75archive: "https://github.com/mirleft/ocaml-tls/releases/download/0.10.4/tls-0.10.4.tbz"
76checksum: [
77 "sha256=24d5f7200ceb526bc8d1513c72dbe641a15012d3b0bba3387b85aaee9e052317"
78 "sha512=c0e246c3e5e81cb8ba6f171869694d83ae948757098b144009c7e357b3deb722b42393270a20434f1d2c82769ff519c64aa6374c471b04c38d39a5729bf60a21"
79]
80}