~eau/wic

ok let's fix those bugs, need to implement SAS.. but i'll still that from olvid implementation when it's done.
implemented the beginning of load/save for the keys.
updated some docs.
bumped version
upgraded some modules.
bugfixes in the key mask/unmask when a new key was sent to a newly present user,
leading to the unability to encrypt/decrypt.
also fixing a potential race in unmasking a key in memory where the key would be unmasked, while it was already masked, leading to crypto errors.
some cleanup.
some minor cleanups
typo in key bindings.
Updated README.
Merge branch 'master' of git.sr.ht:~eau/wic into master
Now each channel message key is derived from a master key.

Added some key bindings into the script:
Alt+K: broadcast keys
Alt+t: accept ONLY trusted broadcast/key exchange.
Alt+T: accept ALL trusted broadcast/key exchange.
Now each channel message key is derived from a master key.

Added some key bindings into the script:
Alt+K: broadcast keys
Alt+t: accept ONLY trusted broadcast/key exchange.
Alt+T: accept ALL trusted broadcast/key exchange.
now each message derivate its own ephemeral aead key, we're trying to see if this is
costly or not CPU wise, but I doubt it..
however we need to mask the key in memory within our own structs... GC is against us... :(
need to find workaround.
Adding the first very naive proverif attempt on just the Key EXchange implemneted in WIC.
now it's about modeling the fully implemented WIC Key exchange as well as query various
potential problematic events.
This naive model just checks if the secret can be retrieved from the KEX.
README update.
started the status request to get informations about, numbers of trusts loaded, number of networks, and nicknames
next: implement save & load and key shortcuts.
README adding bugs & mailing list links.
updating README again.. :)
gofmt
Next