Download project resources
This page proposes to download resources related to the ROHC library. Unsupported releases are also available.
Verifying the integrity of downloaded files before using them is greatly recommended.
Learn how to build the library from sources on the wiki.
Up-to-date releases
release 2.3.1 (stable)
The 2.3.1 release is a bugfix release:
- configure: create missing scripts for better compatibility. Reported by Ole Gabriel Stein.
- Tell Git to ignore GPG signatures of release tarballs
The 2.3.0 release was a major release that introduced new features such as:
- add partial ROHCv2 IP/UDP/RTP profile
- improve conformance to compression standards
- improve compression efficiency (save more bits)
- improve compression robustness (be more robust to packet loss)
- improve compression CPU performances
See the full changelog on Github for more details.
The 2.3.x releases are fully supported. They will become old stable as soon as major version 2.4.0 will be released.
release 2.2.0 (old stable)
The 2.2.0 release is a major release that introduces new features such as:
- ROHCv2 IP-only, IP/ESP and IP/UDP profiles,
- better conformance to ROHC standards:
- RFC3095: handle the IR D flag of IP-only, UDP, ESP, and UDP-Lite profiles,
- RFC3843: add support for Static Chain Termination,
- preliminary Wireshark dissector in Lua,
- bug fixes:
- TCP profile: do not skip MSN 65535 at compressor,
- better robustness of decompressor for TCP profile:
- Context Replication: check whether base context does exist before using it,
- avoid assertion at decompressor with malformed TCP options: length of TCP options is not a multiple of 32-bit words, or large TCP options > 40 bytes,
- handle length-changing generic TCP options.
- kernel:
- fix 64-bit division,
- fix nonnull warnings,
- fix test application/script for Linux kernel module.
- sniffer:
- handle packet timing so that context re-use works correctly
- detect layer-3 protocol from Ethernet protocol type.
The 2.2.x releases are fully supported. They will become deprecated as soon as major version 2.3.0 will be released.
How to verify downloaded files?
There are two ways to check the files you've downloaded:
- using their checksum,
- using their digital signature.
The checksum lets you check that the file was not corrupted during the transfer from the server to your machine. The digital signature lets you check that the file was created by the project maintainer and not altered since then.
Using the checksum
The checksum is a short sequence of letters and numbers obtained by using the SHA-256 hashing algorithm on a file.
You can use that sequence, called the SHA-256 sum, to check that the file has arrived on your machine intact.
- Download the checksum file to the same directory where you've downloaded the project file you want to verify. The checksum file will have the same name as the project file you've downloaded but with .sha256 appended to the end.
- Open a terminal, change to the directory where you have saved the file and accompanying
checksum, then enter the following:
$ sha256sum -c checksumfilename
Replace checksumfilename with the checksum filename. Obviously you need to replace filename with the name of the file you downloaded. - You'll see a line saying whether file integrity is fine or not.
filename: OK
filename: FAILED
If the checksum does not match, do not use the downloaded file. Try to download it again. If it fails again, tell so on the project mailing list.
sha256sum: WARNING: 1 computed checksum did NOT match
Verifying a signature
You can tell which files have a signature by looking out for the sig link alongside the checksum link. Verifying the files signature lets you check that the file is exactly as intended by the project maintainer.
- Download the signature file to the same directory where you've downloaded the project file you want to verify. The signature file will have the same name as the project file you've downloaded but with .asc or .sig appended to the end.
- Open a terminal, change to the directory where you have saved the file and accompanying
signature, then enter the following:
$ gpg --verify signaturefilename
Replace signaturefilename with the signature's filename. gpg will now try to check the signature against the signer's public key. If your version of gpg is configured to retrieve public keys automatically, you can skip to step 3. Otherwise, you'll need to fetch the signer's public key manually. - If gpg can't find the public key on your local system, it will give you an error message
similar to this:
$ gpg --verify signaturefilename
That's no problem: you can easily retrieve the public key. Simply copy the key ID; it's the alphanumeric code, 008E8DAD, at the end of the first line of the error message. Next, enter:
gpg: Signature made Sun May 30 19:24:46 2010 CEST using DSA key ID 008E8DAD
gpg: Can't check signature: No public key$ gpg --recv-keys 5EAE8FAA34ED228523A7CC0184AD9033008E8DAD 3B7029D19456ABFE48B6B803D71627AD1B2BB9C1
gpg will now pull down the public key and you can re-run gpg --verify signaturefilename
gpg: requesting key 008E8DAD from hkp server keys.gnupg.net
gpg: requesting key 1B2BB9C1 from hkp server keys.gnupg.net
gpg: key 008E8DAD: public key "Didier Barvaux <didier@barvaux.org>" imported
gpg: key 1B2BB9C1: public key "Didier Barvaux <didier@barvaux.org>" imported
gpg: Total number processed: 2
gpg: imported: 2 - When asking for verifying signature, you'll see a message from gpg that is similar to
this:
$ gpg --verify signaturefilename
This message shows that the file hasn't changed since it was signed by the maintainer. The file is safe for use if the fingerprint printed by the gpg command matches one of the two hereafter:
gpg: Signature made Sun May 30 19:24:46 2010 CEST using DSA key ID 008E8DAD
gpg: Good signature from "Didier Barvaux <didier@barvaux.org>"
gpg: aka "Didier Barvaux <didier@barvaux.fr>"
gpg: aka "Didier Barvaux <didier.barvaux@wanadoo.fr>"
gpg: aka "Didier Barvaux <didier.barvaux@toulouse.viveris.com>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 5EAE 8FAA 34ED 2285 23A7 CC01 84AD 9033 008E 8DAD008E8DAD: 5EAE 8FAA 34ED 2285 23A7 CC01 84AD 9033 008E 8DAD
If the fingerprint does not match, do not use the downloaded file. Try to download it again. If it fails again and the checksum says the file is OK, tell so on the project mailing list.
