Telethon/telethon
Aaron Gallagher b0e0bc3701 Extend new_algo.salt1 to fix edit_2fa (#1072)
The salt1 that is sent to the server requires an additional 32 bytes
of random data. It's easy to miss this requirement from reading the 
tdesktop source, because this extension is done in a function called
`ValidateNewCloudPasswordAlgo`.

https://github.com/telegramdesktop/tdesktop/blob/2e5a0e056cdb40d61d487c6062bffe1a835f
6ddd/Telegram/SourceFiles/core/core_cloud_password.cpp#L210-L211
2018-12-24 21:16:09 +01:00
..
client Extend new_algo.salt1 to fix edit_2fa (#1072) 2018-12-24 21:16:09 +01:00
crypto Actually perform all checks in 2fa 2018-12-24 14:16:50 +01:00
errors Show the request that caused RPC errors in their messages 2018-10-15 18:35:51 +02:00
events Except TypeError on empty access hash from 5018879 thoroughly 2018-12-18 08:39:36 +01:00
extensions Locally strip outgoing message text respecting entities 2018-11-19 10:15:56 +01:00
network Actually perform all checks in 2fa 2018-12-24 14:16:50 +01:00
sessions Fix get entity by exact name since 2ca8ddb 2018-11-15 17:23:47 +01:00
tl Implement click for KeyboardButtonGame 2018-12-24 17:56:30 +01:00
__init__.py Get rid of full_sync 2018-11-03 12:46:19 +01:00
default.py Create a default module to use as a sentinel value 2018-10-05 14:20:50 +02:00
helpers.py Remove old code to get the hash of a password 2018-12-24 14:47:39 +01:00
password.py Fast-path good known prime in 2fa 2018-12-24 20:17:31 +01:00
sync.py Avoid caching event loop in telethon.sync 2018-11-10 11:34:26 +01:00
utils.py Use getUsers/getChannels with hash 0 on get_input_entity 2018-12-24 17:32:16 +01:00
version.py Update to v1.4.3 2018-12-04 14:09:17 +01:00