diff --git a/include/axolotl/axolotl.hh b/include/axolotl/axolotl.hh
index e333dbc27523671e342d73e559cbb68a8bf09e26..75c5eb5b1093f0a814f8f8378bef36ad380de8ee 100644
--- a/include/axolotl/axolotl.hh
+++ b/include/axolotl/axolotl.hh
@@ -13,94 +13,154 @@ static const size_t AXOLOTL_MESSAGE_TYPE_MESSAGE = 1;
 struct AxolotlAccount;
 struct AxolotlSession;
 
+/** The size of an account object in bytes */
 size_t axolotl_account_size();
 
+/** The size of a session object in bytes */
 size_t axolotl_session_size();
 
+/** Initialise an account object using the supplied memory
+ *  The supplied memory must be at least axolotl_account_size() bytes */
 AxolotlAccount * axolotl_account(
     void * memory
 );
 
+/** Initialise a session object using the supplied memory
+ *  The supplied memory must be at least axolotl_session_size() bytes */
 AxolotlSession * axolotl_session(
     void * memory
 );
 
+/** The value that axolotl will return from a function if there was an error */
 size_t axolotl_error();
 
+/** A null terminated string describing the most recent error to happen to an
+ * account */
 const char * axolotl_account_last_error(
     AxolotlSession * account
 );
 
+/** A null terminated string describing the most recent error to happen to a
+ * session */
 const char * axolotl_session_last_error(
     AxolotlSession * session
 );
 
+/** Returns the number of bytes needed to store an account */
 size_t axolotl_pickle_account_length(
     AxolotlAccount * account
 );
 
+/** Returns the number of bytes needed to store a session */
 size_t axolotl_pickle_session_length(
     AxolotlSession * session
 );
 
+/** Stores an account as a base64 string. Encrypts the account using the
+ * supplied key. Returns the length of the pickled account on success.
+ * Returns axolotl_error() on failure. If the pickle output buffer
+ * is smaller than axolotl_pickle_account_length() then
+ * axolotl_account_last_error() will be "OUTPUT_BUFFER_TOO_SMALL" */
 size_t axolotl_pickle_account(
     AxolotlAccount * account,
     void const * key, size_t key_length,
     void * pickled, size_t pickled_length
 );
 
+/** Stores a session as a base64 string. Encrypts the session using the
+ * supplied key. Returns the length of the pickled session on success.
+ * Returns axolotl_error() on failure. If the pickle output buffer
+ * is smaller than axolotl_pickle_session_length() then
+ * axolotl_session_last_error() will be "OUTPUT_BUFFER_TOO_SMALL" */
 size_t axolotl_pickle_session(
     AxolotlSession * session,
     void const * key, size_t key_length,
     void * pickled, size_t pickled_length
 );
 
+/** Loads an account from a pickled base64 string. Decrypts the account using
+ * the supplied key. Returns axolotl_error() on failure. If the key doesn't
+ * match the one used to encrypt the account then axolotl_account_last_error()
+ * will be "BAD_ACCOUNT_KEY". If the base64 couldn't be decoded then
+ * axolotl_account_last_error() will be "INVALID_BASE64". */
 size_t axolotl_unpickle_account(
     AxolotlAccount * account,
     void const * key, size_t key_length,
     void * pickled, size_t pickled_length
 );
 
+/** Loads a session from a pickled base64 string. Decrypts the session using
+ * the supplied key. Returns axolotl_error() on failure. If the key doesn't
+ * match the one used to encrypt the account then axolotl_session_last_error()
+ * will be "BAD_ACCOUNT_KEY". If the base64 couldn't be decoded then
+ * axolotl_session_last_error() will be "INVALID_BASE64". */
 size_t axolotl_unpickle_session(
     AxolotlSession * session,
     void const * key, size_t key_length,
     void * pickled, size_t pickled_length
 );
 
+/** The number of random bytes needed to create an account.*/
 size_t axolotl_create_account_random_length(
     AxolotlAccount * account
 );
 
+/** Creates a new account. Returns axolotl_error() on failure. If weren't
+ * enough random bytes then axolotl_account_last_error() will be
+ * "NOT_ENOUGH_RANDOM" */
 size_t axolotl_create_account(
     AxolotlAccount * account,
     void const * random, size_t random_length
 );
 
