| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
Initial sketch of the peripheral storage infrastructure for the new
axolotl-based encryption scheme.
|
| |
|
| |
|
| |
|
|\ |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
|/
|
|
| |
be careful: little error handling and no encryption
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
reflection
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\ |
|
| | |
|
| | |
|
|\ \ |
|
| |\ \
| | | |
| | | | |
fix to detect the sender jid correctly
|
| | | | |
|