1B2BB9C1: 3B70 29D1 9456 ABFE 48B6 B803 D716 27AD 1B2B B9C1
Unsupported releases
The releases hereafter are not supported anymore. They contains known bugs and security problems. Please update to a supported releases quickly.
release 2.3.0
release 2.1.0
release 2.0.0
release 1.7.0
release 1.6.1
release 1.6.0
Source code to build the library | 984 KB | checksum | signature
The API documentation of the library in HTML format | 8 MB | checksum | signature
The network PCAP captures required for running the library tests | 65 MB | checksum | signature
release 1.5.3
release 1.5.2
Source code to build the library | 698 KB | checksum | signature
The API documentation of the library in HTML format | 6.7 MB | checksum | signature
The network PCAP captures required for running the library tests | 39 MB | checksum | signature
release 1.5.1
Source code to build the library | 678 KB | checksum | signature
The API documentation of the library in HTML format | 6.7 MB | checksum | signature
The network PCAP captures required for running the library tests | 39 MB | checksum | signature
release 1.5.0
Source code to build the library | 675 KB | checksum | signature
The API documentation of the library in HTML format | 6.7 MB | checksum | signature
The network PCAP captures required for running the library tests | 39 MB | checksum | signature
release 1.4.3
Source code to build the library | 600 KB | checksum | signature
The API documentation of the library in HTML format | 3.5 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.4.2
Source code to build the library | 601 KB | checksum | signature
The API documentation of the library in HTML format | 3.5 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.4.1
Source code to build the library | 490 KB | checksum | signature
The API documentation of the library in HTML format | 3.5 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.4.0
Source code to build the library | 490 KB | checksum | signature
The API documentation of the library in HTML format | 3.5 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.3.3
Source code to build the library | 1.2 MB | checksum | signature
The API documentation of the library in HTML format | 3.9 MB | checksum | signature
The network PCAP captures required for running the library tests | 36 MB | checksum | signature
release 1.3.2
Source code to build the library | 1.2 MB | checksum | signature
The API documentation of the library in HTML format | 3.9 MB | checksum | signature
The network PCAP captures required for running the library tests | 35 MB | checksum | signature
release 1.3.1
Source code to build the library | 924 KB | checksum | signature
The API documentation of the library in HTML format | 3.6 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.3.0
Source code to build the library | 930 KB | checksum | signature
The API documentation of the library in HTML format | 3.6 MB | checksum | signature
The network PCAP captures required for running the library tests | 38 MB | checksum | signature
release 1.2.3
Source code to build the library | 25 MB | checksum | signature
The API documentation of the library in HTML format | 3.6 MB | checksum | signature
release 1.2.2
Source code to build the library | 26 MB | checksum | signature
The API documentation of the library in HTML format | 3.3 MB | checksum | signature
release 1.2.1
Source code to build the library | 26 MB | checksum | signature
The API documentation of the library in HTML format | 3.2 MB | checksum | signature
release 1.2.0
Source code to build the library | 26 MB | checksum | signature
The API documentation of the library in HTML format | 3.4 MB | checksum | signature
release 1.1.0
release 1.0.0
Releases
Next major release: 2.4.0 Git branch roadmap
Current stable release: 2.3.1 download release notes
Previous stable release: 2.2.0 download release notes
Sponsors
Viveris
provides to the ROHC project the skills of its engineering teams in the telecommunications,
network and Linux fields.
Viveris is a French engineering company specialized in advanced technologies and IT. For 30 years, Viveris has developed a pole of competences in embedded network services products.
Viveris proposes its knowledge and expertise on network header compression to companies through the Viveris OpenSource team.