this repo has no description

[new release] tls (6 packages) (1.0.2)

CHANGES:

* tls-lwt: `read` now has an optional `?off:int` argument (mirleft/ocaml-tls#510 @hannesm)
* Use the kdf package instead of hkdf (mirleft/ocaml-tls#509 @hannesm)

Changed files
+294
packages
tls
tls.1.0.2
tls-async
tls-async.1.0.2
tls-eio
tls-eio.1.0.2
tls-lwt
tls-lwt.1.0.2
tls-miou-unix
tls-miou-unix.1.0.2
tls-mirage
tls-mirage.1.0.2
+47
packages/tls-async/tls-async.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/doc"
+
maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test}
+
]
+
+
depends: [
+
"ocaml" {>= "4.14.0"}
+
"dune" {>= "3.0"}
+
"tls" {= version}
+
"ptime" {>= "0.8.1"}
+
"async" {>= "v0.16"}
+
"async_unix" {>= "v0.16"}
+
"core" {>= "v0.16"}
+
"core_unix" {>= "v0.16"}
+
"cstruct-async"
+
"ppx_jane" {>= "v0.16"}
+
"mirage-crypto-rng-async" {>= "1.0.0"}
+
]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml, Async layer"
+
description: """
+
Tls-async provides Async-friendly tls bindings
+
"""
+
authors: [
+
"David Kaloper <david@numm.org>"
+
"Hannes Mehnert <hannes@mehnert.org>"
+
"Eric Ebinger <github@eric.theebingers.com>"
+
"Calascibetta Romain <romain.calascibetta@gmail.com>"
+
]
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d"
+54
packages/tls-eio/tls-eio.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/doc"
+
authors: ["Thomas Leonard"]
+
maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test & os != "macos"}
+
]
+
+
depends: [
+
"ocaml" {>= "5.0.0"}
+
"dune" {>= "3.0"}
+
"tls" {= version}
+
"mirage-crypto-rng" {>= "1.0.0"}
+
"mirage-crypto-rng-eio" {with-test & >= "1.0.0"}
+
"eio" {>= "0.12"}
+
"eio_main" {>= "0.12" with-test}
+
"mdx" {with-test}
+
"crowbar" {>= "0.2.1" with-test}
+
"logs" {>= "0.7.0" with-test}
+
"ptime" {>= "1.0.0"}
+
]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml - Eio"
+
description: """
+
Transport Layer Security (TLS) is probably the most widely deployed security
+
protocol on the Internet. It provides communication privacy to prevent
+
eavesdropping, tampering, and message forgery. Furthermore, it optionally
+
provides authentication of the involved endpoints. TLS is commonly deployed for
+
securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails,
+
virtual private networks, and wireless networks.
+
+
TLS uses asymmetric cryptography to exchange a symmetric key, and optionally
+
authenticate (using X.509) either or both endpoints. It provides algorithmic
+
agility, which means that the key exchange method, symmetric encryption
+
algorithm, and hash algorithm are negotiated.
+
+
Read [further](https://nqsb.io) and our [Usenix Security 2015 paper](https://usenix15.nqsb.io).
+
"""
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d"
+42
packages/tls-lwt/tls-lwt.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/doc"
+
maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test}
+
]
+
+
depends: [
+
"ocaml" {>= "4.13.0"}
+
"dune" {>= "3.0"}
+
"tls" {= version}
+
"mirage-crypto-rng-lwt" {>= "1.0.0"}
+
"lwt" {>= "5.7.0"}
+
"cmdliner" {>= "1.1.0"}
+
"ptime" {>= "0.8.1"}
+
"randomconv" {with-test & >= "0.2.0"}
+
]
+
conflicts: [ "result" {< "1.5"} ]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml, Lwt layer"
+
description: """
+
Tls-lwt provides an effectful Tls_lwt module to be used with Lwt.
+
"""
+
authors: [
+
"David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"
+
]
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d"
+42
packages/tls-miou-unix/tls-miou-unix.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/"
+
maintainer: ["Romain Calascibetta <romain.calascibetta@gmail.com>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test}
+
]
+
+
depends: [
+
"ocaml" {>= "5.0.0"}
+
"dune" {>= "3.0"}
+
"tls" {= version}
+
