mirror of
https://gitlab.com/yawning/obfs4.git
synced 2024-11-15 12:12:53 +00:00
1fee9678c6
Instead of including the previous secretbox in the input when calculating the SipHash-2-4 digest used to generate the obfuscation mask, use only the nonce. This is significantly faster, and if someone breaks obfs4 by exploiting the low amount of input entropy between each invocation (a counter incrementing by 1), I hope they publish the attack on the PRF. This breaks wire protocol compatibility. |
||
---|---|---|
.. | ||
framing_test.go | ||
framing.go |