Index: configure.ac ================================================================== --- configure.ac +++ configure.ac @@ -13,11 +13,11 @@ # GNU Affero General Public License for more details. # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see . -AC_INIT([net2o], [0.8.8-20190404], [bernd@net2o.de], [net2o], [https://fossil.net2o.de/net2o/reportlist]) +AC_INIT([net2o], [0.8.8-20190502], [bernd@net2o.de], [net2o], [https://fossil.net2o.de/net2o/reportlist]) AC_PREREQ([2.59]) AC_CONFIG_MACRO_DIR([m4]) AC_USE_SYSTEM_EXTENSIONS LT_INIT Index: do ================================================================== --- do +++ do @@ -1,10 +1,10 @@ #!/bin/bash echo "This script builds net2o from scratch" -GFORTH=gforth-0.7.9_20190404 +GFORTH=gforth-0.7.9_20190501 if [ "$(uname -o)" = "Cygwin" ] then CONFOPT="--prefix=/usr $*" else Index: wiki/commands.md ================================================================== --- wiki/commands.md +++ wiki/commands.md @@ -1,8 +1,8 @@ # Commands # -Version 0.8.8-20190404. +Version 0.8.8-20190502. net2o separates data and commands. Data is passed through to higher layers, commands are interpreted when they arrive. For connection requests, a special bit is set, and the address then isn't used as address, but as IV for the opportunistic encoding. @@ -271,11 +271,21 @@ * $19 rskkey ( $:string --- ) revoke key, temporarily stored * $1A keypet ( $:string -- ) * $1B walletkey ( $:seed -- ) * $1C avatar ( $:string -- ) - key profile (hash of a resource) + key avatar profile (hash of a resource) +* $1D key-string1 ( $:string -- ) +* $1E key-string2 ( $:string -- ) +* $1F key-string3 ( $:string -- ) +* $20 key-string4 ( $:string -- ) +* $21 key-sec1 ( $:string -- ) +* $22 key-sec2 ( $:string -- ) +* $23 key-num1 ( 64n -- ) +* $24 key-num2 ( 64n -- ) +* $25 key-num3 ( 64n -- ) +* $26 key-num4 ( 64n -- ) read a nested key into sample-key ### address commands ### * $11 addr-pri# ( n -- )