docs: Update example

This commit is contained in:
PapaTutuWawa 2023-06-16 00:18:14 +02:00
parent 4ed2d3dec3
commit 0b2d6f0a97
2 changed files with 8 additions and 3 deletions

View File

@ -145,6 +145,11 @@ void main() async {
/// The text of the <payload /> element, if it exists. If not, then the message might be /// The text of the <payload /> element, if it exists. If not, then the message might be
/// a hearbeat, where no payload is sent. In that case, use null. /// a hearbeat, where no payload is sent. In that case, use null.
payload, payload,
/// Since we did not receive this message due to a catch-up mechanism, like MAM, we
/// set this to false. If we, however, did use a catch-up mechanism, we must set this
/// to true to prevent the OPKs from being replaced.
false,
), ),
); );

View File

@ -394,7 +394,7 @@ class OmemoManager {
} else { } else {
// Check if we even have a ratchet // Check if we even have a ratchet
if (!_ratchetMap.containsKey(ratchetKey)) { if (!_ratchetMap.containsKey(ratchetKey)) {
// TODO: Check if we recently failed to build a session with the device // TODO(Unknown): Check if we recently failed to build a session with the device
// This causes omemo_dart to build a session with the device. // This causes omemo_dart to build a session with the device.
if (!_deviceList[stanza.bareSenderJid]! if (!_deviceList[stanza.bareSenderJid]!
.contains(stanza.senderDeviceId)) { .contains(stanza.senderDeviceId)) {
@ -517,7 +517,7 @@ class OmemoManager {
bundle, bundle,
ownDevice.ik, ownDevice.ik,
); );
// TODO: Track the failure and do not attempt to encrypt to this device // TODO(Unknown): Track the failure and do not attempt to encrypt to this device
// on every send. // on every send.
if (kexResultRaw.isType<InvalidKeyExchangeSignatureError>()) { if (kexResultRaw.isType<InvalidKeyExchangeSignatureError>()) {
encryptionErrors.appendOrCreate( encryptionErrors.appendOrCreate(