Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
Overview
Comment: | Bump version number |
---|---|
Timelines: | family | ancestors | descendants | both | trunk | 0.8.8-20190502 |
Files: | files | file ages | folders |
SHA1: |
1ef068a4dce2ddd38316568f13c1f8ad |
User & Date: | bernd 2019-05-02 14:57:40.939 |
Context
2019-05-02
| ||
18:33 | Add Night mode check-in: 706f86b9b4 user: bernd tags: trunk | |
14:57 | Bump version number check-in: 1ef068a4dc user: bernd tags: trunk, 0.8.8-20190502 | |
2019-04-30
| ||
22:23 | Add dummies for future expansion of pubkey format check-in: 528007f864 user: bernd tags: trunk | |
Changes
Changes to configure.ac.
︙ | ︙ | |||
11 12 13 14 15 16 17 | # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Affero General Public License for more details. # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. | | | 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 | # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Affero General Public License for more details. # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. AC_INIT([net2o], [0.8.8-20190502], [bernd@net2o.de], [net2o], [https://fossil.net2o.de/net2o/reportlist]) AC_PREREQ([2.59]) AC_CONFIG_MACRO_DIR([m4]) AC_USE_SYSTEM_EXTENSIONS LT_INIT AC_MSG_CHECKING([for gforth]) |
︙ | ︙ |
Changes to do.
1 2 3 4 | #!/bin/bash echo "This script builds net2o from scratch" | | | 1 2 3 4 5 6 7 8 9 10 11 12 | #!/bin/bash echo "This script builds net2o from scratch" GFORTH=gforth-0.7.9_20190501 if [ "$(uname -o)" = "Cygwin" ] then CONFOPT="--prefix=/usr $*" else CONFOPT="$*" fi |
︙ | ︙ |
Changes to wiki/commands.md.
1 2 | # Commands # | | | 1 2 3 4 5 6 7 8 9 10 | # Commands # Version 0.8.8-20190502. net2o separates data and commands. Data is passed through to higher layers, commands are interpreted when they arrive. For connection requests, a special bit is set, and the address then isn't used as address, but as IV for the opportunistic encoding. The command interpreter is a stack machine with two data types: 64 |
︙ | ︙ | |||
269 270 271 272 273 274 275 | add a key signature * $18 keyimport ( n -- ) * $19 rskkey ( $:string --- ) revoke key, temporarily stored * $1A keypet ( $:string -- ) * $1B walletkey ( $:seed -- ) * $1C avatar ( $:string -- ) | | > > > > > > > > > > | 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 | add a key signature * $18 keyimport ( n -- ) * $19 rskkey ( $:string --- ) revoke key, temporarily stored * $1A keypet ( $:string -- ) * $1B walletkey ( $:seed -- ) * $1C avatar ( $:string -- ) key avatar profile (hash of a resource) * $1D key-string1 ( $:string -- ) * $1E key-string2 ( $:string -- ) * $1F key-string3 ( $:string -- ) * $20 key-string4 ( $:string -- ) * $21 key-sec1 ( $:string -- ) * $22 key-sec2 ( $:string -- ) * $23 key-num1 ( 64n -- ) * $24 key-num2 ( 64n -- ) * $25 key-num3 ( 64n -- ) * $26 key-num4 ( 64n -- ) read a nested key into sample-key ### address commands ### * $11 addr-pri# ( n -- ) priority * $12 addr-id ( $:id -- ) |
︙ | ︙ |