Check-in [1ef068a4dc]
Not logged in

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

Overview
Comment:Bump version number
Timelines: family | ancestors | descendants | both | trunk | 0.8.8-20190502
Files: files | file ages | folders
SHA1: 1ef068a4dce2ddd38316568f13c1f8ad0ed93d95
User & Date: bernd 2019-05-02 14:57:40
Context
2019-05-02
18:33
Add Night mode check-in: 706f86b9b4 user: bernd tags: trunk
14:57
Bump version number check-in: 1ef068a4dc user: bernd tags: trunk, 0.8.8-20190502
2019-04-30
22:23
Add dummies for future expansion of pubkey format check-in: 528007f864 user: bernd tags: trunk
Changes
Hide Diffs Unified Diffs Ignore Whitespace Patch

Changes to configure.ac.

11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.

# You should have received a copy of the GNU Affero General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

AC_INIT([net2o], [0.8.8-20190404], [bernd@net2o.de], [net2o], [https://fossil.net2o.de/net2o/reportlist])
AC_PREREQ([2.59])
AC_CONFIG_MACRO_DIR([m4])
AC_USE_SYSTEM_EXTENSIONS
LT_INIT

AC_MSG_CHECKING([for gforth])








|







11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.

# You should have received a copy of the GNU Affero General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

AC_INIT([net2o], [0.8.8-20190502], [bernd@net2o.de], [net2o], [https://fossil.net2o.de/net2o/reportlist])
AC_PREREQ([2.59])
AC_CONFIG_MACRO_DIR([m4])
AC_USE_SYSTEM_EXTENSIONS
LT_INIT

AC_MSG_CHECKING([for gforth])

Changes to do.

1
2
3
4
5
6
7
8
9
10
11
12
#!/bin/bash

echo "This script builds net2o from scratch"

GFORTH=gforth-0.7.9_20190404

if [ "$(uname -o)" = "Cygwin" ]
then
    CONFOPT="--prefix=/usr $*"
else
    CONFOPT="$*"
fi




|







1
2
3
4
5
6
7
8
9
10
11
12
#!/bin/bash

echo "This script builds net2o from scratch"

GFORTH=gforth-0.7.9_20190501

if [ "$(uname -o)" = "Cygwin" ]
then
    CONFOPT="--prefix=/usr $*"
else
    CONFOPT="$*"
fi

Changes to wiki/commands.md.

1
2
3
4
5
6
7
8
9
10
...
269
270
271
272
273
274
275
276










277
278
279
280
281
282
283
# Commands #

Version 0.8.8-20190404.

net2o separates data and commands.  Data is passed through to higher
layers, commands are interpreted when they arrive.  For connection
requests, a special bit is set, and the address then isn't used as
address, but as IV for the opportunistic encoding.

The command interpreter is a stack machine with two data types: 64
................................................................................
  add a key signature
* $18 keyimport ( n -- )
* $19 rskkey ( $:string --- )
  revoke key, temporarily stored
* $1A keypet ( $:string -- )
* $1B walletkey ( $:seed -- )
* $1C avatar ( $:string -- )
  key profile (hash of a resource)










  read a nested key into sample-key

### address commands ###

* $11 addr-pri# ( n -- )
  priority
* $12 addr-id ( $:id -- )


|







 







|
>
>
>
>
>
>
>
>
>
>







1
2
3
4
5
6
7
8
9
10
...
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
# Commands #

Version 0.8.8-20190502.

net2o separates data and commands.  Data is passed through to higher
layers, commands are interpreted when they arrive.  For connection
requests, a special bit is set, and the address then isn't used as
address, but as IV for the opportunistic encoding.

The command interpreter is a stack machine with two data types: 64
................................................................................
  add a key signature
* $18 keyimport ( n -- )
* $19 rskkey ( $:string --- )
  revoke key, temporarily stored
* $1A keypet ( $:string -- )
* $1B walletkey ( $:seed -- )
* $1C avatar ( $:string -- )
  key avatar profile (hash of a resource)
* $1D key-string1 ( $:string -- )
* $1E key-string2 ( $:string -- )
* $1F key-string3 ( $:string -- )
* $20 key-string4 ( $:string -- )
* $21 key-sec1 ( $:string -- )
* $22 key-sec2 ( $:string -- )
* $23 key-num1 ( 64n -- )
* $24 key-num2 ( 64n -- )
* $25 key-num3 ( 64n -- )
* $26 key-num4 ( 64n -- )
  read a nested key into sample-key

### address commands ###

* $11 addr-pri# ( n -- )
  priority
* $12 addr-id ( $:id -- )