commit | 9fa6fb273559d29d471df80942ce066e6e40dfde | [log] [tgz] |
---|---|---|
author | Paul Kehrer <paul.l.kehrer@gmail.com> | Sat Dec 02 00:41:25 2017 +0800 |
committer | Alex Gaynor <alex.gaynor@gmail.com> | Fri Dec 01 11:41:25 2017 -0500 |
tree | 7108f14bfee1aebafdade8c8282b4f0cee32013d | |
parent | 4662d44fd3db5078a1882100653a3dbab3e3c7a1 [diff] |
Pass the right length of null bytes when no salt is provided to HKDF (#4036) This bug looks bad but ends up being benign because HMAC is specified to pad null bytes if a key is too short. So we passed too few bytes and then OpenSSL obligingly padded it out to the correct length. However, we should still do the right thing obviously.