Bumps BP_VERSION to 0.2.0, BP_MIN_COMPATIBLE_VERSION to
0.2.0, adds the comprehensive 0.2.0 CHANGELOG entry.
Fixes the last asymmetry surfaced by the TCP-loopback
ED25519 test: the originator's ED25519 M_PWD path didn't
populate FSessionPwd, so post-auth CRYPT activation was
asymmetric (answerer set up the stream, originator didn't,
both hung waiting to decrypt each other's garbage). The
originator now runs the same OnLookupPassword lookup the
answerer's OnFrame_MPWD uses, so CRYPT keys agree or don't
activate on either side.
Examples grew FPC_BINKP_PRIVKEY / FPC_BINKP_PEERKEY env
var hooks so a two-process TCP loopback can exercise the
full ED25519+CRYPT+GZ stack end-to-end. example_outbound
also prints the session's final AuthMethod + TX block.
Live loopback result (same-machine TCP, both ends
fpc-binkp):
- 64 KB AAAA file, ED25519 auth + CRYPT stream cipher +
EXTCMD GZ + secure-routing, delivered in 607 wire bytes,
SHA-verified byte-identical on inbound secure dir.
- Inbound trace confirms full ED25519 path: keypair
derived, answerer challenge issued, originator's
signature verified, AuthMethod=bpAuthED25519.
All 98 checks across 7 test programs green, 5 platforms
clean (x86_64-linux, i386-go32v2, i386-os2, i386-win32,
i386-linux, i386-freebsd). Live Argus regression still
passes (regular + FREQ-client).