+/** The size of the output buffer needed to hold the identity keys */
 size_t axolotl_account_identity_keys_length(
     AxolotlAccount * account
 );
 
+/** Writes the public parts of the identity keys for the account into the
+ * identity_keys output buffer. The output is formatted as though it was
+ * created with sprintf(output, "[[%10d,\"%43s\"]\n]", key_id, key_base64).
+ * The output can either be parsed as fixed width using the above format or by
+ * a JSON parser. Returns axolotl_error() on failure. If the identity_keys
+ * buffer was too small then axolotl_account_last_error() will be
+ * "OUTPUT_BUFFER_TOO_SMALL". */
 size_t axolotl_account_identity_keys(
     AxolotlAccount * account,
     void * identity_keys, size_t identity_key_length
 );
 
+/** The size of the output buffer needed to hold the one time keys */
 size_t axolotl_account_one_time_keys_length(
     AxolotlAccount * account
 );
 
+/** Writes the public parts of the one time keys for the account into the
+ * one_time_keys output buffer. The first key will be formatted as though it was
+ * created with sprintf(output, "[[%10d,\"%43s\"]\n", key_id, key_base64).
+ * subsequent keys are formatted with ",[%10d,\"%43s\"]\n". The final byte of
+ * output will be "]". The output can either be parsed as fixed width using
+ * the above format or by a JSON parser. Returns axolotl_error() on failure.
+ * If the one_time_keys buffer was too small then axolotl_account_last_error()
+ * will be "OUTPUT_BUFFER_TOO_SMALL". */
 size_t axolotl_account_one_time_keys(
     AxolotlAccount * account,
-    void * identity_keys, size_t identity_key_length
+    void * one_time_keys, size_t one_time_keys_length
 );
 
 /* TODO: Add methods for marking keys as used, generating new keys, and
  * tracking which keys have been uploaded to the central servers */
 
+/** The number of random bytes needed to create an outbound session */
 size_t axolotl_create_outbound_session_random_length(
     AxolotlSession * session
 );
 
+/** Creates a new out-bound session for sending messages to a given identity_key
+ * and one_time_key. Returns axolotl_error() on failure. If the keys couldn't be
+ * decoded as base64 then axolotl_session_last_error() will be "INVALID_BASE64"
+ * If there weren't enough random bytes then axolotl_session_last_error() will
+ * be "NOT_ENOUGH_RANDOM". */
 size_t axolotl_create_outbound_session(
     AxolotlSession * session,
     AxolotlAccount * account,
@@ -110,35 +170,67 @@ size_t axolotl_create_outbound_session(
     void const * random, size_t random_length
 );
 
+/** Create a new in-bound session for sending/receiving messages from an
+ * incoming PRE_KEY message. Returns axolotl_error() on failure. If the base64
+ * couldn't be decoded then axolotl_session_last_error will be "INVALID_BASE64".
+ * If the message was for an unsupported protocol version then
+ * axolotl_session_last_error() will be "BAD_MESSAGE_VERSION". If the message
+ * couldn't be decoded then then axolotl_session_last_error() will be
+ * "BAD_MESSAGE_FORMAT". If the message refers to an unknown one time
+ * key then axolotl_session_last_error() will be "BAD_MESSAGE_KEY_ID". */
 size_t axolotl_create_inbound_session(
     AxolotlSession * session,
     AxolotlAccount * account,
     void * one_time_key_message, size_t message_length
 );
 
+/** Checks if the PRE_KEY message is for this in-bound session. This can happen
+ * if multiple messages are sent to this account before this account sends a
+ * message in reply. Returns axolotl_error() on failure. If the base64
+ * couldn't be decoded then axolotl_session_last_error will be "INVALID_BASE64".
+ * If the message was for an unsupported protocol version then
+ * axolotl_session_last_error() will be "BAD_MESSAGE_VERSION". If the message
+ * couldn't be decoded then then axolotl_session_last_error() will be
+ * "BAD_MESSAGE_FORMAT". */
 size_t axolotl_matches_inbound_session(
     AxolotlSession * session,
     void * one_time_key_message, size_t message_length
 );
 
