You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to the document about AEAD in shadowsocks.org. HKDF_SHA1 is strong enough even if the in put key is weak.
But I get the code in ss-go2 that hashing and expanding the input key to requested key length first, then get the hashed key do the HKDF_SHA1 again to get the subkey for AEAD.
Why do this? And I can't see the document request for re-hashing & expanding for the key.
According to the document about AEAD in shadowsocks.org. HKDF_SHA1 is strong enough even if the in put key is weak.
But I get the code in ss-go2 that hashing and expanding the input key to requested key length first, then get the hashed key do the
HKDF_SHA1
again to get the subkey for AEAD.Why do this? And I can't see the document request for re-hashing & expanding for the key.
Only once HKDF operation is leaking safty?
Thx dude, waiting for reply.
@riobard
The text was updated successfully, but these errors were encountered: