Age | Commit message (Collapse) | Author |
|
|
|
|
|
(issue #1529)
|
|
|
|
|
|
|
|
protocol)
|
|
protocol)
|
|
This allows the input callback function for a buffer to receive multiple
lines at once, instead of the message being split on newline before
being sent to the callback. It adds a new flag, input_multiline, to
control this. This flag defaults to 0 which is the current behavior.
|
|
|
|
The value can be "zlib" (default in relay) or "off".
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
(weechat protocol)
Configuration options renamed:
* relay.network.auth_password -> relay.network.password_hash_algo
* relay.network.hash_iterations -> relay.network.password_hash_iterations
Handshake command options renamed:
* password -> password_hash_algo
Handshake reply keys renamed:
* auth_password -> password_hash_algo
* hash_iterations -> password_hash_iterations
|
|
|
|
|
|
|
|
|
|
protocol)
|
|
|
|
prevent replay attacks (closes #1474)
This introduces a new command called "handshake" in the weechat relay protocol.
It should be sent by the client before the "init" command, to negotiate the way
to authenticate with a password.
3 new options are added:
* relay.network.auth_password
* relay.network.hash_iterations
* relay.network.nonce_size
|
|
|
|
Allowed algorithms are:
* PBKDF2 (SHA256 or SHA512, salt, iterations)
* SHA256
* SHA512
|
|
|
|
|
|
|
|
authentication factor in weechat protocol
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
found (closes #767)
|
|
|
|
|
|
|