+/** Removes the one time keys that the session used from the account. Returns
+ * axolotl_error() on failure. If the account doesn't have any matching one time
+ * keys then axolotl_account_last_error() will be "BAD_MESSAGE_KEY_ID". */
 size_t axolotl_remove_one_time_keys(
     AxolotlAccount * account,
     AxolotlSession * session
 );
 
+/** The type of the next message that axolotl_encrypt() will return. Returns
+ * AXOLOTL_MESSAGE_TYPE_PRE_KEY if the message will be a PRE_KEY message.
+ * Returns AXOLOTL_MESSAGE_TYPE_MESSAGE if the message will be a normal message.
+ * Returns axolotl_error on failure. */
 size_t axolotl_encrypt_message_type(
     AxolotlSession * session
 );
 
+/** The number of random bytes needed to encrypt the next message. */
 size_t axolotl_encrypt_random_length(
     AxolotlSession * session
 );
 
+/** The size of the next message in bytes for the given number of plain-text
+ * bytes. */
 size_t axolotl_encrypt_message_length(
     AxolotlSession * session,
     size_t plaintext_length
 );
 
+/** Encrypts a message using the session. Returns the length of the message in
+ * bytes on success. Writes the message as base64 into the message buffer.
+ * Returns axolotl_error() on failure. If the message buffer is too small then
+ * axolotl_session_last_error() will be "OUTPUT_BUFFER_TOO_SMALL". If there
+ * weren't enough random bytes then axolotl_session_last_error() will be
+ * "NOT_ENOUGH_RANDOM". */
 size_t axolotl_encrypt(
     AxolotlSession * session,
     void const * plaintext, size_t plaintext_length,
@@ -146,12 +238,30 @@ size_t axolotl_encrypt(
     void * message, size_t message_length
 );
 
+/** The maximum number of bytes of plain-text a given message could decode to.
+ * The actual size could be different due to padding. Returns axolotl_error()
+ * on failures. If the message base64 couldn't be decoded then
+ * axolotl_session_last_error() will be "INVALID_BASE64". If the message
+ * is for an unsupported version of the protocol then
+ * axolotl_session_last_error() will be "BAD_MESSAGE_VERSION". If the message
+ * couldn't be decoded then axolotl_session_last_error() will be
+ * "BAD_MESSAGE_FORMAT". */
 size_t axolotl_decrypt_max_plaintext_length(
     AxolotlSession * session,
     size_t message_type,
     void * message, size_t message_length
 );
 
+/** Decrypts a message using the session. Returns the length of the plain-text
+ * on success. Returns axolotl_error() on failure. If the plain-text buffer
+ * is smaller than axolotl_decrypt_max_plaintext_length() then
+ * axolotl_session_last_error() will be "OUTPUT_BUFFER_TOO_SMALL". If the
+ * base64 couldn't be decoded then axolotl_session_last_error() will be
+ * "INVALID_BASE64". If the message is for an unsupported version of the
+ * protocol then axolotl_session_last_error() will be "BAD_MESSAGE_VERSION".
+ * If the message couldn't be decoded then axolotl_session_last_error() will be
+ * "BAD_MESSAGE_FORMAT". If the MAC on the message was invalid then
+ * axolotl_session_last_error() will be "BAD_MESSAGE_MAC". */
 size_t axolotl_decrypt(
     AxolotlSession * session,
     size_t message_type,
diff --git a/src/axolotl.cpp b/src/axolotl.cpp
index c195a7ce12faf72b3e53555735f89db780786bf1..f03a01cda88d2992bcedad88193e0aba61d4595f 100644
--- a/src/axolotl.cpp
+++ b/src/axolotl.cpp
@@ -341,7 +341,7 @@ void output_key(
 size_t axolotl_account_identity_keys_length(
     AxolotlAccount * account
 ) {
-    return OUTPUT_KEY_LENGTH * 2 + 1;
+    return OUTPUT_KEY_LENGTH + 1;
 }
 
 
@@ -358,7 +358,6 @@ size_t axolotl_account_identity_keys(
     std::uint8_t * output = from_c(identity_keys);
     output_key(from_c(account)->identity_key, '[', output);
     output += OUTPUT_KEY_LENGTH;
-    output += OUTPUT_KEY_LENGTH;
     output[0] = ']';
     return length;
 }