"mirage-crypto-rng-miou-unix" {>= "1.0.0" & with-test}
+
"x509" {>= "1.0.0"}
+
"miou" {>= "0.3.0"}
+
"crowbar" {with-test}
+
"rresult" {with-test}
+
"ohex" {with-test}
+
"ptime" {with-test}
+
"hxd" {with-test}
+
]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml, Miou+Unix layer"
+
description: """
+
Tls-miou provides an effectful Tls_miou module to be used with Miou and Unix.
+
"""
+
authors: "Romain Calascibetta <romain.calascibetta@gmail.com>"
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d"
+45
packages/tls-mirage/tls-mirage.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/doc"
+
maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test}
+
]
+
+
depends: [
+
"ocaml" {>= "4.13.0"}
+
"dune" {>= "3.0"}
+
"tls" {= version}
+
"fmt" {>= "0.8.7"}
+
"lwt" {>= "3.0.0"}
+
"mirage-flow" {>= "4.0.0"}
+
"mirage-kv" {>= "3.0.0"}
+
"mirage-clock" {>= "3.0.0"}
+
"ptime" {>= "0.8.1"}
+
"mirage-crypto" {>= "1.0.0"}
+
"mirage-crypto-pk" {>= "1.0.0"}
+
]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml, MirageOS layer"
+
description: """
+
Tls-mirage provides an effectful FLOW module to be used in the MirageOS
+
ecosystem.
+
"""
+
authors: [
+
"David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"
+
]
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d"
+64
packages/tls/tls.1.0.2/opam
···
+
opam-version: "2.0"
+
homepage: "https://github.com/mirleft/ocaml-tls"
+
dev-repo: "git+https://github.com/mirleft/ocaml-tls.git"
+
bug-reports: "https://github.com/mirleft/ocaml-tls/issues"
+
doc: "https://mirleft.github.io/ocaml-tls/doc"
+
maintainer: ["Hannes Mehnert <hannes@mehnert.org>" "David Kaloper <david@numm.org>"]
+
license: "BSD-2-Clause"
+
+
build: [
+
["dune" "subst"] {dev}
+
["dune" "build" "-p" name "-j" jobs]
+
["dune" "runtest" "-p" name "-j" jobs] {with-test}
+
]
+
+
depends: [
+
"ocaml" {>= "4.13.0"}
+
"dune" {>= "3.0"}
+
"mirage-crypto" {>= "1.1.0"}
+
"mirage-crypto-ec" {>= "1.0.0"}
+
"mirage-crypto-pk" {>= "1.0.0"}
+
"mirage-crypto-rng" {>= "1.0.0"}
+
"x509" {>= "1.0.0"}
+
"domain-name" {>= "0.3.0"}
+
"fmt" {>= "0.8.7"}
+
"ounit2" {with-test & >= "2.2.0"}
+
"kdf" {>= "1.0.0"}
+
"logs"
+
"ipaddr"
+
"ohex" {>= "0.2.0"}
+
"digestif" {>= "1.2.0"}
+
"alcotest" {with-test}
+
"cmdliner" {with-test & >= "1.3.0"}
+
]
+
conflicts: [ "result" {< "1.5"} ]
+
tags: [ "org:mirage"]
+
synopsis: "Transport Layer Security purely in OCaml"
+
description: """
+
Transport Layer Security (TLS) is probably the most widely deployed security
+
protocol on the Internet. It provides communication privacy to prevent
+
eavesdropping, tampering, and message forgery. Furthermore, it optionally
+
provides authentication of the involved endpoints. TLS is commonly deployed for
+
securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails,
+
virtual private networks, and wireless networks.
+
+
TLS uses asymmetric cryptography to exchange a symmetric key, and optionally
+
authenticate (using X.509) either or both endpoints. It provides algorithmic
+
agility, which means that the key exchange method, symmetric encryption
+
algorithm, and hash algorithm are negotiated.
+
+
Read [further](https://nqsb.io) and our [Usenix Security 2015 paper](https://usenix15.nqsb.io).
+
"""
+
available: [ arch != "arm32" ]
+
authors: [
+
"David Kaloper <david@numm.org>" "Hannes Mehnert <hannes@mehnert.org>"
+
]
+
url {
+
src:
+
"https://github.com/mirleft/ocaml-tls/releases/download/v1.0.2/tls-1.0.2.tbz"
+
checksum: [
+
"sha256=a21751200cb3146ffe1547f5d6de187b5147e8ee6bed12b09d52c002d42b3feb"
+
"sha512=20f74cd724c84dead81c5a124db7b65519a8e23b7305bb7cc7cd1ebb7648ac262ef72534af931e55a10ad2ba75a7541244b8feabad6834c20061e435aaf7af16"
+
]
+
}
+
x-commit-hash: "75cb3b6db90c871756d237aff174e3ebce93291d" # see SIGBUS failures at https://github.com/ocaml/opam-repository/pull/26387