Both now share K = X25519(a, X25519(b, 9)) = X25519(b, X25519(a, 9))
as a shared secret. Both MAY check, without leaking extra
information about the value of K, whether K is the all-zero value and
abort if so (see below). Alice and Bob can then use a key-derivation
function that includes K, K_A, and K_B to derive a symmetric key.
As per RFC 7748:
Just to double check if we do that