Skip to content
  • Nick Mathewson's avatar
    Be smarter about getting key matter from DH. · f12fdd62
    Nick Mathewson authored
    Formerly, once we had g^xy, we took the last N bytes from g^xy.
    
    Now, we take SHA(g^xy || [0]) || SHA1(g^xy || [1]) || ... , in order
    to use all bits from g^xy equally, and generate as much key material
    as we need.
    
    
    svn:r370
    f12fdd62