|
| 1 | +opam-version: "2.0" |
| 2 | +homepage: "https://github.com/mirleft/ocaml-tls" |
| 3 | +dev-repo: "git+https://github.com/mirleft/ocaml-tls.git" |
| 4 | +bug-reports: "https://github.com/mirleft/ocaml-tls/issues" |
| 5 | +doc: "https://mirleft.github.io/ocaml-tls/doc" |
| 6 | +maintainer: ["Hannes Mehnert < [email protected]>" "David Kaloper < [email protected]>"] |
| 7 | +license: "BSD-2-Clause" |
| 8 | + |
| 9 | +build: [ |
| 10 | + ["dune" "subst"] {dev} |
| 11 | + ["dune" "build" "-p" name "-j" jobs] |
| 12 | + ["dune" "runtest" "-p" name "-j" jobs] {with-test} |
| 13 | +] |
| 14 | + |
| 15 | +depends: [ |
| 16 | + "ocaml" {>= "4.13.0"} |
| 17 | + "dune" {>= "3.0"} |
| 18 | + "mirage-crypto" {>= "1.1.0"} |
| 19 | + "mirage-crypto-ec" {>= "1.0.0"} |
| 20 | + "mirage-crypto-pk" {>= "1.0.0"} |
| 21 | + "mirage-crypto-rng" {>= "1.2.0"} |
| 22 | + "x509" {>= "1.0.0"} |
| 23 | + "domain-name" {>= "0.3.0"} |
| 24 | + "fmt" {>= "0.8.7"} |
| 25 | + "ounit2" {with-test & >= "2.2.0"} |
| 26 | + "kdf" {>= "1.0.0"} |
| 27 | + "logs" |
| 28 | + "ipaddr" |
| 29 | + "ohex" {>= "0.2.0"} |
| 30 | + "digestif" {>= "1.2.0"} |
| 31 | + "alcotest" {with-test} |
| 32 | + "cmdliner" {with-test & >= "1.3.0"} |
| 33 | +] |
| 34 | +conflicts: [ "result" {< "1.5"} ] |
| 35 | +tags: [ "org:mirage"] |
| 36 | +synopsis: "Transport Layer Security purely in OCaml" |
| 37 | +description: """ |
| 38 | +Transport Layer Security (TLS) is probably the most widely deployed security |
| 39 | +protocol on the Internet. It provides communication privacy to prevent |
| 40 | +eavesdropping, tampering, and message forgery. Furthermore, it optionally |
| 41 | +provides authentication of the involved endpoints. TLS is commonly deployed for |
| 42 | +securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails, |
| 43 | +virtual private networks, and wireless networks. |
| 44 | + |
| 45 | +TLS uses asymmetric cryptography to exchange a symmetric key, and optionally |
| 46 | +authenticate (using X.509) either or both endpoints. It provides algorithmic |
| 47 | +agility, which means that the key exchange method, symmetric encryption |
| 48 | +algorithm, and hash algorithm are negotiated. |
| 49 | + |
| 50 | +Read our [Usenix Security 2015 paper](https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kaloper-mersinjak). |
| 51 | +""" |
| 52 | +available: [ arch != "arm32" ] # see SIGBUS failures at https://github.com/ocaml/opam-repository/pull/26387 |
| 53 | +x-maintenance-intent: [ "(latest)" ] |
| 54 | +authors: [ |
| 55 | + "David Kaloper < [email protected]>" "Hannes Mehnert < [email protected]>" |
| 56 | +] |
| 57 | +url { |
| 58 | + src: |
| 59 | + "https://github.com/mirleft/ocaml-tls/releases/download/v2.0.2/tls-2.0.2.tbz" |
| 60 | + checksum: [ |
| 61 | + "sha256=9ba50fd0cd20c9be1b6c9980f0d71343cc317446db55217eb39937ac4a8cb21a" |
| 62 | + "sha512=c401deb74c8d78f4c729400ef58a5f8a8049fd53d6efa7dfc968c5b2ced167cc2d819228a4778a4b7f257719964d08a50fe94d9cb2985ab38559fbb6940b8767" |
| 63 | + ] |
| 64 | +} |
| 65 | +x-commit-hash: "92bd5f757af46bee2cb278ac06524a78074ea29f" |
0 commit comments